You are on page 1of 15

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/362512029

Towards Blockchain-Based Document Authentication: Application for Digital


Mushaf Al-Quran Authentication

Article  in  International Journal of Organizational and Collective Intelligence · July 2022


DOI: 10.4018/IJOCI.306693

CITATION READS

1 46

3 authors:

Zineb Touati Hamad Mohamed ridda Laouar


Université de Tébessa Université de Tébessa
8 PUBLICATIONS   34 CITATIONS    68 PUBLICATIONS   250 CITATIONS   

SEE PROFILE SEE PROFILE

Bendib Issam
Université de Tébessa
22 PUBLICATIONS   48 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Intelligent decision support system based cloud computing for urban planning View project

Software architecture modeling, transformation and evolution View project

All content following this page was uploaded by Zineb Touati Hamad on 06 February 2023.

The user has requested enhancement of the downloaded file.


Towards Blockchain-Based Document
Authentication: Application for Digital
Mushaf Al-Quran Authentication
Zineb Touati-Hamad
Laboratory of Mathematics, Informatics and Systems (LAMIS),
University of Larbi Tebessi- Tebessa, Algeria
zineb.touatihamad@univ-tebessa.dz
Mohamed Ridda Laouar
Laboratory of Mathematics, Informatics and Systems (LAMIS),
University of Larbi Tebessi- Tebessa, Algeria
ridda.laouar@univ-tebessa.dz
Issam Bendib
Laboratory of Mathematics, Informatics and Systems (LAMIS),
University of Larbi Tebessi- Tebessa, Algeria
issam.bendib@univ-tebessa.dz

ABSTRACT
Nowadays, with the massive development of technologies, documents are usually made, modified and
published digitally. Unlike paper documents, digital documents are easily falsified, and it is difficult to
verify the authenticity of these advanced documents in effective and fast ways. Mushaf Al-Quran is one of
the most sensitive digital documents that deserves to be preserved due to the divine messages it carries.
There is no way to maintain an immutable document as today's blockchain technology has proven.
Therefore, in order to take advantage of the blockchain technology, this article present a decentralized web
application (dApp) to authenticate and verify the digital Mushaf based on smart contracts and the Ethereum
network. The results show the efficiency of the blockchain technology in preserving immutable documents
and its effectiveness in protecting and proving the authenticity of the digital Mushaf Al-Quran.

Keywords: Blockchain, Digital Document, Mushaf Al-Quran, Authentication, Document Verification,


Ethereum, Smart Contact, DApp.

INTRODUCTION
There are many forms of paper documents such as bank documents, paper books, original records, and so
on. With the advent of digitization, paper copies have made a leap towards digital copies. Because of this
digitization movement, digital documents, in general, suffer from an increase in the phenomenon of forgery
and violation, which puts data security at risk, a crisis that appears to be more acute for the participation of
Mushaf Al-Quran on digital platforms.
Mushaf Al-Quran is the book of God that represents the paper cover from which the Quran is read, which
in turn also witnessed a huge digital movement on websites and phone applications. It is a challenge to
determine whether the obtained digital copy of the Mushaf Al-Quran is valid or has been tampered with
(Kamsin et al., 2014). Therefore, there is a need for a solution that enhances digital trust and helps provide
secure storage, easy retrieval, and protected access to documents.
There was no technology that provides stability for digital content in keeping all data in a secure and tamper-
free manner, as the blockchain technology has proven today.
In this paper, we aim to apply blockchain technology to the most sensitive digital document in order to
build a digital decentralized web application (dApp) that provides authentication and validation of the
digital Mushaf Al-Quran.
The remain of this paper is organized as follows. The next section shows the background. After that, we
present the related works. Then, we discuss the challenges with the traditional document authentication
systems. Next, we describe in detail the proposed methodology. This is then followed by the
implementation scenario and the result sections, respectively. Finally, the conclusion and future works is
given in the last section.

