Professional Documents
Culture Documents
Application of Blockchain Technology
Application of Blockchain Technology
Application of Blockchain Technology
Authorized licensed use limited to: Anelis Plus consortium. Downloaded on March 15,2022 at 08:17:28 UTC from IEEE Xplore. Restrictions apply.
application. Section 3 presents the research methodology or implementing the blockchain. Based on some of these
our approach to prevent the potential of plagiarism. Section studies, it is proven that blockchain has a high level of
4 provides the result and discussion and Section 5 provides security such that Hanifatunnisa [14] conducted research to
the final conclusion of the paper. implement the blockchain in e-voting to maintain data
security such that it cannot be changed by third parties.
II. RELATED WORKS Through the implementation of the blockchain, the e-voting
In 2008, an individual (or group) writing under the database cannot be changed, because even a slight change of
name of Satoshi Nakamoto published a paper entitled data will change the hash value of the entire network.
“Bitcoin: A Peer-To-Peer Electronic Cash System”. This
paper described a peer-to-peer version of the electronic cash Gipp [9] introduced CryptSubmit, an architecture of the
that would allow online payments to be sent directly from delivery system of scientific publications that record
one party to another without going through a financial scientific copyright in blockchain network before being sent
institution. Bitcoin uses cryptographic proof instead of the to reviewers to prevent plagiarism. Hepp [15] continued to
trust-in-the-third-party mechanism for two willing parties to study the idea and overcome the weaknesses of
execute an online transaction over the Internet. Each timestamping which are still centralized by proposing
transaction is protected through a digital signature is sent to Decentralized Trusted Timestamping (DTT). The results of
the “public key” of the receiver, and is digitally signed using the study presented a new approach to timestamping and
the “private key” of the sender. In order to spend money, the archiving digital content using blockchain technology.
owner of the cryptocurrency needs to prove his ownership Furthermore, Pozi [10] continuing the implementation of
of the “private key”. Bitcoin uses a consensus protocol blockchain in scientific publications, namely by proposing a
called PoW (Proof of Work) based on Cryptocurrency to blockchain-based framework to calculate the contribution of
ensure that only legitimate transactions are allowed in the scientific writers so that publication information can be
system. Every time a new transaction is made, the hash accessed transparently. Research on the implementation of
value of the transaction is calculated and entered into a blockchain to prevent plagiarism was then carried out by
database called the blockchain. This block is connected to Holland [16], but in a different perspective by explaining
other blocks that already in the chain. To connect one block how the blockchain application in preventing counterfeiting
to another, the hash value of the previous block is entered and plagiarism towards brands comes from 3D printing
into the next block in order to calculate the hash value of the printers. The results of this study illustrate the model and
new one. The hash value must meet certain requirements proof of how the blockchain is carrying out brand
called difficulty so that it can be considered a legitimate registrations to prevent counterfeiting and acts of
block as described in Fig. 1. plagiarism.
III. RESEARCH METHODOLOGY
In this paper we solved two problems related to
preventing the potential of plagiarism: (1) the main process
in scientific publications, namely submission of scripts and
peer reviews, still has insecure mechanisms and dishonesty
from the individuals (third parties) involved, causing the
possibility of data leakage, theft of ideas, alteration of
plagiarism evidence and retrieval of scientific works
Fig. 1. Blockchain Illustration belonging to others which become gaps which has the
potential to carry out plagiarism, (2) plagiarism prevention
After bitcoin, blockchain technology has been successfully by implementing blockchain is only based on recording
used in several industries, such as finance, energy, health copyright through timestamping only and does not yet have
sector, and supply chain. Mettler [11] conducted research a secure data security mechanism such that the possibility of
related to the potential application of blockchain in the such scientific work being stolen and plagiarized by other
health sector in order to prevent counterfeiting of health data parties is very likely. This paper is an improvement to
such as drug and medical records. This study only explains research by Gipp [9] called CryptSubmit as shown in Fig. 2.
