You are on page 1of 6

2nd Int’l Conference on Advanced Information & Communication

Technology (ICAICT 2020), 28-29 November 2020, Dhaka,


Bangladesh.

DistB-CVS: A Distributed Secure Blockchain based


2020 2nd International Conference on Advanced Information and Communication Technology (ICAICT) | 978-0-7381-2323-3/20/$31.00 ©2020 IEEE | DOI: 10.1109/ICAICT51780.2020.9333523

Online Certificate Verification System from


Bangladesh Perspective
Mahmudul Hasan∗ , Anichur Rahman∗ , and Md. Jahidul Islam‡
Department of Computer Science and Engineering
Mawlana Bhashani Science and Technology University and Green University of Bangladesh
mahmudulhasan2020@gmail.com∗ anis.mbstu.cse@gmail.com† and jahidul.jnucse@gmail.com‡

Abstract—During the academic career, students achieve nu- be verified by their universities. However, the currently used
merous academic credentials. These educational credentials are systems are manual so that they are time-consuming. Those
offered by the student while applying for a job or scholarship. time-consuming systems suffer both employer and graduate
Therefore, the goal of this paper is to propose a theoretical
blockchain-based certificate verification system on the cloud that students. Sometimes it becomes burdens for job-seeking grad-
can offer a potential solution for academic certificate issuing uates and costing money. Also, the process becomes expensive
and verification where cryptocurrencies are banned. By this and difficult when several hundred certificates need to verify
regarding in this research, we address the Blockchain (BC) by a company. According to the Association of Certified Fraud
technology for solving these problems. This BC can be capable Examiners [4], academic certificate scam costs employers
of providing immutability and publicly verifiable transactions.
Moreover, these properties of BC are used to generate the digital approximately $600 billion every year. Hence, BC technology
academic credential, which is anti-counterfeited can be verified can be an excellent solution for certificate verification.
easily in a little time. In addition, the proposed “DistB-CVS”
showed that cryptocurrencies banned country could leverage the Recently, BC is considered a disruptive innovation that
BC technology. It satisfies all the requirements necessary for a could change the banking and commerce sectors. However,
modern academic certificate verification system. Furthermore, it it was introduced in 2008 as the core mechanism for the
tries to close the holes and difficulties in the existing systems to Bitcoin and executed in 2009 [5]. On the other hand, Bitcoin,
verify academic certificate authenticity. considered as the first digital currency, has delighted in an
Keywords—Blockchain (BC), Authentication, Verification, Pri- enormous accomplishment with the capital market arriving at
vate Blockchain, and Certificate Verification (CV). 1.1 billion dollars in 2016 [6]. The first and popular BC-based
application would be Bitcoin, but BC’s unique features make
I. I NTRODUCTION it valuable not only in cryptocurrencies but also in many other
The educational institute issue certificates to students who fields. But, Only a few numbers of educational institutes using
have full filled graduation requirements. However, a certifi- BC technology, and most of them applying it to validate and
cate is a document of evidence that a person completes an share academic certificates. Blockcerts is an open standard
informative course. Usually, the educational institution issues for applications that issues and verifies BC-based certificate,
a paper-based certificate because a digital certificate cannot developed by The MIT Media Lab Learning [7]. Moreover,
fully replace a paper-based certificate. Moreover, technology CertChain [8] is a BC-based certificate management platform
becomes more advanced and cheaper, as the counterfeit cer- that authenticates certificate and solves the problem of the
tificate increases in rapid numbers. It threatens the integrity Counterfeit certificate. In addition, OpenCerts [9] solves the
of the certificate owner and the academic institute that issued problem of Counterfeit certificate by using the Ethereum BC.
the certificate [1]. In addition, Ezell [2] believes that more Academic institutes can issue the digital certificate and publish
than 5000 diploma mills operating worldwide and issuing over it onto the BC by using the OpenCerts system.
200,000 counterfeit certificates annually. Now, the fabrication
Although all of the solution systems we have discussed
of certificates becomes a billion-dollar industry.
above provide a good solution for removing the problem of
Therefore, certificate verification has become an essential counterfeit certificates, still some problems remain unsolved.
task. As certificates are so valuable, people are counterfeiting Further, the verification system like Blockcerts does not ver-
documents often. A global survey finds that most applicants ify if the public keys are owned by the legitimate issuing
are falsifying their skills for a job application. Further, a study institution or not [10]. Moreover, those systems are not self-
observed that most applicants lied about their academic certifi- sufficiency. Furthermore, the cost of issuing and revocation
cate and job experience [3]. Employers need fresh graduates, is too high, every time issuing certificate or revocation its
who offer their academic certificates for jobs. Employers verify costs. Finally, cryptocurrencies are illegal in several countries,
the certificate to ensure the graduate is valid. Therefore, the including Bangladesh. Those countries are unable to utilize all
employer makes the candidate waiting for their certification to of the above systems.