BACKGROUND
To understand the significance of this research study, it is necessary to understand the basic techniques used
behind our research work such as blockchain, consensus algorithm, smart contract and Ethereum. And also,
to have an idea about the Mushaf Al-Quran which represents the subject of our case study.
Blockchain
Blockchain is an emerging technological innovation aimed to provide a high degree of security and reduce
fraud factors when sharing digital data. Blockchain is a distributed ledger used to facilitate the process of
recording transactions in a decentralized data ledger (Glaser, 2014). This is done by implementing a set of
rules and conditions known as a smart contract (Cong & He, 2019).
Blockchain combines several technologies, including cryptography hash functions, consensus algorithms,
mathematics and the peer-to-peer network. The blockchain contains blocks, and each block contains the
master data, hash of the previous block, hash of the current block, timestamp and other information (Lin &
Liao, 2017). With this combination, the blockchain offers the following features (Laouar et al., 2019):
1. Decentralization: The blockchain abandons the central node, and each node in the network can
record, store, and update the ledger.
2. Transparency: Create transparency between nodes by sharing and distributing data.
3. Immutable: Requires control of 51% of network nodes to change records.
4. Consensus base: Data is not written to the Blockchain until the majority of nodes have
unanimously validated it.
5. Anonymous: All data is hashed and all transactions become anonymous open source. Blockchain
systems allow code and technology to be modified in ways that best suit users' needs.
Consensus Algorithm
The blockchain network is based on consensus algorithms among the participants . Consensus generally
works to validate transactions in a peer-to-peer network and append new blocks to the blockchain. There
are three popular types of proof-based consensus algorithms which are Proof of Work (PoW), Proof of
Stake (PoS), and Proof of Authority (PoA) (Honnavalli et al., 2020).
Proof of Work (PoW)
The Proof of Work (PoW) protocol primarily serves to prevent cyber attacks on the network. When a
transaction is triggered, it is first aggregated with previous unrealized transactions into a single block, then
miners work to verify the legitimacy of these transactions by competing to solve complex mathematical
puzzles using their computers processing power.
The first miner solve this problem distributes the result to the network and is rewarded with Bitcoin
(Ouattara et al., 2017) . Finally, transactions are confirmed by the rest of the workers and written to the
public blockchain.
One disadvantage of this mechanism is that it saves a lot of energy to find potential solutions to these
complex problems. In addition, since so many people are joining the mining process, the difficulty is
constantly increasing in order to keep the mining time the same.
Proof of Stake (PoS)
PoS serves the same goal as PoW, but differs greatly in the way the result is obtained. In PoS, miners pawn
a percentage of their coins in a transaction block for mining, where the miner is chosen by an algorithm
based on how many coins they own and how long they hold them (Oyinloye et al., 2021).
PoS is faster and more efficient than PoW, because it requires less computing power, lowers power
consumption, and transactions take only a few seconds. But it has a bias problem because it mainly benefits
the big players who have a lot of coins available to stake.
Proof of Authority (PoA)
Proof of Authority is a form of the Proof of Stake consensus mechanism (Barinov et al., 2018), but where
instead of coins, network participants use their own identity and reputation. This consensus mechanism is
most notable because it seeks to solve some of the problems found in other POW alternatives.
However, there is significant centralization, because the network is controlled by effective actors.
Smart Contract
Smart contracts are simply codes that can be executed in a digital agreement between untrusted parties
without the involvement of an intermediary third party (Buterin, 2014) (Singh et al., 2020). To avoid
tampering, all nodes of the blockchain network take a copy of the smart contract, and execute it by
computers. Smart contracts aim to reduce human error and avoid conflicts.
Smart contracts are written in the Solidity programming language and run on a public, open-source and
immutable computing protocol called Ethereum.
Ethereum
Ethereum is a public, decentralized, programmable blockchain. It uses a special cryptocurrency called
Ether. Ethereum is open source and is the most widely used and leading developer of decentralized
applications also called dapps. Decentralized applications are built on the basis of smart contracts and
executed on the Ethereum network in a smart contract runtime environment called the Ethereum Virtual
Machine (Chauhan et al., 2021).
Dapps are deployed on the Ethereum main networks and require real Ether to run. Therefore, it is important
to first deploy the dApps on a test network due to the ease of getting Ether to test it (Chauhan et al., 2021).
Ethereum has four test networks for the developer to develop and run tests. The work of these networks is
similar to the main network and differs in the time of mining, immunization, consensus algorithm, and
support.
Rinkeby test network
Rinkeby network ID is 4, this network is based on the PoA algorithm and takes about 15 seconds to create
a block. This network is immune to spam attacks because the ether supply is controlled by trusted parties.
It is supported by geth only, and ether is obtained at the request from a faucet.
Ropsten test network
Ropsten network ID is 3, this network is based on the PoW algorithm, and it takes about 30 seconds to
create a block. This network is not immune to spam attacks. Because of this, it is less stable. It can be used
with both geth and parity, and ether can also be mined or requested from a faucet.
Kovan Test Network
Kovan network ID is 42, this network is based on the PoA algorithm and takes about 4 seconds to create a
block. This network is immune to spam attacks because the ether supply is controlled by trusted parties.
Not supported in geth , and the ether cannot be mined but rather requested from a faucet.
Görli Test Network
Görli is a public next-generation Ethereum test network, this network is based on the PoA algorithm in
which the ether is requested from a faucet.
Digital Mushaf Al-Quran
The term Digital Mushaf Al-Quran refers to the book of god that contains the text of the Qur’an processed
as a digital text through specialized devices to displaying the texts and the readings of the Quran in all its
forms.
Mushaf Al-Quran contains an important religious text sequential in the form of 114 verses and 6236 surahs
(Touati-Hamad et al., 2020). The Quran is written in Arabic language and is characterized by Ottoman
drawing with the emergence of diacritics and objective marks. There are several readings of the Noble
Quran with different narrations. These differences are not considered a distortion, but are limited to only
some words related to the Ottoman drawing and the linguistic meaning.
The printed copies of the Quran are subject to a control and approval body. However, despite the smart
developments and the digitization of the electronic copies of the Quran, there is no official Islamic body
responsible for documenting digital copies.
This loophole led to an increase in the number of distorted Mushafs on websites and electronic stores.
Distortion occurs on these copies in terms of missing a letter / word / some verse, or advance / delay /
change in diacriticals. Or even technical errors that lead to the deletion of some pages, intentionally or
unintentionally, which causes a change in meaning or syntax.

