Electronic document authenticity verification of diploma and transcript using smart contract on Ethereum blockchain
DOI:
https://doi.org/10.26594/register.v7i2.1959Keywords:
authentication, diplomas, public blockchain, Smart Contract ERC-721, transcriptAbstract
Ethereum is one of the oldest examples of blockchain technology provides a system that converts centralized storage to distributed and records transactions by way of decentralized and not by a centralized system and can be verified by each node, therefore it is suitable for storing fingerprints from official diploma documents and transcripts that are published. Smart contract is needed for making contract transactions to Ethereum with programming code, so contracts such as diplomas and transcripts uploaded on the Ethereum blockchain can distribute and produce diploma validation and the authenticity of transcripts with transaction hash, consensus, and comply with ERC-721 token standardization. The results showed that a sample of 5 electronic documents in pdf format with a transaction speed of 1 second on each file that were published and secured with Ethereum blockchain technology can be easily verified for authenticity, the system proposed and developed by us takes in consideration invalid and failure cases by giving the necessary feedback to the user.References
[1] T. Kanan, A. T. Obaidat and M. Al-Lahham, "SmartCert BlockChain Imperative for Educational Certificates," in 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), Amman, Jordan, 2019.
[2] J.-C. Cheng, N.-Y. Lee, C. Chi and Y.-H. Chen, "Blockchain and smart contract for digital certificate," in 2018 IEEE International Conference on Applied System Invention (ICASI), Chiba, Japan, 2018.
[3] R. Gupta, Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain, Birmingham, UK: Packt, 2018.
[4] A. K. Shrivastava, C. Vashistth, A. Rajak and A. K. Tripathi, "A Decentralized Way to Store and Authenticate Educational Documents on Private Blockchain," in 2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), Ghaziabad, India, 2019.
[5] J. Fat, H. Candra and W. William, "Sekuritisasi Data Sensor pada Aplikasi Internet of Things (IoT) dengan Menggunakan Blockchain Ethereum di Jaringan Testnet," TESLA, vol. 21, no. 1, pp. 79-86, 2019.
[6] A. Shahnaz, U. Qamar and A. Khalid, "Using Blockchain for Electronic Health Records," IEEE Access, vol. 7, pp. 147782-147795, 2019.
[7] K. D. Kumar, P. Senthil and M. K. D.S, "Educational Certificate Verification System Using Blockchain," International Journal of Scientific & Technology Research, vol. 9, no. 3, 2020.
[8] I. Yunelia, "Laporan Peredaran Ijazah 'Aspal' di Tahun Politik Meningkat," Medcom, 26 August 2019. [Online]. Available: https://www.medcom.id/pendidikan/news-pendidikan/1bVydZ2N-laporan-peredaran-ijazah-aspal-di-tahun-politik-meningkat.
[9] N. Kumavat, S. Mengade, D. Desai and J. Varolia, "Certificate verification system using blockchain," Int. J. Res. Appl. Sci. Eng. Technol. (IJRASET), vol. 7, no. IV, p. 53–57, 2019.
[10] B. Triand, S. Effendi, R. Puspasari, I. F. Rahmad and E. Ekadiansyah, "Digital Document Security on Legalize Higher Education Diplomas with Digital Signature and SHA-1 Algorithm," in 2019 7th International Conference on Cyber and IT Service Management (CITSM), Jakarta, Indonesia, 2019.
[11] W. Cai, Z. Wang, J. B. Ernst, Z. Hong, C. Feng and V. C. M. Leung, "Decentralized Applications: The Blockchain-Empowered Software System," IEEE Access, vol. 6, pp. 53019-53033, 2018.
[12] E. Karataş, "Developing Ethereum Blockchain-Based Document Verification Smart Contract for Moodle Learning Management System," Bilişim Teknolojileri Dergisi, vol. 11, no. 4, pp. 399-406, 2018.