978-0-7381-2323-3/20/$31.00 ©2020 IEEE


460
In this paper, the authors discuss some challenges above. BC technology in [20]. They show the registration process
To solve those discussed challenges, the authors propose a for both student and faculties staff for respective institutions.
BC-based certificate verification system model in the cloud- Ghazali et al. (2018) proposed a model for graduation cer-
database. Moreover, the proposed certificate verification sys- tificate verification through a decentralized approach BC in
tem aims to take advantage of BC technology. The summarized [21]. They enhanced the verification process and able to avoid
main contributions of this paper are: the problems of the existing methods. They gave immense
• We have proposed BC-based DistB-CVS architecture that knowledge about academic certificate verification and authen-
a proper solution for those countries where cryptocurren- tication. In [22], Chen et al. proposed a model for a public and
cies are banned. efficient certificate audit system based on BC technology. They
named their excellent data structure “CertOper”, which helps
• A consensus algorithm has proposed, which improves the to save the traceability and public audit in the BC properly. The
block verification mechanism. University of Nicosia was the first higher education institution
• Finally, the authors enhance security by adopting a multi- that stored academic certificates on the Bitcoin BC. They also
signature scheme. the first university that accepts Bitcoin for tuition for any
degree program.
The rest of the paper has been organized the paper as
pursues: we analyze and discuss related works in Section II. In summary, there is more application of BC technology in
Section III provides the proposed “DistB-CVS” architecture, the certificate verification system. But most of the applications
and we also discuss how the proposed architecture can func- use cryptocurrency-based public Blockchains like bitcoin or
tion in. After that, results and discussions are presented in ethereum. In which there are still a few problems, such as extra
Section IV. In addition, we finish up the work in Section V costs, low scalability rate, dependency on unknown resources
with the significance and future development. for mining. But, the proposed system uses cloud-based private
consortium BC, and the nodes are trusted. Also, this paper
II. R ELATED W ORKS ensured data authentication by the multi-signature scheme and
Roehrs et al. (2017) proposed BC technology in the introduced a proper revocation system.
healthcare domain [11]. Their proposal connecting different
III. P ROPOSED “D IST B-CVS” A RCHITECTURE FOR
providers to build a centralized view, uniting patients scattered
C ERTIFICATE V ERIFICATION VIA O NLINE
health records and promoting interoperability. Swati et al.
applied the BC technology in the travel industry [12], where BC is a decentralized infrastructure model. It has been
BC enhanced data security [13] among the network and offered successfully used in trading cryptocurrencies like Bitcoin and
fraud-proof hotel and airline bookings during traveling. In DASH. It has proven that the characteristics of decentraliza-
another article, [14], Tse et al. introduced BC technology in the tion, transparency, immutability, and traceability. However, the
food supply chain. Again, Nguyen et al. presented a survey of authors propose an architecture, which is depicted in Fig. 1.
a much variant consensus BC algorithm method that allows a Then, the key aspects of architecture can be divided into five
new block to be linked to another block with a verified network layers, listed as follows:
[15]. In another similar work, Koens et al. discussed what the • Infrastructure layer
BC thing is and how to use it in [16]. They have tried to answer • Data layer
the following several questions. The first question is, do you • Network layer
need to use BC. In this study, [17], Aras et al. talked about • Consensus layer
BC and its applications. According to this survey, the authors • Application and Presentation layer
also talked about two types of BC - one public BC and the
other private BC. Then, Dasgupta et al. focused on security A. Infrastructure Layer
issues based on BC technology properly [18]. The authors 1) Private Blockchain: A private BC is an access control
highlighted some cyberattacks in the vulnerable system, and network governed by an individual entity. Besides, it provides
give some future initiatives and tips about BC issues for next- the privacy and permissions required by the institute. In the
generation researchers as well. The main focus of this paper proposed system, the authors use private BC. The trusted
is the use of BC technology in the education domain. Hence, members from the institute are the authenticated nodes of our
this paper aims to use BC on certification verification. Private BC that takes part in the consensus and creating the
block. Private BC are faster, more efficient, and more cost-
Several researchers applied BC in the education domain,
effective than public BC, which require a lot of time and
especially in certificate verification. Cheng et al. proposed
energy to validate transactions.
a great way of verifying the digital certificate through BC
technology efficiently in [19]. First, they create a digital 2) Cloud Database: A cloud database is a typical database
certificate, and then a QR-code generates based on the digital with some extra features like cloud computing, backup, scal-
certificate. QR-Code helps to verify the particular graduate in ing, high availability, security, patching, and health monitoring.
the BC-based distributed database. Curmi et al. focused the In the presented system, authors built the BC in a NoSQL
verification, issuing process of academic certificates based on database like MongoDB, Apache CouchDB, etc. NoSQL is

