Preserving Identity Leakage, Data Integrity and Data Privacy Using Blockchain in Education System (#1093787) - 2334092
Preserving Identity Leakage, Data Integrity and Data Privacy Using Blockchain in Education System (#1093787) - 2334092
Ozgur Oksuz
Adiyaman University
Department of Computer Engineering
Adiyaman, TURKEY
[email protected]
Research Paper Received: 30.01.2022 Revised: 26.03.2022 Accepted: 03.04.2022
Abstract—Today, blockchain technology is evolving and has been used in many sectors such as healthcare, supply chain
management, internet of things (IoT) and cryptocurrency exchange. Using this technology in these areas provides very good
functionalities. A blockchain network is immutable, public, open, distributed, secure and reliable. This paper is about using
blockchain technology in education system. Applying blockchain technology to education system brings all those properties above.
However, user (student) data privacy and identity management of the entities in the system should be also considered. In this paper,
the proposed scheme not only satisfies all these properties but also protects student data privacy and identity management of the
entities when they communicate with each other. The proposed construction consists of encryption algorithms to protect students’
private data and provide secure communication between the entities. Moreover, the proposed scheme does not leak students’
identities to third parties in the blockchain.
1
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE
O. Oksuz, Vol.11, No.1, pp.1-14
another problem when a student applies for an the blockchain. Student’s data integrity is pre-
internship/summer job. Furthermore, storing each served.
student’s academic information/records for a long The organisation of the paper as follows: Section
time can create another problem. These records 2 presents related work. Section 3 introduces the
can be lost due to human mistake or to have definitions that are going to be used throughout
some natural disasters such as flooding. Putting all the paper. In Section 4, the architecture and the
students’ academic records into blockchain elimi- transaction types are introduced in the blockchain.
nates these kinds of disadvantages. However, other Then, the proposed scheme is presented in Section
problems can arise. One of the problems is to 5. In Section 6, security analysis of the scheme is
protect student’s data privacy. Data privacy says that given. In Section 7, we give the conclusion.
any unauthorized entity cannot read the student’s
sensitive information such as student’s real identity, 2. Related Work
course grades, taken courses, enrolled program, and
owned certificates. Thus, data privacy should also There have been some studies that use blockchain
be addressed using blockchain. Another issue that technology in education system. These studies are
should also be considered is identity leakage. The [6], [7], [8], [9], [10], [11]. In [6] students’ grades
students’ identities should be hidden in the sys- are not in the blockchain. The completed courses
tem. Otherwise, any untrusted third party can map of the student are putting into the blockchain.
transactions in blockchain to a student. Then, this However, the courses are still disclosed. This may
untrusted party can do some statistical analysis to rise a problem that student can be rule out if it
make a profile for the student. To address the above is overqualified. Our scheme does not leak any
problems, this paper introduces a system that has sensitive information about student at the beginning.
the following properties: Our scheme leaks only the required courses based
on the job title. The study in [8] uses two kinds
• A brief mathematical formalization and con- of blockchains: private and public. Moreover, it
struction of the system is given to protect sensi- focuses on privacy and integrity of the students’
tive data of the students, manage identity of the data. [9], [10] focus on putting students’ certificates
parties, and process of adding student records into the blockchain not the courses and grades of the
to the blockchain. students. In [11], the first university (the university
• The sensitive data (student’s real identity, grade, of Nicosia) issues the academic certificates for stu-
course identity, program identity) of the stu- dents. The given certificate is verified using bitcoin
dents is stored in the blockchain and is en- blockchain. In [7], Sony Global Education develops
crypted. The data is only seen in the clear a new blockchain for storing academic records. The
by the third parties when a student is trans- work in [12] presented a blockchain-based (permis-
ferred/enrolled to another university/program or sioned) repository for educational credentials but it
applies to an internship. In this case, the leakage does not have privacy protection of the students’
is only limited to the corresponding transactions private data. The work in [13] has the same problem
based on the requirements of the position that that it does not introduce any protection mechanism
the student applies to. for students’ private data. The studies in [14], [15],
• The data of all transactions are immutable in [16], [17], [18] use permissionless blockchain in
2
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE
O. Oksuz, Vol.11, No.1, pp.1-14
education system. [15] does not have protection an output y is given, it is infeasible to compute x
mechanism against student private data. Studies from y. This property is called as ”One Way”. It
in [15], [16], [17], [18] use off-chain storage. It is infeasible to find another z that satisfies H(x) =
means that students’ credentials are not stored in H(z) = y. This is called as ”Collision Resistant”.