[13] P. A. W. Putro, "Physical document validation with perceptual hash," in 2017 3rd International Conference on Science in Information Technology (ICSITech), Bandung, Indonesia, 2017.
[14] M. A. Sadikin and R. W. Wardhani, "Implementation of RSA 2048-bit and AES 256-bit with digital signature for secure electronic health record application," in 2016 International Seminar on Intelligent Technology and Its Applications (ISITIA), Lombok, Indonesia, 2016.
[15] S. S. Kumari and D. Saveetha, "Blockchain and Smart Contract for Digital Document Verification," International Journal of Engineering & Technology, vol. 7, no. 4.6, pp. 394-397, 2018.
[16] M. Crosby, N. Nachiappan, P. Pattanayak, S. Verma and V. Kalyanaraman, "BlockChain Technology: Beyond Bitcoin," Applied Innovation Review, vol. 2, pp. 6-19, 2016.
[17] A. D. Yulianto, P. Sukarno, A. A. Warrdana and M. A. Makky, "Mitigation of Cryptojacking Attacks Using Taint Analysis," in 2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE), Yogyakarta, Indonesia, 2019.
[18] M. Wohrer and U. Zdun, "Smart contracts: security patterns in the ethereum ecosystem and solidity," in 2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE), Campobasso, Italy, 2018.
[19] A. Bogner, M. Chanson and A. Meeuw, "A Decentralised Sharing App running a Smart Contract on the Ethereum Blockchain," in 6th International Conference on the Internet of Things (IoT‘16), Stuttgart, Germany, 2016.
[20] Y. Zhang, S. Kasahara, Y. Shen, X. Jiang and J. Wan, "Smart Contract-Based Access Control for the Internet of Things," IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1594-1605, 2019.
[21] N. Fotiou, I. Pittaras, V. A. Siris, S. Voulgaris and G. C. Polyzos, "OAuth 2.0 authorization using blockchain-based tokens," in Proc. Workshop Decentralized IoT Syst. Secur. (DISS) Conjunct Netw. Distrib. Syst. Secur. Symp. (NDSS), San Diego, CA, USA, 2020.
[22] C. Lin, D. He, N. Kumar, X. Huang, P. Vijayakumar and K. R. Choo, "HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes," IEEE Internet of Things Journal, vol. 7, no. 2, pp. 818-829, 2020.
[23] R. Shrestha and S. Y. Nam, "Regional Blockchain for Vehicular Networks to Prevent 51% Attacks," IEEE Access, vol. 7, pp. 95033-95045, 2019.
[24] S. Sayeed, H. Marco-Gisbert and T. Caira, "Smart Contract: Attacks and Protections," IEEE Access, vol. 8, pp. 24416-24427, 2020.
[25] S. R. Niya, F. Schüpfer, T. Bocek and B. Stiller, "A Peer-to-peer Purchase and Rental Smart Contract-based Application (PuRSCA)," it - Information Technology, vol. 60, no. 5-6, pp. 307-320, 2018.
[26] Q. Xu, Z. He, Z. Li, M. Xiao, R. S. M. Goh and Y. Li, "Chapter 8 - An effective blockchain-based, decentralized application for smart building system management," in Real-Time Data Analytics for Large Scale Sensor Data, vol. 6, H. Das, N. Dey and V. E. Balas, Eds., Academic Press, 2020, pp. 157-181.
[27] M. Conti, N. Dragoni and V. Lesyk, "A Survey of Man In The Middle Attacks," IEEE Communications Surveys & Tutorials, vol. 18, no. 3, pp. 2027-2051, 2016.
[28] G. Oliva, S. Cioabă and C. N. Hadjicostis, "Distributed Calculation of Edge-Disjoint Spanning Trees for Robustifying Distributed Algorithms Against Man-in-the-Middle Attacks," IEEE Transactions on Control of Network Systems, vol. 5, no. 4, pp. 1646-1656, 2018.