461
Fig. 1. Proposed “DistB-CVS” Architecture

a database management system that uses the non-relational 4) Digital Multi-signature: In modern cryptocurrencies, the
approach for storage and retrieval of data. NoSQL database digital signature is a core cryptographic fundamental for autho-
is flexible, scalable, high-performance, and highly functional. rizing transactions. Ethereum uses ECDSA and Bitcoin uses
Moreover, NoSQL helps us built BC with JSON and script secp256k1 with the ECDSA algorithm. This system utilizes
language. the digital signature to collect votes from the nodes to confirm
the new block, as illustrated in Fig. 2.
B. Data Layer
1) Data Block: The data we store in the BC store within the
data-block of the block. There are two fundamental ways of
BC data storage solutions: off-chain and on-chain. However,
the authors use an on-chain approach to store data in the
BC. Moreover, the clear advantage of this method is that
even in the event of an attack, the data can be recovered and
resynchronized.
2) Timestamp: The usage of a timestamp as proof of
integrity. Each block contains a Unix time timestamp. Besides,
timestamp serving as a source of validating block hash. A
timestamp is accepted as valid if:
• Be less than 2 hours in the future from servers current
time.
Fig. 2. Digital Multi-signature Process
• Be greater than the median timestamp of the past 11
blocks.
5) Revocation List: Certificates may sometimes be revoked
3) Hash Function: A secure hash function has four main when the student’s personally identifiable information changes
characteristics these are: and inaccuracy in achievement. In our system, we use an in-
• A hash function needs to have a fixed or specific output. chain revocation list. There are some protocols to update the
It doesn’t matter how many times you input the same revocation list. Those are:
data; the result is always the same.
• Only the certificate issuer can revoke the certificate.
• A hash function must be computationally efficient.
• The receiver can request for revoked the certificate.
• A hash function must have the properties of Collision
Resistance. • The revocation list must be verified and signed by the
nodes.
• The output of a hash function must be one way.

