You are on page 1of 8

Certificate locker using trust centric blockchain integrated

capsule Siamese network based digital certificate storage


and verification system
R Sijukrishna˚, R Soloman:, V Vaishanavee : ,
˚Departmentof CSE, Sathyabama Institute of Science and Technology :
Department of CSE, Sathyabama Institute of Science and
Technology :Assistant Professor, Department of CSE, Sathyabama Institute of Science and

Abstract—The dependency on traditional paper-based or cen- diplomas immune to tampering, their integrity etched onto
tralized digital certificates is fraught with inefficiencies, secu- the blockchain’s unyielding foundation. Employers navigate
rity vulnerabilities, and privacy issues. To address these chal- a sea of qualifications with unwavering confidence, guided by
lenges, we propose an innovative, our system places a premium
on user control and data security. In our solution, the unerring compass of authenticity. Individuals, no longer
individuals can seamlessly issue, store, and share a variety tethered to vulnerability, captain their digital identities with
of certificates—ranging from academic credentials to profes- newfound sovereignty, navigating their course with precision
sional licenses—while having fine-grained control over access and reclaiming their rightful place in the digital realm.This is
and privacy settings. The verification process is streamlined, not merely a system; it embodies a seismic shift in the very
providing instant and secure validation, thereby eliminating essence of trust. It’s a handshake sealed on the blockchain,
time-consuming delays and mitigating the risk of fraud. Our
comprehensive solution aims to empower educational institutions,
a promise encrypted in cryptography, a revolution poised to
employers, healthcare organizations, and individuals by offering be ignited. Join us as we delve into the intricate mechanics
a tamper-proof, transparent, and user-centric ecosystem for the of this transformative system, unlocking a future where trust
effective management of trusted digital certificates. reigns supreme in every digital interaction.
Index Terms—Blockchain-based digital certificates, Distributed
ledger technology, Tamper-proof certificates, Non-linear GaN II. LITERATURE REVIEW
HEMT model, Low-frequency S-parameters.
The integration of blockchain technology into digital
certificate management systems has attracted considerable
I. INTRODUCTION
attention in recent years. This literature review explores the
In the evolving landscape of the digital era, our foundational works and key advancements in the development
identities teeter on precarious islands of fragile paper of trust-centric, privacy-preserving, blockchain-based digital
and susceptible digital repositories. Diplomas lose their luster, certificate lockers. Nakamoto’s seminal work [1] introduced
licenses crumple, and medical records harbor concerns of Bitcoin as a decentralized electronic cash system, laying the
breaches. The verification process languishes in cumbersome groundwork for blockchain technology. Subsequently, Buterin
procedures, veiled in uncertainty. Unchecked fraud throws proposed Ethereum [2], a smart contract platform, expanding
shadows on accomplishments and qualifications. Amid this the scope of blockchain applications.
climate of distrust,, casting hope and
revolution.Envision each certificate, from academic Swan’s work on blockchain [3] provides a comprehensive
credentials to professional licenses, not as easily forged overview of blockchain principles, serving as a foundational
documents or vulnerable digital vaults, but as secure jewels reference for understanding the technology’s potential.
embedded within an impregnable block on a global, Zyskind, Nathan, and Pentland [4] delve into the concept
decentralized ledger. This blockchain serves as an of decentralizing privacy using blockchain, emphasizing its
unassailable fortress, staunchly safeguarding your identity. significance in protecting personal data. Kosba et al.’s work
You, the individual, wield the key – your private key, a on ”Hawk” [5] introduces a blockchain model of
digital testament of trust – granting access with unparalleled cryptography for privacy-preserving smart contracts,
precision. Liberated from centralized gatekeepers, you dictate presenting a significant advancement in the field, crucial for
who has access to what, exercising the power of privacy with developing secure and privacy-centric digital certificate
unmatched accuracy. lockers.

