ACC Blockchain Based Trusted Management

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

ACC: Blockchain Based Trusted Management of

Academic Credentials
Md. Suman Reza Sujit Biswas1 Abdullah Alghamdi
Computer Science and Engineering Dept. Computer Science and Engineering Dept. Information System Dept.
Faridpur Engineering College, Bangladesh Faridpur Engineering College, Bangladesh Najran University , Saudi Arabia
suman.reza@fec.ac.bd sujitedu@fec.ac.bd abdulresearch@hotmail.com

Mesfer Alrizq Anupam Kumar Bairagi Mehedi Masud


Information System Dept. Computer Science and Engineering Discipline Department of Computer Science
Najran University, Saudi Arabia Khulna University, Bangladesh Taif University, Saudi Arabia
msalrizq@nu.edu.sa anupam@ku.ac.bd mmasud@tu.edu.sa

Abstract—Justification of authenticity of academic credentials Human Resource Department(HRD) rarely bothers to re-
is a very clumsy task from a global perspective. For digital view applicants’ educational records due to lack of credentials
certificates to be widely accepted requires secure verifications of details and asked for Curriculum Vitae (CV) as an additional
the issuer, credential holders, and secure data sharing. Physical
verification and a traditional centralized digital system are document. Moreover every paper certificate is vulnerable to
entirely viable for the current era. This paper proposes ACC, a counterfeiting. In most cases, the quality of forged certificates
blockchain-based Academic Credentials Chain(ACC), for global is practically the same as the original owing to the high-
authenticity verifications and sharing. The proposed system tech printing and photocopying machines. [7] Technological
recognizes from a credential who is certifying whom. In the advancement has made it extremely easy to make a counterfeit
proposed Blockchain network, a decentralized application allows
users to store their credentials data privately. The evaluation certificate. From a global perspective, it is not straightforward
results in proof of the feasibility, security and exhibits the level to justify the authenticity of such records. Considering the
of performance. limitations leading institutions are trying to migrate typical
Index Terms—Blockchain, E-Health Systems, Digital Assets, management to digitized certifications systems. Digital creden-
Access Control. tials promise to make education more relevant by documenting
I. I NTRODUCTION learning to empower people to plan, track, and share their
accomplishments in a secure and verifiable way. Digital man-
Credential (i.e., certificate, diploma) is a piece of any
agement starts with the conversion of typical credentials into
document that details a qualification, competence, or authority
digitized images. Such electronically converted (i.e., scanned
issued to an individual by a third party with a relevant authority
), a high-resolution digital copy is stored in a centralized server
or assumed competence to do so. Sharing credentials is a secu-
along with indexed information such as reference number, who
rity and privacy concern [1]. Academic credentials signify and
belongs to, date created, and other academic achievements.
provide information about who, issuing institution, the course
Such a traditional credentials management system primarily
title, and the average result. Paper-based typical document
uses a client-server system where files are stored locally or on
management faces many difficulties such as security of storage
cloud-based servers. Electronic records management using this
space, security issues (i.e., losing, damage, mishandled, wrong
centralized system carries a substantial security risk in various
spelled, etc.), high cost, authentication justification, etc. These
ways, such as hacking by intruders, confidential company
manual processes often turned out to be inefficient, error-
information may end up in the wrong hands, etc. In addition, a
prone, and time-consuming, but still, that was the overall
centralized electronic records management system poses risks
process in the absence of any other option. Statistics state that
of a single point of failure, data security, data forking, etc.
the average employee uses 10,000 paper sheets in a year, 14%
It is also very challenging to allow restricted access of multi
of which is unnecessary [2] where workers spend an average of
parties (i.e., employers) without compromising privacy.
50% of their time creating and preparing documents [3]. Hard
Distributed Ledger Technology (DLT) is becoming an im-
document based account issuing for more than 21% of daily
portant new direction to meet up the above challenges. It
productivity loss [4]. 65% of staff experience challenges when
allows to significantly reduce costs and enhance security where
checking and approving office documents. 86% of employees
there is a need for reliable and unchangeable documents.
say that they usually experience difficulty searching for office
Moreover, it eliminates the involvement of a third party that
files when they need it [5]. Companies spend an average of
reduces the cost and processing time where employers can
$20 to file and store paper documents [6]. 1
get secure access. As a well-known DLT, Blockchain is the
1 Sujit Biswas is the corresponding Author best choice for the applications. Blockchain is highly secure
because of its immutable ledger, while decentralized data there is no mechanism to store the certificate image in any
storage ensures data security. Peer-to-Peer (P2P) back-end net- storage area. Also, the admin registration mechanism is not
works approve every transaction using consensus technology clear here. In [14], the authors designed a Blockchain-based