462
C. Network Layer the Blockchain nodes approve the validity of block
1) Dissemination Mechanism : In the present system, the then the block approved and add to the Blockchain.
dissemination mechanism described how the information sends
to nodes, which information is shared with the verification
application users, and how the information is shared. Fur- Algorithm 1: Proposed Algorithm for Block validation
thermore, the dissemination mechanism connected with two Process
audiences, one is nodes of the network, and another is the Input: Certinf o , P Kisser , HashB , Signatureissuer
verification application users. Moreover, the nodes of the Output: Block valid or not
network get full information about the certificate to verify the 1 Function BlockCheck():

information on the certificate. 2 approvedN ode ← 0


2) Peer-to-Peer Network: The peer-to-peer network is the 3 hashCert ← HASH(Certinf o )
backbone of the BC network. The computer is connected to 4 signatureHash ←DECRYPT(Signatureissuer , P Kissure )
the peer-to-peer network called a node. Moreover, every node 5 for allActiveNode i ← 0 to n do
in the peer-to-peer network is the same level as all other nodes. 6 if HashB == hashC ert then
Nodes can come in many forms, but there is no central node 7 if HashB == signatureHash then
that is an authority. Every node in the network stored a copy 8 approvedN ode ← approvedN ode + 1
of the BC data. 9 signaturenodei ←ENCRYPT(HashBC , SKnodei )
3) Authentication Mechanism: The authentication process 10 end
permits users to do their role in the system. In this proposed 11 end
system, users must log in with their user id and password. 12 end
Also, an algorithm is proposed for block validation in this 13 if approvedNode > N/2 then
layer. After that, the algorithm uses a consensus mechanism 14 return valid
to validate the block. Steps of the algorithm given below: 15 end
16 else
Step 1: Take input information about Certificate
17 return invalid
information(Certinf o ), Public key of the
18 end
issuer(P Kissuer ), Hash of the block (HashB ),
Signature of the issuer (Signatureissuer ) into a
function called BlockCheck().
Step 2: ApprovedNode is initialized to zero ( approvedNode D. Consensus Layer
= 0 ). Here approvedNode is the nodes of the
Blockchain network. The consensus layer is the most essential and necessary
layer for any BC, and it contains a consensus algorithm.
Step 3: hashCert is initialized to Hash of the Certinf o 1) Proof-of-Work: Proof-of-Work is the first and the most
(hashCert = HASH(Certinf o )). Here hashCert dominant consensus algorithm in the BC network. In the
is the calculated hash of certificate information for proposed system, the author proposes Proof-of-Work as a
comparison with block hash(HashB ) by the nodes. systems consensus algorithm. Proof-of-Work is used as the
Step 4: signatureHash initialized to decrypt consensus algorithm in popular cryptocurrencies. Furthermore,
of Signatureissuer and P Kissuer Proof-of-Work’s main advantages are the low impact of a stake
(signatureHash =DECRY P T ((Signatureissuer ), in mining possibilities and anti-DOS attacks defense. In the
(P Kissuer )). Here Signatureissuer is the hash proposed system, the issuer acts as a miner, and other nodes
of the data that issuer signed with Private kay. check the validity of the block.
signaturehash is also for comparison with block
hash(HashB ) for checking the authenticity of the
issuer. E. Application & Presentation Layer

Step 5: Now, for all nodes of the Blockchain, DistB-CVS The verification applications are responsible for verifying
check the block hash is equal to hash of certificate the authenticity and integrity of the certificates issued before.
information. If any node gets, hashes are equal, then 1) Verification Application: The verification applications
check the signature hash with block hash. if both retrieve the information through the API, then the system
comparisons satisfy the node then approvedNode is verifying information by comparing it with the checking
increased by one (i.e approvedNode= approvedNode information of the receipt. Moreover, the main component
+ 1). and satisfied node singed the block with their functions of the authentication application as follow:
private key.
• Input the block id and the digital certificate
Step 6: If the approvedNode is greater than the half of total • The interaction with BC through API
active miner nodes (approveNode> N/2 ) i.e. half of • The logic of the verification

