Professional Documents
Culture Documents
Research Article: Blockchain Ecosystem For Credit Transfer in Education
Research Article: Blockchain Ecosystem For Credit Transfer in Education
Research Article
Blockchain Ecosystem for Credit Transfer in Education
Copyright © 2021 R. Manoj et al. This is an open access article distributed under the Creative Commons Attribution License,
which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Data is the key to measuring educational effectiveness promptly. But data and education are trapped and siloed across centralized
systems, causing information discrepancies and inaccuracies. This has caused countless delayed opportunities, academic cre-
dential disagreements, and never-ending confusion around learning potency. This lack of transparency, despite having its fair
share of usefulness, has also been quite burdensome. To alleviate this issue, our team has developed a blockchain protocol that
verifies professional certifications that have been earned both locally and through another well-established online educational
portal. This system allows accuracy, reliability, and immutability that has never been implemented. This foundation of clear,
verified data will then be used further to power blockchain-based applications. The result is that our attempt at a versatile, holistic,
and decentralized view of educational performance ensures the best e-learning outcome for students and teachers alike.
start
yes
Is
certificate valid or not Diploma
(by comparing approved Send answer to the
hashes) challenge question
Blockchain
Student database Solidity code Teacher database
Platform
Sending
tookens
Update database
Give grades for
Solidity code for token
token grade database
Initially, all the important information that comprises tokens the owner allows to spend, which contains the ad-
the database is stored in a .csv file. This .csv file will contain dress for the user who owns the funds and the user who will
metadata that includes key information such as student spend the funds. The address specified for transferring the
name, registration number, fee payment information, gen- token also consists of the address of where it should be
der, section, registered course(s), password, blockchain transferred and the amount to be transferred. Another
address, public key, and private key. The student will gain function is created, which contains the block address and
access into the student database by providing their user ID, measures the spent tokens and the value of the number of
password, and public key that is unique to everyone. Once tokens.
they are in, it will interface with the Solidity code base and a
third party will verify the links of each student with the
teacher database. This includes the grades and credits 4.1. Blockchain Wallet Based on Multiple Signature Protocol.
completed and can be modified by individual professors for The multiple signature protocol is a cryptographic protocol
their respective subjects. These are then converted into with multiple parties jointly signing documents with
appropriate tokens by Solidity which is then updated on the timestamps and public and private keys. It is used for val-
student database, as shown in Figure 4. idating shared documents as shown in Figure 5.
We developed a decentralized Solidity smart contract for
transferring credits to students through a blockchain wallet.
The credits are converted into tokens and are transferred. 4.2. Universities Registering to Blockchain. A node is ran-
The security is provided using public key encryption and domly chosen as the commutator node. The commutator
hashing techniques. The university and students registered node shares a link with the new university to join the
on the blockchain are provided with a private key. When a blockchain. The new university node generates a blockchain
student completes a registered course, the credit is converted wallet and a blockchain address, along with the public and
into a token and saved in the blockchain wallet. To ensure private keys. After generating the blockchain address, the
the security of the proposed system, the impact of various new node will connect to another university node already
attacks on the system has been analyzed and the system was available in the network. A token is generated from the
found to be resistant to those attacks. The scalability of the existing node and sent to the new node blockchain address.
system is tested by load testing by increasing the number of This communication between the nodes generates a hash
universities registering on the blockchain platform and value and appends it to the newly created block as a block
analyzing the maximum response time and minimum re- address. To inform other nodes in the network, the address is
sponse time. replicated and sent to all the nodes in the network.