[29] F. Ahmad, F. Kurugollu, A. Adnane, R. Hussain and F. Hussai, "MARINE: Man-in-the-Middle Attack Resistant Trust Model in Connected Vehicles," IEEE Internet of Things Journal, vol. 7, no. 4, pp. 3310-3322, 2020.
[30] R. Roshdy, M. Fouad and M. Aboul-Dahab, "Design and Implementation a New Security Hash Algorithm Based on MD5 and SHA-256," International Journal of Engineering Sciences & Emerging Technologies, vol. 6, no. 1, pp. 29-36, 2013.
[31] M. S. Ali, M. Vecchio, M. Pincheira, K. Dolui, F. Antonelli and M. H. Rehmani, "Applications of Blockchains in the Internet of Things: A Comprehensive Survey," IEEE Communications Surveys & Tutorials, vol. 21, no. 2, pp. 1676-171, 2019.
[32] Y. Hu, A. Manzoor, P. Ekparinya, M. Liyanage, K. Thilakarathna, G. Jourjon and A. Seneviratne, "A Delay-Tolerant Payment Scheme Based on the Ethereum Blockchain," IEEE Access, vol. 7, pp. 33159-33172, 2019.
[33] S. Guo, Y. Dai, S. Guo, X. Qiu and F. Qi, "Blockchain Meets Edge Computing: Stackelberg Game and Double Auction Based Task Offloading for Mobile Blockchain," IEEE Transactions on Vehicular Technology, vol. 69, no. 5, pp. 5549-5561, 2020.
[34] M. C. I. Putri, P. Sukarno and A. A. Wardana, "Two factor authentication framework based on ethereum blockchain with dApp as token generation system instead of third-party on web application," Register: Jurnal Ilmiah Teknologi Sistem Informasi, vol. 6, no. 2, pp. 74-85, 2020.
Downloads
Published
How to Cite
Issue
Section
License
Please find the rights and licenses in Register: Jurnal Ilmiah Teknologi Sistem Informasi. By submitting the article/manuscript of the article, the author(s) agree with this policy. No specific document sign-off is required.
1. License
The non-commercial use of the article will be governed by the Creative Commons Attribution license as currently displayed on Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
2. Author(s)' Warranties
The author warrants that the article is original, written by stated author(s), has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author and free of any third party rights, and that any necessary written permissions to quote from other sources have been obtained by the author(s).
3. User/Public Rights
Register's spirit is to disseminate articles published are as free as possible. Under the Creative Commons license, Register permits users to copy, distribute, display, and perform the work for non-commercial purposes only. Users will also need to attribute authors and Register on distributing works in the journal and other media of publications. Unless otherwise stated, the authors are public entities as soon as their articles got published.
4. Rights of Authors
Authors retain all their rights to the published works, such as (but not limited to) the following rights;
Copyright and other proprietary rights relating to the article, such as patent rights,
The right to use the substance of the article in own future works, including lectures and books,
The right to reproduce the article for own purposes,
The right to self-archive the article (please read out deposit policy),
The right to enter into separate, additional contractual arrangements for the non-exclusive distribution of the article's published version (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal (Register: Jurnal Ilmiah Teknologi Sistem Informasi).
5. Co-Authorship
If the article was jointly prepared by more than one author, any authors submitting the manuscript warrants that he/she has been authorized by all co-authors to be agreed on this copyright and license notice (agreement) on their behalf, and agrees to inform his/her co-authors of the terms of this policy. Register will not be held liable for anything that may arise due to the author(s) internal dispute. Register will only communicate with the corresponding author.
6. Royalties
Being an open accessed journal and disseminating articles for free under the Creative Commons license term mentioned, author(s) aware that Register entitles the author(s) to no royalties or other fees.
7. Miscellaneous
Register will publish the article (or have it published) in the journal if the article’s editorial process is successfully completed. Register's editors may modify the article to a style of punctuation, spelling, capitalization, referencing and usage that deems appropriate. The author acknowledges that the article may be published so that it will be publicly accessible and such access will be free of charge for the readers as mentioned in point 3.