Professional Documents
Culture Documents
Abstract—During the academic career, students achieve nu- be verified by their universities. However, the currently used
merous academic credentials. These educational credentials are systems are manual so that they are time-consuming. Those
offered by the student while applying for a job or scholarship. time-consuming systems suffer both employer and graduate
Therefore, the goal of this paper is to propose a theoretical
blockchain-based certificate verification system on the cloud that students. Sometimes it becomes burdens for job-seeking grad-
can offer a potential solution for academic certificate issuing uates and costing money. Also, the process becomes expensive
and verification where cryptocurrencies are banned. By this and difficult when several hundred certificates need to verify
regarding in this research, we address the Blockchain (BC) by a company. According to the Association of Certified Fraud
technology for solving these problems. This BC can be capable Examiners [4], academic certificate scam costs employers
of providing immutability and publicly verifiable transactions.
Moreover, these properties of BC are used to generate the digital approximately $600 billion every year. Hence, BC technology
academic credential, which is anti-counterfeited can be verified can be an excellent solution for certificate verification.
easily in a little time. In addition, the proposed “DistB-CVS”
showed that cryptocurrencies banned country could leverage the Recently, BC is considered a disruptive innovation that
BC technology. It satisfies all the requirements necessary for a could change the banking and commerce sectors. However,
modern academic certificate verification system. Furthermore, it it was introduced in 2008 as the core mechanism for the
tries to close the holes and difficulties in the existing systems to Bitcoin and executed in 2009 [5]. On the other hand, Bitcoin,
verify academic certificate authenticity. considered as the first digital currency, has delighted in an
Keywords—Blockchain (BC), Authentication, Verification, Pri- enormous accomplishment with the capital market arriving at
vate Blockchain, and Certificate Verification (CV). 1.1 billion dollars in 2016 [6]. The first and popular BC-based
application would be Bitcoin, but BC’s unique features make
I. I NTRODUCTION it valuable not only in cryptocurrencies but also in many other
The educational institute issue certificates to students who fields. But, Only a few numbers of educational institutes using
have full filled graduation requirements. However, a certifi- BC technology, and most of them applying it to validate and
cate is a document of evidence that a person completes an share academic certificates. Blockcerts is an open standard
informative course. Usually, the educational institution issues for applications that issues and verifies BC-based certificate,
a paper-based certificate because a digital certificate cannot developed by The MIT Media Lab Learning [7]. Moreover,
fully replace a paper-based certificate. Moreover, technology CertChain [8] is a BC-based certificate management platform
becomes more advanced and cheaper, as the counterfeit cer- that authenticates certificate and solves the problem of the
tificate increases in rapid numbers. It threatens the integrity Counterfeit certificate. In addition, OpenCerts [9] solves the
of the certificate owner and the academic institute that issued problem of Counterfeit certificate by using the Ethereum BC.
the certificate [1]. In addition, Ezell [2] believes that more Academic institutes can issue the digital certificate and publish
than 5000 diploma mills operating worldwide and issuing over it onto the BC by using the OpenCerts system.
200,000 counterfeit certificates annually. Now, the fabrication
Although all of the solution systems we have discussed
of certificates becomes a billion-dollar industry.
above provide a good solution for removing the problem of
Therefore, certificate verification has become an essential counterfeit certificates, still some problems remain unsolved.
task. As certificates are so valuable, people are counterfeiting Further, the verification system like Blockcerts does not ver-
documents often. A global survey finds that most applicants ify if the public keys are owned by the legitimate issuing
are falsifying their skills for a job application. Further, a study institution or not [10]. Moreover, those systems are not self-
observed that most applicants lied about their academic certifi- sufficiency. Furthermore, the cost of issuing and revocation
cate and job experience [3]. Employers need fresh graduates, is too high, every time issuing certificate or revocation its
who offer their academic certificates for jobs. Employers verify costs. Finally, cryptocurrencies are illegal in several countries,
the certificate to ensure the graduate is valid. Therefore, the including Bangladesh. Those countries are unable to utilize all
employer makes the candidate waiting for their certification to of the above systems.
461
Fig. 1. Proposed “DistB-CVS” Architecture
a database management system that uses the non-relational 4) Digital Multi-signature: In modern cryptocurrencies, the
approach for storage and retrieval of data. NoSQL database digital signature is a core cryptographic fundamental for autho-
is flexible, scalable, high-performance, and highly functional. rizing transactions. Ethereum uses ECDSA and Bitcoin uses
Moreover, NoSQL helps us built BC with JSON and script secp256k1 with the ECDSA algorithm. This system utilizes
language. the digital signature to collect votes from the nodes to confirm
the new block, as illustrated in Fig. 2.
B. Data Layer
1) Data Block: The data we store in the BC store within the
data-block of the block. There are two fundamental ways of
BC data storage solutions: off-chain and on-chain. However,
the authors use an on-chain approach to store data in the
BC. Moreover, the clear advantage of this method is that
even in the event of an attack, the data can be recovered and
resynchronized.