Verification, once a lumbering process, transforms into an Dorri, Kanhere, and Jurdak [6] explore the optimization
agile hummingbird, swiftly traveling from certificate to em- of blockchain for the Internet of Things (IoT), addressing
ployer in an instant, eradicating delays and silencing fraud sus- challenges related to scalability and efficiency. Hardy and
picions. In this envisioned future, educational institutions issue Wills [7] propose blockchain as a solution to privacy-related
trust issues in the IoT, contributing to the development of
secure digital certificate management for IoT devices. Zohren,
Harlev, and Knottenbelt [8] introduce a Bayesian approach
to privacy-preserving distributed ledger transactions, offering
valuable insights into enhancing the privacy aspects of challenges, our system leverages blockchain technology to
blockchain transactions, a critical aspect for digital certificate provide a robust and transparent ecosystem for managing
lockers. digital certificates.
In our solution, users can seamlessly issue, store, and
Wang et al.’s research on achieving secure, scalable, and share a variety of certificates, including academic credentials
fine-grained data access control in cloud computing [9] and professional licenses. Crucially, users have fine-grained
presents solutions that can be adapted for blockchain-based control over access and privacy settings, ensuring that
digital certificate lockers, ensuring robust security measures. sensitive information remains secure and accessible only to
Huckle et al. [10] explore applications of blockchain in the authorized parties. The verification process is streamlined,
shared economy, highlighting its relevance to trust-centric enabling instant and secure validation of certificates. This
systems. Ali et al. [14] discuss Blockstack, a global naming eliminates time-consuming delays and reduces the risk of
and storage system secured by blockchains, providing insights fraud, thereby enhancing trust and reliability in certificate
into securing digital identities. verification processes.

Zheng et al.’s overview of blockchain technology [12] of- A. Blockchain Network:


fers a comprehensive understanding of architecture, consensus The blockchain network utilizes consensus algorithms,
mechanisms, and future trends. Stathakopoulou, Gouglidis, such as Proof-of-Work or Proof-of-Stake, to validate
and Mavridis [13] conduct a systematic literature review on and estab- lish agreement on the state of the ledger.
blockchain cybersecurity, providing insights into the evolving This consensus mechanism ensures that all nodes in the
challenges and solutions. network maintain a consistent view of the blockchain,
thereby enhancing se- curity and reliability. Smart contracts,
III. S YSTEM A RCHITECTURE integral to blockchain functionality, can incorporate
conditional logic and triggers, enabling the automation of
intricate processes. The self- executing nature of smart
contracts diminishes the reliance on intermediaries,
streamlining operations, and reducing as- sociated
costs.Immutability is a fundamental characteristic of
blockchain, ensuring that once a block is added to the chain, it
remains unalterable. This property is paramount for preserving
the integrity of digital certificates, preventing any unauthorized
modifications or deletions. Blockchain networks may adopt
different permissioning levels, including public, private, or
consortium-based blockchains. Permissioning controls access
to the network, allowing for customization based on specific
use cases and requirements.To address scalability challenges
associated with blockchain networks, various solutions, such
as sharding or layer 2 protocols, can be implemented. These
scalability solutions ensure the efficient processing of a grow-
ing number of transactions, maintaining the network’s respon-
siveness and effectiveness.

B. Smart Contracts:
Smart contracts operate in a deterministic manner, ensuring
that the outcome of their execution remains predictable and
consistent across all nodes in the network. This determinism
is instrumental in maintaining uniformity, preventing disputes,
and avoiding discrepancies in contract execution. Oracles,
Fig. 1. System Architecture
which are external services providing real-world data to smart
contracts, can be integrated to augment the capabilities of
smart contracts. This integration enables smart contracts to
The proposed system architecture aims to revolutionize interact with off-chain information, broadening their util-
the current paradigm of certificate management by ity.Upgradable smart contracts offer the flexibility to introduce
introducing a novel approach that prioritizes user control new features or fixes without disrupting existing functionality.
and data security. Traditional paper-based or centralized This adaptability is crucial for meeting changing requirements
digital certificates suffer from inefficiencies, security and enhancing the overall system over time. Events within
vulnerabilities, and privacy concerns. To address these smart contracts emit notifications about specific occurrences,
SSI systems enable users to own and manage their
digital identities, reducing dependence on centralized
authorities. Leveraging decentralized identity standards, such
as W3C’s Decentral- ized Identifiers (DIDs) and Verifiable
Credentials, ensures compatibility and interoperability with
other decentralized systems.Continuous monitoring and
anomaly detection mech- anisms embedded within the
identity management system play a crucial role in
identifying and mitigating potential security threats. This
approach ensures the ongoing integrity of user identities by
promptly addressing any irregularities or suspicious activities.
Fig. 3. Level 1

