Blockchain Framework for Priority Metric Based Academic Record - A study done on Blockchain with priority metric verifiers and dynamic content validation.
Original Title
Blockchain Framework for Priority Metric Based Academic Record
Blockchain Framework for Priority Metric Based Academic Record - A study done on Blockchain with priority metric verifiers and dynamic content validation.
Blockchain Framework for Priority Metric Based Academic Record - A study done on Blockchain with priority metric verifiers and dynamic content validation.
Under the Guidance of : Dr. Kavita Choudhary Blockchain Blockchain as the name suggests can be virtually visualized as an endless chain of blocks. It can be defined as a distributed database that maintains records in the form of blocks. It is a decentralized structure that maintains a linked chain of blocks being added continuously. Complex algorithms and very high computational power is required to process the transactions for inserting blocks into the chain. Blockchain is peer to peer technology combined with encryption Each of the block records a transaction that has taken place. It stores a timestamp to mark the time of transaction and a link to denote the prior block. As the timestamp can’t be changed, blocks can’t be modified. Hence the design enforces trustworthiness in a decentralized structure. Blockchain functionally work on consent of all, removing the requirement of middle man authority. But the most important advantage of Blockchain is the solution to double spending. This revolutionary approach will make every system economically stronger by cutting the cost of maintenance. Our Goal This paper proposed a Blockchain fabric where an academic track record can be managed for every Indian Citizen after getting verified through Aadhaar Number. The resultant information generated by the proposed fabric would be immutable, decentralized and on distributed ledger. to make recruitment process transparent and efficient. Reason behind: As there is no secure and distributed platform for skill tracking and managing rightnow available in India, this paper will propose a model to have a non-centralized repository for all academic reports as an evidence of certain skill acquirement, which could be furthered to rate the skill sets on the basis of priority. This proposed model will be used by various Government and non-government organizations while hiring employees. Literature Survey In the paper “Enigma: Decentralized Computation Platform with Guaranteed Privacy”, Zyskind et al. [1] has attacked the issue of protection of personal data. So a lightweight architecture for blockchain is conceptualized to improvise the strength. In this paper a method is proposed where an external blockchain is used only to store the references to actual data hence responsible for light-weight processing whereas the actual data is stored off-chain. This model is based on a highly optimized version of secure multi-party computation. In “Towards a More Democratic Mining in Bitcoins” by Paul et al. [2] a new scheme is proposed to mine Bitcoin in an energy efficient technique. This technique is suggested as an alternative way to the existing Proof-of-Work scheme where some extra bytes are added to the present block header so that the timestamp is utilized more effectively in the hash generation. This paper basically introduces a new defense mechanism cyber-attack. Literature Survey Although many mechanisms such as distributed consensus and cryptography are there to prevent Blockchain from common cyber-attacks, however attacks like 51% attack of 14th June 2014, which is peculiar to a Blockchain, is a matter of concern. As discussed by Underwood [3] in his paper, immutability is a prime reason behind the acceptance of Blockchain in the finance sector. However, this assumption of security by the organizations adopting it initially hasn’t been same after 51% attack.Yli- Huumo et al. [4], authenticates that in a case like this a single node can control all other nodes and can smartly manipulate the records during attack. Lim et al. [5], describes that attacks like DDoS and hacking of private accounts are also other common breaches in security in a Blockchain. Literature Survey This analysis is supported by Atzori [6], which says that as the nodes have access to all the data, which may pose threat to confidentiality and privacy. According to Kakavand et al. [7] and also Peters and Panayi [8], Blockchain can be used as a boon in application areas that involve smart contracts or financial asset settlements and even in areas which involve financial transactions. In today’s competitive economy, new innovative ways to reduce transaction costs can surely be explored by the use of Blockchain technology. One of such innovation chain.com a start-up venture of NASDAQ aiming for private equity exchange is introduced by Crosby et al. [9]. This paper also discussed about the applications which are non-financial like the electronic voting system proposed by Bitcoin foundation to enforce transparency. Other applications like management of digital ownership and notary services based on Blockchain are also discussed in the paper. Literature Survey According to Kim and Laskowski [10], the application of Blockchain in supply chain management is described in elaboration. It is said that the consensus-based ledger system is quite useful for product provenance as the origin and processes can be tracked easily in a Blockchain. In the paper “A maturity model for blockchain adoption” by Wang et al. [11], a five-stage maturity model is proposed which has four dimensions for blockchain. For adoption of the same model a progressive procedure is also proposed to guide step by step. In the paper, “Are Blockchains Immune to All Malicious Attacks” by Xu[12], various types of malicious activities and fraud that can be prevented by blockchain technology are identified. Even the attacks that are vulnerable for Blockchain are also discussed. This paper has recommendations for measures that could be taken for security of blockchains. Sun et al. [13] has discussed an altogether new perspective of Blockchain that is its contribution in making smart cities in future. Zhu and Zhou [14], has analysed some important issues of China’s equity crowdfunding. This proposal will be helpful in reducing the cost