0% found this document useful (0 votes)
48 views9 pages

Blockchain-Driven Automation For Degree Certificate Authentication While Preserving Data Integrity

This research paper explores the use of blockchain technology for the authentication and verification of degree certificates, highlighting its advantages over traditional methods that are prone to fraud and inefficiency. By utilizing smart contracts on the Ethereum blockchain, the proposed solution ensures data integrity, security, and scalability in managing academic records. The paper discusses various applications of blockchain in higher education, including credentialing, decentralized transcripts, and automated enrollment processes.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views9 pages

Blockchain-Driven Automation For Degree Certificate Authentication While Preserving Data Integrity

This research paper explores the use of blockchain technology for the authentication and verification of degree certificates, highlighting its advantages over traditional methods that are prone to fraud and inefficiency. By utilizing smart contracts on the Ethereum blockchain, the proposed solution ensures data integrity, security, and scalability in managing academic records. The paper discusses various applications of blockchain in higher education, including credentialing, decentralized transcripts, and automated enrollment processes.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Blockchain-Driven Automation for Degree

Certificate Authentication while Preserving Data


Integrity
Kaustubh Patil Vedangi Thokal Prof. Mamta Bhamare
Department of Computer Engineering Department of Computer Engineering Department of Computer Engineering
and Technology and Technology and Technology
Dr. Vishwanath Karad MIT World Dr. Vishwanath Karad MIT World Dr. Vishwanath Karad MIT World
Peace University Peace University Peace University
Pune, India Pune, India Pune, India
[email protected] [email protected] [email protected]

Dr. Pradnya V. Kulkarni Dr. Prasad Purnaye Dr. Vrushali Kulkarni


Department of Computer Engineering Department of Computer Engineering [email protected]
and Technology and Technology
Dr. Vishwanath Karad MIT World Dr. Vishwanath Karad MIT World
Peace University Peace University
Pune, India Pune, India
[email protected] [email protected]

Abstract—Academic records are constantly at risk of Blockchain provides a secure way to exchange any
varying attacks which impede traditional methods because they product, service, or business [1]. Although initially
implement manual processes and web services, something that popularized by Bitcoin, it is the foundation of more than just
SAC has already underlined as a threat. In this research, an cryptocurrencies [2]. The recent introduction of Blockchain
endeavor has been made to investigate the way blockchain has revolutionized the digital world, bringing new horizons
technology is benefiting certificate authentication and for security, speed, and efficiency [3]. Blockchain
verification of degree certificates. This research paper develops technology is based on peer-to-peer collaboration, meaning it
a solution for using smart contracts on the Ethereum
operates as a peer-to-peer network [4]. It has three main
blockchain to prove the security, transferability, and validity of
advanced certificates. This helps to validate student academic
components: cryptographic keys, peer-to-peer networks, and
records securely. The information about the same is kept in a digital ledgers. Each participant in the network has a unique
hashed pattern on a blockchain for the verification process so set of cryptographic keys: a private key and a public key. The
that it is tamper-free. Application of this method delivers a secret private key is used to sign the transaction, while the
safe, reliable and scalable answer for schools to authenticate & public key is used to verify the authenticity of the signature
handle academic credentials. [5]. This digital signature acts as a unique and secure digital
ID for you, ensuring that only authorized users can make or
Keywords—Blockchain, Ethereum, Smart Contracts, approve changes. Instead of relying on human oversight and
Hashing, ACID properties, keccak256, cryptography, control, it leverages networked computation to ensure
decentralization trustworthiness [6]. This decentralized approach, often
described as an "operating system for interactions" [7],
I. INTRODUCTION empowers a system where trust is inherent in the technology
Degree certificates are essential documents that confirm itself, rather than dependent on individuals or institutions.
an individual's successful completion of a specific course of Traditional centralized systems, dependent on a single
study. Traditionally, universities have relied on manual authority for data verification and storage, are susceptible to
processes for issuing and authenticating these certificates, breaches, fraud, and errors. Blockchain’s decentralized
often managed by examination departments or student architecture mitigates these risks by distributing control
sections. However, the growing scale of higher education across multiple nodes, ensuring that no single entity can
institutions and the increasing demand for swift and reliable manipulate the data [8]. In a decentralized network, data is
verification procedures have highlighted the limitations of stored across multiple nodes, with no central point of control,
traditional methods. These limitations include inefficiency, making it resistant to tampering or unauthorized access.
susceptibility to errors, and potential vulnerabilities to fraud. Several studies have highlighted how blockchain’s
decentralized nature ensures data integrity and transparency,
The growing dependence on digital technologies has
offering a more secure alternative to conventional systems
revolutionized the way academic records are managed. This
[9]. Research has also shown that decentralized systems can
move towards automation and digitization has introduced
streamline verification processes, reduce fraud, and improve
new challenges concerning data security, integrity, and
scalability in various sectors, including digital identity
adherence to ACID properties. Upholding these properties is
verification and certification management [10].
essential for guaranteeing the authenticity and reliability of
academic records. Any breach can result in unauthorized This research paper looks into using blockchain
access, data manipulation, or the generation of fraudulent technology to make degree certificate authentication digital
certificates, which can ultimately undermine trust in and automatic. It shows how blockchain can keep the ACID
academic credentials. properties of the dataset safe. This implies that making