RELATED WORK
To date, research is still underway in order to overcome the obstacles and deficiencies of the document
authentication process in many use cases.
With the help of blockchain technology, some solutions take advantages of the technologies behind the
blockchain that combine digital signature, cryptographic hash functions, decentralized storage and smart
contracts together, to develop systems to protect the authenticity of documents. for example:
The authors of (Cheng et al., 2018) have introduced a digital certificate system based on blockchain
technology, the system creates an electronic document for all certificate data and then calculates its hash
value, and finally stores the hash value in the blockchain so that any other party can verify it easily and
securely.
The authors of (Sun et al., 2020) have proposed a framework that uses blockchain and smart contracts to
share electronic medical records and solves the problem of secure storage by allowing clinicians to encrypt
electronic medical records with optimal access policies and then aggregate them into an interplanetary filing
system (IPFS).
The authors of (Chauhan et al., 2021) have designed a framework for documenting daily business records
using smart contracts and publishing them on the Rinkeby Test Network. The nodes generate a unique
fingerprint for each document using the SHA-256 algorithm and then store the fingerprint on the blockchain
to verify the document in the future.
The authors of (Marella & Vijayan, 2020) have developed a working prototype for curriculum vitae
authentication, the model saves only the hash values of all job applicant original documents submitted by
different organizations in the blockchain consortium. Thus, job applicant details can be verified during the
recruitment process by comparing the hash value of the selected document with the hash value of the
document on the blockchain.
The authors of (Lam et al., 2018) have proposed an open ledger for keeping digital signatures of various
types of documents relevant to civil engineering practices. The system leverages enabling technologies of
smart cities such as IoT, RFID, and ubiquitous connectivity to minimize manual processes that are
vulnerable to falsification and to automate record creation & entry of digital signatures into the blockchain.
In (Sullivan & Burger, 2017) the authors discuss the possibility of radically changing the way identity
information is controlled and authenticated by applying blockchain to e-residency and eliminating concerns
of identity crime, fraud, and money laundering.
The blockchain was also applied to authenticate other documents such as invoices (Nguyen et al., 2019),
financial reports (Van Thanh Le et al., 2019) and national electronic identity (Juan et al., 2018) and other
sensitive documents that are not easy to verify.
Although the Blockchain technology has proven its worth in protecting digital documents, no work was
noticed that applied this technology to the Quran, so we seek in this paper to maintain the credibility of the
Mushaf Al-Quran by using the features of the Blockchain technology.

