Professional Documents
Culture Documents
Blockchain Personal Sem 1
Blockchain Personal Sem 1
Blockchain Personal Sem 1
Project Report on
OF
SUBMITTED BY
Prof. K C kulkarni
May, 2022
Certificate
This is to Certify that the project report entitles
are bonafide students of this institute and the work has been carried
out by them under the guidance of Prof. K C kulkarni and it is approved
for the partial fulfillment of the requirement of Savitribai Phule Pune Uni-
versity for the award of the degree of Bachelor of Engineering (Computer
Engineering).
Date: / /
Acknowledgement
We have taken efforts in this project. However, it would not have been possible
without the kind support and help of many individual and organizations. We would
like to extend our sincere thanks to all of them. It gives us proud privilege to complete
the project on “Admission process using Blockchain”. We are highly
indebted to our internal guide Prof. K C kulkarni for his guidance and constant
supervision as well as for providing necessary information regarding the project and also
for his support in completing the project.
We are also extremely grateful to our respected H.O.D. (Computer Department)
Dr. M. U. Kharat and Dr. P. N. Metange (Project Co-ordinator) for
providing all facilities and every help for smooth progress of project work.
Aakanksha Barkale
Gayatri Suryawanshi
Aniruddha Jeughale
Ujjwal Jejurkar
ii
Abstract
iii
Contents
Acknowledgement i
1 Introduction 1
1.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2 Literature Survey 3
2.1 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
3 Problem Definition 5
3.1 Need of Block Chain . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3.2 Basic Concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
3.3 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
4 Analysis 7
4.1 Project Plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
4.1.1 Project Plan for semester I . . . . . . . . . . . . . . . . . . . 7
4.2 Requirement Analysis . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.2.1 Necessary Functions . . . . . . . . . . . . . . . . . . . . . . . 8
4.2.2 Desirable Functions . . . . . . . . . . . . . . . . . . . . . . . 8
4.3 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
5 Design 10
5.1 Software Requirement Specifications . . . . . . . . . . . . . . . . . . 10
5.1.1 Project Scope . . . . . . . . . . . . . . . . . . . . . . . . . . 10
5.1.2 Operating Environment . . . . . . . . . . . . . . . . . . . . . 11
5.1.3 User Classes and Characteristics . . . . . . . . . . . . . . . . . 11
iv
Admission process using Blockchain
6 Modeling 17
6.1 Data Flow Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . 17
6.2 Use Case Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
6.3 Class Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
6.4 Sequence Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
6.5 Component Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . 26
6.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
7 Technical Specifications 28
7.1 Advantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
7.2 Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
7.3 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
7.3.1 Hardware Requirements . . . . . . . . . . . . . . . . . . . . . 29
7.3.2 Software Requirements . . . . . . . . . . . . . . . . . . . . . 30
7.4 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
8 Conclusion 31
Bibliography 32
vi
List of Tables
vii
Chapter 1
Introduction
This chapter describes the term Block Chain and introduces the concept of Block
chain Framework. It also gives the overview of the Block Chain Framework which de-
scribes the deliverable of the project.
1.1 Overview
Data is often presented as “the new oil” of our (digital) world, a key asset with
both economic and social value [1]. The term “big data” is used to describe the massive
processing of high volumes of data produced very quickly by various sources. Despite the
opportunities, innovation and growth arising from this omnipresence of data, users find it
all the more difficult to have their privacy boundaries clearly delineated and respected in
the era of big data. Increasingly, the same sets of personal data are collected by different
service providers, each with their purpose and specific approach. Data subjects seeking
to access their own data must acquiesce to the terms imposed by these providers, which
dramatically decreases the effective control that users have over their personal data [2]
[3]. The big data landscape also poses other challenges, such as the increased frequency
of personal data breaches, the deployment of wide scale electronic surveillance systems,
or the profiling of users without their knowledge or consent.
The challenges outlined above, coupled with revelations on the existence of massive
governmental surveillance programs [4], have weakened the confidence of users in certain
aspects of the digital economy [5]. To this end, the European Commission (“EC”), in an
effort to restore users’ trust, has called for a more balanced relation between the interests
1
Admission process using Blockchain
of data controllers and the rights of end-users regarding the processing of personal data
[6]. The General Data Protection Regulation (“GDPR”) [7], which will replace Directive
95/46/EC [8] and is set to apply from 25 May 2018, is part of this reform.
Along the same line, ENISA, in its study “Privacy by design in big data”, under-
lined how crucial it is to shift the discussion from “big data versus privacy” to “big data
with privacy” [9]. The purpose of the study was to explore ways to address privacy issues
with the opportunities afforded by technology, focusing on strategies involving privacy
by design and privacy enhancing technologies (“PETs”) in big data analytics. Key areas
to explore, according to ENISA, are solutions that can increase transparency and control
for end users over their personal data.
