0% found this document useful (0 votes)
28 views10 pages

Blockchain Project Implementation Paper by RK

Uploaded by

druv1404
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views10 pages

Blockchain Project Implementation Paper by RK

Uploaded by

druv1404
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Certificate Validation System Using Blockchain

Druva S
Vidyavardhaka College of Engineering ,Mysuru, India

Abstract

Traditional paper certificates are susceptible to forgery, hindering trust and efficiency in the verification process.
This project proposes a novel solution using blockchain technology to revolutionize certificate validation. The
system leverages the immutability and decentralization of blockchain to create a secure and tamper-proof record of
issued certificates. Issuing authorities manage certificates through a web application, while verifiers can instantly
confirm authenticity using a dedicated platform. The system utilizes smart contracts for secure data storage, access
control, and automated validation. This approach offers significant advantages: enhanced security by eliminating
forged certificates, streamlined verification for faster turnaround times, increased trust through transparency, and
improved efficiency with automation. This study shows how blockchain technology may revolutionize certificate
validation and create a more reliable and safe credential management ecosystem .

Keywords: Blockchain, Ethereum, Validation, Solidity, Ganache-Cli,Truffle;


1. Introduction
Relying on paper certificates presents a significant challenge in today's digital landscape. Verifying their
authenticity often involves contacting issuing institutions, a cumbersome and time-consuming process.
Furthermore, the inherent vulnerability of paper certificates to forgery creates a significant risk for both certificate
holders and verifiers.
Consider these real-world scenarios:
• A job applicant submits a fraudulent degree certificate. This not only hinders the hiring process for the employer
but also deprives a deserving candidate of the opportunity.
• A student attempts to transfer credits using a forged academic transcript This can have serious\ academic
consequences and erode trust in the educational system.

2. Related Works

Paper title: Design and Analysis of Digital Certificate Validation and Verification using Blockchain-based
Technology

 Focus: Provides a broad overview of how blockchain can prevent certificate forgery and highlights its core
functionalities.
 Enhancement Potential: Explore specific implementation details using popular blockchain platforms like
Ethereum or Hyperledger Fabric. You can see how smart contracts can automate certificate issuance and
verification processes.

1877-0509
Paper title: A Blockchain Based Certificate Authentication System

 Focus: Addresses user privacy concerns in certificate verification and proposes a blockchain-based solution
for secure and efficient verification.

Enhancement Potential: Analyze how existing privacy-preserving techniques like zero-knowledge proofs can be
integrated with the system to verify certificates without revealing student data.For user privacy, you might also
investigate the use of decentralized identity management systems.

 Paper title: CredChain: Academic and Professional Certificate Verification System using Blockchain

 Focus: Introduces CredChain, a detailed system utilizing Ethereum, smart contracts, and IPFS for secure
and transparent certificate verification.
 Enhancement Potential: CredChain offers a solid foundation. You can explore how to integrate a revocable
credential system within CredChain to allow institutions to deactivate certificates in case of fraud.
Additionally, analyze scalability solutions for CredChain to handle a large volume of certificates and users.

Paper title: Academic Certificate Validation Using Blockchain Technology

 Focus: Proposes a system using Hyperledger Fabric, a private blockchain platform, for secure and tamper-
proof storage and verification of academic certificates.
 Enhancement Potential: Explore the possibility of integrating Hyperledger Fabric with public blockchains
for wider adoption and transparency. Additionally, you can examine how Hyperledger Fabric can interface
with other blockchain platforms to facilitate smooth certificate verification between institutions through
interoperability standards.

Year Paper Inference Methodology


2023 Design and Analysis of Digital * Blockchain prevents server hacking and Lacks specific
Certificate Verification and data modification. * Blockchain offers implementation
Validation using Blockchain- tamper-proof data storage for certificates. details. Mentions
based Technology smart contracts for
automation.
2023 A Blockchain Based Certificate * Blockchain provides secure and efficient Not clearly defined.
Authentication System certificate validation. * Addresses user Mentions
privacy concerns. blockchain
technology for
secure verification.
2024 CredChain: Academic and * CredChain utilizes Ethereum, smart Details CredChain
Professional Certificate contracts, and IPFS for secure verification. * system with
Verification System using Blockchain offers immutable, secure, and certificate
Blockchain transparent verification. uploading,
verification, and
retrieval
functionalities.
3

2022 Academic Certificate * Blockchain offers secure storage and Focuses on


Validation Using Blockchain sharing of certificates. * Hyperledger Fabric Hyperledger Fabric
Technology provides tamper-proof and transparent for implementation.
verification. Mentions end-to-
end encryption.