CHALLENGES WITH TRADITIONAL DOCUMENT AUTHENTICATION SYSTEMS


PDF files are the most popular format for sharing digital documents. PDF files can be protected in three
ways: either by password protection, by using digital signatures, or by encryption. In this way, the
protection applies only to the entire document, and it is not difficult to sabotage the content of the document
and the timestamp of its creation. The main reason is that the document is owned by a central authority and
there is no guarantee who modified the document and at what time.
Blockchain's strength is demonstrated in protecting documents by creating timestamps and allowing
multiple signatures using private keys between all aspects of a decentralized network.
The hash is calculated for the original version of the PDF and the value is stored in the blockchain.
Authorized parties can verify the legality of copies of a document by matching the version hash to the
original version hash.
Blockchain can save the timestamp and identity of the person who signed the document. Therefore, it can
become possible for multiple parties to sign a document through a legally binding and secure process.
One of the main advantages of using blockchain technology to verify documents is cost-effectiveness.
Eliminating third party interference in any transaction helps eliminate additional business expenses on it.
Secondly, it is the scalability feature of the blockchain that helps tremendously in terms of document
verification. One can complete operations i.e. transactions in a few seconds, unlike a traditional stream.
Finally, the most important component is stability. A blockchain network encrypts information in a
structure that makes it difficult to modify. This means that once there is an agreement to the system about
the information, it ends up being immutable.

PROPOSED METHODOLOGY
The proposed methodology aims to apply blockchain technology to solve the current problem associated
with the authentication and verification of the electronic Mushaf Al-Quran.
The advantages of the blockchain overcome the main challenges in the authentication process as the
decentralized distributed ledger provides stability and the inability to modify documents. The decentralized
nature of the blockchain eliminates the intermediary to ensure transparency, and reduces transaction fees
for the verification process.
The smart contract will be built on the Ethereum blockchain platform due to its effectiveness in building
decentralized applications.
The next algorithm shows the authentication and verification functions of a smart contract. This contract
publishes on the Ethereum network, and allows to store data on the blockchain and read it. The
authentication function creates a one-way cryptographic hash for each Mushaf so that it is difficult to find
the original document from the hash, and this ensures high privacy.
The SHA-256 algorithm was used as a hash function. This algorithm produces a 32-bytes fingerprint
derived from the input data, whatever its size, and this ensures flexibility in using different types of Quran.
A time-stamped fingerprint is saved on the blockchain. This serves as evidence that there is a Mushaf in a
particular edition at a particular time.
The verification function is based on proving the integrity of the file by comparing the hash code of a
particular Quran with the tokens already stored on the blockchain.
This way, if any pixel/character/diacritics or verse order is changed, it will completely change the hash
code. Therefore, this methodology ensures that the same fingerprint is not produced for more than one
Mushaf.

Algorithm: Mushaf Authentication & Verification Contract

Contract Mushaf
{
struct Record
{
uint mineTime;
uint blockNumber;
}
mapping (bytes32 => Record) private docHashes;

function addDocHash (bytes32 hash) public


{
Record memory newRecord = Record (now, block.number);
docHashes[hash] = newRecord;
}

function findDocHash (bytes32 hash) public constant returns (uint, uint)