that enhances security one step more [8]. Smart contract- digital document verification that allows degree certificate and
based user-specific access control policy creates the best-fitted testimonial verification. It allows verifying the uploaded file
technology for the credential management application. of users by the authorized authority (i.e., school or university,
This article contributes a blockchain-based credential man- etc.) Their solutions suggest delivering the documents to a
agement framework that stores traditional paper-based cer- third-party system for verification. Unfortunately, the third
tificates in a distributed ledger. Besides certifications, it also party may compromise the records as well. Our proposed
provides testimonials of a student, which is more important architecture allows direct access of faculties to update the
for employers to justify track records. Furthermore, the con- regular records that create an extensive information system
tribution allows multi-users access based upon rights that will for the alumni students. Moreover, we have designed the
play a significant role in the production environment in the architecture for best utilized for private Blockchain, which
following ways. overcomes the state-of-art challenges.
• Eliminates the third party for document verification that
cut off the cost. B. Background Studies
• The documents are securely placed that only authorized
persons can access. Blockchain(BC) started its journey as a decentralized, dy-
• Data becomes unalterable. It is practically impossible to
namic new technology introduced with bitcoin (a public BC)
hack. in 2009. This technology is not only a single technique, it
is a combination of many techniques such as cryptography,
II. R ELATED W ORKS AND BACKGROUND mathematics, algorithms and distributed consensus algorithms
[15]. Like an old fashion account book, a decentralized ledger
A. Related Work only adjusted to computer specifications that can send files
OpenKM [9], a web-based document management system or blocks of information to all participating computer nodes
store and manage their files and document using a cloud- in a shared activity, bitcoin, banking, or e-government. In
based system. It synchronizes with other devices and allows Blockchain, data is distributed over many computers (nodes).
access to files anytime and anywhere. LogicalDOC uses a It is harder to hack than centralized networks because each
web-based user interface for file sharing, setting security node receives the same information, and any tampering is
roles, and finding and auditing enterprise records and registers transparent to all nodes. Moreover, information once entered
[10]. These systems can improve efficiency by organizing all is permanent and cannot be changed or removed. Each block
of our files and making them accessible for anyone in the is identified with a hashtag that is signed and dated. If a
organization to find. It also provides some essential features correction is entered, it appears next to the original entry.
like time savings, easy scaling, quick and easy document Therefore, the issues of revision and update still need to be
retrieval, better regulatory compliance, and improved collabo- addressed. Nowadays, without changing the basic principle
ration. Data security is a vital part nowadays. As we have seen, of BC, due to security reasons, commercial and industrial
all these systems are cloud-based, and a third party handles applications are going to be migrated in private Blockchain
everything. As a result, valuable data may be compromised. In where only authorized users are eligible to access the data.
2019, reports TechRepublic, the number of breaches increased According to [16] academic credentials are significant as they
by 54%, 89% of which were outside attacks [11]. Jiin-Chiou serve as an indicator of the human capital of their bearers. So
Cheng et al [12] developed a decentralized application and any fraud regarding this issue may cause a severe problem.
designed a certificate system based on Ethereum blockchain Blockchain-based management of such credentials can ensure
to avoid counterfeiting certificates. The system first generates security and faster service as well as minimize the cost.
the electronic file of a paper certificate and then stores the hash
value created for the certificate in the Blockchain system. The III. S YSTEM A RCHITECTURE
authenticity of the paper certificate is ensured by creating a
related QR-code and inquiry string code to affix to the paper The architecture shown in Figure 1 comprised of three
certificate. The system saves on paper, cuts management costs, sections such as Application section, Management section,
prevents document forgery, and provides accurate and reliable and Blockchain Section. The application section presents a
digital certificates. However, risks exist because private data front-end application interacting with management server and
is released on a public Blockchain. A. Gayathiri et al. [13] Blockchain network. Overall architecture provides support for
proposed a solution to the problem of certificate forgery based academic record management. Records might be two types
on Blockchain technology. The system converts the paper such as 1) academic achievements 2) certificates or diploma.
certificates into digital certificates and stores the hash value Academic achievements is recorded through instructors and
of the digital certificate. Finally, use a mobile application to certificates might be issued a scanned version or system
validate the certificate. Still, it is in public Blockchain, and generated version.
Ma age e Se e

