0% found this document useful (0 votes)
103 views4 pages

Blockchain Based Certificate Validation System

Education is necessary for every individual. During the course of training, students obtain numerous certificates. You can use your certificates to apply for jobs in the public or private sector, but all of these certificates must be manually verified. Students may present fake certificates, which can be difficult to identify. The issue of academic falsification has been a long-standing issue in the academic world.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
103 views4 pages

Blockchain Based Certificate Validation System

Education is necessary for every individual. During the course of training, students obtain numerous certificates. You can use your certificates to apply for jobs in the public or private sector, but all of these certificates must be manually verified. Students may present fake certificates, which can be difficult to identify. The issue of academic falsification has been a long-standing issue in the academic world.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Volume 9, Issue 1, January 2024 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165

Blockchain based Certificate Validation System


Vrushank Rao*1, Vinay Kumar M*2, KC Sri Venkatesh*3
*123
Student, Department of Computer science and Engineering, Presidency
University, Yelhanka, Bangalore, India

Abstract:- Education is necessary for every individual. Even if the data is changed, it only takes one second to
During the course of training, students obtain numerous know that it has been tampered with.
certificates. You can use your certificates to apply for
jobs in the public or private sector, but all of these In blockchain, data or nodes are only verified if
certificates must be manually verified. Students may multiple parties approve them.Therefore, the system is
reliable and always authenticated.This will resolve the
present fake certificates, which can be difficult to
identify. The issue of academic falsification has been a operation issue.
long-standing issue in the academic world. Certificates distributed by universities are usually in
paper format.
To make your data more secure, everything should
be digitized according to the principles of When an applicant applies for a job in the public or
confidentiality, reliability, and availability. All of this private sector, the applicant has to submit it in paper form,
can be achieved using a technology called blockchain. but the organization has to manually check all the
Blockchain technology offers inherent security qualities certificates, which is very It is a time-consuming process
and can be used to generate digital certificates that are and some companies may submit certificates such as: The
tamper-proof and easy to verify. Each certificate has a examiner may not notice this during the process because the
unique hash key that any organization can use through case is legitimate and this unqualified candidate is given a
the portal to verify the certificate's authenticity. The chance.
advantage of this system is that there is less risk of
students losing or damaging their certificates, and In the past, there have been many cases where people
certificate verification is also very easy. have been arrested for selling fake certificates of various
organizations at low cost.
Keywords:- Blockchain, Digital Certificates,
Confidentiality, Reliability, Availability. Blockchain technology can be used to solve this
problem and reduce the creation of fake certificates.
I. INTRODUCTION
Blockchain can be used to store and verify certificate
In India, a student's learning is typically like starting data had been lot of cases in past where people are caught
kindergarten and then transferring to elementary school, selling fake certificates of different organization at low cost.
middle school, and high school. After graduating from high To eradicate such problem and diminish the production of
school, students must enroll in college. Finally, there is the fake certificates we can use the Blockchain technology.
possibility of changing universities. This is the basic cycle Blockchain can be used to store the data of the certificate
of a student's academic year. Some students then go on to that can be validated by anyone from any place.
further education. So the problem with this cycle is that at
each stage students have to submit all their certificates for The Blockchain is a decentralized shared distributed
verification. Certificates may be lost or damaged. Also, it is ledger; the data stored in the Blockchain is almost un-
cumbersome for the verifier to authenticate each certificate. modifiable. It is a type of database which is not centralized
Our country has such a large population that approximately and governed by the set of rules. In this study, we are going
26.3 million students graduate each year. Tracking and to develop the decentralized certificate verification
validating such large datasets is extremely difficult. application on the Blockchain. We are selecting this
technology because it is traceable, tamper proof and
This leads to the undesirable scenario of manipulating encrypted. By integrating the Blockchain technology
or creating fake or duplicate certificates. There are many Eliminate the problem of fake certificates.A smart contract
hidden agencies in our country that carry out this fraud is used on the backend to interact with the blockchain, and
hidden from everyone. the encrypted hash value of each document is stored on the
blockchain and verified against the user's document. This
Technology has come a long way so far.Distinguishing proposed system not only addresses the gaps in the current
between fake and genuine certificates requires a lot of system but also provides effective and concrete solutions.
concentration and wastes valuable time.
II. PROPOSED SYSTEM
To eliminate this disadvantage, a technology called A. Methodology
blockchain appears in our lives as a savior. Building a blockchain based certificate validation
Under realistic conditions, the data in the blockchain project means leveraging a decentralized and tamper proof
cannot be changed. nature of blockchain technology to ensure authenticity and
integrity of certificates.Below describe the main
components of the project: [13]

IJISRT24JAN371 www.ijisrt.com 400


Volume 9, Issue 1, January 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165

Fig. 1: Verification process.