D. Privacy-Preserving Techniques:
Homomorphic encryption stands out as a technique allowing
Fig. 2. Level 0 computations to be carried out on encrypted data without
the need for decryption. This preserves the confidentiality of
sensitive information throughout the processing pipeline. Zero-
knowledge proofs, available in various forms like zk-SNARKs
C. Identity Management System: and zk-STARKs, empower a prover to demonstrate knowledge
Multi-factor authentication (MFA) serves as an effective of a statement without revealing the specifics of the statement
method within the identity management system to bolster itself, enhancing privacy in transactions. Differential privacy, a
security by adding an additional layer of protection. This can strategy involving the introduction of controlled noise to query
involve combining elements such as something the user knows results, is adept at safeguarding individual privacy in statistical
(password) with something they have (security token) or analyses of sensitive data. This method ensures the provision
something they are (biometric data). To safeguard user identity of useful aggregated information while protecting the identities
information, privacy-enhancing technologies like differential of individuals. Secure enclaves, exemplified by technologies
privacy or secure multi-party computation can be seamlessly like Intel SGX or ARM TrustZone, furnish isolated execu-
integrated. These techniques enable the analysis of aggregated tion environments for sensitive computations. This hardware-
data without exposing individual contributions.Adhering to based approach significantly enhances the security of privacy-
self-sovereign identity (SSI) principles empowers users with preserving techniques. Federated learning, an innovative ap-
increased control over their identity information. proach, facilitates model training across decentralized devices
without the necessity to share raw data. This collaborative
learning method ensures data privacy while still extracting
valuable insights from the collective dataset.

E. Certificate Authority (CA):


Hierarchical Certificate Authorities can be implemented
to establish a chain of trust, where higher-level CAs vouch
for the authenticity of lower-level CAs. This hierarchical
structure enhances the scalability and flexibility of the
certificate issuance process. To provide irrefutable evidence
of the exact time when a digital certificate was issued or
revoked, time-stamping services can be seamlessly integrated
into the CA infrastructure. This temporal information is
crucial for auditing and legal purposes.

For real-time checking of the validity status of digital


certificates, mechanisms like the Online Certificate Status
Protocol (OCSP) or Certificate Revocation Lists (CRLs) can
be effectively utilized. These mechanisms ensure that re-
lying parties can promptly detect and respond to revoked
certificates.Inspired by Certificate Transparency, revocation
transparency logs can be employed to publicly record certifi-
cate revocation information. This transparency enhances the
overall security and trustworthiness of the digital certificate
Fig. 4. UML-Class diagram
Role-based access control (RBAC) within the UI ensures that
users have appropriate permissions based on their roles. This
F. Decentralized Storage: granular control enhances security by limiting access to
InterPlanetary File System (IPFS) or other distributed sensitive functionalities. Usability testing and user
file systems can be used for storing digital certificates in a experience (UX) design principles are integral to the UI
decentralized manner. These systems offer high availability development process. A well-designed and intuitive interface
and fault tolerance by distributing data across a network of contributes to user satisfaction and adoption, reducing the
nodes. likelihood of errors and misunderstandings. Integration with
decentralized
Content Addressing ensures that the location of data
is determined by its content rather than its location. This
identity wallets, such as Metamask or self-sovereign identity
mechanism, used in decentralized storage systems, enhances
wallets, streamlines the user authentication process. This in-
data integrity and facilitates efficient retrieval of digital
tegration enhances user convenience and security. Real-time
certificates.
notifications and alerts within the UI keep users informed
about important events, such as the issuance or revocation of
Replication strategies, such as sharding or erasure coding,
digital certificates. This proactive communication contributes
can be employed to ensure redundancy and availability of
to a transparent and responsive user experience. Accessibility
digital certificates. These strategies prevent data loss in the
features, including support for screen readers and other assis-
event of node failures or malicious attacks.
tive technologies, ensure that the UI is inclusive and usable
by individuals with diverse abilities.
Incentive mechanisms, like token-based rewards for storage
providers, can be implemented to encourage participants in H. Interoperability Module:
the decentralized storage network. These incentives foster
Standardized protocols, such as Interledger Protocol
a robust and sustainable storage infrastructure for digital
(ILP) or Blockchain Interoperability Alliance (BIA)
certificates.
standards, facilitate seamless communication between
different blockchain networks. This interoperability allows for
Data encryption, both in transit and at rest, is crucial
the exchange of digital certificates across diverse ecosystems.
for ensuring the confidentiality of digital certificates stored
in decentralized systems. Encryption mechanisms, such as
Advanced Encryption Standard (AES), protect against unau-
thorized access.