4. Implementation
4.3. Student Registration under a University within a
The Ethereum smart contract is programmed in Solidity. A Blockchain. The student details are verified by the university
proposed ecosystem for higher educational organizations for to generate a student ID. While issuing a student ID, a
token-based credit transfer using blockchain is presented student data block is generated. The block is then added to
here. The credit value in the form of tokens is stored in each the chain as per the distributed consensus protocol. A public
student’s individual wallet, and, after completion of each key and a private key are issued to verify the student’s
course, tokens get accumulated in the wallet. Faculties credentials. The university uses a multiple signature protocol
transfer the credits to students’ wallets after completion of to generate a blockchain wallet address for the student. The
each course based on the student’s address identifier, which public key of the university and student is used to generate a
is a blockchain with multiple signatures consisting of public wallet for the student. The student ID and wallet ID are
and private keys. rehashed to form a node in the network and are informed of
Firstly, the total number of tokens in existence is de- all the other nodes in the network. After this process, token
cided. Then the token balance from the specific block ad- transactions can be done between the student and the
dress is obtained. There is a function to check the number of university. Figure 6 shows the system model.
Mathematical Problems in Engineering 5
Student
block creation
Smart Contract
Home university
block chain Network
Other universities
Other universities
4.4. Contract Secure Math. Overflows in the arithmetic of the ERC-20 Token. There are appropriate functions to
operations in Solidity are wrapped below. This will lead to manage the balance of tokens.
bugs, since programmers have the assumption that over-
flows lead to errors in standard programming languages.
Secure math reverts the transactions when arithmetic 4.9. ETH Rollback Functions. They assist the user in
overflow occurs and restores the assumption of the pro- reclaiming any currency that was deployed by him inad-
grammer. Using the library, all bugs are eliminated, in vertently or through some other error.
contrast to operations which are not checked and are rec-
ommended (Algorithm 1). 5. Results and Discussion
The results obtained are discussed in terms of security and
4.5. Contract Receipt Approval and Callback. The contract scalability of the system. In the security analysis part, the
receipt approval and callback enables the user to execute proposed system is analyzed for different types of attacks in
contract functions that receive approval and execute func- the network. In the second part, the scalability of the system
tions in just one call (Algorithms 2–5). is analyzed.
4.6. Contract ERC 20 Token. The Ethereum token standard 5.1. Security Analysis. The common attacks are considered,
(ERC-20) defines the rules for implementing tokens on and their impact is analyzed.
Ethereum. This gives developers the capability to program
how tokens will work in the ecosystem. The token standard
explains the operation and actions the token contract should 5.1.1. Replay Attack. It is a common cyberattack in peer-to-
implement. peer networks. In this attack, the attacker disguises its
identification by seizing the messages from a particular peer
and replaying them. In blockchain technology, every node
4.7. Contract Owned. To modify the nature or behavior of a acts as both a client and a server. Assume that there is a
function, we use modifiers. The condition of the modifier normal user, an attacker, and a server in the blockchain
should be satisfied while the function is executed, or else an network. Signed and encrypted messages are sent between
exception will be thrown. normal users and the server, and vice versa. The attacker
impersonates a normal user or server, as shown in Figure 7.
Ettercap 0.8.3.1 is used to simulate a replay attack and, after
4.8. Contract ERC Token Addition. This contract contains analysis and verification, it is proved that the ecosystem can
symbols, labels, and decimals, which are additional features resist the replay attack.
6 Mathematical Problems in Engineering
University
Wallet ID
Update Token
Student number Deployment
Blockchain
of Tokens
5.1.2. Sybil Attack. In peer-to-peer networks, similar data identities. Analysis confirms that the proposed ecosystem
must be supported with many nodes in a clustered fashion. If can resist Sybil attack.
any attack is present in the cluster, then the attacker can
establish different identities with the help of virtualization.
Thus, attackers can impersonate different identities and take 5.1.3. Collusion Tamper Attack. Successfully committed
control of the network, as shown in Figure 8. transactions with the blockchain will be shared and kept in a
The proposed system defends against the Sybil attack single node. When the network size is small, the majority of
with two-factor authentication. The forged identities of Sybil nodes collude to tamper with the stored transaction data at
nodes cannot join the network since they fail to authenticate the beginning stage of the blockchain network. The proposed
themselves. So, no advantage can be taken by Sybil nodes scheme updates the data periodically to the public Ethereum.
