Nitya - A Secured Crime Report System Using Permissioned Blockchain
Nitya - A Secured Crime Report System Using Permissioned Blockchain
A Synopsis Submitted
in Partial Fulfillment of the Requirements
for the Degree of
Bachelor In Technology
in
Information Technology
by
Sarvottam Kumar Singh (41551203116)
Narender Singh (40851203116)
Pranav Saxena (60151203116)
Under Supervision of
September, 2019
Synopsis
1. Introduction
It is an automated case management system designed
exclusively for criminal trial courts. The system is up to date in all
stages of case related record keeping from case initiation through
disposition and appeal, if applicable.
2. Motivation
Why blockchain?
Ledgers are at the core of every business. Ledgers store the flow
of assets, such as payments to suppliers, taxes owed, and goods
delivered. They also store the firm’s current balances. All of a firm’s
revenue, relationships, and assets are recorded on a core system of
ledgers. For centuries, these records were stone, clay, or paper-based.
However, these records were among the first systems to be automated
and moved to computing systems.
3. Related work
The concept of Blockchain technology was first proposed by
Satoshi Nakamoto[1], it is a cryptographically engineered software
platform to store ledger using peer to peer network. It is a sequential
chain of blocks where every block contains a cryptographically hash
value of previous block, time-stamp and the block information. From
the above method we can ensure the integrity and security of the block
and we can identify the invalid block. The first application of this
technology was Bitcoin, which allows cash transaction using internet,
through peer to peer network without a central authority and in a
trustless network. The author gave a resolution to the problem of
double spending. The system uses the method of timestamp by
hashing the block into continuous chain based of proof of work
mechanism.
The introduction of the DAPP and smart contract comes was
mentioned in this paper[10]. We have blocks in the Ethereum
blockchain, these blocks are linked together and each blocks we have
list of transaction similar to bitcoin. Inside these transaction we do have
timestamp and other parameters which we can programme it.
Ethereum blockchain gets stored in every miners computer which is
called a node, it uses the proof of work algorithm to verify the network.
The block contains the smart contract which has the code snippet that
runs in each block, when the code computation is successfully
executed in each miner’s computer. It is sent to whole network so that
the other miners can agree. The successful verification of the block will
be added to the chain.
The author did a thorough study about the IPFS. According to
the author they want to make the web completely distributed by
running it top of the peer to peer networks, it will work similarly how
bit-torrent works. In the current scenario when we want to download
the content from the web, we have to provide the exact location which
we call a URL. Present-day, the model which is followed to download
the content is centralize i.e. it is govern by a particular organization –
this is called location-based addressing, but if the server is down then
we will not get the content. There is a chance that there must be
someone who will have the copy of that content in their device which
we were searching yet we won’t be able to get that. To solve this issue
IPFS works from location-based addressing to content-based
addressing. All the files in the internet will have a unique figure print.
When we want to download the file we have to compare the hash
value and the content will be available. In IPFS there are different types
of file that we can store, an object is created in which files are stored,
and these object can only store up to 256kb of data. So to store a file
like a video n-1 number of objects are created and in n object all the
n-1 objects are linked in a sequential manner. This can be used as a file
system. The biggest disadvantage of this system is to keep the file
available. So to avoid this we can incentivize people to keep the file
available or we can proactively make the file distributed so that the file
is available – this defines the system of Filecoin.
This paper describes about the software that can be used to
create blockchain based solution for businesses. Hyperledger is an
open source platform, in 2015 people from different industry came
together to make blockchain more accessible to the world. In this
platform the member who are linked to the transaction will only be
notified, this create privacy and confidentiality of the transaction.
Hyperledger fabric came up with the concept of permissioned
blockchain technology. In this paper[3] the author talks about
decentralized crowd based platform that will identify the scams in
internet and it will also provide notification to the other people about
the scams in the internet, due to the growth of the cryptocurrency the
scams have also increased like phishing website, fake projects and
various scam scheme have grown these days. It works with the help of
any browser. When a person will do any transaction through the
internet there will be a flag which will appear in the browser which will
say whether the website is safe or not if these notification does not
appear then that person can provide them a report about the website
and the crypto police give them a reward. The report will be verified by
the officers of crypto police. The main task of crypto police is to report
fraud in the cryptocurrency market. In this paper, the author discusses
about the importance of blockchain in the medical field. The sensitive
data in the medical field is getting manipulated this enfeeble the
integrity of data.
Although, there is no work done in the field of law and justice
enforcement available using the permissioned blockchain. Most of
them are based on centralised system and there is also one paper have
been published [4] which leverage ethereal blockchain for building
secured FIR system.
4. Proposed Method
To provide more secure, easy tracing and sharing of the crime
report data sharing and management, this paper proposes a method
of using permissioned blockchain which surpasses all the shortcoming
imposed by the current method of digital crime report system.
• Distributed Ledger
Hyperledger Fabric has a ledger subsystem comprising two
components: the world state and the transaction log.
Each participant has a copy of the ledger to every Hyperledger
Fabric network they belong to.
The world state component describes the state of the ledger at a
given point in time. It’s the database of the ledger. The transaction
log component records all transactions which have resulted in the
current value of the world state; it’s the update history for the world
state. The ledger, then, is a combination of the world state database
and the transaction log history.
The ledger has a replaceable data store for the world state. By
default, this is a LevelDB key-value store database. The transaction
log does not need to be pluggable. It simply records the before and
after values of the ledger database being used by the blockchain
network.
