You are on page 1of 6

CITY-ZEN APPLICATION USING BLOCKCHAIN

Shiv Palak
Pandeyshiv18@gmail.com palakkarn15@gmail.com

Disha Sarna Dolly Mehra


dishasarna2001@gmail.com dollymehra204@gmail.com

Department of Information Technology, Guru Tegh Bahadur Institute of Technology, Rajouri Garden,
New Delhi, Delhi – 110064, India

Abstract
To date, there is a paucity of information on the trust with the stakeholder of the supply chain. In
discrepancies of awareness and attitudes towards the end, the research paper has also given some
government policies and welfare schemes. considerations on the implications that are positive
as well as the potential of the blockchain in the
Due to the number of policies and schemes being field of collaboration and integration.
so high a common citizen is not able to keep a track
of all of the opportunities and facilitates. The blockchain technology that Satoshi Nakamoto
has proposed for financial transactions can be used
CITY-Zen is a mobile app to access central and to solve the problems of trust in centralized systems
state government services. The app is created for and the subversion and alteration that these
all citizens of India and offers government services transactions may be exposed to. Blockchain-based
available to the general public online and around systems have shown their effectiveness and ability
the clock. to solve most security problems related to
exchanging systems’ transactions. Hence, A
PURPOSE: The purpose of this study are to decentralized system for exchanging digital
investigate the discrepancies in the awareness and documents, using Ethereum blockchain and
attitudes toward advance welfare schemes initiated Interplanetary File System (IPFS), has been
by the government all around the year. A total of proposed to overcome the problems of using
1000 people including urban and non-urban trusted third parties in exchanging digital
sections of the society were surveyed for the same. documents.
In this paper, we study and compare the awareness
parameter with the application of Block chain The proposed system provides immutable and
Technology and smart contracts. One upon reading irreversible logs of the process of sending and
this will get to know about the effect of block chain receiving documents. In this framework, all
technology utilization on this field. registered users can encrypt the documents using
the Advanced Encryption Standard (AES)
Due to the centralized nature and maintain the vast Algorithm, send, and receive documents using the
amount of data block chain has to implemented Ethereum Blockchain’s smart contract.
because a crash or failure of the database would
affect all records. With the implementation of The smart contract used in the Ethereum
Block chain, a malicious or unwitting actor could blockchain was written in the Solidity
be prevented from altering records in the database programming language, and the android application
and only an authorized party could enter records that was needed to interact with the blockchain was
into the database. built using Java,JDBC and other different libraries
like web3 and MongoDB. Finally, the model’s
There is no doubt in the fact that blockchain results indicated that the users of any age and
technology plays an important role in developing section were easily aware of the current schemes
and according to their eligibility criteria, they could
easily apply online using our application which at
the same time 1-stop secure solution for impacting
an increased user experience and a good usage of get the proper knowledge and the major of all it is not