blockchain. They are stored in a file storage system. A secure hash function algorithm should satisfy the
Indy Hyperledger [19] is a public permissioned all above properties. SHA-256 can be used to have
blockchain system that allows users to share all these properties.
their identities (based on credentials) anonymously.
Moreover, this system is able to issue and revoke 3.2. Symmetric/Private Key Encryption
cryptographic credentials [20], [21]. Anyone with
read access to the ledger can verify signatures made A symmetric encryption key scheme consists of
by issuers on credentials. In order to use this system 3 algorithms: Key generation (KGen), Encryption
(hyperledger Indy), the credentials that students own (SEnc), and Decryption (SDec). KGen is the
need to be known in advance. Every user can have key generation algorithm takes a security param-
different credentials. However, it could be very eter and outputs a key for user u: Secret key
difficult to manage these credentials. In addition, (SSku ). Encryption algorithm takes a message m
it uses heavy cryptographic operations. Moreover, and the secret key (SSku ), outputs the ciphertext
in this work, these kind of heavy cryptographic C = SEncSSku (m). Decryption algorithm takes
tools are not used. The students do not participate the secret key SSku and C, outputs message m =
in the blockchain network and the blockchain does SDecSSku (SEncSSku (m)). A secure symmetric key
not contain the students’ identities in the clear. encryption scheme should be resilient at least to
This hides students’ identities in the blockchain. Chosen Plaintext Attack (CPA). It means that even
However, once the student applies/communicates to a message m is encrypted over and over again,
a company for an internship or a permanent job, the the resulting ciphertext should be different each
student’s real identity is disclosed to corresponding time. An example of CPA secure algorithm is AES
recruiter. The recruiter needs to know the student to (Advanced Encryption Standard) with CBC mode.
communicate with the institution for this student to
verify if the student has satisfied the internship/job 3.3. Asymmetric/Public Key Encryption
requirements.
An asymmetric encryption protocol consists of
3. Definitions 3 algorithms: Key generation (KGen), Encryption
(P Enc), and Decryption (P Dec). KGen is the key
3.1. Hash Function generation algorithm takes a security parameter and
outputs a key pair for user u: Public key P P ku
A hash function is a mathematical algorithm that and Secret key P Sku . Encryption algorithm takes
has the following properties: It maps an input x of a message m and public key P P ku , outputs a
any size to an output of fixed size y. This is shown ciphertext C = P EncP P ku (m). Decryption algo-
as H(x) = y. It is deterministic algorithm, which rithm takes the secret key P Sku and C, outputs
means that if the algorithm retakes x, the output is message m = P DecP Sku (P EncP P ku (m)). A secure
always y. The algorithm is efficiently computed. If asymmetric key encryption scheme also should be
3
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE
O. Oksuz, Vol.11, No.1, pp.1-14
3.4. Signature
4
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE
O. Oksuz, Vol.11, No.1, pp.1-14
public.
The work flow of the system is the following:
0. Each node (trusted or untrusted) registers its
public key to CA. Then, CA authorizes each
node’s public key. Moreover, CA makes these
public keys public. Thus, everyone in the sys-
tem knows the identities of others.
1. After grading a student’s exam, an institution Figure 2. An illustration of storage, course
sends the student’s grade as a transaction to policy and program policy blocks/transactions.
other trusted nodes.
2. If most of the nodes (more than 50%) verify
that the transaction is correctly formed, it is put an internship. Students can present fake information
into the blockchain as a block by every trusted about their academic history when they apply a job
node. or an internship.