1
degree certificate authentication automatic won't put the Blockchain technology has the potential to revolutionize
safety, honesty, or trustworthiness of school records at risk. various aspects of the education system. The following
Furthermore, this work displays how blockchain can cause a points highlight the application of blockchain in higher
change in how schools handle degree certificates. It offers a educational institutions leading to secure, transparent and
safe, effective, and easy-to-grow answer for the future. efficient systems.

1. Credentialing: Universities can issue digital


diplomas and certificates on the blockchain,
ensuring tamper-proof records that are easily
verifiable by employers or other institutions.

2. Decentralized Transcripts: Blockchain can be used


to create decentralized student transcripts, allowing
students to maintain their own records, control
access, and share them securely with potential
employers.

3. Smart Contracts for Enrollment: Smart contracts


can automate and secure the enrollment process by
ensuring that only students who meet specific
criteria are admitted and enrolled in courses.

4. Research Data Provenance: Blockchain can track


the provenance of academic research, ensuring the
integrity and authenticity of research data,
publications, and citations.

5. Accreditation: Educational institutions and


accreditation bodies can use blockchain to ensure
that accredited programs and institutions maintain
compliance and authenticity, reducing the risk of
fraudulent accreditation.

II. LITERATURE REVIEW


This literature survey explores several innovative
approaches that leverage blockchain to tackle these
challenges, including the use of decentralized systems for
revocation management, enhanced certificate transparency,
and secure signature mechanisms This study focuses on
current developments by examining different applications,
evaluates their results, and identifies potential areas for
further research in the field of blockchain-based
authentication management [11].
A. Specific Application Based Review
1) Review on existing blockchain applications for
certification

TABLE I. REVIEW ON EXISTING BLOCKCHAIN


APPLICATIONS FOR CERTIFICATION

Paper Title Work Done Technique Used Results


Enhanced the
credibility
and security
Proposed a
of
Blockchain digital Utilized blockchain
certificates,
and Smart certificate technology to
enabling
Fig. 1. Blockchain used for verifying and recording transactions [5]. Contract for system to generate a key of
verification
Digital prevent the certificate data
via QR code
Fig. 1 illustrates how blockchain technology is utilized to Certificate forgery of and stored it on the
or website,
[12]. academic blockchain
securely verify and record transactions. Each transaction is certificates
reducing
hashed and added to a decentralized ledger, ensuring fraud and loss
risks)
immutability and transparency throughout the verification
process.