Personal Data Clouds (“PDCs”) is one such privacy enhancing solution that
has recently garnered considerable attention1 . PDCs are data management and sharing
systems designed to empower individuals and help them regain control over their data.
The term “PDC” is sometimes used interchangeably with “Personal Data Vaults”, “Per-
sonal Data Stores”, or “Personal Data Services”. The origin of PDCs can be traced to
the development of personal information management systems, which in turn arose out
of the need to achieve better management of dispersed data. These systems, however,
were not primarily concerned with the preservation of privacy, which is why the idea of
PDCs is not only to enable individuals to collect, store, manage, use, and share their
personal data, but to do so according to their own levels of privacy comfort, trust and
needs. These developments have been bolstered by the appearance of technical stan-
dards, such as XDI (”eXtensible Data Interchange”), a semantic data interchange format
and protocol under development by the OASIS XDI Technical Committee.2
1.2 Summary
In this chapter we described the term Data Security and also highlighted the
concept of Data Security Framework. We also discussed the various deliverables of the
project Application.
Literature Survey
In this chapter we will see the various studies and research conducted in order to
identify the current scenarios and trends in digital Data Privacy and also the attempts
of introducing mobile devices in education.
• “Big Data Model of Security Sharing Based on Blockchain”, P Li Yue ; Huang
Junqin ; Qin Shengzhi ;is a author of this paper, this paper published in 2017.
Advantage of his project is, The rise of big data age in the Internet has led to
the explosive growth of data size. However, trust issue has become the biggest
problem of big data, leading to the difficulty in data safe circulation and industry
development. The blockchain technology provides a new solution to this problem
by combining non-tampering, traceable features with smart contracts that auto-
matically execute default instructions. In this paper, we present a credible big data
sharing model based on blockchain technology and smart contract to ensure the
safe circulation of data resources.
• Sunghyun Cho ; Sejong Lee [1] in this paper described A network composed of
lightweight devices such as IoT has problems due to limited resources such as
3
Admission process using Blockchain
lack of storage space and low computing performance. These issues pose signif-
icant challenges in the application of robust security technologies, which reduces
network security performance. The blockchain with strong security is a suitable
technology to solve IoT problems with weak security. As a result, various research
is being carried out to increase security, lightness, and efficiency of the IoT network
by applying blockchain to IoT. This paper introduces the trend of research to apply
blockchain to IoT.
• The Blockchain is an emerging paradigm that could solve security and trust issues
for Internet of Things (IoT) platforms. We recently introduced in an IETF draft
(“Blockchain Transaction Protocol for Constraint Nodes”) the BIoT paradigm,
whose main idea is to insert sensor data in blockchain transactions. Because ob-
jects are not logically connected to blockchain platforms, controller entities for-
ward all information needed for transaction forgery. Never less in order to gen-
erate cryptographic signatures, object needs some trusted computing resources.
In previous papers we proposed the Four-Quater Architecture integrating general
purpose unit (GPU), radio SoC, sensors/actuators and secure elements including
TLS/DTLS stacks. These secure microcontrollers also manage crypto libraries re-
quired for blockchain operation. The BIoT concept has four main benefits: publi-
cation/duplication of sensors data in public and distributed ledgers, time stamping
by the blockchain infrastructure, data authentication, and non repudiation.
2.1 Summary
In this chapter we discussed the various researches conducted in order to achieve
a clear view of Data Secuity framework and also understand the needs of users who are
attracted towards digital education.
Problem Definition
This chapter explains the need of Blockchain Framework and also describes the
importance of high quality Security. It introduces the basic concept of the role of mobile
devices in learning.
5
Admission process using Blockchain
3.3 Summary
In this chapter we introduced the basic concept of Block Chain Framework with
Personal Data and explained the need of Framework as well as the role of Security in
personal data.
Analysis
This chapter describes the project plan adopted and determines the requirement
analysis. We have implemented the project on the basis of Bock chain and Security. The
stake holders who participated in the requirement analysis process were the developers
who will be among the end users of the security data for building block chain applications.
7
Admission process using Blockchain
• Data Management.
MET’s Institute of Engineering 8
Admission process using Blockchain
• Blockchain integrity.
4.3 Summary
In this chapter we described the implementation details of the project plan for
Semester I and Semester II. We also studied the necessary functions and the desirable
functions of our project.
Design
10
Admission process using Blockchain
Battery life, screen size, form factor, variations in keyboard availability and dynami-
cally changing orientation (horizontal or vertical positioning done by user) present using
set of issues to be dealt with.it was necessary to innovate the space where maximum
number of users would benefit. Mobile devices including phones and tablets are the most
prominent majority - and also have high projections for the future. So it is imperative
that we have to have good tools for content creation and dissemination. Teachers who
are our prime focus must have some superb tools to create their Data Security modules.