3. If a Stu is transferred to another institution or We assume that malicious adversaries can not
applying on a job, an Ins or a Rec asks the collude with each other. It means that they can
current institution to hand over some tokens not share specific information with each other. This
to retrieve the student information from the information can be their real identities, public keys
blockchain. (pseudonym identities) and their secret keys. More-
4. Once an Ins or a Rec gets corresponding over, any student can not collude with any recruiter.
tokens from the student’s current institution,
the Ins or the Rec retrieves the corresponding
4.2. Transactions
student’s information (as a transaction) from the
blockchain.
In this section, transactions (storage, course policy
and program policy) of the proposed scheme as
4.1. Threat Model
blocks are going to be presented. In other words,
each transaction is going to be a block. In Fig.2,
In this paper, CA and Institutions are trusted en- there are three types of transactions. Multiple trans-
tities. Recruiters and students are untrusted entities. action types in a blockchain are not new. These
Recruiters and students are malicious adversaries are used in other studies such as in [2]. While
that they can provide fake or altered information institutions issue storage transactions, course policy
to institutions. Recruiters try to learn private data transactions and program policy transactions are
of students in the blockchain. Recruiters can ask only issued by CA.
institutions for decryption keys to learn specific
A storage block consists of the following infor-
students’ private data in the blockchain. Moreover,
mation:
recruiters can change data that comes from student
A. Then, it asks institution for decryption keys to S1. Transaction Type (T T ): This is type 00 which
learn private data of student B. Student A can also is storage transaction.
pretend to be student B when applying a job or S2. Transaction Number (T N )
5
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE
O. Oksuz, Vol.11, No.1, pp.1-14
6
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE
O. Oksuz, Vol.11, No.1, pp.1-14
7
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE
O. Oksuz, Vol.11, No.1, pp.1-14
algorithms are announced to the public, each node with each other, they show their valid certificates –
(trusted and untrusted) and CA chooses their secret that are digitally signed by CA’s private key- to each
key/public key pair for signature algorithm and other.
chose their secret/public key pair for public key
Moreover, each student Stuq registers its signature
encryption algorithm. CA’s secret key and public
public key SignP kstuq and public encryption key
key pair for signature algorithm are represented as
P P kStuq to its corresponding institution Insj . This
SignSkCA and SignP kCA . A trusted node i’s secret
can be done when student enrols a program in that
key and public key pair for signature algorithm
institution.
are represented as SignSki,t and SignP ki,t . An
untrusted node j’s secret key and public key pair for Transaction: Three cryptographic primitives are
signature algorithm are represented as SignSkj,ut used for storage transaction phase: Symmetric En-
and SignP kj,ut . cryption (SEnc), Hash (H) and Signature (SIGN ).
Once student’s exam is graded, institution j (Insj )
Moreover, CA’s secret key and public key pair
encrypts its grade G, corresponding real identity
for public key encryption algorithm are represented
(SRI) of the student, corresponding course identity
as P SkCA and P P kCA . A trusted node i’s secret
number CID and corresponding program identity
key and public key pair for public key encryption
number P ID. We use the following notations: GStuq
algorithm are represented as P Ski,t and P P ki,t . An
as the grade of student q, SEnck (GStuq ) as the en-
untrusted node j’s secret key and public key pair
cryption of the grade G of student q, SEnck′ (CID)
for public key algorithm are represented as P Skj,ut
as the encryption of the course identity number
and P P kj,ut .
CID, SEnck′′ (P ID) as the encryption of the pro-
Furthermore, each student Stuq also chooses se- gram identity number P ID and SEnck′′′ (SRI)
cret key and public key pair for signature algo- as the encryption of the student’s real identity.
rithm as SignSkStuq , SignP kStuq and chooses pub- Here k, k ′ , k ′′ , k ′′′ are four different secret private
lic/secret key as P SkStuq , P P kStuq for asymmetric encryption keys chosen randomly by Insj for SEnc
public key encryption algorithm. A note that all algorithm. Moreover, Insj uses hash algorithm H
secret keys are chosen randomly for security. to hash the following data
Register: In this phase, each node’s (trusted or un- DH = H(T T ||T N ||SEnck′′′ (SRI)||SEnck′ (CID)||
trusted) public encryption key P P ki and signature
SEnck′′ (P ID)||SEnck (Gstuq )||SignP kj ||HP Bl ||T S),
public key SignP ki for node i are going to be
where ∥ is the concatenation symbol.