B. Name: identifier.The hashed data is securely stored on the


Refers the name of the certificate owner.We are blockchain along with the assigned certificate ID.
inserting a field in the certificate data structure to store
name of person who purchase a certificate.This part of H. Blockchain Storage:
information becomes the transaction recorded on the Blockchain acts as a distributed ledger and stores all
blockchain. certificates and their corresponding hashed details.Each
block in the blockchain contains a set of certificates,
C. Course: creating a comprehensive and transparent repository.The
Specifies the course or program for which the certificate blockchain network's nodes collectively store the certificate
is awarded.It creates field in the certificate data structure to details in a decentralized fashion, including the Certificate
store course details.This field contains information such as ID, Certificate Hash, and other pertinent data.The fields for
course name,duration and other relevant details. the name of the individual, the completed course, the details
of the issuing organization, and any additional metadata
D. Issuing Organization: are defined in the certificate data structure. Consistency and
Identifies the organization or authority that issues the effective validation are guaranteed by this organized data.A
certificate.Includes a field in certificate data structure that certificate's details cannot be changed or removed once they
captures about issuing organization. are recorded due to the decentralized and immutable nature
of the blockchain. The validation process's integrity is
E. Certificate Hash: strengthened by its permanence.
We use cryptographic hashes of certificate data to
ensure data integrity.Create a unique identifier by I. Certificate Validation:
generating a hash (e.g.SHA-256) of the entire certificate To validate a certificate, a user provides a certificate
data, including name, course, issuing organization, and ID.The application uses this ID to retrieve the
other relevant details. Storing this hash on the blockchain corresponding hashed data from the blockchain.At the same
ensures that the record is tamper-proof.It is important to time, the certificate details provided by the user are hashed
note that any changes to the certificate data will generate a and the resulting hash is compared with the hash stored on
different hash, highlighting potential tampering attempts. the blockchain.If the hashes match, the certificate is
considered authentic and valid.If there is a mismatch, this
F. Certificate indicates possible tampering or manipulation of the
 ID: certificate data and advises the user to be careful.
Each certificate requires a unique identifier to facilitate III. RESULTS AND DISCUSSIONS
search and verification.
Blockchain-based certificate verification projects
To address this issue, we assign a unique certificate ID leverage the decentralized and tamperproof nature of
to each certificate at the time of issuance. This unique ID blockchain technology.When an individual completes a
becomes an integral part of the blockchain record, ensuring course, the issuing organization creates a unique certificate
easy search and quick verification. that includes the individual's name, the completed course,
G. Working of Application: and the issuing organization's details. This certificate is
assigned a certificate ID, and its contents are hashed using a
 Certificate Issued: cryptographic algorithm to create a digital fingerprint called
When a certificate is issued, details such as the owner's a certificate hash.This data is stored on the blockchain via
name, course, and issuing organization are captured. These smart contracts, ensuring transparency and immutability.To
details are hashed to create a unique certificate verify a certificate, users provide either the certificate ID or

IJISRT24JAN371 www.ijisrt.com 401


Volume 9, Issue 1, January 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
the certificate hash.The smart contract retrieves the recalculated hash matches the stored hash, the certificate is
relevant certificate details from the blockchain and considered authentic, providing a secure, efficient, and
recalculates the hash from the provided information.If the decentralized method of certificate verification.

Table 1: Result obtained vs Existing Methods


Criteria Blockchain-Based Certificate Validation Existing Methods
Uses decentralization and cryptographic Conventional techniques might entail actual certificates
hashing to provide tamper resistance. Data bearing seals and signatures. Secure databases and
Security integrity is ensured by immutability. encryption are used in digital methods.
Transparency may be lacking in traditional certificates.
Provides a decentralized ledger with high Transparency is achieved through centralized databases in
Transparency transparency, boosting stakeholder trust. digital methods.
Effective verification with a hash or Manual verification procedures might be necessary for
Certificate ID. Reliance on central authorities traditional methods. Validation via online platforms can be
Efficiency is decreased through decentralization. streamlined with digital methods.
Offers a forward-thinking solution, Digital methods are frequently utilized; traditional methods
Adoption particularly in sectors where credential are deeply ingrained. Adoption might be contingent upon
Potential validation and trust are valued. industry readiness to accept blockchain.
The consensus process and blockchain Physical certificates are prone to being misplaced or
Consideration platform are key components of security. destroyed. Issues with standardization and interoperability
and Challenges Scalability could be a problem. may arise with digital methods.