2) Timestamp: The usage of a timestamp as proof of
integrity. Each block contains a Unix time timestamp. Besides,
timestamp serving as a source of validating block hash. A
timestamp is accepted as valid if:
• Be less than 2 hours in the future from servers current
time.
Fig. 2. Digital Multi-signature Process
• Be greater than the median timestamp of the past 11
blocks.
5) Revocation List: Certificates may sometimes be revoked
3) Hash Function: A secure hash function has four main when the student’s personally identifiable information changes
characteristics these are: and inaccuracy in achievement. In our system, we use an in-
• A hash function needs to have a fixed or specific output. chain revocation list. There are some protocols to update the
It doesn’t matter how many times you input the same revocation list. Those are:
data; the result is always the same.
• Only the certificate issuer can revoke the certificate.
• A hash function must be computationally efficient.
• The receiver can request for revoked the certificate.
• A hash function must have the properties of Collision
Resistance. • The revocation list must be verified and signed by the
nodes.
• The output of a hash function must be one way.
462
C. Network Layer the Blockchain nodes approve the validity of block
1) Dissemination Mechanism : In the present system, the then the block approved and add to the Blockchain.
dissemination mechanism described how the information sends
to nodes, which information is shared with the verification
application users, and how the information is shared. Fur- Algorithm 1: Proposed Algorithm for Block validation
thermore, the dissemination mechanism connected with two Process
audiences, one is nodes of the network, and another is the Input: Certinf o , P Kisser , HashB , Signatureissuer
verification application users. Moreover, the nodes of the Output: Block valid or not
network get full information about the certificate to verify the 1 Function BlockCheck():
Step 5: Now, for all nodes of the Blockchain, DistB-CVS The verification applications are responsible for verifying
check the block hash is equal to hash of certificate the authenticity and integrity of the certificates issued before.
information. If any node gets, hashes are equal, then 1) Verification Application: The verification applications
check the signature hash with block hash. if both retrieve the information through the API, then the system
comparisons satisfy the node then approvedNode is verifying information by comparing it with the checking
increased by one (i.e approvedNode= approvedNode information of the receipt. Moreover, the main component
+ 1). and satisfied node singed the block with their functions of the authentication application as follow:
private key.
• Input the block id and the digital certificate
Step 6: If the approvedNode is greater than the half of total • The interaction with BC through API
active miner nodes (approveNode> N/2 ) i.e. half of • The logic of the verification
463
Fig. 3. Flow Diagram of Certificate Verification System
2) Issuing Application: The issuing applications are re- Step 7: Now, the student able to share the certificate with the
sponsible for the main business logic, which includes the 3rd party. When applying for a job, a graduate simply
certificates, applying, correcting, revocation, and issuing. It sends the block id and the digital certificate to the
stores the hash of the certificate to BC by APIs. Furthermore, target companies.
the main component functions of the issuing application such
Step 8: The companies send inquiries to the system and are
as follow:
informed if the block id and the digital certificate are
• Login function valid or not.
• Privilege control
• Multi-signature function Step 9: The BC confirms the companies or the 3rd party that
• Auditing the certificate the certificate is valid or not.
• Revoking the certificate
IV. R ESULTS A NALYSIS AND D ISCUSSIONS
• Administration page to maintain the data, the privilege,
In this section, the authors have evaluated the performance
and more.
of the presented architecture with different parameters like
throughput and response time variation efficiently. The authors
F. Process
program a demo private blockchain using JavaScript ES5 with
The working processes of the system developed in this paper a computer Intel(R) Core(TM) i7, CPU-2.50 GHz, 8 GB of
are as follows: RAM, Win 10, 64-bit OS. The authors use MongoDB cloud-
Step 1: At firsts, graduate students apply for the certificate. database MongoDB Atlas as the core database. The authors
compare the proposed model with existing models Bockcerts
Step 2: The system sends the request to the university author-
and OpenCerts.
ity.
First of all, in Fig. 4 displays core and proposed file
Step 3: The authority granted a certificate by a node with its
operation. The graph shows the file operation efficiently, based
digital signature. Also, the certificate revocation list
on response time and the file size no. Then, as the number
updates or creating send for approval.
of files increases, the response time increases as well, and
Step 4: All those nodes verify the certificate, the revocation it performed adequately in the system. Also, the authors
list, and give their signatures. Last, all the verified noticed this graph because the presented model can transfer
data add to the BC. a substantial file than the actual core-based system, free from
various attacks.
Step 5: BC informs the system’s success or failure status. If
the action is successful, the BC responds with the Again, the throughput has determined depending on the
block id and hash of the block that stores the data. number of requests, as shown in Fig. 5. Also, it shows the com-
parisons of the throughput between the existing certification
Step 6: The system sends the student the digital certificate and
model and the proposed “DistB-CVS”. Then, when the number
the block id.
of requests for documents is lower, we have noticed that
464
[4] A. of Certified Fraud Examiners, Report to the nations on occupational
fraud and abuse: 2016 global fraud study. Association of Certified
Fraud Examiners, 2016.
[5] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,”
Manubot, Tech. Rep., 2019.
[6] G. Hileman, “State of blockchain q1 2016: Blockchain funding overtakes
bitcoin,” CoinDesk, New York, NY, May, vol. 11, 2016.