2
Paper Title Work Done Technique Used Results Paper Title Work Done Technique Used Results

Provided a Implemented
more secure a novel
and efficient system with
Proposed a
Developed a method for smart
Converted paper system Utilized blockchain
system to certificate contracts in
certificates to called CTB (IBM Hyperledger
Certificate store and validation via Go,
digital, used a Certificate to enhance Fabric) to ensure
validation validate a mobile improving
chaotic algorithm Transparency CA CA consent from
using digital application, certificate
to generate hash Using accountabilit domain owners for
blockchain academic simplifying issuance
codes, and stored Blockchain y and issuing certificates
[13] certificates the transparency
them on the [17]. certificate and included a
using verification and
blockchain revocation revocation
blockchain. process for revocation
using mechanism
institutions processes
blockchain
and compared to
organizations traditional
methods
Provided a
trusted
Achieved low
verification
latency and
system, Developed
Implemented a high
Applied allowing the
cooperative throughput,
Explored the blockchain to students to ECBC: A High Educational
consensus with efficient
Explored the integration manage and manage and Performance Certificate
mechanism, and quick
integration of of securely transfer share their Educational Blockchain
introduced MPT- query
blockchain blockchain student data, achievements Certificate (ECBC) to
Chain for efficient capabilities,
technology technology academic while Blockchain enhance
querying, and outperformin
into the into the credentials, and enabling with Efficient certificate
designed a privacy- g traditional
educational educational educational employers to Query [18]. management
protecting blockchain
sector [14]. sector databases access with better
transaction format solutions in
accurate, performance
certificate
secure
management
representatio
ns of
students' Proposed
Educert-chain: Achieved an
potential EduCert-
a secure and average
Improved Chain, a
notarized Utilized ECDSA throughput of
TLS secure
educational for digital 34.95 TPS
Proposed handshake educational
CertLedger: A Utilized blockchain certificate signatures, SHA- (query) and
CertLedger, performance certificate
new PKI to prevent split- authentication 256 for 32.23 TPS
a new PKI and authenticatio
model with world attacks, and cryptographic (open), with
architecture certificate n and
Certificate manage verification hashing, and Raft average
for validation, verification
Transparency certificates, and system using consensus latencies of
certificate eliminating framework
based on ensure permissioned mechanism 4.21 s (query)
transparency the need for using
blockchain certificate/revocati blockchain and 2.05 s
using traditional Hyperledger
[15] on transparency [19]. (open)
blockchain CA Fabric
validation.
Predicted that
Explored
blockchain
Demonstrated blockchain
Decentralized can
improved adoption in
Academic revolutionize
performance educational
Platforms: The Blockchain, education by
in execution credentialing
Proposed a Future of Decentralized securing
time and data and its
Blockchain decentralize Extended the Education in Platforms, Smart academic
consumption potential
Based d certificate certificate structure the Age of Contracts credentials
compared to impact on
Certificate revocation to include a Blockchain and
traditional decentralizin
Verification management distribution point [20]. decentralizin
methods like g academic
System and status for revocation and g educational
CRL and platforms.
Management verification used blockchain for governance.
OCSP,
[16]. system using management Blockchain
providing a
blockchain Descibed the provides a
more
efficient and impact of solution to
Blockchain-
resilient blockchain challenges
Based E-
solution technology Blockchain such as data
Learning
in technology, privacy,
Platform:
transforming Decentralized content
Transforming
centralized Networks, ownership,
Education
E-learning Distributed Ledger and equitable
Through
platforms Technology access by
Decentralizatio
into decentralizin
n [21].
decentralize g control in
d systems. E-learning
platforms.
Blockchain in Investigated Blockchain, Smart Blockchain
Higher the Contracts, and Smart
Education: application Empirical Model, Contracts
Smart Contract of SWOT Analysis enhance the

3
Paper Title Work Done Technique Used Results TABLE II. COMPARITIVE ANALYSIS OF BLOCKCHAIN BASED SYSTEMS
WITH TRADITIONAL AND E-LEARNING SYSTEMS
security of
academic E-
records,
Blockchain Blockchain Learning
increase Traditional
technology
transparency, -Based Platforms
and Smart Parameter
Education
University
improve (e.g.,
Contracts in System System
Application in addressing
management Coursera,
efficiency, Udemy)
Student Credit fraud in
and expand
Registration student
[22]. credit
career Data is Centralized
opportunities secured via Centralized
registration databases
through real- cryptograph databases
systems in can be
higher
time tracking Security & ic methods, are prone to
and hacked,
education. Data making data
information Integrity records posing
breaches
sharing with
tamper- risks to
employers. and
proof and learner
The use of tampering.
blockchain immutable. data.
Proposed the
& smart
use of smart Data on
contracts for
contract
E-Pass All records Limited platforms
combined transparenc is
Smart
with
verification are publicly
Contract-
blockchain
improves accessible y; data is controlled
Based Free Blockchain security, Transparen
technology cy
and managed by by the
Privilege-Pass (Hyperledger), ensures verifiable internal provider,
to issue and
Authentication Permissioned authenticity, on the
System For
verify E-
Public Blockchain, and prevents departments limiting
Passes for blockchain. . transparenc
Indian Blockchain Hash forgery by
Indian
Railway Using
Railways
Affirmative allowing only y.
Permissioned Method legitimate
employees Platform
Blockchain railway
to eliminate Users
[23].
forged E-
employees Institutions providers
verified by (students) own student own user
Passes and
the CRIS own and
ensure Ownership data and data and
system to control their
authenticity.
join the of Data control have
own records
network. on the access to control
blockchain. records. over
Table I. provides an overview of various blockchain access.
applications used for certification management, highlighting Platforms
key features, advantages, and limitations in existing systems. handle
Automated
It also outlines areas for improvement, forming the basis for Manual their own
and
the research gaps addressed by our proposed solution. decentralize processes certificate
Moreover it also explores Decentralization, a core principle Verification d; for validation,
of blockchain, which offers significant advantages over Process credentials verification; but may
traditional centralized systems. can be often time- lack third-
verified consuming. party
B. Research Gap instantly. verification
1. Necessity of common, accepted standards & .
protocols to enable the smooth functioning of
blockchain certificate systems across various Automatio
institutions and countries, enabling wide adoption as Reduces n helps, but
High
well as integration. administrati platform
administrati
ve costs and fees can
2. While the current iteration is an improvement, Cost & ve costs for
time by still add
blockchain still requires more work to accommodate Time
automating
managing
Efficiency up, and
increased transactional load and decreased lag time verification and
manual
overall. and record verifying
verification
storage. records.
3. Less examination of how blockchain technology can may be
be mixed with and layered on top of existing required.
educational databases and legacy systems.
4. Comprehensive solutions are thus needed to Table II. provides a comparison between Blockchain-
adequately safeguard user data and ensure a rigorous Based Education Systems and traditional Centralized
certificate management system remains transparent, Education Models across five key parameters: Security &
secure over the long term. Data Integrity, Transparency, Ownership of Data,
5. High operational costs and resource consumptions Verification Process, and Cost & Time Efficiency. By
associated with the existing implementations, further analyzing real-world centralized models, such as Traditional
research should investigate ways to minimize costs University Systems and popular E-Learning Platforms (like
and consumptions. Coursera and Udemy), we can better understand the
advantages and limitations of each approach.