IV. CONCLUSION systems (ICSSS) is scheduled for


2020.http://10.1109/icsss49621.2020.9201988
In this paper, we proposed a solution to document [3]. Carlos Enrique Montenegro-Marin and Song,
forgery. Integrating blockchain technology can eliminate Hesheng. "Secure prediction and assessment of sports
the issue of forged or lost certificates. Check your injuries using deep learning based convolutional
certificates anytime, anywhere. This application provides neural network." 12.3 (2021): 3399-3410 in Journal of
accurate and reliable information about digital Ambient Intelligence and Humanized Computing.
certificates. A blockchain-based certificate validation [4]. Jinping Chang, Sujatha Krishnamoorthy, and
project includes key elements such as name, course, issuing Seifedine Nimer Kadry. "Review and synthesis of Big
organization, certificate hash, certificate ID, etc., and issues Data analytics and computing for smart sustainable
security, reliability, and efficiency in the certificate cities." Smart Transportation Systems, IET (2020).
validation process. Provides a robust solution to address [5]. "Behavior-based swarm model using fuzzy controller
By using decentralized blockchain technology, this project for route planning and E-waste collection," Batoo,
ensures the integrity and immutability of certificates, Khalid Mujasam, et al. Pollution Research and
thereby significantly reducing the risk of fraud. Certificate Environmental Science, 2021, 1–15.
ID allows you to quickly and reliably retrieve certificate [6]. L.Zhang, D.Choffnes, D.Levin et al., "Analysis of SSL
details, simplifying the verification process for various certificate reissue and revocation during Heartbleed,"
parties. A cryptographic hash of the certificate content Procedures ACMIMC'14, November 2014, p.489–
provides a tamper-proof mechanism that enhances the 502.
overall security of the system. This innovative approach not [7]. M.Carvalho and R.Ford, “Moving target defense for
only minimizes dependence on central authorities, but also computer networks,” IEEE Security & Privacy, vol.12,
promotes transparency and trust in validating education and Nine.2, S.73–76, Ma rz-April 2014.
training qualifications. As projects evolve, collaboration [8]. Papazoglou, M., Service-oriented computing:
with stakeholders, compliance with regulatory standards, concepts, characteristics, and directions, International
and a focus on user-friendly interfaces will be essential to Conference on Web Information Systems
widespread adoption and success in the certificate Engineering.2003, IEEE: Rom.
validation space. [9]. D.Ferraiolo, R.Kuhn, and R.Sandhu, “Rbac Standard
Rationale: Comments on “A Critique of the ANSI
REFERENCES Standard for role-based Access Control,” IEEE
[1]. The Proposal of a Blockchain-based Architecture for Security Privacy, vol. 5, no.6, p.51–53, November
Transparent Certificate Handling, J. Gresch, B. 2007.
Rodrigues, E. Scheid, S. S. Kanhere, and B. Stiller, [10]. A.Ouaddah, A.A. Elkalam, and A.A.Ouahman,
BIS2018: Business Information System. Workshops, “Towards a Novel Privacy-Preserving Access Control
vol. 339 of Lecture Notes in Business Information Model Based on Blockchain Technology in IOT,”
Processing, Springer, pp. 185-196, 2018. Information and Communication Technology
[2]. Jayachitra, J., Matilda, S., and Gayathiri, A. (2020). Advances in Europe and MENA
Blockchain-based certificate validation. The seventh Cooperation.Springer, 2017, S.523–533.
international conference on smart structures and [11]. L.Y.Chen and H.P.Reiser, “Distributed Applications
and Interoperable Systems, 17th International

IJISRT24JAN371 www.ijisrt.com 402


Volume 9, Issue 1, January 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
Conference Held as Part of the 12th International
Conference on Distributed Computing Technologies
ifip wg 6.1, Lectern 2017, Discotec 2017, Neuchter,
Switzerland., June 1922, 2017”Springer, 2017.
[12]. Q.Shea, E.B.Shifa, K.O.Asamoah, J.Gao, X. Du, and
M.Guizani, “Medshare: Trustless exchange of medical
data between cloud service providers over
blockchain,” IEEE Access, vol. 5, 14 757–14 767,
2017.
[13]. Nguyen Huynh-Tuong, Hoang-Anh Pham “CVSS:
Blockchained Certificate Verification Support
System” https:
//www.researchgate.net/publication/329139747

IJISRT24JAN371 www.ijisrt.com 403

You might also like