G. User Interface (UI):


Fig. 5. Usecase diagram
investigation into the . This approach has
API standards, such as RESTful APIs or GraphQL, been strategically chosen to facilitate a thorough
enable the integration of the blockchain-based system exploration of the technical intricacies of the system while
with external applications and services. These standards also delving into the subtleties of user trust dynamics.
simplify the development of custom interfaces and third-party
integrations. Semantic interoperability, achieved through the 1) Quantitative Methods: Quantitative methods will be
use of common data formats and ontologies, ensures that employed to gather numerical data related to the
information exchanged between systems has shared meaning. performance, efficiency, and security aspects of the proposed
This semantic alignment enhances the accuracy and utility of system. These methods include: Blockchain Transaction
interoperable data. Analysis: Rigorous examination of blockchain transactions
will be conducted to quantify factors such as transaction
throughput, confirmation times, and resource utilization.
Cross-chain bridges or relay networks may be implemented
to enable the transfer of assets or information between
This quantitative data will offer insights into the system’s
disparate blockchains. These mechanisms enhance the fluidity
operational efficiency. Smart Contract Execution Metrics:
of digital certificate transactions in a multi-chain environment.
The execution of smart contracts will be closely monitored
to capture quantitative metrics, including gas consumption
Compliance with established industry standards, such as
and transaction costs.
ISO/IEC 27001 for information security management or ISO
These in- dicators will contribute to evaluating the economic
20022 for financial services messaging, ensures that the
feasibility and scalability of the implemented system.
blockchain-based system aligns with broader industry prac-
tices. 2) Qualitative Methods: Qualitative methods will
be utilized to capture the nuanced aspects of user trust
I. Regulatory Compliance: and acceptance of the ”Trust-Centric Privacy-Preserving
Data protection impact assessments (DPIAs) play a crucial Blockchain-Based Digital Certificate Locker.” These methods
role in identifying and mitigating privacy risks associated with include:
the processing of personal data within the digital certificate
ecosystem. These assessments are conducted to ensure
compliance with privacy regulations such as GDPR. Legal
contracts and agreements are drafted to specify the rights and
responsibilities of participants in the system, aligning with
relevant regulatory requirements. These contracts establish a
legal framework for the secure and compliant operation of
the system. To validate the system’s adherence to industry
standards and regulatory guidelines, regular audits and Fig. 6. Blockchain Integration
certifications are conducted by third-party assessors. These
assessments provide external validation of the system’s
security and compliance posture.. User Experience (UX) Studies: Qualitative feedback will
be gathered through user experience studies, involving
Privacy by design principles, integrated into the system participants interacting with the Digital Certificate Locker.
architecture and development processes, ensure that Insights into the ease of use, user satisfaction, and potential
privacy considerations are addressed from the outset. usability challenges will be gleaned to inform user-centric
This proactive approach minimizes the risk of privacy improvements.
violations and fosters a privacy-centric culture. User consent
mechanisms, implemented within the user interface and Trust Perception Surveys: Qualitative surveys will be
identity management system, ensure that individuals have administered to users to gauge their perceptions of the
control over the use of their personal data. These mechanisms trustworthiness and security of the system. Open-ended
support compliance with consent-related requirements in questions will allow participants to express their concerns,
privacy regulations. expectations, and suggestions, providing qualitative data on
trust dynamics.