I c
E d e
I e
S de

Ad Off-c a S age B c c a Ne

A ca Sec Ma age e Sec B c c a Sec

Fig. 1: System Architecture

A. Application Section 1) Management Server: The management server serves as


a local server of an organization, such as a typical server of
The application comprises front-end supports for interacting
a university. It is also used as a store of a web application.
with the system and end-users. It allows users to show the
Besides application hosting services, it is also responsible for
different dashboards and restricted access based upon access
identity management and credential management. Manage-
rights. For example, the Administrator (System Admin) is
ment server reduces the dependency of a local organization on
responsible for adding users and their roles, instructors (Course
a Blockchain server. The management server approves every
Teachers) for academic record entry, moderators to validate
user registration using algorithm 1. It also works as a gateway
submitted records, students for viewing, and employers for
of the blockchain network, which means while transactions are
record justification. To access the system, all users need to
required to be executed in the BC network, the server prepares
register themselves using a unique identity that makes the
and makes it suitable to execute to network.
system very flexible in managing different data types. The
whole registration process and unique id generation technique • Identity Management: Management server is also re-

have been illustrated in the next section. sponsible for unique identity generation for every user,
The application connects with peers with the help of the including students. Algorithm 1 presents the identity
Application Programming Interface (API) to access the ledger registration and enrollment process, which is the crucial
and chaincode. API allows the application to invoke chaincode, stage for being a member of the network to get access to
generate transactions, and execute a transaction to the network. the Blockchain network. As academic institutions hold
The invocation result is returned to the application after com- sensitive academic data, it is important to ensure the
pleting the process such as ordering, validation, and commit access of the right person. In the proposed system, we
to the ledger. Finally, the application executes chain codes use a compound key in combination with the user’s
to query or update a ledger. Application is also linked with biometric data, personal id assigned by the organization,
off-chain storage, which is responsible for storing certificate and secret key. The user executes the registration request
images. In addition, the application interacting with the man-
agement server provides the interface to process organization-
Algorithm 1: User Registration
level data, such as class test scores, student’s semester-specific
achievements, etc. Input : (BioID, InsID, Pass) as registration request
Output: A newly registered user Un
1 Uid ← createU serId();
B. Management Section
2 Kcompound ← hash(BioID, InsID, P ass);
The management section comprises an organizational server 3 (Kpub , Kpr ) ← generateKeys(setInf o);
and off-chain storage. The server maintains web application 4 Kpub → ∀Uwallet ;
space and other identity management and registration pro- 5 Un
W allet
← createBlockChainW allet(Kpub , Kpr );
cess. Off-chain storage is responsible for storing credentials’ 6 Un ← distributeW allet(n, Un
wallet
) |Un ∈ UN ;
scanned or soft images.
1. a da Re e 2) Off-chain Storage: As the certificate is an image, it
C e 7. T . E ec e BC requires ample space and will be very costly to store in BC. In
A
8. N f ca
addition, considering the scalability of the BC network, it is
best to hold such heavy data in off-chain storage. Furthermore,

BC
e
I c da

De a
considering the security issue of the credentials, we have
Va

Ne
6.P e a e T f
proposed to store the hash of the credentials in a BC ledger
f

2. Ge Va da
e

B c cha
that protects the certificate from forking info. In the proposed
e
R
3.