[7] P. Schmidt, “Blockcerts—an open infrastructure for academic credentials
on the blockchain,” MLLearning (24/10/2016), 2016.
[8] J. Chen, S. Yao, Q. Yuan, K. He, S. Ji, and R. Du, “Certchain: Public
and efficient certificate audit based on blockchain for tls connections,”
in IEEE INFOCOM 2018 - IEEE Conference on Computer Communi-
cations, 2018, pp. 2060–2068.
[9] OpenCerts, accessed may 25, 2020. [Online]. Available:
Fig. 4. Response Time Variation https://opencerts.io/
[10] M. Baldi, F. Chiaraluce, M. Kodra, and L. Spalazzi, “Security analysis
of a blockchain-based protocol for the certification of academic creden-
tials,” arXiv preprint arXiv:1910.04622, 2019.
[11] A. Roehrs, C. A. da Costa, and R. da Rosa Righi, “Omniphr: A
distributed architecture model to integrate personal health records,”
Journal of biomedical informatics, vol. 71, pp. 70–81, 2017.
[12] V. Swati and A. S. Prasad, “Application of blockchain technology
in travel industry,” in 2018 International Conference on Circuits and
Systems in Digital Enterprise Technology (ICCSDET). IEEE, 2018,
pp. 1–5.
[13] A. Rahman, M. J. Islam, F. A. Sunny, and M. K. Nasir, “DistBlockSDN:
A Distributed Secure Blockchain based SDN-IoT Architecture with NFV
Implementation for Smart Cities,” In Progress: International Conference
on Innovation in Engineering and Technology (ICIET), vol. 23, p. 24,
IEEE, 2019.
[14] D. Tse, B. Zhang, Y. Yang, C. Cheng, and H. Mu, “Blockchain appli-
cation in food supply information security,” in 2017 IEEE International
Conference on Industrial Engineering and Engineering Management
Fig. 5. Throughput Comparison (“DistB-CVS” Model vs. Existing Model) (IEEM). IEEE, 2017, pp. 1357–1361.
[15] G.-T. Nguyen and K. Kim, “A survey about consensus algorithms used
in blockchain.” Journal of Information processing systems, vol. 14, no. 1,
2018.
the throughput is almost similar to each other. But when the [16] T. Koens and E. Poll, “What blockchain alternative do you need?” in
number of requests increases, the throughput increases as well. Data Privacy Management, Cryptocurrencies and Blockchain Technol-
After performing a certain time, due to strong authentication ogy. Springer, 2018, pp. 113–129.
[17] S. T. Aras and V. Kulkarni, “Blockchain and its applications–a detailed
and privacy, we have also observed that the proposed “DistB- survey,” International Journal of Computer Applications, vol. 180, no. 3,
CVS” architecture effectively shows much better performance pp. 29–35, 2017.
than the existing model performance. [18] D. Dasgupta, J. M. Shrein, and K. D. Gupta, “A survey of blockchain
from security perspective,” Journal of Banking and Financial Technol-
ogy, vol. 3, no. 1, pp. 1–17, 2019.
V. C ONCLUSION [19] J.-C. Cheng, N.-Y. Lee, C. Chi, and Y.-H. Chen, “Blockchain and smart
contract for digital certificate,” in 2018 IEEE international conference
In this paper, the authors using the BC approach proposed a on applied system invention (ICASI). IEEE, 2018, pp. 1046–1051.
“DistB-CVS” architecture for the online certificate verification [20] A. Curmi and F. Inguanez, “Blockchain based certificate verification
platform,” in International Conference on Business Information Systems.
system. This study has also presented a workflow diagram Springer, 2018, pp. 211–216.
for successful certificate verification and authentication to [21] O. Ghazali and O. S. Saleh, “A graduation certificate verification model
provide the emerging advantages for the exploiters. Addi- via utilization of the blockchain technology,” Journal of Telecommuni-
cation, Electronic and Computer Engineering (JTEC), vol. 10, no. 3-2,
tionally, the multi-signature schema increases data security. pp. 29–34, 2018.
The model recommended for using BC technology without [22] J. Chen, S. Yao, Q. Yuan, K. He, S. Ji, and R. Du, “Certchain: Public
crypto-currency may be a model. In the future, more options and efficient certificate audit based on blockchain for tls connections,” in
IEEE INFOCOM 2018-IEEE Conference on Computer Communications.
will be appropriately appended to the proposed architecture IEEE, 2018, pp. 2060–2068.
for the graduate in the various stages such as undergraduate,
postgraduate and others. Finally, we will more efficiently
evaluate the performances of our architecture presented in
numerous parameters.
R EFERENCES
[1] S. C. Z. Chen and X. Sun, “Anti-counterfeit authentication system of
printed information based on a logic signing technique.”
[2] A. Ezell, “Diploma mills and counterfeit operations,” College and
University, vol. 94, no. 3, pp. 39–46, 2019.
[3] J. R. Clark, “The perfect resume,” Air medical journal, vol. 36, no. 1,
pp. 13–15, 2017.
465