IV. M ETHODOLOGY
A. Research Design
The research design for this study is intentionally
multifaceted, combining both quantitative and qualitative
methodologies to provide a comprehensive and nuanced
3) Mixed-Methods Integration: The integration of This ensured that the collected digital certificates
quantitative and qualitative data will be conducted accurately represented real-world scenarios while
iteratively throughout the research process. Triangulation, safeguarding sensitive information.
where findings from different methods are compared and
C. Justification of Methodologies
contrasted, will be employed to enhance the robustness
The choice of a trust-centric approach is justified by the
of the overall analysis. This mixed-methods approach
need to establish a secure and trustworthy environment for
aims to provide a holistic understanding of the interplay
handling digital certificates. Blockchain technology provides
between the technical functionality of the system and the
a decentralized infrastructure that mitigates the risks
perceptions and trust behaviors of its users.
associated with centralized systems, enhancing overall trust.
The inte- gration of privacy-preserving techniques addresses
4) Iterative Design and Evaluation: The research design concerns related to the transparency of blockchain, ensuring
embraces an iterative approach, allowing for ongoing the confi- dentiality of sensitive information.
refinement based on continuous feedback loops between the
quantitative and qualitative analyses. As insights emerge from
one aspect of the study, they will inform adjustments and VI. Result
improvements in other dimensions, creating a dynamic and
responsive research process. In conclusion, the Certificate Locker system is a secure
B. Data Collection
and reliable platform for storing and accessing digital
educational certificates using PKI encryption and Blockchain
verification. The system has been implemented using Python
Flask, MySQL, and JSON for private blockchain
implementation.

The application provides a user-friendly interface for


certificate holders, verifiers, and web administrators. The
system offers various functionalities, such as registration,
login, certificate upload, verification, and approval. The tests
covered various aspects of the system, including login and
registration processes, certificate uploading and verification,
and the use of PKI and blockchain technologies for
encryption and verification.

Fig. 7. Modules

1) Blockchain Transactions: Blockchain data was collected


from the Ethereum blockchain, leveraging the Web3.js library
to interact with Ethereum nodes. The focus of data collection
was on transactions related to digital certificates, including
their issuance, transfer, and revocation. By examining the
blockchain transactions, we aimed to gain insights into
the transparency and integrity of the digital certificate
management process.

2) Digital Certificates: Digital certificates were obtained


from participating certificate authorities and organizations in-
volved in the study. To ensure the confidentiality and integrity
of digital certificates during the collection process, secure pro-
tocols such as Transport Layer Security (TLS) were employed.
The test cases were designed to ensure that the system academic of student registration numbers or names, epitomizes
meets the requirements specified in the project scope, and operational efficiency. This not only expedites the
to identify any potential issues or bugs. The test results authentication process for companies and verifiers but also
indicate that the system is functioning as intended and is reinforces the reliability and seamlessness of the entire
able to securely store and access digital certificates for credential verification ecosystem.record management. The
students. The tests also confirm that the system can streamlined verification process, facilitated by the use
integrate with blockchain technology to ensure the integrity
and authenticity of the certificates. As we gaze into the future, the consortium blockchain
system signifies more than just a remedy for immediate
challenges. Its adoption signals a broader paradigm shift,
reflecting a commitment to transparent, secure, and account-
able data management practices in education. Beyond being a
technological upgrade, this innovative solution stands as a
transformative force, envisioning and actively contributing to
a future where the trustworthiness of academic credentials is
unassailable, fostering confidence and reliability in the ever-
evolving landscape of digital education.