all the beneficial schemes, thereby being a potential able to reach the intended audience.
citizen of the nation. Also, the model has satisfied
the three main security requirements which are  Indian Government, at all levels, announces Welfare
Schemes for a cross section of the society from time to
confidentiality, integrity, and availability by using
time. These schemes could be either Central, State
the suitable countermeasure for each one of them. specific or a joint collaboration between the Centre and
KEYWORDS-: AES, Smart contract, Ethereum the States
blockchain, Solidity, IPFS
 In the 2022 Union budget of India, there are 740
I. INTRODUCTION central sector (CS) schemes. and 65 (+7+) centrally
sponsored schemes (CSSs). From 131 CSSs in February
Blockchain is a “distributed database or public ledger of 2021, the union government aimed to
all digital events that have been executed and shared restructure/revamp/rationalize these by the next year.
among participating parties using a peer to peer (P2P)
network” [4].  To blame the government alone is unfair. An
It was proposed in 2008 by S. Nakamoto to solve the information drought occurs despite the government’s best
problem of double-spending without the need of a trusted efforts in creating awareness through radio, TV, print or
third party by introducing new cryptocurrency [1]. Each online media.
transaction in the public ledger is hashed with the  Unfortunately, these communication efforts often do
network timestamps forming a record that cannot be not reach rural areas. For example, in Uttar Pradesh, one
changed. of India’s poorest states, between 2013 and 2017, there
was more than US $1.3 billion in unspent funds for
When a transaction occurred, it will be validated and minority welfare schemes. In Karnataka, although US
verified by some nodes in the network which means that $735 million was collected to be used as welfare schemes
the sender has to sign the transaction with his/her digital for workers, only 2.44 percent was used due to lack of
signature, and if it is a valid transaction it will be added awareness of such programs.
in a block in the blockchain [4].
II. II. BACKGROUND
Beyond online cryptocurrencies, blockchain has potential
uses in many other fields such as; education, healthcare, In this section, the operation of the blockchain will be
IoT and decentralized systems for digital documents. The explained by illustrating how BitCoin works since it was
proposed system will adopt blockchain adopt blockchain the first application that uses the blockchain. In the
to overcome the privacy issue in how users’ data is being Bitcoin system, digital signatures are used to protect
shared among third party entities. transactions. Signed transactions are then verified and
broadcasted to the nodes in the BitCoin network. Thus,
Meanwhile, the existing systems are considered to be a Blockchain is used in the BitCoin network to agree on
centralized system, thus a single point of failure may lead the sequence of transactions as each block in the
the system to fall to pieces. Furthermore, blockchain blockchain includes the hash of the previous block as
technology can preserve the integrity and provide an end seen in Figure 1. If two blocks from different nodes
to end network for exchanging documents with the use of
IPFS, which is a peer to peer decentralized file storage
system, to avoid the need of storing the blockchain in
servers. The main objectives of this work can be
represented as the following: first Provide a Tamperproof
platform for exchanging digital documents. Second,
provide an end to end network for exchanging digital
documents.