registered to the system by CA. In the system, each
public key (for signature and encryption) will be In the hash data, institution signature public key
identity of a party (trusted node, untrusted node, SignP kj is chosen as the institution identity num-
CA). A standard Public Key Infrastructure (PKI) ber. Moreover, HP Bl is chosen as hash of the
scheme can be used to register entities public keys. previous block. We assume that current block is
CA also acts as certificate authority that is respon- l + 1. We also assume that SRI is only known to
sible for identities of the parties in the blockchain student itself and the institution. This information
network. After the parties’ identities have been is never seen in public. Only authorized people
verified, CA generates digital certificate under the (old and new institution, recruiter when student
parties’ public keys. When the entities communicate applies a job or an internship, and CA) can know
8
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE
O. Oksuz, Vol.11, No.1, pp.1-14
9
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE
O. Oksuz, Vol.11, No.1, pp.1-14
S1. Stuq generates a tuple, R1. Recm first decrypts P EncP P kRecm (M ) in step-
(App||InstitutionInf o||RecruiterInf o|| S4 as DecP SkRecm (P EncP P kRecm (M )) and gets
StudentInf o1||StudentInf o2||Reqs), where the tuple (M ). Thus, Recm knows Stuq ’s real
App ∈ {Job, Internship, T ransf er} identity SRI, pseudonym identity SignP kStuq
shows the purpose of the application. and student’s current institution information.
InstitutionInf o is the current institution Recm also checks if the signature is a valid
information which is SignP kInsj (signature signature.
verification key of the institution), R2. Recm knows who is applying to the po-
RecruiterInf o is the recruiter information sition. If the signature is valid from step-
which is SignP kRecm (signature verification R1, Recm computes P EncP P kInsj (M ) and
key of the recruiter), StudentInf o1 is SIGNSignSkRecm (P EncP P kInsj (M )). Then it
the student’s pseudonym identity which is sends them to Insj .
SID = SignP kStuq (signature verification key
Institution
of the student), StudentInf o2 is the student’s
real identity which is SRI, and Reqs is I1. Insj firstly decrypts the ciphertext in step-S3
the requirements of the position of a job/an and gets M . Then, it checks/verifies the sig-
internship. Reqs consists of the requirements nature using SignP kStuq that if the encrypted
of the position, deadline of the application and message (in step-S3) is generated by Stuq .
10
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE
O. Oksuz, Vol.11, No.1, pp.1-14
If the signature is valid, Insj learns what course. In the block, the recruiter simply retrieves
Stuq wants to do (internship/job application or CP4 (course requirements). This allows the recruiter
transfer to another university) and where Stuq to see what topics have been covered in this course.
wants to apply (who is the recruiter) and what
the requirements are for the position that Stuq 5.1. Discussions
applies (Reqs). These are all learned from M .
Insj also checks if SRI and SID belong to When a student wants to be transferred another
same student. institution and wants to study the same program, the
I2. Next, Insj decrypts the ciphertext in step- new institution requires all the course history of the
R2 and gets M . Then, it checks/verifies the student. This case old university needs to send all
signature that if the encrypted message (in step- the secret keys of the corresponding ciphertexts with
R2) is generated by Recm . all the corresponding transaction numbers. When a
I3. If the tuples from step-I1 and step-I2 are the student applies for a job that it requires completing
same and all the checking/verification steps in the program of study, the recruiter (employer) also
I1 and I2 are successfully completed, Insj needs to have all course history of the student with
sends transaction numbers (T N ) and the se- the transaction numbers. This is because whether
cret keys to decrypt ciphertexts (encrypted stu- the student has completed the all the requirements of
dent’s private information) in the transactions the program for a degree. For this case, the recruiter
to Recm . needs to retrieve program policy transaction in the
blockchain for verification.