with the help of multiple identities. To verify our analysis, a As the number of nodes increases, the chain of data pro-
virtual box is used to include a blockchain using forged tection implemented in the scheme shows that the
Mathematical Problems in Engineering 7
Contract SecureMath
Function secAdd
Pass In: unsigned integer A and unsigned integer B
Add A and B and pass value to C
Require C to be greater than or equal to A
Pass Out: unsigned integer C
Endfunction
Function secSub
Pass In: unsigned integer A and unsigned integer B
Subtract B and A and pass value to C
Require B to be lesser than or equal to A
Pass Out: unsigned integer C
Endfunction
Function secMul
Pass In: unsigned integer A and unsigned integer B
Multiply A and B and pass value to C
Require A to be equal to or C/A equal to B
Pass Out: unsigned integer C Endfunction
Function secDiv
Pass In: unsigned integer A and unsigned integer B
Divide A and B and pass value to C
Require B to be greater than 0
Pass Out: unsigned integer C
Endfunction
Contract receiveApproveAndCallBack
Call: getApproval
Contract ERC20inf
Call: totalSupply
Call: balanceOf
Call: allowance
Call: transfer
Call: approve
Call: transferFrom
Declare Event Transfer
Declare Event Approval
probability of the collusion tamper attack decreases as the The load test was conducted on an open-source software
number of nodes in the chain increases. platform, Apache JMeter 5.2. A simulation of 100–800
virtual institutions with the same number of events but
5.2. Scalability Analysis varying sets of storage requirements was conducted to an-
alyze the scalability of the system. Figure 9 denotes the
5.2.1. Scalability Load Test Analysis. The hash of student performance of the system with the response time for storage
information is added to the blockchain through the pro- requests on the y-axis and the varying number of virtual
posed scheme. The processes of block generation and data institutions on the x-axis. The results show that the scal-
submission are done in an asynchronous mode. The eval- ability measured in terms of response time is greater as the
uation parameters analyzed are minimum, average, and number of virtual institutions is increased. The results show
maximum response time. that the maximum response time is less than 10 ms. This
8 Mathematical Problems in Engineering
ALGORITHM 4: ERC token with additional data and assisted token transfers.
Mathematical Problems in Engineering 9
Contract receiveApproveAndCallBack
Declare blockAddress Public owner
Declare blockAddress Public newOwner Event OwnershipTransferred
Function Ownedtoken() Public
Assign ownertoken � msg.sender Endfunction
Modifier onlyOwnertoken
msg.sender to be equal to ownertoken
Function transferOwnership
Pass In: blockaddress newOwner
Assign newOwner � newOwner
Endfunction
Function acceptOwnership
Require msg.sender to be equal to newOwner
Call: ownerTransfer
Assign owner � newOwner
Assign newOwner � blockaddress(0) Endfunction
Normal
Server
User
re-transmission of
messages
seizing of messages
Attacker
Your node
Sybil node
Honest node
shows that the system could be used for real-time appli- second. Figure 10 compares the number of requests with
cations using blockchain. time to the time taken to process the request by varying the
requests.
10
RESPONSE TIME (MS)
0
200 400 600 800
VIRTUAL INSTITUTIONS
maximun response time
(c)
Figure 9: (a) Minimum response time. (b): Average response time. (c): Maximum response time.
180
160
140
Average time per request (sec)
120
100
80
60
40
20
0
0 20 40 60 80 100 120
No of requests
Figure 10: Average time per request.
Mathematical Problems in Engineering 11
[10] M. Raikwar, D. Gligoroski, and K. Kralevska, “SoK of used Journal of Artificial Intelligence and Technology, vol. 1, no. 1,
cryptography in blockchain,” IEEE Access, vol. 7, pp. 51–60, 2021.
