Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

e-ISSN: 2582-5208

International Research Journal of Modernization in Engineering Technology and Science


( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:04/April-2023 Impact Factor- 7.868 www.irjmets.com

CRIMINAL RECORD MANAGEMENT SYSTEM


Nilay Patil*1, Manish Parikh*2, Abhishek Sawant*3, Yash Shelar*4,
Prof. Priyanka Kinage*5
*1,2,3,4Student, Computer Dept., Smt. Kashibai Navale College Of Engineering,
Pune, Maharashtra, India.
*5Faculty, Computer Dept., Smt. Kashibai Navale College Of Engineering,
Pune, Maharashtra, India.
ABSTRACT
In addition to other technologies, other systems have made use of blockchain to maintain criminal data records.
The concept of the research is based on the confidentiality of criminal data and maintenance from the local
Police Officers' perspective. The aim of the study is to use blockchain technology to improve the security
protocol for criminal record data. The work focuses on both the security protocols and the system architecture
from both the user and implementers’ sides. Criminal records are highly sensitive public records. The
authenticity and rigidity of records can be upheld by including criminal records in a blockchain, which also
helps to protect the data from enemies. Each nation's ability to develop is directly hampered by rising crime
rates, so it is and has always been a top priority for all countries to prevent or at least curtail current and
potential criminal activity. The decentralization of data is made possible through a peer-to-peer cloud network.
It assists in preventing unauthorized data alterations. In order to achieve integrity and security, this article
offers a system for storing criminal records that uses blockchain technology. While high-level criminals seek to
avoid attention, low-level criminals who carry out the grunt labor in a criminal organization are more likely to
be apprehended.
Keywords: Blockchain, Criminal, Decentralization.
I. INTRODUCTION
The graph of crime rates is gradually rising due to rapid urbanization and urban and rural development.
Blockchain can replace such piled-up criminal records with a network where papers are freely available and
could not be tampered with, keeping them safe and Secure. Blockchain is a P2P (peer-to-peer network) that
helps decentralize data. This system will be based upon the immutability characteristic of the blockchain to
ensure the integrity and security of data. This blockchain-based approach can reduce corruption risk factors by
making it easier for third parties to monitor tamper-evident transactions and provide improved impartiality
and consistency, consequently boosting criminal record openness and accountability. Also, timely access to
legitimate criminal records by different administrative bodies will make law enforcement effective.
II. LITERATURE SURVEY
Nowadays crime rates are increasing and the public is facing many security problems in society. When this
happens, individuals feel vulnerable and require assistance to be protected. Even though many technologies
have been introduced for Crime control systems. This application will overcome these concerns and provide a
database for storing data.
Criminal records are now maintained via manual procedures, which is a less-than-efficient data system. There
are chances of losing data. This application will resolve these issues and also offers a database for data storage.
The current system utilized by the police department for prisoner information stores the name of the prisoners,
information about the crime, the date of the FIR, the criminal's background, and the duration of the prison.
III. LIMITATIONS OF THE EXISTING SYSTEM
1. System is not for everyone.
2. In the current method, time management is a problem.
3. Consumes a large volume of paperwork.

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science


[2018]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:04/April-2023 Impact Factor- 7.868 www.irjmets.com
IV. METHODOLOGY
Crime Record Management System is a system used for statistical purposes to categorize different types of
criminal activity. It provides a standardized framework for collecting and analyzing data related to crime. The
purpose of categorizing crimes is to facilitate the comparison and analysis of crime statistics across different
countries and jurisdictions.
Various authorities such as police, prosecution, courts, and prisons collect data on crimes for their own
purposes. These authorities use their own methods and techniques for recording and reporting crime data,
which may vary depending on their operational requirements and legal systems. For example, police may
collect data on reported crimes, prosecutions may track convictions, and prisons may record data on inmate
populations.
The Crime Record Management System categorizes crimes into different types or categories based on their
nature and characteristics. Common categories include violent crimes (such as homicide, assault, and sexual
offenses), property crimes (such as theft, burglary, and arson), drug offenses, fraud, and other types of crimes
(such as traffic offenses, public order offenses, and cybercrimes).
By grouping crimes into categories, the system enables the collection of data on crime trends, patterns, and
prevalence at a macro level. This data can be used for policy-making, resource allocation, and evaluation of
crime prevention strategies. However, it's important to note that the Crime Record Management System is a
statistical framework and does not necessarily align with legal definitions of crimes in different jurisdictions, as
legal definitions and classifications may vary across countries and legal systems.
V. PROPOSED SYSTEM