Table.1. summarizes the complete literature survey

3. SYSTEM ARCHITECTURE:

DATA FLOW DIAGRAM: Data Flow Diagrams (DFDs), often referred to as bubble charts, are visual tools
used to represent the flow of information within a system. They illustrate how data is input, processed,
transformed, and output. DFDs are required for understanding system components, including processes,
data, external entities, and information flow. By breaking down a system into hierarchical levels of detail,
DFDs provide a clear and comprehensive view of how data moves through it. This graphical
representation aids in system analysis, design, and communication among stakeholders.

Key points:

 DFDs are used to model system components and data flow.


 They offer multiple levels of detail for different perspectives.
 DFDs are valuable for understanding and communicating system processes.
Fig.3. System Architecture.

4. INTEGRATION

1. Utilize blockchain technology to record certificate metadata and issuance details, ensuring transparency and
immutability of academic credentials. Each transaction, including certificate uploads, verifications, and revocations,
is securely recorded on the blockchain, providing a transparent audit trail.

2. Leverage blockchain's decentralized architecture and cryptographic algorithms to increase the security of the
certificate validation system. By distributing data across a network of nodes and employing consensus mechanisms,
blockchain ensures that certificates are tamper-proof and resistant to unauthorized alterations.

3. Manage permissions and access control for verification platforms and issuing institutions by implementing smart
contracts on the blockchain. In order to guarantee that only authorized parties are able to issue, validate, or revoke
certificates within the system, smart contracts can enforce preset rules and permissions.

4. By integrating blockchain technology, certificate validation system fosters trust and accountability. Institutions,
learners, and employers can all rely on the transparency and integrity provided by the blockchain, thereby
strengthening confidence in the authenticity and validity of academic credentials.
5

5. IMPLEMENTATION

1.Setting-up Firebase:
-Setup firebase for authentication purpose.
-Setup project-id for your project in firebase.
-Enter required details to .env file from firebase.

2. Starting IPFS Server:


- Install and configure an IPFS server for decentralized file storage.
- Start the IPFS server and ensure it's running properly.
- Configure IPFS settings to work with your application.

3. Running the Ganache Server:

-Set up a Ganache server or any other backend framework to manage IPFS and blockchain connectivity as well
as business logic.
- Start the Ganache server and ensure it's listening for incoming requests.
- Implement APIs for user registration, document upload/download, and other necessary functionalities.

4. Registering verifier:
- Implement a registration process for verifier.
- Authenticate verifier and securely store there credentials.
- Store judge information securely on the blockchain or in a database.

5. Authenticate Institute/organization:
- Implement a registration process for users.
- Authenticate users and securely store their credentials.
- Provide users the features they need to maintain their accounts.

6. Institute/organization uploads Certificate:


- Allow registered Institute/organization to log in to the system.
- Make it easy for users to upload court papers and case-related data by creating an intuitive user interface.
- IPFS hash is generated after successful upload of certificate for secure storage.

6. System Test Cases

S.NO INPUT Output

1 Academic Certificate Generation Certificate is successfully generated then Hashed is


created, then uploaded to IPFS.

2 Academic Certificate Verification Certificate is Successfully Retrieved from IPFS if exists


else results as invalid ID/Certificate might be tampered.
Table 2: Test Case Results.

7. Screenshots

Fig 4. Verification Page

Fig 5. Result: Certificate Tampered page


7

Fig 5: Result: Certificate Generation successful page

Fig 6. Results:Certificate validation result


Conclusion

By using smart contracts for automated validation and safe data storage, the suggested architecture greatly lowers
the possibility of counterfeit certifications. Employers, educational institutions, and other third-party verifiers can
quickly verify the legitimacy of credentials via streamlined verification via a dedicated site. This promotes openness
and trust throughout the ecosystem.
This blockchain-based technology has numerous benefits. Credential integrity is protected and enhanced security is
attained by doing away with the potential for faked certificates. Because all transactions on the blockchain are
recorded and available to authorized individuals, the transparency of this technology promotes greater confidence
among stakeholders. Process automation and quick verification boost efficiency significantly, enabling quicker
decision-making and less delays in professional and academic contexts.
To sum up, the incorporation of blockchain technology into certificate verification signifies a noteworthy
progression inside the credential management framework. This method offers a safe, transparent, and effective
solution that helps certificate holders, verifiers, and issuing authorities by tackling the major problems of forgery
and inefficiency. As blockchain technology develops further, its use in a variety of fields, such as certificate
validation, promises to completely transform the way we handle and validate credentials. This will ultimately lead to
the creation of a more dependable and secure environment for academic and professional success. This study opens
the door for further advancements in safe and reliable credential management by illuminating the revolutionary
potential of blockchain technology.
9