4
Thus, this literature survey highlights critical gaps in
blockchain-based certificate management. Our project
addresses these gaps by implementing a solution that utilizes
Ethereum blockchain technology to manage certificate
issuance, verification, and updates. By employing keccak256
hashing for secure data handling and integrating with
existing systems for efficient data processing, our approach
ensures enhanced scalability and performance. Additionally,
our system facilitates easy integration with existing systems,
preserves user privacy through secure hash storage and
minimizes costs through optimized blockchain interactions.
This comprehensive approach not only advances blockchain
applications in certificate management but also offers a
practical solution to the challenges identified in current
research.
III. METHODOLOGY
The methodology section outlines the technical approach
and implementation of our blockchain-based educational
certificate management system [24]. Our system aims to
create a secure and tamper-proof system of issuing, storing Fig. 2. System Architecture
(on the Ethereum blockchain) and authentication of
education certificates using built-in smart contracts.The Fig. 2. visually represents the architecture of the system,
system utilizes the keccak256 (SHA-3 family) as the hashing outlining the flow of data from input (certificate details)
algorithm to ensure the integrity of certificate data.It is through to the hashing process, storage on the blockchain,
designed to handle bulk uploads of certificate data from and subsequent verification. The process includes:
universities and single-entry uploads, allowing for flexibility 1. User inputs certificate data.
in managing data. This allows educational facilities with
established infrastructures to implement this technology 2. Data is parsed and hashed using the Keccak256
without the need for significant changes. This system solves algorithm.
the common issues of certificate forging, centralized control 3. The admin verifies the data from the university
and long verification process by combining the blockchain’s database and sends an approval if the data is valid.
decentralized & immutable nature with Smart Contract’s
flexibility. 4. The hashed information is first stored in the database
for backup along with the quick retrieval and then
A. System architecture overview written to the blockchain.
Our blockchain-based certificate management solution is 5. Data is verified by comparing stored and new hashes.
specifically designed with an architecture to securely,
efficiently, and verifiably store educational certificates. The 6. Generated certificate is displayed to the user.
input provided starts with bulk uploading of certificate
details via CSV or individual entry. Further, verifiable fields
This architecture ensures data integrity, security, and
include PRN (Personal Registration Number) which is the
verifiability while maintaining a seamless process for
equivalent of a unique ID provided to each student by their
certificate issuance and verification.
university, Name, Degree, Course Name, Year of
Graduation, and CGPA. Once the data is provided, a hash is B. Data Flow and Process Workflow
created via the keccak256 algorithm, which creates a single,
1) Data Parsing and Hashing : Data flow in the system
unique cryptographic hash per certificate.
begins with the input of certificate details, which is capable
It is first stored in a secure database and then sent to the of being in two ways: a bulk upload using a CSV file, or by
blockchain upon the execution of a smart contract [25]. The single entry. In the case of bulk uploads, a CSV containing
smart contract would then validate the data, add the multiple entries is parsed and all the basic certificate
certificate information to the blockchain, and then update, information is extracted, like PRN, Name in both English and
making sure that the information does not change. Stored, the
Devanagari, Degree, Course Name, Year of Graduation, and
hash can then be obtained and rehashed to check against the
hash of the submitted certificate for verification. CGPA. In the case of a single entry, the user manually fills in
the same details into the system.

