You are on page 1of 6

INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTING SCIENCE ISSN NO: 0972-1347

BLOCKCHAIN TECHNOLOGY FOR KYC DOCUMENT


VERIFICATION
M. Mohamed Rafik1 & Dr.T.Ananth Kumar2
1
U.G.STUDENT, 2ASSISTANT PROFESSOR
Department of Computer Science & Engineering
IFET COLLEGE OF ENGINEERING, GANGARAPALAYAM

Abstract: Blockchain is one of the be applied in the real time


most powerful technology that has environment. Blockchain is
taken the world by storm these days. completely decentralized, immutable,
Blockchain can be applied for the tamper proof and secured. Only the
various challenging task, one of the authorized user can able to see the
major challenge is financial because data in the blockchain network that
verifying the KYC document for the provides transparency by this
multiple financial sectors is a time blockchain can be implemented in the
consuming process and data insecure KYC chain to provide a decentralized
because documents are maintained by data storage and transparency.
the centralized organization .The Because managing the same customer
proposed KYC system is a information in the various bank and
decentralized system that are other financial sectors that creates
developed by Blockchain which can data redundancy and high cost for
be used to establish the proof of maintaining the sensitive information.
identity for an individual person and In the traditional system that also
also this is cost efficient method and have a lack of security. Blockchain
the data stored on the decentralized based Kyc verification can solve all
application is an additional security. the problem that are exist in the
traditional method. Using the
Keyword: blockchain, kyc
generation of signature keys, the
INTRODUCTION: since the signature token is required for access
evaluation of Bitcoin, blockchain can the information of the individuals, as

Volume 6, Issue 3, March 2019 457 http://ijics.com


INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTING SCIENCE ISSN NO: 0972-1347

certain action can perform only Teo . In this, the authors have briefly
through the user permission. discussed about how the blockchain
technology implemented with the
LITRATURE SURVEY:
anonymous data sharing that
[1] Block chain orchestration and performed based on the receiver does
experimentation framework: a case not know about the exact sender.
study of kyc Wazen
EXISTING METHODOLOGY:
M.Shbair*,Mathis Steichen*,Jerome
Francois, Radu State* University of In existing system, customer wants to
Luxembourg. In this, the author creates an account in bank they fill a
discussed how the blockchain
lot of personal identity documents for
orchestration framework perform end
explain about the experimental work verifying the customer they fill a lot
for the blockchain technology in this of hand written papers generally bank
can be easy to learn for the developer
to do they fill the all the details for
to develop a blockchain on document
verification. [2] Transaction creating a account for a particular
Authorization from Know Your bank. Same customer wants to do
Customer (KYC) Information in
same process for creating a account to
Online Banking Prakash Chandra
Mondal,1,* Rupam Deb,2 and the another bank that is a time
Mohammad Nurul Huda1. In this, the consuming process and same details
author have briefly discussed about are stored into the different bank
how the blockchain technology work
to notice the online banking forgery database. If the customer wants to
by the government issued document create a 10 bank account same
through the customer portal. [3] process is carried over the all banks
Double-Blind Consent-Driven Data
with some other additional details.
Sharing on Blockchain Kumar
Bhaskaran, Peter Ilfrich, Dain Maintaining a customer information
Liffman, Christian Vecchiola, in all the banks they did not get any
Praveen Jayachandran, Apurva
revenue from that simply waste the
Kumar, Fabian Lim, Karthik
Nandakumar, Zhengquan Qin, money over the 10billions for each
Venkatraman Ramakrishna, Ernie GS

Volume 6, Issue 3, March 2019 458 http://ijics.com


INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTING SCIENCE ISSN NO: 0972-1347

banks from this only suffering for the only by the customer and through
end customer. all bank more or less customer permission. The requested
bank can view the customer KYC
get a same information from the
document by give a view request to
customer that leads data redundancy the customer profile and the customer
and that information‟s are stored and may give a options either allow or
deny if the customer‟s allows the
managed by the centralized
view request then the blockchain
organization also data in security. provide a transparent view to the bank
Through the centralized organization and government can able to cross
verify the kyc document which are
control hackers can easily crash the
issued by the government. The
server and collecting or modify the information stored in the blockchain
information so that in an existing is additional security.
system is less secure not give a ARCHITECTURE:
confidentiality to the customers
In this project we create a blockchain
information. web application that create a smart
PROPOSED METHODOLOGY: contract using a solidity language.
The customer sign up into blockchain
We propose a blockchain based kyc network and upload the general
verification system that create a block information which are the bank need
for the each bank and the customer and request to the corresponding
add the kyc information and stored bank. And the bank need to view the
into the blockchain network by customer document so that the bank
creating account on blockchain give the view request to the customer
through the customer account they by the approval provided by the
can request the bank which they need customer then bank can view the
to create a account and the details are information transparently.
stored in the blockchain will be
modified or any changes performed

Volume 6, Issue 3, March 2019 459 http://ijics.com


INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTING SCIENCE ISSN NO: 0972-1347

provide a permission then only the


bank can view the details
transparently.