that blockchain has enormous potential if applied in the
health sector. After the study, the idea began to emerge to
apply blockchain in other fields such as that done by O’Dair
[12] to analyze the application of Blockchain in the music
industry, especially in the protection of music copyright and
recording the payment of loyalty benefits from the music
created. Furthermore, some researchers began to analyze the
blockchain in recording copyright in other fields, such as
conducted by Xu [13] which proposed a method of
safeguarding and protecting copyright by using rights
management schemes based on blockchain technology. The
results of the study are in the form of an architectural model
that explains the procedures for copyright protection by Fig. 2. CryptSubmit Architecture [9]
Authorized licensed use limited to: Anelis Plus consortium. Downloaded on March 15,2022 at 08:17:28 UTC from IEEE Xplore. Restrictions apply.
really prevent participants (researcher and reviewer) from
There are two main differences between our model to misconduct action. First, we change the information about
the model by Gipp [9]: (1) we record the whole information plagiarism in order to eliminate evidence of plagiarism.
of scientific work rather than just the timestamping; (2) Secondly, we will show how the blockchain eliminates the
scientific work submission from the writer to the reviewer is existence of third-party intermediaries who have the
not protected by digital signature. Based on the above potential to commit plagiarism. Finally, we show how to
architecture, we introduce a new model and we use Citation prevent other parties from doing potential plagiarism and
Network Dataset [17], as shown in Fig. 3 below. read the scientific work sent to the reviewer.
IV. RESULT AND DISCUSSION
In this paper, we build an application to model the
prevention of potential plagiarism using node.js and we run
the test on Processor Intel ® Core™ i5 @ 2.3 GHz. We
provide some features such as: paper submission or add
publication by legitimate writer, list all added blocks to see
all legitimate blocks, and do some changes to the information
on a certain block in the chain (network). We separate the
experiments into 2 parts i.e.: (1) quantitative test to find the
relationship between number of blocks and difficulty targets
to security level which is indicated by mining time if there is
change in the block; (2) qualitative test to show that 1. any
attempt to plagiarize somebody’s work will be detected, 2.
peer reviewers who are also third parties will be eliminated
Fig. 3. Proposed Model for the Prevention Of Potential so that the potential for plagiarism can be prevented, 3. paper
submission from a writer to the system will be encrypted and
Plagiarism
signed such that nobody can see or alter the paper to prevent
potential of plagiarism.
The publication processes are conducted as follows:
For the quantitative test, we use the number of blocks NB
A. Publication Registration = 1, 10, 50, 100, 250 and 500. Meanwhile, for difficulty
Researchers who have scientific works carry out the targets we use DT= 1 until DT = 5. For different NB and DT,
publication process by filling in the online forms that are we find the mining time as shown in Table 1 below.
separate on the front end which is usually a website. After
Table 1. Experiment Mining Time
the online form is filled in, the next step is to sign
information on scientific papers using ECDSA to produce a Number Mining Time (Seconds)
public key, private key and message digest. The final of Blocks
DT=1 DT=2 DT=3 DT=4 DT=5
process is to process or send the scientific work to 1 0.006 0.104 0.156 9.937 92.197
reviewers, so you must press the submit button. 10 0.057 0.546 3.39 88.539 1,754.79
50 0.353 2.054 26.027 426.595 8,350.6
B. Backend Process 100 1.141 4.393 57.791 977.731 17,539
The system implements the blockchain using SHA-256 250 5.777 13.991 142.74 2,325.54 42,847.5
500 22.298 40.645 326.921 4,484.16 90,695.7
every time a new publication is submitted. Information
about scientific work will be protected with a digital
signature using public key and private key, where the From Table 1 above, we can see that the more block and
private key will be stored (kept) by the researcher and the the more difficulty target, we find that mining time very
public key will be given to the reviewer concerned so that significantly increases. This time increasing indicates that it
scientific information can only be opened by the reviewer. is difficult to make any slight change to the block that
All information that is processed will be stored in the already in the blockchain. Furthermore, the mining time
database and read through the blockchain network. The needed to fulfill difficulty target shows that it is impossible
blockchain network contains information on all scientific to plagiarize the paper that its hash value already in the
works that have been sent by previous researchers. Each blockchain. The test shows that for number block 500 with
scientific work is stored in a block that will be connected to difficulty target 5, it takes up to 90,695.7 seconds to
complete the mining process. If it is assumed that scientific
previous blocks such that if there is a change in scientific
publication information on a blockchain network is around
work information by someone, it will be related to other
500,000, then if the mining process is carried out on the
blocks, so that evidence of plagiarism is impossible to entire block it will take 90,695,700 seconds (around 25,193
eliminate. days). This test result shows that the model could prevent the
C. Paper Review potential of plagiarism since the computation time needed
does not make sense in order to mine the entire block to
The reviewer who wants to review a paper must have a become valid.