Upon receiving the data, it gets automatically parsed and


processed by the system for further operations. The next
most crucial step is hashing the data. The Keccak256
algorithm of the SHA-3 family will then be used to generate
a unique cryptographic hash corresponding to every
certificate. This step of hashing guarantees that tampering
with the info within the certificate is impossible seeing that
any alteration to the enter statistics will completely alter the
hash. This specific hash acts as a virtual fingerprint for every

5
certificates. 6. Verification: A rehash of certificate details is
generated and compared with the stored hash for
2) Storage and Verification : After the certificate data is verification.
hashed, the system proceeds to store the hash securely. The 7. Certificate Printing: Upon successful verification,
storage occurs in two locations: first, the hash is stored in a the certificate is available for printing and
centralized database for quick access and backup purposes. verification.
Then, the system transfers data to the blockchain via smart
C. Smart Contracts and Blockchain Integration
contract execution, which handles functions such as adding,
updating, and validating certificates. As for the verification Smart Contracts are executable codes that run on top
of the Blockchain [26]. As opposed to traditional
method, the system rehashes the certificate data supplied
contracts, smart contracts allow users to encode their
through the person and compares the newly hashed cost with agreements and trust relationships. Its primary function is
the only recorded on the blockchain after a verification permitting automated transactions with out the
request is made by way of both a student or public verifier.. involvement of a government.. To safeguard against
If both the hashes match, the certificate is valid and tampering, copies of smart contracts are distributed
unaltered. It grants immutability to the records and presents a across all nodes in the blockchain network. By
decentralized way of verification through blockchain automating these operations, blockchain platforms help
technology. reduce human error, minimizing disputes related to
contract execution. Smart Contracts automate processes
within a network and have transformed traditional paper
contracts into digital ones. [27]. In the context of the
Ethereum blockchain, these contracts are written in
Solidity, a specialized programming language designed
for such contracts [28].
For this project, smart contracts on the Ethereum
blockchain are implemented using Solidity.
Fundamentally, Solidity is intentionally made to build
smart contracts by which complex logic can be encoded
into simple and executable instructions. Here, three core
functionalities are being governed by these smart
contracts: certificate validation, addition, and updates.
These functions handle the creation, storage, and
verification of the certificates securely on the blockchain.
These operations are written within a single Solidity-
based smart contract that runs autonomously once
deployed on the Ethereum network [29].
The workflow for the proposed blockchain-based
certificate management system can be broken down into
multiple stages, each playing a crucial role in ensuring
the integrity, security, and transparency in the process of
generating and validating certificates. Starting with the
submission of certificate data, the system uses
cryptographic hashing through the Keccak256 algorithm
to create unique, tamper-proof digital signatures. These
hashed signatures are then stored on the Ethereum
blockchain via smart contracts, making the certificates
publicly verifiable. Fig.4 visually represents this end-to-
end process.
Fig. 3. Complete System Process Workflow

Fig. 3. represents the step-by-step workflow :


1. User Login: User (university admin) logs into the
system.
2. Uploading Data: Certificate data is uploaded (via
bulk CSV or single entry).
3. Parsing Data: The system parses the certificate
details.
4. Hash Generation: Keccak256 algorithm generates
the hash for each certificate.
5. Storing Hash: Hash is stored in the database and
transferred to the blockchain via smart contracts.