VII. FUTURE WORK

1. Interoperability and Standardization: Explore ways


to make the system interoperable with existing certificate
authorities and standards. Work towards standardization in
Overall, the testing process has provided valuable blockchain-based digital certificates to ensure compatibility
feedback and insights into the system, helping to identify across different platforms and systems.
areas for improvement and ensuring that the system is ready
for deployment. The system is recommended for use in 2. Scalability: Research and implement solutions to improve
educational institutions to manage and maintain digital the scalability of the blockchain network, ensuring it can
certificates securely. However, it is essential to continue handle a growing number of users and certificates without
testing and updating the system to ensure it remains secure compromising performance.
and reliable
3. Integration with Identity Management Systems: Integrate
the digital certificate locker with identity management systems
VI. CONCLUSION to enhance identity verification and authentication processes.
In a landscape where the integrity of academic credentials
4. Smart Contracts and Automation: Develop smart
and data security are paramount, the consortium blockchain
contracts to automate certificate issuance, renewal, and
system emerges as a trailblazing solution that goes
revocation processes. Implement conditional logic in smart
beyond conventional practices. This groundbreaking
contracts to allow for dynamic changes in access permissions
system, fostering collaboration among universities, affiliated
based on certain criteria.
colleges, autonomous colleges, and companies, represents a
5. Enhanced Privacy Techniques: Explore advanced
watershed moment in the evolution of academic credential
cryptographic techniques such as zero-knowledge proofs to
management.The prowess of this system lies in its adept
enhance privacy and confidentiality in certificate transactions.
harnessing of blockchain technology, where the immutable
Research privacy-preserving algorithms that allow for
and tamper-proof nature of distributed ledgers addresses head-
selective disclosure of information to authorized parties.
on the persistent challenge of fake certificates. The robust
security mechanisms embedded in the blockchain architecture
not only fortify the sanctity of academic records but also create 6. User-Friendly Interfaces: Design and implement user-
an unassailable foundation for trust in the verification process. friendly interfaces for both administrators and end-users to
manage and interact with their digital certificates securely.
Consider the integration of mobile applications or other
The universality inherent in the system’s design is a
convenient interfaces for ease of use.
keystone feature. This universality extends beyond a mere
technical aspect, promoting standardized practices across the
diverse spectrum of educational institutions. It cultivates a
collaborative ethos that strengthens the shared commitment
to upholding the highest standards of data security in
Our research endeavors have been profoundly shaped by
Dr. Vaishanavee’s wisdom and guidance. We extend our
6. User-Friendly Interfaces: Design and implement user- deepest gratitude for her significant contributions to our
friendly interfaces for both administrators and end-users to academic and research pursuits. Her commitment to
manage and interact with their digital certificates securely. excellence has played a pivotal role in the success of our
Consider the integration of mobile applications or other project, and we acknowledge her with immense respect for
convenient interfaces for ease of use. the impact she has had on our scholarly endeavors.