{
return (docHashes[hash].mineTime, docHashes[hash].blockNumber);
}

To ensure reliable copies of the Mushaf Al-Quran, we apply the proof of existence consensus. No narration
from the Noble Quran can be considered distorted, so we chose to work on all narrations. The Religious
Affairs Authority first uploads all the original copies of the Mushaf Al-Quran onto the blockchain one by
one. Every time a block is added to the chain, a hash is generated for it. With this methodology, if there is
an intention to distort a copy of the Mushaf, then all the serial copies before it must be distorted, and this is
almost impossible.
Authentication Process
As shown in Figure 1, the authentication process goes through 5 steps:
Step 1: Log in to the platform
Users who want to use the blockchain document platform to authenticate the Mushaf are the Religious
Affairs Authority. In this case, we use the private and public key of the wallet as a username and password
to enter the platform without the participation of third parties that are required to bring trust to the system.
Step 2: Upload the document to the platform
The Religious Affairs Authority can download the reliable Quran with its various narrations and forms that
need to prove its existence. In this case, we choose to work only with the pdf version.
Step 3: Calculate the Mushaf hash code
The hash code of the reliable Mushaf is calculated using the SHA-256 algorithm that generate a 32-bytes
fingerprint. The hash code of any type of Mushafs can be calculated separately.
Step 4: Execute the authentication function under the smart contract
Every time a user generates a fingerprint, this code is passed on to the smart contract and distributed over
the Ethereum network in order to validate the code and avoid any conflicts.
Step 5: Save the fingerprint in the blockchain
After the code is validated, a new record is created in which the current time, record number and the
fingerprint are written and stored on the blockchain, so that its content cannot be changed.

Figure 1. Authentication process


Validation Process
As shown in Figure 2, the validation process goes through 4 steps:
Step 1: Log in to the platform
Any electronic Quran holder can log into the platform using the private and public key of his wallet in order
to ensure the reliability of the downloaded Quran.
Step 2: Upload the document to the platform
An electronic Quran holder by uploading the document to be verified, provided that it is in pdf format
Step 3: Calculate the Mushaf hash code
The document hash code is calculated using the SHA-256 algorithm.
Step 4: Executing the validation process within the smart contract
After calculating the file's hash, this token is passed to the smart contract and distributed to the Ethereum
network. If a matching code is found, the first node that mastered it publishes the result (the record number
and date it was written on the blockchain) on the network, and the rest of the nodes quickly verify the
correctness of the result to avoid any conflicts. If no matching token is found, the last node returns a message
with only the hash token that it was impossible to get.

Figure 2. Validation process

IMPLEMENTATION
Smart Contract Development
The underlying smart contract was developed on the Ethereum network using the Solidity programming
language.
The authentication function adds the hash to the blockchain and returns the transaction ID. The validation
function looks for the hash on the blockchain and returns the block number and timestamp for writing the
hash on the blockchain, or returns a null if the hash is not found on the blockchain. In order to reduce
transaction fees, we use the document hash code only and not the document as a whole.
Smart Contract Deployment
We have deployed the smart contract on a local blockchain. For this, we used an Ethereum blockchain
simulation tool used as a personal blockchain for development and testing purposes and running locally
called Ganache (see Figure 3). In order to test the working of the smart contract we are deploying it to
Ganache with the modification of the Truffle framework configuration file to set the development network
as “localhost”. Finally, by using the truffle migrate command, the smart contract is published.
Figure 3. Ganache interface
Web Application Design
It is necessary to build a user interface of a web application that facilitates the performance of tasks for the
specified parties. For this we used the following supplies:
• HTML, CSS and bootstrap framework are used to create the front end.
• HTTP server is used as local server.
• Solidity language is used to create the authentication and verification smart contract.
• The MetaMask extension is used to provide Web 3 in the browser.
• The Rinkeby network is chosen as the wallet network for signing transactions from user accounts.
• The initialization code is changed in the middle of the javascript file.
• Transactional ether is provided from the Rinkeby faucet.
• Finally, the smart contract is executed using a web browser, where authentication and verification
functions are accessed through programmed buttons, and transaction fees are charged from the
MetaMask wallet.