Once Recm has the secret keys, it can decrypt the
sensitive data required for the position. For example, A student can provide fake academic history via
if Insj sends its CV/Resume to the recruiter when the student
applies for the position. This can be done by the
P EncP P kRecm (IID||T N ||k ′′′ ||k ′ ||k ′′ ||k) and
student updating the message tuple as follows:
SIGNSignSkInsj (P EncP P kRecm (IID||T N ||k ′′′ ||k ′ ||k ′′
(Internship||SignP kInsj ||SignP kRecm ||SignP kStuq
||k)) to Recm . Recm decrypts the ciphertext as
||SRI||CV /Resume||Reqs). Since all the academic
P DecP SkRecm (P EncP P kRecm (IID||T N ||k ′′′ ||k ′ || history of the student is stored in the blockchain
′′ ′′′ ′ ′′
k ||k)) = IID||T N ||k ||k ||k ||k. It gets tuple and it is immutable, student does not get any
(IID||T N ||k ′′′ ||k ′ ||k ′′ ||k). Then, it checks if the advantage by presenting fake results (CV ) to the
signature is valid using verification key IID = recruiter. The recruiter needs to communicate with
SignP kInsj . If the signature is valid, it decrypts the institution for the student’s real academic history
the ciphertexts in the transaction using the keys for the requirements (Reqs) of the position. Thus,
k, k ′ , k ′′ , k ′′′ to retrieve the student’s information. the recruiter can easily verify student’s CV this
After decrypting all the sensitive information, the case. Since the student can not get any advantage
recruiter sees the student’s grades, course identities, by faking its academic history, we don’t add the
program identity, real identity. Moreover, once the student’s CV to the tuple in the real protocol.
recruiter gets course identity, it can look for the As a note that students can study multiple pro-
course identity in the course policy transaction block grams, masters and PhDs. Moreover, students can
in the blockchain for getting information about the enroll multiple programs and have multiple degrees,
11
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE
O. Oksuz, Vol.11, No.1, pp.1-14
and have their certificates. Putting these certifi- in a company (recruiter), the leakage is limited that
cates as pictures and all other information to the only the required decryption keys of the transac-
blockchain can be problematic. This is because each tions and corresponding secret keys are sent to the
node in the blockchain network has limited source recruiter. Moreover, the decryption keys are not sent
capabilities such as storage. This case the values in the clear, they are sent in the encrypted form.
should be stored in other sources (off-chain) such Thus, only the authorized recruiter can recover the
as in a cloud [2] or in a central database [26]. keys by decryption. Then, the recruiter can recover
For these cases, the encrypted private data of the the student’s real identity, grade, program identity
students are stored in a database, the addresses and course identity by using those keys.
of these data are stored in the blockchain. After Data Integrity and Data Immutability: Data in-
the student applies for an internship, the institution tegrity is observed by using signature algorithm
not only sends the decryption keys but also sends in the proposed scheme. With this algorithm the
the transaction numbers to the recruiter. Once the data cannot be altered by any entity. The data
recruiter gets the transaction numbers, it looks for immutability is preserved in the construction by
the transaction numbers in the blockchain to get using blockchain technology. With this technology
the addresses of the encrypted student’s data. Then, each block (transaction) is tied each other with the
the recruiter retrieves the encrypted student’s data help of signature and hash algorithms. Thus, no one
from the database using the addresses. Using the can break this chain to change data. Moreover, a
decryption keys, the recruiter gets the plaintexts of malicious recruiter can not gain any useful infor-
the data. mation by changing student A’s message to student
B’s message. The malicious recruiter can do this
6. Security Analysis to get decryption keys to learn student B’s private
data. This is because institution needs to have the
User/student Data Privacy: User/student’s sensi- appropriate message from student B too. In other
tive data consists of Student’s grade, Student’s real words, steps S3 and R2 should be consistent. A
identity, Course identity number and Program iden- student can not pretend being another student when
tity number. These data are very sensitive. Leaking it generates a message since the student needs to
this information in the clear results breaching of know another student’s real identity and pseudonym
student’s data privacy. However, any unauthorized identity and signature secret key. The student can
entity cannot see these data in the clear. This in- not provide false information about its academic
formation is encrypted using secure symmetric key history since all the academic history is stored in
encryption scheme such as AES with CBC mode. the blockchain by the trusted parties (institutions).