framework, the management server maintains the off-chain


5. T E ec e storage [17].
Se e

4. C Ma age e Q e
C. Blockchain Network
Ad a e f ca Se e DB Re e Blockchain network comprises a typical DLT supported P2P
I f
network. A private Blockchain network consists of multiple
Fig. 2: Records Validation and Storage peers as core components of the network, Certificate Authority
(CA), and Orderer. Peers are interconnected and also linked
with CA, and Orderer serves ordering services of all connected
to the management server through the application with peers. Every peer holds smart contracts for validating and
the compound key. This combination is then hashed and approving valid users agreement which is known as consensus.
sent to create a private and public key pair. A public key Peers are also responsible for maintaining every committed
is distributed to users’ wallets (line 4). A user-specific transaction in a sequential chain called Blockchain or ledger.
wallet is created in line 5 for using the public and private CA provides secure communication and authentication certifi-
keys. The newly created wallet is distributed to the user. cates to different network components, including management
• Records Validation: Records validation refers validation server and application and off-chain storage. CA verifies the
and issuance of submitted records from an assigned credential (certificates) for any transactions forwarded from
instructor. This system is designed in such a way that the management server and issues a pass to execute in the BC
the administrator sets the role of every registered user. network. The management server is responsible for validating
For example, an instructor can submit the students’ exam the end-user (e.g., instructor, students, etc.) and carrying the
scores and other track records for a specific course. The transaction to the BC network on behalf of users. Hence, the
corresponding academic head (Validator) is responsible BC network serves many education organizations for the same
for viewing, validating and finalizing the records. The services and employers. Every organization is linked with the
management server prepares the executed documents and BC network with agreements (smart contracts). According to
decides which data should be executed in BC and what the smart contract, during transaction execution, such as query
should be kept in the local server. Management servers through management server or other employer organization is
divide records into two categories, such as performance responded.
records and general records. The performance records
carry academic achievements, which are executed in IV. E VALUATIONS AND D ISCUSSION
BC, and general information (i.e., course details, utility, Application is implemented using nodeJS and uses JSON
library record, etc.) stored in the management server. as payload. Cloud-based webserver (i.e., management server)
As we know, Blockchain suffers scalability issues, so provides the front-end services, allowing the participants to
we have avoided storing every local record to store in use their devices like smartphones, laptops, desktops, etc.
Blockchain. The whole procedure is being illustrated in The management server store only the general information;
Figure 2. The instructor (1) sends a request for validation on the other hand, the core sensitive data is stored in the
of his submitted records along with his unique ID (UID) Blockchain ledger. Blockchain network is implemented using
and validator details to the application. The application Hyperledger fabric in docker platform. To connect the front-
(2) collects the validator details from Management server end web application with the blockchain network, we use
and (3) forwards the request to the validator. The validator gPRC() REST API and smart contract written in Javascript.
verifies (4) instructors information against the course The system with Core-i7, 2.7GHz, 16GB Ram, and 512GB
enrollment data from identity and fact data stored in SSD has been used for the implementation.
the local cloud storage. The validator then signs the Figure 3 presents the different view of credentials. It demon-
records and executes them to the server (5). Finally, the strates the sample output at employer end and Blockchain
server prepares the transaction proposal for BC network storage. Figure 3a demonstrate the credential (i.e., diplo-
and forward to application, if it is performance record; ma/certificate) images that the employer can ask to ensure
otherwise, it is stored in its local database. Application the authentication of the certificate. The certificate images are
executes the proposal to BC network (7) and Blockchain retrieved from off-chain storage. Here credential images are
does its own process for further validation and storing it shown as an example, and other academic achievements can
to ledger. Finally the app will notify the instructor (8). be added with this evaluation system. Figure 3b shows the hash
(a) Credentials Front-view from Employers End (b) Credentials Record View in Blockchain
Fig. 3: System Output Template