7. Governance and Compliance: Implement governance R EFERENCES


mechanisms within the blockchain network to manage 1 S. Nakamoto, ”Bitcoin: A Peer-to-Peer Electronic Cash System,” 2008.
changes, updates, and compliance with [Online]. Available: https://bitcoin.org/bitcoin.pdf
2 V. Buterin, ”Ethereum: A Next-Generation Smart Contract
regulatory andDecentralized Application Platform,” 2013. [Online].
requirements. Explore the integration of compliance Available:
features to ensure adherence to industry-specific https://github.com/ethereum/wiki/wiki/White-Paper
regulations and standards. 3 M. Swan, ”Blockchain: Blueprint for a New Economy,” O’Reilly
Media,2015.
8. Security Audits and Penetration Testing: Conduct 4 G. Zyskind, O. Nathan, and A. Pentland, ”Decentralizing Privacy:
UsingBlockchain to Protect Personal Data,” IEEE Security Privacy, 2015.
regular security audits and penetration testing to identify 5 A. Kosba et al., ”Hawk: The Blockchain Model of Cryptography and
and address vulnerabilities in the system. Collaborate with Privacy-Preserving Smart Contracts,” in 2016 IEEE European Symposium on
cybersecurity experts to ensure the system remains resilient Security and Privacy (EuroSP), 2016.
against emerging threats. 6 A. Dorri, S. S. Kanhere, and R. Jurdak, ”Towards an Optimized
Blockchain for IoT,” in 2017 IEEE International Conference on Pervasive
Computing and Communications (PerCom), 2017.
9. Integration with Decentralized Identity Standards: 7 S. Hardy and G. Wills, ”The Blockchain as a Solution to Privacy-Related
Explore integration with emerging decentralized identity Trust Issues in the Internet of Things,” in 2017 IEEE 21st International
standards, such as those proposed by organizations like the Enterprise Distributed Object Computing Workshop (EDOCW), 2017.
Decentralized Identity Foundation (DIF). 8 A. Zohren, D. Harlev, and W. J. Knottenbelt, ”A Bayesian Approach to
Privacy-Preserving Distributed Ledger Transactions,” in 2017 IEEE European
Symposium on Security and Privacy (EuroSP), 2017.
10. Cross-Platform Compatibility: Ensure compatibility 9 Z. Liu et al., ”Towards Efficient and Privacy-Preserving Computing in Big
with various blockchain platforms to provide users with Data Era,” IEEE Transactions on Parallel and Distributed Systems, 2018.
flexibility in choosing their preferred blockchain network. 10 Y. Wang et al., ”Achieving Secure, Scalable, and Fine-Grained Data
Access Control in Cloud Computing,” IEEE Transactions on Information
Forensics and Security, 2018.
11. Community Engagement and Feedback: Foster a
11 S. Huckle et al., ”Internet of Things, Blockchain and Shared Economy
community around the blockchain-based digital certificate Applications,” Procedia Computer Science, 2018.
locker to gather feedback and suggestions for continuous 12 Z. Zheng et al., ”An Overview of Blockchain Technology: Architecture,
improvement. Consider open-sourcing the project to Consensus, and Future Trends,” in 2017 IEEE International Congress on Big
encourage contributions from the broader community. Data (BigData Congress), 2017.
13 C. Stathakopoulou, A. Gouglidis, and I. Mavridis, ”A Systematic
Literature Review on Blockchain Cyber Security,” Computers Security, 2019.
12. Research Emerging Technologies: Stay informed about 14 M. Ali et al., ”Blockstack: A Global Naming and Storage System Secured
emerging technologies such as quantum-resistant cryptogra- by Blockchains,” in USENIX Annual Technical Conference, 2016.
phy and blockchain advancements, and assess their potential 15 A. Azaria et al., ”MedRec: Using Blockchain for Medical Data Access and
impact on the security and privacy of the digital certificate Permission Management,” in 2016 2nd International Conference on Open and
Big Data (OBD), 2016.
locker.
16 Ahmad, J., Waqas, M., Fahad, M., Anwar, S. M. (2022). ”A Privacy-
Preserving and User Self-Governance Blockchain-Based Framework to
A CKNOWLEDGMENT Combat COVID-19 Depression in Social Media.” IEEE Access.
We express our sincere appreciation to Dr. V. Vaishanavee, 17 Saleh, O. S., Ghazali, O., Rana, M. E. (2020). ”Blockchain-based
M.E., Ph.D., an esteemed faculty member in the Department framework for educational certificates verification.” Studies Planning and
Follow-up Directorate Ministry of Higher Education and Scientific Research
of Computer Science and Engineering at Sathyabama Institute Baghdad Iraq School, 7(3), 79-84.
of Science and Technology, for her unwavering mentorship 18 Nguyen, B. M., Dao, T. C., Do, B. L. (2020). ”Towards a blockchain-
and insightful guidance throughout our research journey. based certificate authentication system in Vietnam.” PeerJ Computer
Dr. Vaishanavee’s profound expertise, continuous support, Science, 6, e266.
19 Roopa, C., Suganthe, R. C., Shanthi, N. (2020). ”
and dedication to academic excellence have significantly Blockchain Based Certificate Verification Using Ethereum and Smart
enriched our learning experience. We are grateful for the Contract.” Journal of Critical Reviews, 7(9), 330-336.
invaluable opportunities to work under her supervision,
and her encouragement has served as a constant source of
inspiration.

You might also like