RESULTS AND TESTING


The proposed decentralized application for the Religious Affairs Authority would allow hashes of digital
copies of the Mushaf Al-Quran to be stored on the public blockchain. Anyone interested in downloading
an electronic Quran can share the downloaded digital Quran in the normal way with other entities that can
verify the hash of the document instantly on the blockchain through the application. The central
entity/database/server has been phased out, and the Religious Affairs Authority does not need to respond
to verification requests as this is facilitated by a decentralized application.
As mentioned earlier, we use the MetaMask browser plugin, which is available for Chrome browsers.
MetaMask is an Ethereum wallet for the browser. The extension actually injects the web3 provider into the
browser, allowing us to connect to the blockchain via a MetaMask node that asks users to confirm
transactions with a certain trace fee. After installing MetaMask, we connect to the test blockchain network
(Rinkeby), then we can serve our dApp at http://localhost:8080 as shown in Figure 4.
The interface of the dApp is easy and simple, it contains only two buttons, the first is the authentication
button, which is intended for use only by the authentication body, by relying on the public key as an
identifier in the system.
As for the second button, it is intended for use by everyone, as any holder of a digital Mushaf copy can join
and request to verify the authenticity of his copy.

Figure 4. The prototype interface for the Mushaf authentication dApp

Authentication Result
The Religious Affairs Authority first uses the upload dialog to upload the carefully reviewed and trusted
electronic Mushafs, then clicks on the “Add to Blockchain” button to record only the sha-256 hash value
of the Mushaf file on the distributed ledgers via the consensus mechanism.
Then a MetaMask notification appears to request confirmation of the transaction as shown in Figure 5. The
Religious Affairs Authority can upload several reliable copies of the Mushafs, such as Mushaf Warsh,
Mushaf Hafs, and other narrations, as well as the various forms such as the Tajweed Mushaf, the taught
Mushaf, the Mushaf accompanied by translation, and others trusted forms.
Figure 5. MetaMask wallet notification
If the transaction is confirmed, MetaMask sends it through its own Ethereum node, signed with the end
user’s key so that the transaction can be mined as shown in Figure 6. If the transaction is rejected or the
total Ether required for mining is insufficient, the transaction will be canceled and will not be distributed to
web.

Figure 6. Result of authentication process

Verification Result
Anyone who owns a digital Mushaf copy can verify its authenticity by accessing the dApp and owning a
MetaMask wallet, uploading the document to be verified, and then clicking “Find on Blockchain”.
First Scenario: Valid Verification
In the first scenario, if all miners agree that the copy sha-256 hash matches one of the documented hashes
in the blockchain i.e. the document is trusted, the output will be returned as shown in Figure 7. A message
will be returned stating that the copy hash was found in the Ethereum blockchain. The hash value, the block
number containing the hash and the time of authentication of the copy are also displayed.

Figure 7. Result of valid verification


Second Scenario: Invalid Verification
In another scenario, if the content of the Mushaf copy is distorted or the uploaded document contradicts the
documents uploaded by the Religious Affairs Authority authenticated on the Ethereum blockchain, the
result is negative and the output is as shown in Figure 8.

Figure 8. Result of invalid verification


CONCLUSION AND FUTURE WORKS
This research has successfully demonstrated the power of blockchain in preserving the most distortion
sensitive document using the Ethereum network. This application is smart, adaptable, secure and easy to
use. Ani individual can carefully share the digital Mushaf Al-Quran which is confirmed by others through
the mining stage. This application eliminates the requirements of mediators and does not depend on an
intermediary factor. The arrangement has been fully trialled in Ethereum and the order line and graphical
user interfaces are built in.
Therefore, in future work, we seek to exploit this technology to solve other potential forms of distortion in
the content of the Mushaf, with the aim of creating a complete online tool to improve the recognition and
validation of Quranic verses/surahs.

ACKNOWLEDGMENT
This research was supported by the Algerian General Directorate of Research (DGRSTD) and the
Laboratory of Mathematics, Informatics and Systems (LAMIS) in University of Larbi Tebessi.