AES − CBC mode consists of an initialization
vector (IV ) as a random number in the algorithm
that even the same message is encrypted more than 7. Conclusion
once, the resulting ciphertext is going to be different
each time. Thus the proposed scheme provides data In this paper, a protocol is introduced for an
privacy of the student. In the case when the student education system using blockchain technology that
is transferred to another institution to study different provides student data privacy, data integrity, and
program or when the student wants to do internship immutability of the data. The proposed construction
12
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE
O. Oksuz, Vol.11, No.1, pp.1-14
uses encryption algorithms (symmetric and asym- [7] S. G. Education, “Sony global education develops technology
metric) to protect data privacy, uses signatures for using blockchain for open sharing of academic proficiency and
progress records,” Tech. Rep., 2016.
data integrity and uses blockchain for immutabil- [8] K. Kuvshinov, I. Nikiforov, J. Mostovoy, D. Mukhutdinov,
ity. Moreover, the proposed scheme does not leak K. Andreev, and V. Podtelkin, “Disciplina: Blockchain for
students’ real identities in the blockchain since the education,” Yellow Paper, Tech. Rep., 2018.
[9] R. Arenas and P. Fernandez, “Credenceledger: A permissioned
students do not need to participate in the blockchain
blockchain for verifiable academic credentials,” in 2018 IEEE
network. In addition, all the sensitive data is en- International Conference on Engineering, Technology and In-
crypted. The proposed protocol models commu- novation (ICE/ITMC), Stuttgart, Germany, 17-20 June 2018, pp.
1–6.
nication between the parties and proposes iden-
[10] Blockcerts, the open standard for blockchain certificates.
tity management. This paper also proposes course- http://www.blockcerts.org/. Accessed April 5, 2022. [Online].
program graph for the scheme to provide minimum Available: http://www.blockcerts.org/
of difficulty when the student change its major. [11] University of nicosia. blockchain certificates (academic
and others). https://www.unic.ac.cy/iff/blockchain-certificates.
Accessed April 5, 2022. [Online]. Available: https:
//www.unic.ac.cy/iff/blockchain-certificates
Acknowledgments
[12] E. E. Bessa and J. S. Martins, “A blockchain-based educational
record repository,” 2019, arXiv preprint arXiv:1904.00315.
The author thanks the anonymous reviewers for [13] M. Sharples and J. Domingue, “The blockchain and kudos:
A distributed system for educational record, reputation and
their useful comments and suggestions. reward,” in Adaptive and Adaptable Learning, K. Verbert,
M. Sharples, and T. Klobučar, Eds. Cham: Springer Inter-
national Publishing, 2016, pp. 490–496.
References [14] M. Han, Z. Li, J. S. He, D. Wu, Y. Xie, and A. Baba, “A novel
blockchain-based education records verification solution,” in
[1] S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system. Proceedings of the 19th Annual SIG Conference on Information
Accessed April 4, 2022. [Online]. Available: http://bitcoin.org/ Technology Education, ser. SIGITE ’18. New York, NY, USA:
bitcoin.pdf Association for Computing Machinery, 2018, pp. 178–183.
[2] L. Hirtan, P. Krawiec, C. Dobre, and J. M. Batalla, “Blockchain- [Online]. Available: https://doi.org/10.1145/3241815.3241870
based approach for e-health data access management with [15] M. Turkanović, M. Hölbl, K. Košič, M. Heričko, and
privacy protection,” in 2019 IEEE 24th International Workshop A. Kamišalić, “Eductx: A blockchain-based higher education
on Computer Aided Modeling and Design of Communication credit platform,” IEEE Access, vol. 6, pp. 5112–5127, 2018.