And students, who will eventually consume these modules, must have excellent tools to
use these Data Security units. Out of this exact need, Application was born. Application
must be extremely portable, FREE to use and open source. Our philosophy is to make
world a better place.
Following are the merits of the design implementation :
• Each user will get unique username and password to user our system, we store user
information by using block chain to avoid the problems which is face by user today.
• Each user will create information with the information, and then send to the system
for processing, system will use block chain for data integrity. And secure the data.
• Data Security:
Here we are using the blockchain technology which will be used for secuirity pur-
posed
• SD card: The Data Security application will secure the data content stored on
the SD card.
• Portability: The Data Security application can be used regardless of the time
and location constraints.
As mobile devices evolve and people discover new ways in which mobile devices
functionalities can be applied to training, mobile personal data will likely become some-
thing increasingly different from conventional personal data.
5.7 Summary
In this chapter we studied the operating environment and the user classes and
characteristics which describes the scope of the project. We have also described the
software system attributes and various nonfunctional requirements.
Modeling
This chapter includes the various modeling techniques which describes the various
users of the Data Security Framework and Data Security application. It also describes
the functionality of the different features of the Data Security framework.
17
Admission process using Blockchain
• Actors: Actors refer to a type of users, users are people who use the system. In
this case student, teacher developer are the users of the framework and application
• Use cases: A use case defines behavioral features of a system. Each use case
is named using a verb phrase that express a goal of the system. The name may
appear inside or outside the ellipse.
• Components
• Interfaces
6.6 Summary
Thus we saw the various modeling techniques used for the design of Data Security
Framework and the Data Security Applications.
Technical Specifications
In this chapter we will discuss the advantages and limitations of the Data Security
Framework. We will also go through the applications of the framework and have a brief
study about the technical requirements.
7.1 Advantages
A key benefit of Data Security is its potential for increasing productivity by mak-
ing Data Privacy available anywhere, anytime. Because mobile devices have the power
to make Data Privacy even more widely available and accessible, mobile devices are a
natural extension of eLearning. Data Security is the power of Data Privacy that is truly
“just-in-time” where you could actually access training at the precise place and time on
the job that you need. Our project provides the reusable piece of code that will help the
developers for developing multiple Data Security applications easily; one can also prepare
audio or textual notes on move. The greatest benefit of this delivery is the combination
of true interactivity coupled with portability.
Following are some more advantages of Data Security Framework:
• Potential for location based learning:This means the phone can alert
the person when they are near a potential Data Privacy experience based in the
context in which the Data Privacy will be used–which potentially can help retention
and return on investment.
7.2 Limitations
To participate in mobile Data Privacy one must have a tablet or mobile devices
with android as its base operating system,these can have high ranges of cost, due to this
reason it cannot be affordable by everybody in todays world.
Another aspect to be considered is the size of the device, this is only a challenge if
one incorrectly plans mobile Data Privacy content to be nothing more than compressed
eLearning. If your users are already using their mobile device that you plan to push Data
Privacy to, your strategy should be what content do they need in the context of using
the device. Add to that, the greatly improved displays, such as the OLED display on
the DROID Incredible, and size isn’t a detriment any more, but an advantage.
7.3 Applications
The Data Security framework can be used in following areas:
• Institutions for teaching the Data Privacy material developed by the developer for
mobile learning.
• The education application developer can use this framework for developing number
of applications that can be imported on mobile devices.
• Action Script
• PHP
7.4 Summary
In this chapter we were made aware of the various advantages of the framework and
also the limitations of the project. We also saw the hardware and software requirements
of the project.
Conclusion
Data Security concept was tossed during the early 1990’s but was never brought
in the implementations. We analyzed the need of the Data Security Framework and
conducted rigorous studies and researches. We understood the requirements of the Data
Security Application Developers and decided to design a framework which will match
their needs and will ease their task of developing the applications. We have developed
a Data Security Framework for multiple Android Platforms which includes Android 2.2
(Froyo), Android 2.3 (Gingerbread), Android 3.0 (Honeycomb) and 4.0 (Ice cream sand-
wich). We have successfully tested the Data Security applications developed using the
Data Security Framework on the above mentioned Android platforms.
31
Bibliography
[1] James Ball. Nsa’s prism surveillance program: how it works and what
it can do. The Guardian, 2013.
[4] Mobile Data Privacy in the 21st century: Benefit for learners ;Geddes
S.,In The knowledge tree, December 2010.
[6] Moving mobile into the mainstream ;Stead, G.,In Proceedings of mLearn,2010.
[7] Mobile Data Privacy anytime everywhere ;Corlett and Sharples, In London:
Data Privacy and Skills Development Agency, 2010.