6
ALGORITHM I KECCAK[R,C] SPONGE FUNCTION PSEUDO-CODE
[30].

Here, the Keccak256 algorithm securely hashes


certificate data into a fixed-length string of 256 bits from key
attributes such as PRN, student name, degree, course name,
Fig. 4. Flowchart of Certificate Hashing and Smart Contract Interaction.
year of graduation, and CGPA. This hash is unique and
Fig. 4. depicts the step-by-step process involved in serves as the digital fingerprint of each certificate. As the
generating a certificate hash and interacting with the smart algorithm is immutable and unique in nature, even the
contract on the blockchain. This flowchart outlines the key slightest change in the certificate information will lead to a
stages, including data input, hashing using the Keccak256 completely unique hash value. The process starts with
algorithm, and the subsequent storage of the hash in the collecting the certificate details, either through bulk upload
blockchain for secure and verifiable certificate management. (CSV) or single entry. These details are parsed, concatenated
into a single string, and then fed into the Keccak256
D. Hashing using the Keccak256 algorithm algorithm. The resulting hash is a compact and irreversible
representation of the original data which is subsequently
The Keccak[r,c] sponge function works using the stored on the blockchain via the smart contract.
parameters capacity (c) and bitrate (r), with the assumption
that for simplicity, r is a multiple of the lane size, which is
commonly the case for standard implementations. The input
message (M) is represented as a string of bytes (Mbytes) and
may include a few trailing bits (Mbits) for domain
separation. These trailing bits are encoded as the delimited
suffix (d). The input is padded to form a message (P), which
is organized into blocks (Pi) and further arranged as arrays of
lanes. The state variable (S) holds these arrays, and the ‘||’
operator is used for string concatenation throughout the
process [30].

TABLE III. SAMPLE CERTIFICATE DATA AND HASH VALUES

PRN Name Degree Course Year Cgpa Keccak


256

7
Hash
without much hassle. The final verification process with its
cryptographic hash comparison is also capable of spotting
123456 Rahul B.E. Computer 2023 8.9 0xA0F tampering or forgery attempts very easily. Overall, the
789 Deshm Science 9.... methodology ensures a secure, scalable, and reliable
ukh framework for digital certificate issuance and verification,
protecting both institutions and individuals from fraudulent
987654 Priya B.A. Economics 2022 7.5 0xB1A practices.
321 Sharma 7..
IV. FUTURE SCOPE
112233 Sagar M.Tech Mechanical 2024 9.2 0xC9E
445 Patil 3... The system can be enhanced in future by implementing
additional features and improving existing ones. One
998877 Neha B.Sc. Information 2021 8.3 0xD2B potential enhancement is the introduction of a student login
665 Kulkar Tech 9... system, allowing students to directly access their profiles and
ni monitor the progress of their degree certificates. Enhancing
security through biometric authentication for the Controller
554433 Ankit M.B.A. Finance 2020 7.8 0xF5A.
221 Rao .. of Examination (CEO) is another feature that we can
incorporate to provide access control. Moreover, introducing
multi-language support, including regional languages, can
Table II. presents a collection of student data entries enhance the system’s usability, especially for users from
along with their corresponding hash values generated using diverse backgrounds. Similarly, expanding email
the Keccak256 algorithm. This table illustrates the functionality to enable bulk communication with students can
relationship between the original certificate details and their streamline interaction. In a similar fashion, facilitating
unique digital signatures, emphasizing the secure and dynamic notifications can improve overall engagement.
verifiable nature of the certificate generation process. Future development can also focus on more advanced
E. Verification analytics and data visualization tools within the dashboard to
offer deeper insights into student performance. Cloud-based
The system at the time of certificate issuance pushes the deployment could provide scalability, flexibility, and ease of
Keccak256-generated hash of the certificate details onto the maintenance, making the system capable of handling larger
blockchain. In the verification process, the same certificate datasets and user volumes efficiently. In addition, the
details are fed by the verifier, e.g., PRN, name, degree, etc. integration of external verification systems would ensure the
Once again, the same set of details is passed through the authenticity and security of certificates, preventing tampering
Keccak256 algorithm to produce a new hash value. The and enabling real-time verification by third parties.
system compares this generated hash with the one that was Developing a mobile application would further improve
originally stored on the blockchain at the time of issuance. accessibility, enabling students and administrators to interact
The verification process in the proposed system hinges on with the system on the go. By prioritizing these aspects, the
comparing two cryptographic hashes generated using the system can continue to evolve to meet both current and
Keccak256 algorithm. Let H(m) denote the original hash future operational demands.
derived from the certificate data ‘m’ (e.g., PRN, name, Additionally, the future scope of the system could include
degree, etc.) when the certificate was initially issued and advanced biometric and AI integrations to further enhance
stored on the blockchain. During verification, a new hash functionality and security. Incorporating biometric
H'(m) is computed from the certificate details provided by verification, such as fingerprint or facial recognition, would
the user. The system then compares the two hashes strengthen access control, especially for sensitive roles like
H(m) == H'(m) (1) that of the Controller of Examination. AI integration could
bring powerful predictive analytics to the system, helping
administrators forecast student outcomes, detect trends, and
The comparison works as follows: personalize learning recommendations based on individual
1. If the newly generated hash matches the stored hash, student data.
it confirms that the certificate data has not been V. CONCLUSION
altered since issuance, and the certificate is deemed
authentic. Thus, in this paper, we have proposed an all-inclusive
blockchain-based framework to securely manage educational
2. If the hashes do not match, the system flags the certificates, aiming to address the pervasive issue of
certificate as invalid, indicating possible tampering certificate forgery and fraud in this domain. We ensured the
or incorrect data input. immutable and publicly verifiable data about certificates
Thus the methodology section discusses the steps through the usage of the Ethereum blockchain and the
involved in setting up a secure and verifiable system in Keccak256 hashing algorithm. Using smart contracts, the
educational certificate management through the use of system is able to issue, store, and verify certificates with
blockchain technology. Starting from generating hashes security at its core; hashed certificate data is also logged on
based on Keccak256, data involved in each certificate is the blockchain, providing long-term integrity and ease of
hashed securely to produce a unique and tamper-resistant decentralized verification through comparison of the new
digital signature. Smart contracts stored on the Ethereum hashes against hashes stored on the blockchain. We also
blockchain automate storage and verification processes for made the solution adaptable by including Java for having
certificates, meaning the data is immutable and transparent. It hitch-free integration with legacy systems and therefore has
takes care of the whole flow of data related to any issuance the ease of integration within the current infrastructure. Our
and verification process, allowing for bulk and single entries approach emphasizes on the security of the system in a
scalable and effective way through handling unapproved