pp. 148550–148575, 2019. [25] M. Kaur, D. Singh, and V. Kumar, “Color image encryption
[11] A. Srivastava, P. Bhattacharya, A. Singh, A. Mathur, and using minimax differential evolution-based 7D hyper-chaotic
R. I. Pradhan, “A distributed credit transfer educational map,” Applied Physics B, vol. 126, no. 9, pp. 1–19, 2020.
framework based on blockchain,” in Proceedings of the Second [26] D. Jiang, G. Hu, G. Qi, and N. Mazur, “A fully convolutional
International Conference on Advances in Computing, Control neural network-based regression approach for effective
and Communication Technology (IAC3T), Allahabad, India, chemical composition analysis using near-infrared spectros-
September 2018. copy in cloud,” Journal of Artificial Intelligence and Tech-
[12] J. C. Farah, A. Vozniuk, M. J. Rodriguez-Triana, and Gillet, “A nology, vol. 1, no. 1, pp. 74–82, 2021.
blueprint for a blockchain-based architeture to power a [27] H. S. Basavegowda and G. Dagnew, “Deep learning approach
distributed network of tamper-evident learning trace repos- for microarray cancer data classification,” CAAI Transactions
itories,” in Proceedings of the IEEE 18th International Con- on Intelligence Technology, vol. 5, no. 1, pp. 22–33, 2020.
ference on Advanced Learning Technologies (ICALT), Mumbai,
India, July 2018.
[13] C. BouSaba and E. Anderson, “Degree validation application
using solidity and Ethereum blockchain,” in Proceedings of the
Southeast Con, Huntsville, AL, USA, April 2019.
[14] M. Han, Z. Li, J. S. He, D. Wu, Y. Xie, and A. Baba, “A novel
blockchain-based education records verification solution,” in
Proceedings of the 19th Annual SIG Conference on Information
Technology Education, Fort Lauderdale Florida USA, October
2018.
[15] R. Arenas and P. Fernandez, “CredenceLedger: a permis-
sioned blockchain for verifiable academic credentials,” in
Proceedings of the IEEE International Conference on Engi-
neering, Technology and Innovation (ICE/ITMC), Stuttgart,
Germany, June 2018.
[16] J. Cheng, N. Lee, C. Chi, and Y. Chen, “Blockchain and smart
contract for digital certificate,” in Proceedings of the IEEE
International Conference on Applied System Innovation,
Chiba, Japan, April 2018.
[17] B. Duan, Y. Zhong, and D. Liu, “Education application of
blockchain technology: learning outcome and meta-diploma,”
in Proceedings of the IEEE 23rd International Conference on
Parallel and Distributed Systems (ICPADS), Shenzhen, China,
December 2017.
[18] T. Arndt and A. Guercio, “Blockchain-based transcripts for
mobile higher-education,” International Journal of Informa-
tion and Education Technology, vol. 10, no. 2, pp. 84–89, 2020.
[19] D. Singh, V. Kumar, V. Yadav, and M. Kaur, “Deep neural
network-based screening model for COVID-19-infected pa-
tients using chest X-ray images,” International Journal of
Pattern Recognition and Artificial Intelligence, vol. 35, no. 03,
p. 2151004, 2021.
[20] S. Ghosh, P. Shivakumara, P. Roy, U. Pal, and T. Lu, “Gra-
phology based handwritten character analysis for human
behaviour identification,” CAAI Transactions on Intelligence
Technology, vol. 5, no. 1, pp. 55–65, 2020.
[21] G. Hu, S.-H. K. Chen, and N. Mazur, “Deep neural network-
based speaker-aware information logging for augmentative
and alternative communication,” Journal of Artificial Intel-
ligence and Technology, vol. 1, no. 2, pp. 138–143, 2021.
[22] M. Kaur and D. Singh, “Multiobjective evolutionary opti-
mization techniques based hyperchaotic map and their ap-
plications in image encryption,” Multidimensional Systems
and Signal Processing, vol. 32, no. 1, pp. 281–301, 2021.
[23] B. Gupta, M. Tiwari, and S. Singh Lamba, “Visibility im-
provement and mass segmentation of mammogram images
using quantile separated histogram equalisation with local
contrast enhancement,” CAAI Transactions on Intelligence
Technology, vol. 4, no. 2, pp. 73–79, 2019.
[24] Xu Yang and T. Qiu, “Human activity recognition and em-
bedded application based on convolutional neural network,”