Professional Documents
Culture Documents
1. a Blockchain Based Authentication System for Document Digitization in Flood Affected Areas-3
1. a Blockchain Based Authentication System for Document Digitization in Flood Affected Areas-3
• In response, this paper proposes a blockchain-based authentication system tailored for document digitization in flood-prone areas. By leveraging
blockchain technology, which offers decentralized, immutable, and tamper-resistant storage of data, the proposed system aims to provide a
secure and reliable method for digitizing and storing important documents.
• Through the use of cryptographic techniques and smart contracts, the system ensures the authenticity and integrity of digitized documents,
allowing individuals and authorities to verify their legitimacy easily.
• Moreover, the decentralized nature of blockchain facilitates access to documents even in the absence of centralized infrastructure, enhancing
disaster resilience and aiding in post-flood recovery efforts.
• This paper presents the design and implementation of the blockchain-based authentication system, highlighting its potential to mitigate the
challenges associated with document management in flood-affected areas and improve overall disaster preparedness and response capabilities.
Introduction
• The rapid advancement of information sharing and exchanging is driving more and more companies and individual users towards the use of
digitized documents.
• Moreover, the cumbersome and time-consuming use and validation process of traditional physical documents contribute to motivating people
• Though digital documents are undoubtedly convenient to use, proving the authenticity is often a matter of concern.
• Due to the technological revolution and ease of access to cheap and advanced equipment, the forgery of important documents has become quite
easy and made document authentication quite a tedious task. The implication arising from fake documents causes serious impacts and needs
urgent consideration.
• Therefore, a system to validate the authenticity of important documents would be greatly beneficial to users for maintaining their digital
documents.
• Current document verification process includes human interpretations and third-party observations. As already known, it is a very lengthy
process and also there is always a chance of mistakes and dishonesty. So, the current method of verification doesn’t seem reliable and efficient.
• An open-source, immutable, and consensus model called blockchain can be used to solve this problem.
Introduction…
• Floods are one of the most devastating natural disasters, causing widespread damage to infrastructure and affecting millions of people worldwide.
In flood-affected areas, vital documents such as identification papers, land titles, and medical records are often lost or damagedleading to
• Traditional paper-based document systems are vulnerable to destruction and loss during floods highlighting the need for secure and resilient digital
alternatives.
• Blockchain technology offers a decentralized and tamper-resistant solution for storing and authenticating digital documents making it ideal for use
in flood-prone regions.
• This project proposes a Blockchain-based authentication system designed specifically for document digitization in flood-affected areas. This
project aiming to ensure the integrity, accessibility, and security of critical documents during and after flood events.
Literature survey
1 Blockchain in Additive This research combines inductive in- Transperncy Loss of Access
Manufacturing and its Impact on depth interviews with the Delphi
Supply Chains method to explore what potentials
Chandru et al 2019 blockchain technology in AM
creates, which adoption barriers
firms need to overcome, and how
supply chains will be affected by the
integration of these two potentially
disruptive technologies.
2 Blockchain Based Reliability and The aggregated streamflow records Decentralization Legal Recognition
Availability Improvement for are stored on a streamflow ledger, a
Integrated Rivers’ Streamflow Hyperledger fabric-based ledger for
Data rivers’ streamflow data. In contrast,
Bajwa et al 2020 InterPlanery File System (IPFS)
distributed file storage system is
helpful for policy documents and
distribution scheme storage
Literature survey
5 Smart Flood Detection with AI and In this study, we propose a secure Global Accessibility Complexity
Blockchain Integration in Saudi method of flood detection in Saudi
Arabia Using Drones Arabia using a Flood Detection
Sanjay et al 2019 Secure System (FDSS) based on
deep active learning (DeepAL) based
classification model in federated
learning to minimize communication
costs and maximize global learning
accuracy.
Problem Statement
• The current document verification considers human interpretation and third-party observations.
• Once an area is affected by flood, the affected person should write a petition letter to corresponding government officials.
• Then the officials would verify the situation and the truthfulness behind the petition, either directly or through a third-party.
• It’s a long process which takes approximately a month for processing and handing-over to the user.
• There is always a chance of mistakes in documents and corruption in every step of processing, since the government officials can be easily
• To streamline and expedite the process of document verification, reducing the time and effort
required for authentication, especially during disaster recovery, insurance claims, and legal
proceedings.
Existing System
• Flash flooding is considered one of the most dynamic natural disasters for which measures need to be taken to minimize economic
damages, adverse effects, and consequences by mapping flood susceptibility. Identifying areas prone to flash flooding is a crucial step
in flash flood hazard management.
• In the existing study, the Kalvan watershed in Markazi Province, Iran, was chosen to evaluate the flash flood susceptibility modeling.
Thus, to detect flash flood-prone zones in this study area, five machine learning (ML) algorithms were tested. These included boosted
regression tree (BRT), random forest (RF), parallel random forest (PRF), regularized random forest (RRF), and extremely
randomized trees (ERT).