References

[1] A. Husain, M. Bakhtiari, and A. Zainal, “Printed Document Integrity Verification Using Barcode,” Journal
Teknologi (Sciences and Eng, pp.99-106, 2022.
[2] M.H. Eldefrawy, K. Alghathbar, and M.K. Khan, “Hardcopy document authentication based on public key
encryption and 2D barcodes,” In Biometrics and Security Technologies (ISBAST), 2022 International Symposium,
pp. 77-81, IEEE, March 2022.
[3] R. Jain, and D. Doermann, “Visualdiff: Document image verification and change detection,” In Document
Analysis and Recognition (ICDAR), 2013 12th International Conference on pp. 40-44, IEEE, August 2023.
[4] N. Ganesan, “Three foreigners jailed in Singapore for submitting fake academic certificates _ Human Resources
Online, Human Resources,” Available at: http://www.humanresourcesonline.net/three-foreigners jailed-for-
submitting-fake-academic-certificates/ (Accessed: 07 February 2018), 2017.
[5] S. Kalipa, “Home Affairs official sold us fake papers _ IOL News, Crime and Courts IOL News,” Available at:
https://www.iol.co.za/news/crime courts/home-affairs-official-sold-us-fake-papers-1929048 (Accessed: 08 February
2018), 2020.
[6] C. Lewis, “SABC News exposes fake payslips, bank statements,” 8 May 2018, 2018. [Online]. Available:
http://www.sabcnews.com/sabcnews/sabc-news-exposes-fake-payslips bank-statements/. [Accessed: 13-Sep-2018].
[7] B. Cresitello-Dittmar, “Application of the Blockchain For Authentication and Verification of Identity,”
Independent Paper, 2016.
[8] Y. S. Joshi, “The Future of Enterprise Printing: Securing Hardcopy Documents in the Digital Age: white paper,”
CIO Insight, no. July, pp. 1–12, 2020.
[9] C. Lakmal, S. Dangalla, C. Herath, C. Wickramarathna, G. Dias, and S. Fernando, “IDStack - The common
protocol for document verification built on digital signatures,” 2017 Natl. Inf. Technol. Conf. NITC 2017, vol.
2017–Septe, no. September, pp. 96–99, 2018.
[10] S. R. M. Oliveira, M. A. Nascimento, and O. R. Zaiane, “Digital Watermarking: Status, Limitations and
Prospects,” Technical Report TR 02-01, Department of Computing Science, Alberta University, Edmonton, Alberta,
Canada, 2002.
[11] S. Dhiman, and A. Singh, 2013. “Tesseract vs gocr a comparative study,” International Journal of Recent
Technology and Engineering, 2(4), pp.80, 2013.
[12] C. Patel, A. Patel, and D. Patel, 2012. Optical character recognition by open-source OCR tool tesseract: A case
study. International Journal of Computer Applications, 55(10), 2012.
[13] V. S. Chandel, “Deep Learning based Text Recognition (OCR) using Tesseract and OpenCV,” 06 June 2018,
2018. [Online]. Available: https://www.learnopencv.com/deep-learning-based-text-recognition-ocr using-tesseract-
and-opencv/. [Accessed: 13-Sep-2018].
[14] B. Karanjia, A. G. Karanth, S. Veerapaneni, S. Goswami, A. Sharma, and M. Boda, “Blockchain in the Public
Sector – Transforming Government Services through Exponential Technologies,” 2017.
[15] Universa, “Blockchain in Education,” 23 May, 2018. [Online]. Available:
https://medium.com/universablockchain/blockchain-in education-49ad413b9e12. [Accessed: 04-Sep-2018].
[16] A. S. de P. Crespo and L. I. C. García, “Stampery Blockchain Timestamping Architecture (BTA) - Version 6,”
2017, pp. 1–21.
[17] M. Salleh, and T.C. Yew, “Application of 2D Barcode in Hardcopy Document Verification System,” In ISA,
pp. 644-651, June 2009.
[18] C.M. Li, P. Hu, and W.C. Lau, “Authpaper: Protecting paper-based documents and credentials using
authenticated 2D barcodes,” In Communications (ICC), 2015 IEEE International Conference, pp. 7400 7406, IEEE,
June 2015.
[19] S. Mthethwa and N. P. Dlamini, “Verifying the Integrity of Hardcopy Document Using OCR,” in 2nd
International Women in Science Without Borders (WiSWB)-Indaba, 2018.
[20] N. Dlamini, S. Mthethwa, and G. Barbour, “Mitigating the Challenge of Hardcopy Document Forgery,” in
International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD), 2018,
pp. 1–6.

You might also like