of credential images that are stored in the BC ledger. As it is V. C ONCLUSION


immutable, nobody can fork the certificate’s information. If
off-chain storage compromises the security and changes the Credential fraud is far from being over. The combat meth-
certificate’s information, the hash stored in the Blockchain ods, especially in the paper model, proved to be quite inef-
ledger will be mismatched and denied the query result. fective. Digital degrees have grown due to digitization, but
they do not provide students with enough privacy to feel
A. Privacy and Security comfortable freely disseminating their credentials. Moreover,
The proposed system is designed to overcome the global the security mechanism of the storage of academic records is
credential verification and authentication, time-consuming and vulnerable nowadays. The disruptive technology of Blockchain
costly process. Furthermore, it ensures security requirements: allows for a breakthrough in distribution while also ensur-
integrity, confidentiality, authentication, access control, avail- ing that data is protected from tampering. Furthermore, the
ability, and non-repudiation. The following issues prove the technology’s anonymity level is achieved by recording only
effectiveness of the proposed system. the hash records on the Blockchain, making the solution less
• Data stored in the Blockchain cannot be modified once vulnerable to data leaking than digital certificate alternatives
registered due to its immutability. As a consequence, that do not use Blockchain. We have appropriately utilized
integrity is achieved while at the same time only core the blockchain technology during the development of this
sensitive information is saved on the chain. Academic application in which it was possible to operate issuance,
digitized documents are stored in off-chain encrypted storage, shares, and verification of academic credentials. The
with a secret key which protects intruders. Even if the proposed system allows to reliably store and secure access of
issuer and administrator are compromised, credential in- a third party to any academic record without compromising
formation cannot be changed as a Blockchain ledger. personal data privacy. On the other hand, the system layout,
• Information exchanges, like any other networked system, based on a set of Blockchain, enhances the performance and
must be done across secure channels. Therefore, the scalability of the system.
security of the Blockchain nodes and their interface with
educational institution access points must be securely ACKNOWLEDGEMENT
guarded.
Dr. Sujit Biswas is the corresponding authors of the paper.
• Only authorized third-party verifiers can access informa-
The work of Sujit Biswas was supported by Information and
tion to confirm or recover educational data, and every
Communication Technology Division, Ministry of Post and
operation is tamper-proof stored in the system to ensure
telecommunication, Bangladesh.
responsibility.
• Only recognized entities and organizations are allowed
to be part of the private Blockchain. However, every R EFERENCES
organization is allowed for transactions as a chain code [1] R. Mukta, J. Martens, H.-y. Paik, Q. Lu, and S. S. Kanhere, “Blockchain-
agreement. based verifiable credential sharing with selective disclosure,” in 2020
• Blockchain replicates information by design, and avail- IEEE 19th International Conference on Trust, Security and Privacy in
Computing and Communications (TrustCom), 2020, pp. 959–966.
ability is a fundamental element that overcomes the [2] hcondon, “The true cost of a paper-based document management pro-
single-point-failure issue. cess,” 2020, Accessed: 15 April’ 2021.
[3] Nitro, “7 facts that will make you rethink document
management,” Accessed: 15’July 2021. [Online]. Avail-
able: https://www.gonitro.com/blog/2015/05/7-facts-will-make-rethink-
document-management/
[4] S. Melo, “8 disadvantages of paper document management
system,” 2019. [Online]. Available: https://mydatascope.com/blog/en/8-
disadvantages-of-paper-document-management-system/
[5] G. Hollander, “[infographic] 18 startling in-
formation management statistics,” 2019. [Online].
Available: https://resources.m-files.com/blog/infographic-18-startling-
information-management-statistics-3
[6] “The paperless office and document management.” [Online]. Avail-
able: https://learn.ademero.com/infographic-paperless-office-document-
management-statistics/
[7] O. Ghazali and O. S. Saleh, “A graduation certificate verification model
via utilization of the blockchain technology,” Journal of Telecommuni-
cation, Electronic and Computer Engineering, vol. 10, pp. 29–34, 2018.
[8] S. Biswas, K. Sharif, F. Li, B. Nour, and Y. Wang, “A scalable blockchain
framework for secure transactions in iot,” IEEE Internet of Things
Journal, vol. 6, no. 3, pp. 4650–4659, 2019.
[9] “Openkm review.” [Online]. Available:
https://comparecamp.com/openkm-review-pricing-pros-cons-features/
[10] “Electronic document management system.” [Online]. Available:
https://www.logicaldoc.com/solutions/document-management
[11] J. Sanders, “Data breaches increased 54% in 2019 so far,” August 2019.
[Online]. Available: https://www.techrepublic.com/article/data-breaches-
increased-54-in-2019-so-far/
[12] J. Cheng, N. Lee, C. Chi, and Y. Chen, “Blockchain and smart contract
for digital certificate,” pp. 1046–1051, 2018.
[13] A. Gayathiri, J. Jayachitra, and S. Matilda, “Certificate validation using
blockchain,” pp. 1–4, 2020.
[14] S. Sunitha kumari and D. Saveetha, “Blockchain and smart contract for
digital document verification,” pp. 1–4, 2018.
[15] Y. Perwej, N. Akter, and F. Parwej, “A technological perspective of
blockchain security,” vol. 9, no. November, pp. 1–4, 2018.
[16] OECD, The Well-being of Nations, 2001. [Online]. Available:
https://www.oecd-ilibrary.org/content/publication/9789264189515-en
[17] S. Biswas, K. Sharif, F. Li, I. Alam, and S. Mohanty, “DAAC: Digital
asset access control in a unified blockchain based e-health system,” IEEE
Transactions on Big Data, pp. 1–1, 2020.

You might also like