Fig. 1. Blockchain structure.

were created at the same time, the first block’s puzzle to


be answered it will be add to the blockchain, these
blocks’ difficult puzzles known as “proof of work”,
which is one of the consensus algorithms used in
blockchain. The first node to solve the puzzle broadcasts
the new blockchain to all nodes in the network. Those
nodes who solve these mathematical problems are called
“miner nodes”. This approach makes the blockchain safe
against fraudulent transactions because if the attacker
changes one block in the blockchain this will result in
changing the hash of that block and all blocks after that
A) CURRENT SCENARIOS block needed to be changed too thus, the attacker will
end up changing the rest of blocks.
Due to the large number of Government Policies and
schemes introduced people are not able to keep a track, Blockchain refuses two blocks with the same hash. Proof
of work is used in blockchain to solve the problem of
double- spending and to make all nodes in the network blockchain. The transactions of each device are chained
have the same blockchain. There are many algorithms together as an unchangeable BC ledger, each block
other than proof of work, these algorithms are called contains two headers, block header and policy header,
consensus algorithms. and a number of transactions. The proposed framework
achieves the security requirements; Confidentiality has
been preserved by using symmetric encryption. While
employing hash functions, integrity can be assured. And
by limiting acceptable transactions availability can be
achieved. Finally, User control data can be obtained by
logging transactions in the local blockchain. Their main
limitation was the energy consumption in different traffic
flows were expensive in comparison with the base idea
for the smart home. [9] have proposed a new data-sharing
scheme by combining decentralized storage
interplanetary file system (IPFS), Ethereum blockchain
Fig. 2. Blockchain network protocol and the attribute-based encryption (ABE) technology.
The system has two main users; the data owner, who
owns the data and wants to share it with others, and the
data user, who wants to get access to the data shared by
III. RELATED WORK
the data owner. The scheme archives fine-grained access
Currently, Blockchain is one of the most secure data by giving the capabilities to the data owner to distribute
protection technologies. The rapid advancements in the secret key for data users and encrypt the shared data
digital technology have also introduced new challenges by specifying access policy. The system framework
around data security. Organizations need to secure their consists of the following steps; User registration, this
data by implementing strong authentication and step is accessible by the data owner, which takes the
cryptography key vaulting mechanisms. Blockchain master key and the attributes set of the new user as input
technology is functioning enough to address the challenge and outputs the user secret key that will be encrypted in
of how to secure the data and prevent malicious cyber- AES algorithm and embedded in the Ethereum
attacks. Reports say the global blockchain technology blockchain. The data owner selects a keyword set from
market is likely to be around $20 billion by 2024. the file and selects the AES key from the key space,
Blockchain has been revolutionary, is used in many encrypts the file and upload the cypher text to IPFS.
industries like healthcare, finance, sports and more. After that, the public parameter and the key that has been
used in encrypting the file and the location of the
This section will review the previous work on both ciphertext, which is encrypted using the AES key, along
digital databases security, and blockchain applications. with the access policy will be encrypted by the data
Because of the difficulties of sharing information by owner using ABE Algorithm and return it as an
meeting in a face-toface manner, information exchanges encrypted result. In the decryption step, if the data user’s
are moving towards online environments. Therefore, the attribute meets the access policy, the data user decrypts
trust that was in a faceto-face manner must be maintained the result in the previous step and gets the AES key and
in the online environment and such systems must build uses it to decrypt the file location, download it and
properly. [3] had described the key attribute for sharing decrypt it again using the same key. However, the system
information mechanisms, and they explained how to doesn’t provide functions for the users’ attribute
establish and maintain trust as a fundamental part of rescission and access policy update. [4] have presented
information exchange. In order to maintain these blockchain application and one of them was the notary
systems, information must be classified, protected, and public which implements the blockchain to obtain the
Anonymity must be preserved. In this work, they focused documents’ certificates that can be used to prove the
on the trust in online systems for sharing information, but ownership, integrity, and existence of such documents. It
these systems may be hacked, corrupted or even charge a can also provide proof of publication using cryptographic
high amount of money for ensuring that the file hashes in the blockchain that leads to a new level of
communication channel is secured enough. notary timestamping. Using blockchain can minimize the
need for notarization fees and avoid the need for using
Blockchain centralized systems which are vulnerable to a single point
Due to the nature of IoT, privacy and security remain a of failure.
major challenge. [5] presented a case study of applying A. Blockchain databases
blockchain on smart homes for preserving privacy and
security with minimal overhead in terms of energy
Any data structure used to store information can be
consumption, traffic, and processing time. The authors
considered a database. Blockchain technology, at its core,
divided the smart home into four components;
is no more than a ledger to store information about
Transactions, Local blockchain, home miner, and local
transactions.
storage. The transaction component is responsible for
To that point, blockchains can be considered databases.
accessing and storing transactions issued by devices. The
Blockchain databases bring the concept one step further
blockchain (BC) used in the case study is a local private
and combine the best of both worlds. In this article, you
will learn the benefits of blockchain databases and how
they can be used in your IT infrastructure.
To understand what blockchain databases are, it is crucial
to understand what a blockchain is. Blockchains are used
as a digital ledger to store transactional information. The
data is stored as signed blocks, which link to each other,
creating a chain of immutable interconnected data
entries.