in equity registration or operations related to them. From this valuable information can be generated to understand the crowdfunding market in a more efficient way. Proposed Framework of Academic Repository The process: how the processes, protocols, role of miners, setting of priorities are integrated altogether National Institutes and individuals will upload all the transcripts of achievements and skills in this repository. Miners from recognized institutes will verify the authenticity of the documents. An individual can update additional skills on the platform. This will be verified by Miners from Domain Specific Communities where they can validate the skill. The process: how the processes, protocols, role of miners, setting of priorities are integrated altogether The proposed framework will: generate a Resume of the person with all the verified skills on the platform That is helpful for any organization (Government Sector) to keep track of skilled individuals Aadhaar verification (UID), hence authentic The process: how the processes, protocols, role of miners, setting of priorities are integrated altogether Easier and faster skill search: If an organization wants to hire people on a particular set of skills, by simply querying on the skills they can search for worthy people. Sending offer letters to final hiring each process will be verified by Verifiers at all stages. The process: how the processes, protocols, role of miners, setting of priorities are integrated altogether Verifiers: Verifiers will be miners in the blockchain First categorization of miners is from pool of recognized and approved organizations. Second categorization of miners is from domain specific communities. This community comprises similarly skilled peers who are responsible for the verifying process of additional skills added by individuals. Proposed Class Diagram for Academic Repository Smart Contracts for Academic Repository This paper proposes two smart contracts namely: “Repository.sol” and “Institution.sol” Respective contracts are responsible collectively starting from the process of registering a student till own verification by respective university or school. Repository contract contains the relevant information of a student who likes to share skills on an online portal. The Institution contract holds the necessary details of the institution and its respective students. The details comprise name, registered number and the city. With the help of the Aadhaar identification they can store their students’ necessary qualifications and verification would take place by institutes. Smart Contracts for Academic Repository • The concept of the Aadhar verification (UID) will be an important and necessary aspect to connect the two contracts. • Only if UID matches in both contracts then it would be possible to retrieve the qualifications / academic record of any student. • It serves as a vigilant method to provide the abstraction and transparency of any students’ details who wishes so. Snap Shorts of the smart contracts The output: This is the output for the repository for students .The smart contract is deployed using an account address. Following contract contains the details of any student. Register function registers a student using his/her Adhaar number. •addSkill adds the skill set of the particular student. •output_skill displays the skill set of that student. Conclusion Government Recruitment portal can directly forward the job-related openings to concerned skill set available across India with single click. Verification Process can be managed where Proof of work and Proof of stake would be applied. Government and other stakeholders can filter the data as per requirements and can deduce the “Skill Metric” of India. Job information and opportunities can reach to beneficiary directly with no misleading / misguidance at all. The proposed Blockchain framework can be further extended by integration of artificial intelligence and machine learning. This welcomes variety of high-volume data analytic solutions for various applications. Bibliography 1. Zyskind G, Nathan O, Pentland A (2015) Enigma: Decentralized Computation Platform with Guaranteed Privacy. arXiv preprint arXiv:1506.03471 2. Paul G, Sarkar P, Mukherjee S (2014) Towards a More Democratic Mining in Bitcoins. In: Prakash A, Shyamasundar R. Information Systems Security. vol. 8880 of Lecture Notes in Computer Science. Springer International Publishing, Switzerland, pp. 185–203 3. Underwood S (2016) Blockchain beyond bitcoin. Commun. ACM 59, 11 (October 2016), 15–17 4. Yli-Huumo J, Ko D, Choi S, Park S, Smolander K (2016) Where Is Current Research on BlockchainTechnology – A Systematic Review. PLoS ONE 11(10), pp.1–27 Bibliography 5. Lim IK, Kim YH, Lee JG, Lee JP, Nam-Gung H, Lee JK. (2014) The Analysis and Countermeasures on Security Breach of Bitcoin. In International Conference on Computational Science and Its Applications. Springer International Publishing, pp. 720–732 6. Atzori, Marcella, Blockchain-Based Architectures for the Internet of Things: A Survey (2016). Available at SSRN: https://ssrn.com/abstract=2846810 7. Kakavand, Hossein and Kost De Sevres, Nicolette (2016) The Blockchain Revolution: An Analysis of Regulation and Technology Related to Distributed Ledger Technologies, Luther Systems. Available at SSRN: https://ssrn.com/abstract=2849251 8. Peters GW, Panayi E (2015) Understanding Modern Banking Ledgers Through Blockchain Technologies: Future of Transaction Processing and Smart Contracts on the Internet of Money. Available at SSRN: https://ssrn.com/abstract=2692487 Bibliography 9. Crosby MA, Pattanayak P, Verma S, KalyanaramanV (2016) BlockChain Technology: Beyond Bitcoin. Applied Innovation, No. 2, pp. 6–10 10.Kim, Henry M. and Laskowski, Marek (2016) Towards an Ontology- Driven Blockchain Design for Supply Chain Provenance. CoRRabs/1610.02922 11.Wang H, Chen K, Xu D (2016) A maturity model for blockchain adoption[J]. Financ Innov 2(1):12 12.Xu J (2016) Are Blockchains Immune to All Malicious Attacks? [J]. Financial Innovation 13.Sun J,Yan J, Zhang K (2016) Blockchain-based Sharing Services: What Blockchain Technology Can Contribute to Smart Cities[J]. Financial Innovation 14.Zhu H, Zhou Z (2016) Analysis and Outlook of Applications of Blockchain Technology on Equity Crowdfunding in China[J]. Financial Innovation