• Fifteen climatic and geo-environmental variables were used as inputs of the flash flood susceptibility models. The results showed that
ERT was the most optimal model with an area under curve (AUC) value of 0.82. The rest of the models’ AUC values, i.e., RRF, PRF,
RF, and BRT, were 0.80, 0.79, 0.78, and 0.75, respectively.
• In the ERT model, the areal coverage for very high to moderate flash flood susceptible area was 582.56 km2 (28.33%), and the rest of
the portion was associated with very low to low susceptibility zones.
Disadvantage
• Data Availability and Quality: The accuracy and reliability of flood susceptibility modeling heavily depend
on the quality and availability of input data.
• Model Complexity and Interpretability: Hybrid and ensemble tree-based machine learning algorithms,
while offering improved predictive performance, may also introduce complexities in model interpretation.
• Uncertainty and Risk Assessment: While susceptibility models provide valuable insights into areas prone to
flash floods, they inherently involve uncertainties.
Proposed System
• The proposed system of document verification allows the user to submit the digital documents to the authority for
• The submitted documents are recorded into the cloud server over block by block; each user request is created as a
• The Blockchain process usually follows two important things while processing, which are called as: Miner
• The Miner Requisition process is handled by the Volunteers, each and every person who want to associate
themselves with this application can enter their details with proper identity and submit those details to the
authority.
• The respective authority will check the details and provide the permission to the person to act as a
• The authority will check the document novelty based on the given volunteer no-objection certificate.
• If the number of volunteers specified in the threshold level crosses the approval, that particular claim
• The authorities have a permission to enhance or diminish the threshold level of the volunteers for the
• Utilizes blockchain technology to create a secure and immutable record of digitized documents.
• Provides cryptographic authentication, making it extremely difficult for unauthorized access or tampering.
• Streamlines document authentication processes by eliminating the need for manual verification.
Volunteer Volunteer
Registration Verification Accept/Reject
…
Prev. Hash + Content Prev. Hash + Content
Genesis Block
Block Hash Block Hash
Blockchain
Requirement Analysis
• React JS:
• React (also known as React.js or ReactJS) is a JavaScript library for building user interfaces.
• Node JS:
• Node.js is an open-source, cross-platform, JavaScript runtime environment that executes JavaScript
code outside of a browser.
• Node.js lets developers use JavaScript to write command line tools and for server-side scripting—
running scripts server-side to produce dynamic web page content before the page is sent to the user's
web browser.
• MySQL Database:
• MySQL is an open-source, widely used relational database management system (RDBMS).
• It is free and open-source and is ideal for both small and large applications.
Proposed Design
• Model: Blockchain
• Input:
• Output:
• Backend: MySQL
• Hardware Requirements:
• Minimum Ram: 4 GB
• Disk: 4 GB
• Accept/Reject volunteer
Admin registration and new claims
• Decentralized document
Block storage in blocks with unique
Chain hash
Advantages
• In the proposed model, corruption, document forgery and misuse will highly be reduced.
• There remains no central server to own the data rather all the information regarding any
transactions is distributed to the whole network.
• Verification result is always accurate and efficient and achieves both security enhancement and
time optimization.
Design Phase
Admin
User Volunteer
Project Design
Admin Module
• The admin check cautiously any documents submitted to them before closing a deal otherwise they will
• After each upload, the hash of the file is attached with the public key and the date of adding the document
• The admin will also receive an IPFS hash, which only they can see and share with a particular user for
• If the same file is added multiple times only the first user who added it, will be shown as result.
Volunteer Module
• Once the admin verified the identity of the volunteer, then they can view the document
authenticity and also be able to download the original file always for further checking to find any
fake document.
• Any user with less knowledge about blockchain, Ethereum will never face any problem using this
system.
UML Diagram
Raise Petition
Verify
Document
Receive IPFS
Hash
User
Register
Volunteerism
Admin
Verify
Volunteers
Authenticate
Documents Volunteer
Download
Documents
Result
• Using Smart contracts at the back-end linking with the blockchain and stored the encrypted has
value of individual documents which will be cross-checked against the given document. So, any
change in the actual document will change the corresponding hash also.
• If somebody tries to manipulate a document that document will never pass the verification test.
Thus, getting rid of the problem of fake documents.
References
1. I. T. Imam, Y. Arafat, K. S. Alam and S. A. Shahriyar, "DOC-BLOCK: A Blockchain Based
Authentication System for Digital Documents," 2021 Third International Conference on Intelligent
Communication Technologies and Virtual Mobile Networks (ICICV), Tirunelveli, India, 2021, pp.
1262-1267, doi: 10.1109/ICICV50876.2021.9388428.
3. S. Rouhani and R. Deters, “Security, Performance, and Applications of Smart Contracts: A Systematic
Survey,” in IEEE Access, vol. 7, pp.50759-50779, 2019.
References…