463
Fig. 3. Flow Diagram of Certificate Verification System

2) Issuing Application: The issuing applications are re- Step 7: Now, the student able to share the certificate with the
sponsible for the main business logic, which includes the 3rd party. When applying for a job, a graduate simply
certificates, applying, correcting, revocation, and issuing. It sends the block id and the digital certificate to the
stores the hash of the certificate to BC by APIs. Furthermore, target companies.
the main component functions of the issuing application such
Step 8: The companies send inquiries to the system and are
as follow:
informed if the block id and the digital certificate are
• Login function valid or not.
• Privilege control
• Multi-signature function Step 9: The BC confirms the companies or the 3rd party that
• Auditing the certificate the certificate is valid or not.
• Revoking the certificate
IV. R ESULTS A NALYSIS AND D ISCUSSIONS
• Administration page to maintain the data, the privilege,
In this section, the authors have evaluated the performance
and more.
of the presented architecture with different parameters like
throughput and response time variation efficiently. The authors
F. Process
program a demo private blockchain using JavaScript ES5 with
The working processes of the system developed in this paper a computer Intel(R) Core(TM) i7, CPU-2.50 GHz, 8 GB of
are as follows: RAM, Win 10, 64-bit OS. The authors use MongoDB cloud-
Step 1: At firsts, graduate students apply for the certificate. database MongoDB Atlas as the core database. The authors
compare the proposed model with existing models Bockcerts
Step 2: The system sends the request to the university author-
and OpenCerts.
ity.
First of all, in Fig. 4 displays core and proposed file
Step 3: The authority granted a certificate by a node with its
operation. The graph shows the file operation efficiently, based
digital signature. Also, the certificate revocation list
on response time and the file size no. Then, as the number
updates or creating send for approval.
of files increases, the response time increases as well, and
Step 4: All those nodes verify the certificate, the revocation it performed adequately in the system. Also, the authors
list, and give their signatures. Last, all the verified noticed this graph because the presented model can transfer
data add to the BC. a substantial file than the actual core-based system, free from
various attacks.
Step 5: BC informs the system’s success or failure status. If
the action is successful, the BC responds with the Again, the throughput has determined depending on the
block id and hash of the block that stores the data. number of requests, as shown in Fig. 5. Also, it shows the com-
parisons of the throughput between the existing certification
Step 6: The system sends the student the digital certificate and
model and the proposed “DistB-CVS”. Then, when the number
the block id.
of requests for documents is lower, we have noticed that