REFERENCES
Barinov, I., Baranov, V., & Khahulin, P. (2018). POA network white paper. URL: Https://Github.
Com/Poanetwork/Wiki/Wiki/POA-Network-Whitepaper.
Buterin, V. (2014). A next-generation smart contract and decentralized application platform. White
Paper, 3(37).
Chauhan, P., Verma, J. P., Jain, S., & Rai, R. (2021). Blockchain Based Framework for Document
Authentication and Management of Daily Business Records. In S. Tanwar (Ed.), Blockchain for
5G-Enabled IoT: The new wave for Industrial Automation (pp. 497–517). Springer International
Publishing. https://doi.org/10.1007/978-3-030-67490-8_19
Cheng, J.-C., Lee, N.-Y., Chi, C., & Chen, Y.-H. (2018). Blockchain and smart contract for digital
certificate. 2018 IEEE International Conference on Applied System Invention (ICASI), 1046–1051.
Cong, L. W., & He, Z. (2019). Blockchain Disruption and Smart Contracts. The Review of
Financial Studies, 32(5), 1754–1797. https://doi.org/10.1093/rfs/hhz007
Glaser, F. (2014). Bitcoin—Asset or Currency? Revealing Users’ Hidden Intentions. ECIS 2014
Proceedings : 22th European Conference on Information Systems, Tel Aviv, Israel, June 9-11,
2014. Ed.: Michel Avital, 1–14.
Honnavalli, P. B., Cholin, A. S., Pai, A., Anekal, A. D., & Anekal, A. D. (2020). A Study on Recent
Trends of Consensus Algorithms for Private Blockchain Network. 31–41.
Juan, M. D., Andrés, R. P., Rafael, P. M., Gustavo, R. E., & Manuel, P. C. (2018). A model for
national electronic identity document and authentication mechanism based on blockchain. Int. J.
Model. Optim, 8(3), 160–165.
Kamsin, A., Gani, A., Suliaman, I., Jaafar, S., Mahmud, R., Sabri, A. Q. M., Razak, Z., Idris, M.
Y. I., Ismail, M. A., & Noor, N. M. (2014). Developing the novel Quran and Hadith authentication
system. The 5th International Conference on Information and Communication Technology for The
Muslim World (ICT4M), 1–5.
Lam, R. C. Y., Junus, A., Mak, J. Y. W., Lam, L., & Lee, P. K. K. (2018). Blockchain for civil
engineering practices in smart cities. 1294–1300.
Laouar, M. R., Hamad, Z. T., & Eom, S. (2019). Towards Blockchain-Based Urban Planning:
Application for Waste Collection Management. Proceedings of the 9th International Conference
on Information Systems and Technologies. https://doi.org/10.1145/3361570.3361619
Lin, I.-C., & Liao, T.-C. (2017). A survey of blockchain security issues and challenges. Int. J.
Netw. Secur., 19(5), 653–659.
Marella, V., & Vijayan, A. (2020). Document Verification using Blockchain for Trusted CV
Information. AMCIS.
Nguyen, V.-C., Hoai-Luan, P., Thi-Hong, T., Huynh, H.-T., & Nakashima, Y. (2019). Digitizing
invoice and managing VAT payment using blockchain smart contract. 74–77.
Ouattara, H. F., Ahmat, D., Ouédraogo, F. T., Bissyandé, T. F., & Sié, O. (2017). Blockchain
consensus protocols. 304–314.
Oyinloye, D. P., Teh, J. S., Jamil, N., & Alawida, M. (2021). Blockchain Consensus: An Overview
of Alternative Protocols. Symmetry, 13(8), 1363.
Singh, A., Parizi, R. M., Zhang, Q., Choo, K.-K. R., & Dehghantanha, A. (2020). Blockchain smart
contracts formalization: Approaches and challenges to address vulnerabilities. Computers &
Security, 88, 101654.
Sullivan, C., & Burger, E. (2017). E-residency and blockchain. Computer Law & Security Review,
33(4), 470–481.
Sun, J., Ren, L., Wang, S., & Yao, X. (2020). A blockchain-based framework for electronic
medical records sharing with fine-grained access control. Plos One, 15(10), e0239946.
Touati-Hamad, Z., Laouar, M. R., & Bendib, I. (2020). Quran content representation in NLP.
Proceedings of the 10th International Conference on Information Systems and Technologies, 1–6.
Van Thanh Le, C. P., El Ioini, N., & D’Atri, G. (2019). Enabling Financial Reports Transparency
and Trustworthiness using Blockchain Technology. International Journalon Advances in Security,
12(3 & 4).

View publication stats

You might also like