Links and Networks (CAMAD). Limassol, Cyprus: IEEE, 11- [16] W. Gräther, S. Kolvenbach, R. Ruland, J. Schütte, C. Torres,
13 September 2019, pp. 1–7. and F. Wendland, “Blockchain for education: lifelong learning
[3] K. Christidis and M. Devetsikiotis, “Blockchains and smart passport,” in Proceedings of 1st ERCIM Blockchain workshop
contracts for the internet of things,” IEEE Access, vol. 4, pp. 2018, 2018: European Society for Socially Embedded Technolo-
2292–2303, 2016. gies (EUSSET). Amsterdam, Netherlands: European Society
[4] D. Salah, M. H. Ahmed, and K. ElDahshan, “Blockchain ap- for Socially Embedded Technologies (EUSSET), 2-8 May 2018,
plications in human resources management: Opportunities and pp. 1–8.
challenges,” in Proceedings of the Evaluation and Assessment [17] P. Ocheja, B. Flanagan, H. Ueda, and H. Ogata, “Managing
in Software Engineering. Trondheim, Norway: Association lifelong learning records through blockchain,” Research
for Computing Machinery, New York NY, United States, 15-17 and Practice in Technology Enhanced Learning, vol. 14,
April 2020, pp. 383–389. no. 1, p. 4, 2019. [Online]. Available: https://doi.org/10.1186/
[5] M. C. H. Clifton and S. Cox. (2018, January) ’staggering’ trade s41039-019-0097-0
in fake degrees revealed. Accessed April 4, 2022. BBC News. [18] R. A. Mishra, A. Kalla, A. Braeken, and M. Liyanage, “Privacy
[Online]. Available: https://www.bbc.com/news/uk-42579634 protected blockchain based architecture and implementation for
[6] L. M. Palma, M. A. Vigil, F. L. Pereira, and J. E. Martina, sharing of students’ credentials,” Information Processing and
“Blockchain and smart contracts for higher education registry in Management, vol. 58, no. 3, p. 102512, 2021.
brazil,” International Journal of Network Management, vol. 29, [19] M. Lodder and B. Zundel. Hyperledger indy
no. 3, p. e2061, May 2019. hipe. Accessed April 4, 2022. [Online]. Avail-
13
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE
O. Oksuz, Vol.11, No.1, pp.1-14
able: https://hyperledger-indy.readthedocs.io/projects/hipe/en/
latest/text/0109-anoncreds-protocol/README.html
[20] J. Camenisch and A. Lysyanskaya, “An efficient system for non-
transferable anonymous credentials with optional anonymity
revocation,” in Advances in Cryptology — EUROCRYPT 2001,
B. Pfitzmann, Ed. Berlin, Heidelberg: Springer Berlin Heidel-
berg, 2001, pp. 93–118.
[21] J. Camenisch and A. Lysyanskaya, “A signature scheme with
efficient protocols,” in Security in Communication Networks,
S. Cimato, G. Persiano, and C. Galdi, Eds. Berlin, Heidelberg:
Springer Berlin Heidelberg, 2003, pp. 268–289.
[22] R. L. Rivest, A. Shamir, and L. Adleman, “A method for
obtaining digital signatures and public-key cryptosystems,”
Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978.
[23] P. Paillier, “Public-key cryptosystems based on composite de-
gree residuosity classes,” in International conference on the
theory and applications of cryptographic techniques, J. Stern,
Ed. Prague, Czech Republic: Springer Berlin Heidelberg, 2-6
May 1999, pp. 223–238.
[24] C.-P. Schnorr, “Efficient signature generation by smart cards,”
Journal of cryptology, vol. 4, no. 3, pp. 161–174, 1991.
[25] Ethereum. https://www.ethereum.org. Accessed April 5, 2022.
[Online]. Available: https://www.ethereum.org
[26] M. Hanley and H. Tewari, “Managing lifetime healthcare
data on the blockchain,” in IEEE SmartWorld, Ubiquitous
Intell. Comput., Adv. Trusted Comput., Scalable Comput. Com-
mun., Cloud Big Data Comput., Internet People Smart City
Innov. (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI),
Guangzhou, China, 8-12 October 2018, pp. 246–251.
14