RESULT:

IMPLEMENTATION:

In this we are using a node.js tool for


executing a JavaScript code on server
side and ganache-cli for making a
smart contract. The system have an
Open the terminal window and
execute the command testrpc to run
the local blockchain network.

Open the new terminal execute the


init.js file using the command line
`node init.js`

And the 20 byte address is obtained


and it is store into the contract file
now the blockchain is ready to
execute.

[1] The customer sign up into the


blockchain network and request the
bank they want and upload the
document into the blockchain
network.

[2] then the bank side want to view


the information they give a request to
the customer only the customer

Volume 6, Issue 3, March 2019 460 http://ijics.com


INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTING SCIENCE ISSN NO: 0972-1347

CONCLUSION: Nandakumar, Zhengquan Qin,


Venkatraman Ramakrishna, Ernie GS
By implementing a blockchain
Teo .
application for kyc document
verification, it give a proof of identity 4. Decentralized Applications: The
of a customer on bank and provide a Blockchain-Empowered Software
transparent access to all the banks System WEI CAI1,2, (Member,
which are connected into the IEEE), ZEHUA WANG2,3,
blockchain network it ensure the (Member, IEEE), JASON B. ERNST3
faster accessing of the kyc document , (Member, IEEE), ZHEN HONG2 ,
and also give a security. By this we (Student Member, IEEE), CHEN
can reduce the cost of maintaining the FENG4 , (Member, IEEE), and
document from the centralized VICTOR C.M. LEUNG2 , (Fellow,
organization IEEE)

REFERENCE: 5. A. Kosba, A. Miller, E. Shi, Z.


1.Block chain orchestration and Wen, and C. Papamanthou, “Hawk:
experimentation framework : a case The Blockchain Model of
study of kyc Wazen Cryptography and Privacy-Preserving
M.Shbair*,Mathis Steichen*,Jerome Smart Contracts,” IEEE Symposium
Francois,Radu State* *University of on Security and Privacy, 2016, pp
Luxembourg,SnT,29,Avenue J.F 839-858.
Kennedy,L-1855 Luxembourg.
6. “Consumer Digital Identity:
2. Transaction Authorization from Leveraging Distributed Privacy
Know Your Customer (KYC) Enhancing Technology,” (White
Information in Online Banking Paper: Secure Key):
Prakash Chandra Mondal,1,* Rupam https://securekey.com/resources/consu
Deb,2 and Mohammad Nurul Huda1. mer-digital-identity/

3. Double-Blind Consent-Driven Data 7. E. Ben-Sasson, A. Chiesa, C.


Sharing on Blockchain Kumar Garman, M. Green, I. Miers, E.
Bhaskaran, Peter Ilfrich, Dain Tromer, and M. Virza, “Zerocash:
Liffman, Christian Vecchiola, Decentralized Anonymous Payments
Praveen Jayachandran, Apurva from Bitcoin,” IEEE Symposium on
Kumar, Fabian Lim, Karthik

Volume 6, Issue 3, March 2019 461 http://ijics.com


INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTING SCIENCE ISSN NO: 0972-1347

Security & Privacy (Oakland) 2014,


pp 459-474, IEEE, 2014.

8. C. Garman, M. Green, and I. Miers,


“Accountable privacy for
decentralized anonymous payments”,
International Conference on Financial
Cryptography and Data Security
(Barbados), pp. 81-98, 2016.

9. “Zero-knowledge Security Layer to


be Added to Quorum Blockchain
Platform”, Press Release:
https://z.cash/blog/zsl-quorum.html

10. A. M. Antonopoulos, “Mastering


Bitcoin: Unlocking Digital
CryptoCurrencies” (1st ed.). O'Reilly
Media, Inc., 2014.

11. “A Next-Generation Smart


Contract and Decentralized
Application Platform” (White paper):
https://github.com/ethereum/wiki/wiki
/White-Paper

12. “What it means to „Know Your


Customer‟”:
https://complyadvantage.com/knowle
dgebase/kyc

[13] “IBM Blockchain Platform”:


https://console.bluemix.net/docs/servi
ces/blockchain/index.html#ibmblockc
hain-platform.

Volume 6, Issue 3, March 2019 462 http://ijics.com

You might also like