public key such that he (she) can open the whole
information about that scientific publication. For qualitative test, we experiment three different tests to
see that blockchain application can detect any action related
In our model, we simulate three different scenarios to to plagiarism conduct:
show that the blockchain technology we implement can
Authorized licensed use limited to: Anelis Plus consortium. Downloaded on March 15,2022 at 08:17:28 UTC from IEEE Xplore. Restrictions apply.
First, a writer conducts plagiarism by publishing created where each sender has a copy of his/her own record
scientific works belonging to others by making a few which is able to eliminate third parties interfering in it. Each
changes. The author assumes that with the presence of a third peer is protected by a consensus such that if there is data in
party within the publishing organization, the evidence of different peer, it will be rejected in the blockchain network.
plagiarism can be changed and deleted if at any time a The test shows if there is an information change by one peer
dispute arises over the scientific work resulting from the will automatically change the hash value of the last block
plagiarism. For this test, it is assumed that the block number and will be different from the other peer. Through the
of the scientific work produced by plagiarism is in block permissionless blockchain mechanism, it can create a
number 22 and original scientific works are in block number
decentralized and trusted publicity network such that we can
20. With the timestamping, it can be seen who the owner of
add the application of text mining that provides more
the scientific work first published the scientific work, so that
it can be proved that the number block 22 is plagiarizing the accurate results of plagiarism comparison. Fig. 5 shows how
scientific work contained in block number 20. Suppose that a the blockchain can detect any change made and eliminate
writer or third party, attempts to change the information of the existence of third party.
the author's name from Eun-Kyeong Kwon to Sutanto and
timestamping information from 2019-07-07 03:38:44 to be
2019-07-07 02:38:44 such as block 22 was first published
before block 20. However, when a change occurs, the hash
value of block 22 and the next blocks will change. In this
case, we show that block 22 and block 23 becomes red which
means that the block is invalid as a result of the information
change. has been changed. as shown in Fig. 4.
Authorized licensed use limited to: Anelis Plus consortium. Downloaded on March 15,2022 at 08:17:28 UTC from IEEE Xplore. Restrictions apply.
After the scientific publication information is open, then theft or potential plagiarism. At the end of the study, a
the authenticity of the information must be verified, whether combination of the number of blocks with difficulty targets
it has been changed or not by pressing the verify button. If was tested to prove the safety of the blockchain. The
the information is not changed, the block will be green and experimental results imply that using blockchain is very safe
if the information has been changed, the block will be red. because no one can make changes to the data on the block
The simulation of digital signature verification can be seen and validate all blocks on the network. Future research can
in Figures 7 and 8. be done by using blockchain 4.0 as a new technology for
industry 4.0 and implementing deep learning to make any
plagiarism misconduct can be broadcasted to the entire
scientific publication network. The use of blockchain 4.0 can
increase trade per second (TPS) significantly.
REFERENCES
Authorized licensed use limited to: Anelis Plus consortium. Downloaded on March 15,2022 at 08:17:28 UTC from IEEE Xplore. Restrictions apply.