• Peers
Peers are the transaction endpoints for organizations and make
up much of the physical structure of a network. They are maintained
by members (organizations) whose identities are known by the
blockchain network. Peers can maintain multiple ledgers (they have
one for every channel they are a member of) and endorse
transactions.
• Channel
A channel contains a subset of network members who want to
communicate and transact privately. Ledgers are channel specific
(that is, every channel has a separate ledger). Only the peers on a
channel can see the assets and transactions for its ledger. As a result,
channels ensure privacy for participants within the network. It enables
inter agency communication very easy and secure.
• Smart Contract
Hyperledger Fabric smart contracts are implemented in
chaincode. When an application needs to interact with the ledger, it
invokes these contracts by sending transactions into the Fabric
network. This is the case because chaincode predominately interacts
only with the database component of the ledger and not the
historical transaction log.
• Certificate Authority
The certificate authority (CA) identifies all entities in the network:
Peers, the ordering service, and the participants who are submitting
transactions and accessing the ledger. These identities are provided
and secured by using a public key infrastructure (PKI). Peers use the
CA to cryptographically sign transactions and contracts, whereas
participants use the CA to prove that they have a right to access the
network.
• Client SDK
The Hyperledger Fabric Client SDKs enable interaction between
your client application and your blockchain network. With support for
multiple languages, the SDK contains APIs that allow an app to
connect to and to access the smart contracts and the ledger for the
channel the peer is on.
• Permissioned Network
In other blockchain systems, anyone who has the internet can
connect to the network and view all the blockchain data and
transactions. In businesses it will be a problem because data privacy
and isolation are an issue. Using fabric we can create the
permissioned networks where all parties are known identities. In
business context, we need to make sure with whom we are
transferring data, allowing to access our data. It can be easily
handled in the fabric framework that brings more trust and
transactions also remain confidential.
• Consensus
Process of keeping the ledger transactions synchronised across the
network. The update to the blockchain information happens because
of the approved participants. Ledgers do update the same
transactions in same order is called consensus.
• Data security
When dealing with critical evidence the importance of keeping data
secure is paramount. By avoiding vendor lock-in coupled with
patented data fragment spreading and recovery technology,
Leonovus Vault offers a storage solution that ensures that if a data
breach occurs hackers receive nothing of value, All while keeping
your network owned, controlled, and open to authenticated users.
The main characteristics of the blockchain technology is the level of
security it provides to the network. This technology uses the
cryptographically engineered block to make the information secured,
the use of SHA-256 and hash tree are the few algorithms used in this.
When we are performing these algorithms, we are basically hiding
the identity of an individual – this will help to create a no trust
network. When a case is filed, the user that is the complainer,
suspect, witness and the officer will not know the individual’s identity
then there will not be any manual intervention in the case – the
proceeding of the case will carry out smoothly. The decentralization
of blockchain is an add-on benefit as there would not be a central
govern person to interfere. When there is a single administration
there is a single point of failure, the deletion of the data is easy in the
network. The system that we are going to address will avoid all these
security threats, we will be developing this system from the open
source marketplace, which will rely on the Blockchain technology.
• No cryptocurrency
• Tracing criminality
• Transaction ordering
Only signatures of the transaction and read/write sets are sent around
the network. Only Endorsers and committers truly see the transaction.
So fewer level of trust bring more security to the system.
5. Methodology
In our use case, we are having two organisations i.e. one is Police and
second one is Court. Each organisation agreed to share the
information of crime report and update according to the permission
they enjoy.
we need one service which validates all the transaction in the network
called orderer. We are going to have one common orderer in the
network.
“Since we have identified the number of entities going to be in our
network. We need to generate valid certificates for each and every
entity in the network. That’s how private blockchain network is created”
“To interact with each blockchain node — which is the entry point, we
should have valid users also. Certificates for users also to be created.
Each organisation will have one Admin user. That admin user is
responsible to provision new users to the organisation.”
• September, 2019
—> Building the architecture and design of the system.
—> Establishing the certificate for all the stakeholders.
—> Creating the channel between organisations.
—> Building the policies for the organisation and consensus to
sign agreement between them.
—> Building the smart contract i.e. business logic to interact
fabric blockchain, deploy it to the peers and test it
continuously.
• October, 2019
—> Building the UI/UX of the application.
—> Building the Front end of the application.
—> Integration of the client side to the fabric Blockchain.
7. References
[1] https://bitcoin.org/bitcoin.pdf
[2] https://www.hyperledger.org/wp-content/uploads/2018/07/
HL_Whitepaper_IntroductiontoHyperledger.pdf
[3] https://arxiv.org/pdf/1801.10228
[4] https://www.irjet.net/archives/V3/i4/IRJET-V3I4235.pdf
[5] https://www.researchgate.net/publication/256518389_E-
P o l i c e _ S y s t e m _ f o r _ I m p r o v e d _ E -
Government_Services_of_Developing_Countries
[6] https://hyperledger-fabric.readthedocs.io
[7] https://medium.com/@grsind19/hyperledger-development-with-
in-21-days-day-10-858aae6e7ff9
[8] https://www.youtube.com/watch?v=Rw6KoLND9tc
[9] http://www.newindianexpress.com/cities/thiruvananthapuram/2018/
aug/02/police-to-launch-blockchain-technology-for-better-data-
management-1851911.html
[ 1 0 ] h t t p : / / b l o c k c h a i n l a b . c o m / p d f / E t h e re u m _ w h i t e _ p a p e r-
a_next_generation_smart_contract_and_decentralized_application_plat
form-vitalik-buterin.pdf