Fig. 3. Blockchain network blocks

To sign a new block, a node needs to find an SHA-256


signature that matches specific criteria. To do so, it will
use the nonce field to brute force possible solutions. Any Fig. 4.
new block needs to be validated with the majority of the
validation nodes forming the blockchain. Once the block
has been validated, it is added to all the nodes of the IV. PROPOSED MODEL
blockchain. This way of validating new blocks is called
the proof of work (PoW) and was very prevalent in the A. Model Overview
early days of blockchain technology. Nowadays, other
methods for validating have emerged, such as the proof A decentralized application for accessing the distributed
of stake (PoS). database will be implemented using the Ethereum
blockchain, smart contract and solidity. The main
If any of the information in the data inside the block is
objective is to present a p2p network for exchanging
altered, the signature becomes invalid. To make the block
information and retrieving respective welfare scheme
valid again, this signature would need to change. To
data according to and provide logs to keep track of
ensure that the following blocks still work, a new
transactions that take place to ensure both; integrity and
signature would also need to be generated for each of
security.
them. Even if a node could regenerate those signatures,
the changes would need to be accepted by a majority of
For an effective solution and according to the Digital
the nodes hosting the blockchain.
India Mission a Mobile App is required that over rules
For these reasons, blockchains are immutable. No the traditional way of filling a lot of entry details and
information that is included in the data of the blocks can providing less info.
be changed. They are also managed by a set of  CITY-Zen is a simple Android java bases application
decentralized nodes, removing the need for a central which when started prompts the user for language he is
authority to control all the transactions. This comfortable in as a large amount of audience is not well
immutability is why blockchains have gained popularity educated in rural areas.
in industries such as finances and real estate.  Age City and gender would be the first 3 requirements
to be filled so that data can be selected according to the
The blockchain structure makes it virtually impossible needs of the user as a Resident of Mumbai Male 21-year-
for someone to change the data without breaking the old would not apply for his minor account or Delhi girl
chain. child scheme.
 Data Fetched from Block Chain Database would be
Data can only be read or added to the blockchain. The
managed and divided into 3 tabs with relevant
verification methods to ensure data integrity can slow
information about the policy on 1st eligibility and
down the querying and general performance of a
required documents on 2nd and a 24x7 online working
blockchain. Blockchains can be fully decentralized and
links on 3rd for the simplicity of all users.
not rely on any central authority.
 Login for users will also be provided for better and
enhanced experience.
The proposed framework is implemented using the
solidity programming language.
The proposed framework has four main functionalities:
1) The ability to login into the application.
2) Fetching via keywords from the blockchain based
database.
3) The ability to track and verify the scheme links and blockchain. We enumerate some major challenges and
documents. recent advances as follows.
4) Maintaining the three security standards: A. Scalability:
Confidentiality, Integrity, Availability. Building a website
application became a necessity to be able to communicate With the amount of transactions increasing day by day,
with the blockchain. the blockchain becomes bulky. Each node has to store all
transactions to validate them on the blockchain because
The website is built in with Android Java,JDBC and they have to check if the source of the current transaction
other tools which is an effective and declarative is unspent or not. Besides, due to the original restriction
MongoDB library that allows you to deal with user of block size and the time interval used to generate a new
interface (IU) components as small pieces called block, the Bitcoin blockchain can only process nearly 7
“components” [2]. The following de- pendency will be transactions per second, which cannot fulfill the
used in building and connecting the website with the requirement of processing millions of transactions in
Ethereum blockchain: Truffle development environment real-time fashion. Meanwhile, as the capacity of blocks is
that can be used to compile and deploy the smart contract very small, many small transactions might be delayed
and inject them into the application, it acts as a front- since miners prefer those transactions with high
end. transaction fee. There are a number of efforts proposed to
address the scalability problem of blockchain.

B. Privacy Leakage

Blockchain can preserve a certain amount of privacy


through the public key and private key. Users transact
with their private key and public key without any real
identity exposure. However, it is shown in [40], [5] that
blockchain cannot guarantee the transactional privacy
since the values of all transactions and balances for each
public key are publicly visible. Besides, the recent study
[41] has shown that a user’s Bitcoin transactions can be
linked to reveal user’s information. Moreover, Biryukov
Fig. 5. ER Diagram of the proposed application et al. [11] presented a method to link user pseudonyms to
IP addresses even when users are behind Network
Address Translation (NAT) or firewalls. In [11], each
B. Model Design client can be uniquely identified by a set of nodes it
connects to.
Ethereum blockchain Smart contracts are used to govern
the queries that have been executed in the blockchain. VI CONCLUSION AND FUTURE WORK
Smart contract’s code is considered to be the code
deployed to the blockchain. In the proposed model the In order to query the blockchain or add new blocks to the
smart contract will be used to control the process of chain, each block that is created must be kept in a single
sending and receiving documents. It will also be location. The cloud-based database-as-a-service from
responsible for adding a new member to the system. MongoDB, MongoDB Atlas, is ideal for storing a
blockchain ledger.
According to the survey undertaken, more than half of
the university students (59.89%) had never heard of
many welfare govt. schemes before; there were
significant differences in the awareness regarding this
between urban and rural-peers including people from
children to adults to senior citizens.
But a re-survey conducted after the app usage suggested
that the people are getting more engaged with the
government schemes and are also grabbing the benefits
of schemes at the intended time itself, also the app has
provided ease to all the beneficiaries.