8
manipulation of certificates. All this is in a framework with Management. IntechOpen, Oct. 18, 2023. doi:
the key combination of cryptographic hashing and 10.5772/intechopen.109392.
decentralized storage along with automation to give it a [15] Murat Yasin Kubilay, Mehmet Sabir Kiraz, Hacı Ali Mantar,
CertLedger: A new PKI model with Certificate Transparency based
future-proof status towards overcoming the challenges on blockchain, Computers & Security, Volume 85, 2019,Pages 333-
presented by digital certificate management. 352,ISSN 0167-4048, https://doi.org/10.1016/j.cose.2019.05.013.
[16] Q. Aini, E. P. Harahap, N. P. L. Santoso, S. N. Sari, and P. A.
Sunarya, “Blockchain Based Certificate Verification System
Management”, ATM, vol. 7, no. 3, pp. 184–193, Nov. 2022.
REFERENCES
[17] D. S. V. Madala, M. P. Jhanwar and A. Chattopadhyay, "Certificate
Transparency Using Blockchain," 2018 IEEE International
[1] T. Ahram, A. Sargolzaei, S. Sargolzaei, J. Daniels and B. Amaba, Conference on Data Mining Workshops (ICDMW), Singapore, 2018,
"Blockchain technology innovations," 2017 IEEE Technology & pp. 71-80, doi: 10.1109/ICDMW.2018.00018.
Engineering Management Conference (TEMSCON), Santa Clara, CA, [18] Xu, Y., Zhao, S., Kong, L., Zheng, Y., Zhang, S., Li, Q. (2017).
USA, 2017, pp. 137-141, doi: 10.1109/TEMSCON.2017.7998367. ECBC: A High Performance Educational Certificate Blockchain with
[2] J. E. Kim, "Blockchain Based Secure Healthcare Management Efficient Query. In: Hung, D., Kapur, D. (eds) Theoretical Aspects of
System," Victoria University Institutional Repository, 2023. [Online]. Computing – ICTAC 2017. ICTAC 2017. Lecture Notes in Computer
Available: https://vuir.vu.edu.au/47869/. [Accessed: 11-Sep-2024]. Science(), vol 10580. Springer, Cham. https://doi.org/10.1007/978-3-
[3] Monash University, "ITI5214: Blockchain," Monash University 319-67729-3_17
Handbook, 2023. [Online]. Available: [19] Rani, P., Sachan, R.K. & Kukreja, S. Educert-chain: a secure and
https://handbook.monash.edu/2023/units/ITI5214. [Accessed: 11-Sep- notarized educational certificate authentication and verification
2024]. system using permissioned blockchain. Cluster Comput 27, 10169–
[4] Sarmah, s. (2018). Understanding Blockchain Technology. 8. 23-29. 10196 (2024). https://doi.org/10.1007/s10586-024-04469-5
10.5923/j.computer.20180802.02. [20] Berlin Any, T. Ramadhan, Alwiyah, and Efa Ayu Nabila,
[5] "Abstracts," OSCM-CSCR Conference, University of Liverpool. “Decentralized Academic Platforms: The Future of Education in the
[Online]. Available: Age of Blockchain”, B-FronT, vol. 3, no. 2, pp. 112–124, Jan. 2024.
https://www.liverpool.ac.uk/management/conferences-and-events/osc [21] Ramasamy, L.K., Khan, F. (2024). Blockchain-Based E-Learning
m-cscr-conference/abstracts/. [Accessed: 11-Sep-2024]. Platform: Transforming Education Through Decentralization. In:
[6] Zhao, J. & Fan, Shaokun & Yan, Jiaqi. (2016). Overview of business Blockchain for Global Education. Springer, Cham.
innovations and research opportunities in blockchain and introduction https://doi.org/10.1007/978-3-031-52123-2_6
to the special issue. Financial Innovation. 2. 10.1186/s40854-016- [22] LT Tien and LA Linh, “Blockchain in higher education: smart