Figure 1: System Architecture.


This is a police dashboard where the police can accept the absolute information using a login password. To
access the online criminal management system, we need to Add on users (police office bearers along with the
background screening agencies) and allocate their various levels of entitlements. Verify user login particulars
and also make sure user level prerogatives to data. Stock as well as recover all the data about crime and
criminals. Execute search tasks on the grounds of some defined standards. Execute crime inspection and
analysis along with the statistics to generate adequate reports.

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science


[2019]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:04/April-2023 Impact Factor- 7.868 www.irjmets.com
Mathematical Model
Let S be Whole system S= {I, P, O}
I-input
P-procedure
O-output
Input(I)-
I = {Criminal Data}
Where,
Procedure (P)-
P = {I, Using I System perform operations and Using PHP}
Output(O)-
O = {system adds criminal records in the database and handles the case}
Block Diagrams
 Use Case Diagram

Figure 2: Use Case Diagram.

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science


[2020]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:04/April-2023 Impact Factor- 7.868 www.irjmets.com
 Activity Diagram

Figure 3: Activity Diagram


VI. CONCLUSION
In this paper, we will overcome the problem of the communication gap between the police during their
investigation. We will also provide solutions to bridge the communication gap between police and the general
user. Also, criminal information will be readily accessible to police officials as it is stored on the cloud. The
problem of reporting fake crimes will be overcome as this application will need the verification of police to
report incidents reported by the users to broadcast it to other users using the same application. In the future,
some other security algorithms can be used to provide better security measures for the criminal database.
Future research can be dedicated to these challenges.
VII. REFERENCES
[1] T. Mohana Priya, Dr. M. Punithavalli & Dr. R. Rajesh Kanna, Machine Learning Algorithm for
Development of Enhanced Support Vector Machine Technique to Predict Stress, Global Journal of
Computer Science and Technology: C Software & Data Engineering, Volume 20, Issue 2, No. 2020, pp
12-20
[2] Ganesh Kumar and P.Vasanth Sena, “Novel Artificial Neural Networks and Logistic Approach for
Detecting Credit Card Deceit,” International Journal of Computer Science and Network Security, Vol. 15,
issue 9, Sep. 2015, pp. 222-234
[3] Gyusoo Kim and Seulgi Lee, “2014 Payment Research”, Bank of Korea, Vol. 2015, No. 1, Jan. 2015.
[4] Chengwei Liu, Yixiang Chan, Syed Hasnain Alam Kazmi, Hao Fu, “Financial Fraud Detection Model:
Based on Random Forest,” International Journal of Economics and Finance, Vol. 7, Issue. 7, pp. 178-188,
2015.
[5] Hitesh D. Bambhava, Prof. Jayeshkumar Pitroda, Prof. Jaydev J. Bhavsar (2013), “A Comparative Study
on Bamboo Scaffolding And Metal Scaffolding in Construction Industry Using Statistical Methods”,
International Journal of Engineering Trends and Technology (IJETT) – Volume 4, Issue 6, June 2013,
Pg.2330-2337.
[6] P. Ganesh Prabhu, D. Ambika, “Study on Behaviour of Workers in Construction Industry to Improve
Production Efficiency”, International Journal of Civil, Structural, Environmental and Infrastructure
Engineering Research and Development (IJCSEIERD), Vol. 3, Issue 1, Mar 2013, 59-66
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[2021]

You might also like