Fig. 6. Data Flow Diagram of City-Zen App

IV. CHALLENGES & RECENT ADVANCES

Despite the great potential of blockchain, it faces


numerous challenges, which limit the wide usage of
Fig. 7. Statistics after development of this model
technology now will benefit you in the long run. The
time to become familiar with Blockchain technology is
now.

The scope of blockchain technology will expand in the


coming years and the merits of its application will lure
businesses and organizations globally for investing in it.
Although blockchain technology is in its nascent stage,
its future is poised to see adoption from industries across
the globe.

REFERENCES
[1] S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic
Cash System,” J. Gen. Philos. Sci., vol. 39, no. 1, pp. 53–
67, 2008.

[2] Eisenman, Bonnie. Learning React Native. O'reilly


Media, Inc., 2015.

[3] D. Sutton, “Vertrauenswürdiger


Informationsaustausch für ein besseres Lageverständnis
im Cyberspace,” Elektrotechnik und
Informationstechnik, vol. 132, no. 2, pp. 113–116, 2015

[4] M. Crosby, P. Pattanayak, S. Verma, and V.


Kalyanaraman, “Applied Innovation Review,” Appl.
Innov. Rev., no. 2, pp. 5–20, 2016.
Fig. 8. Welfare Schemes Initial Survey
[5] A. Dorri, S. S. Kanhere, R. Jurdak, and P.
Gauravaram, “Blockchain for IoT security and privacy:
The case study of a smart home,” 2017 IEEE Int. Conf.
From the above data it can be concluded that people were Pervasive Comput. Commun. Work. PerCom Work.
only aware about the schemes that are spoken about and 2017, pp. 618–623, 2017.
people had no knowledge about many other schemes that
are very basic and useful for the people. [6] L. Nekouei and A.Y. Yang," Automatic Pose
Correction Using Landmark-adjustment,” in Proceedings
Our application will be a fully build one stop platform of the IEEE Conference on Computer Vision and Pattern
for the people of all categories, age and gender, where Recognition (CVPR) , 2017
people can get information about the basic schemes that
the government has for them and can also apply for the [7] T. Luu, et al.," Human Pose Regression for
same. Healthcare Use Cases,” in Proceedings of the IEEE/CVF
International Conference on Computer Vision (ICCV),
2019.

[8] S. Wang, Y. Zhang, and Y. Zhang, “A blockchain-


based framework for data sharing with fine-grained
access control in decentralized storage systems,” IEEE
Access, vol. 6, pp. 38437–38450, 2018.

[9] S. Wang, Y. Zhang, and Y. Zhang, “A blockchain-


based framework for data sharing with fine-grained
access control in decentralized storage systems,” IEEE
Access, vol. 6, pp. 38437–38450, 2018.
Fig. 9. Analysis of Schemes Awareness
[10] A. Antolino-Hernández, H. Ferreira-Medina, C.
Torres-Millarez, and J. C. Olivares-Rojas, “Management
The idea of blockchain can also aid in the management of of digital documents with encrypted signature, through
enormous amounts of data, which can be highly the use of centralized PKI, and distributed using
beneficial for government organizations. The adoption of blockchain for a secure exchange,” J. Res. Dev., vol. 5,
Blockchain will result in an efficient data management no. 15, pp. 26–37, 2019.
system with the potential to enhance how these entities
operate.

Blockchain engineers and specialists are in short supply


on the job market, despite the technology being at the
height of its popularity. Investing in Blockchain

You might also like