0049-2. contract application in student credit registration”, UD-JST , vol 22,
[7] Nath, Indranil. (2016). Data Exchange Platform to Fight Insurance no. 5B, pp 11–15, May 2024.
Fraud on Blockchain. 821-825. 10.1109/ICDMW.2016.0121. [23] H. S. Lamkuche and S. Prasad, "Smart Contract-Based Free Privilege-
[8] Ahmed M. Shamsan Saleh, Blockchain for secure and decentralized Pass Authentication System for Indian Railway Using Permissioned
artificial intelligence in cybersecurity: A comprehensive review, Blockchain," Revista Investigacion Operacional, vol. 45, no. 1, pp.
Blockchain: Research and Applications, Volume 5, Issue 3, 2024 33-39, 2024.
[9] Marouan, A., Badrani, M., Kannouf, N., Chetouani, A. (2024). [24] T. K. Vashishth, V. Sharma, K. K. Sharma, B. Kumar, S. Chaudhary,
Empowering Education: Leveraging Blockchain for Secure and R. Panwar, "Transforming Classroom Dynamics: The Social
Credentials and Lifelong Learning. In: Idrees, S.M., Nowostawski, M. Impact of AI in Teaching and Learning," IIMT University, India.
(eds) Blockchain Transformations. Signals and Communication [25] "Data Management, Analytics and Innovation: Proceedings of
Technology. Springer, Cham. https://doi.org/10.1007/978-3-031- ICDMAI 2023," Conference Proceedings, 2023.
49593-9_1 [26] Rani, P., Sachan, R.K. & Kukreja, S. Educert-chain: a secure and
[10] Haoran Zhang, Shan Jiang, Shichang Xuan, Decentralized federated notarized educational certificate authentication and verification
learning based on blockchain: concepts, framework, and challenges, system using permissioned blockchain. Cluster Comput 27, 10169–
Computer Communications, 2024, Volume 216, Pages 140-150, ISSN 10196 (2024). https://doi.org/10.1007/s10586-024-04469-5
0140-3664. [27] Khan, S.N., Loukil, F., Ghedira-Guegan, C. et al. Blockchain smart
[11] "Blockchain explained: How it works and how to keep it secure," contracts: Applications, challenges, and future trends. Peer-to-Peer
University of Sunderland, [Online]. Available: Netw. Appl. 14, 2901–2925 (2021). https://doi.org/10.1007/s12083-
https://online.sunderland.ac.uk/blockchain-explained-how-it-works- 021-01127-0
and-how-to-keep-it-secure/. [Accessed: 11-Sep-2024]. [28] "Mobile Internet Security: 5th International Symposium, MobiSec
[12] J. -C. Cheng, N. -Y. Lee, C. Chi and Y. -H. Chen, "Blockchain and 2021, Jeju Island, South Korea, October 7–9, 2021, Revised Selected
smart contract for digital certificate," 2018 IEEE International Papers," Conference Proceedings, 2022
Conference on Applied System Invention (ICASI), Chiba, Japan, [29] Taherdoost, Hamed. (2023). Smart Contracts in Blockchain
2018, pp. 1046-1051, doi: 10.1109/ICASI.2018.8394455. Technology: A Critical Review. Information. 14. 117.
[13] A. Gayathiri, J. Jayachitra and S. Matilda, "Certificate validation 10.3390/info14020117.
using blockchain," 2020 7th International Conference on Smart [30] Guido Bertoni et. al. “Keccak specifications summary” Team Keccak.
Structures and Systems (ICSSS), Chennai, India, 2020, pp. 1-4, doi: https://keccak.team/keccak_specs_summary.html (last accessed Sept.
10.1109/ICSSS49621.2020.9201988. 16, 2024).
[14] C.-M. Vipie, A.-D. Afumatu, and M. Caramihai, ‘Blockchain-Based
Educational Certificates: A Proposal’, Information Systems

You might also like