464
[4] A. of Certified Fraud Examiners, Report to the nations on occupational
fraud and abuse: 2016 global fraud study. Association of Certified
Fraud Examiners, 2016.
[5] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,”
Manubot, Tech. Rep., 2019.
[6] G. Hileman, “State of blockchain q1 2016: Blockchain funding overtakes
bitcoin,” CoinDesk, New York, NY, May, vol. 11, 2016.
[7] P. Schmidt, “Blockcerts—an open infrastructure for academic credentials
on the blockchain,” MLLearning (24/10/2016), 2016.
[8] J. Chen, S. Yao, Q. Yuan, K. He, S. Ji, and R. Du, “Certchain: Public
and efficient certificate audit based on blockchain for tls connections,”
in IEEE INFOCOM 2018 - IEEE Conference on Computer Communi-
cations, 2018, pp. 2060–2068.
[9] OpenCerts, accessed may 25, 2020. [Online]. Available:
Fig. 4. Response Time Variation https://opencerts.io/
[10] M. Baldi, F. Chiaraluce, M. Kodra, and L. Spalazzi, “Security analysis
of a blockchain-based protocol for the certification of academic creden-
tials,” arXiv preprint arXiv:1910.04622, 2019.
[11] A. Roehrs, C. A. da Costa, and R. da Rosa Righi, “Omniphr: A
distributed architecture model to integrate personal health records,”
Journal of biomedical informatics, vol. 71, pp. 70–81, 2017.
[12] V. Swati and A. S. Prasad, “Application of blockchain technology
in travel industry,” in 2018 International Conference on Circuits and
Systems in Digital Enterprise Technology (ICCSDET). IEEE, 2018,
pp. 1–5.
[13] A. Rahman, M. J. Islam, F. A. Sunny, and M. K. Nasir, “DistBlockSDN:
A Distributed Secure Blockchain based SDN-IoT Architecture with NFV
Implementation for Smart Cities,” In Progress: International Conference
on Innovation in Engineering and Technology (ICIET), vol. 23, p. 24,
IEEE, 2019.
[14] D. Tse, B. Zhang, Y. Yang, C. Cheng, and H. Mu, “Blockchain appli-
cation in food supply information security,” in 2017 IEEE International
Conference on Industrial Engineering and Engineering Management
Fig. 5. Throughput Comparison (“DistB-CVS” Model vs. Existing Model) (IEEM). IEEE, 2017, pp. 1357–1361.
[15] G.-T. Nguyen and K. Kim, “A survey about consensus algorithms used
in blockchain.” Journal of Information processing systems, vol. 14, no. 1,
2018.
the throughput is almost similar to each other. But when the [16] T. Koens and E. Poll, “What blockchain alternative do you need?” in
number of requests increases, the throughput increases as well. Data Privacy Management, Cryptocurrencies and Blockchain Technol-
After performing a certain time, due to strong authentication ogy. Springer, 2018, pp. 113–129.
[17] S. T. Aras and V. Kulkarni, “Blockchain and its applications–a detailed
and privacy, we have also observed that the proposed “DistB- survey,” International Journal of Computer Applications, vol. 180, no. 3,
CVS” architecture effectively shows much better performance pp. 29–35, 2017.
than the existing model performance. [18] D. Dasgupta, J. M. Shrein, and K. D. Gupta, “A survey of blockchain
from security perspective,” Journal of Banking and Financial Technol-
ogy, vol. 3, no. 1, pp. 1–17, 2019.
V. C ONCLUSION [19] J.-C. Cheng, N.-Y. Lee, C. Chi, and Y.-H. Chen, “Blockchain and smart
contract for digital certificate,” in 2018 IEEE international conference
In this paper, the authors using the BC approach proposed a on applied system invention (ICASI). IEEE, 2018, pp. 1046–1051.
“DistB-CVS” architecture for the online certificate verification [20] A. Curmi and F. Inguanez, “Blockchain based certificate verification
platform,” in International Conference on Business Information Systems.
system. This study has also presented a workflow diagram Springer, 2018, pp. 211–216.
for successful certificate verification and authentication to [21] O. Ghazali and O. S. Saleh, “A graduation certificate verification model
provide the emerging advantages for the exploiters. Addi- via utilization of the blockchain technology,” Journal of Telecommuni-
cation, Electronic and Computer Engineering (JTEC), vol. 10, no. 3-2,
tionally, the multi-signature schema increases data security. pp. 29–34, 2018.
The model recommended for using BC technology without [22] J. Chen, S. Yao, Q. Yuan, K. He, S. Ji, and R. Du, “Certchain: Public
crypto-currency may be a model. In the future, more options and efficient certificate audit based on blockchain for tls connections,” in
IEEE INFOCOM 2018-IEEE Conference on Computer Communications.
will be appropriately appended to the proposed architecture IEEE, 2018, pp. 2060–2068.
for the graduate in the various stages such as undergraduate,
postgraduate and others. Finally, we will more efficiently
evaluate the performances of our architecture presented in
numerous parameters.

R EFERENCES
[1] S. C. Z. Chen and X. Sun, “Anti-counterfeit authentication system of
printed information based on a logic signing technique.”
[2] A. Ezell, “Diploma mills and counterfeit operations,” College and
University, vol. 94, no. 3, pp. 39–46, 2019.
[3] J. R. Clark, “The perfect resume,” Air medical journal, vol. 36, no. 1,
pp. 13–15, 2017.

465

You might also like