IPFS-Blockchain Smart Contracts Based Conceptual Framework to Reduce Certificate Frauds in the Academic Field
Abstract
:1. Introduction
1.1. Research Contributions
- Analyse several existing blockchain applications and their limitations, as described in the literature survey section.
- The paper presents a well-designed and implemented system that ensures the security of academic data on the blockchain by employing robust encryption techniques. Additionally, the system leverages the MetaMask extension for efficient storage and seamless execution of operations on the encrypted data.
- Perform a detailed security analysis of the proposed system so that it is highly secured against various potential attacks on the blockchain and encrypted data.
- Investigate the regulatory and legal implications of using blockchain technology for securing academic data, offering insights into compliance requirements and data privacy considerations.
- Discuss potential challenges and future directions in the adoption of blockchain-based solutions for academic data security, paving the way for further research and development in the field.
1.2. Road Map of the Paper
2. Related Work
3. Preliminaries
3.1. IPFS
3.2. MetaMask
3.3. System Model
4. Proposed Methodology
4.1. Admin and User
4.2. Encryption
Algorithm 1 Algorithm for Encryption |
Input: Original Message Output: Cipher Text 1: Read the original message as 2: Generate random keys, Tetrahedral-based Secret key, Pentatope-based Secret key, 3: For to do upto step 7. 4: Convert to the ASCII value of each character, 5: Perform Binomial Coefficient on ASCII of the original message. 6: Apply homomorphic operations on 7: Concatenate the result of homomorphic operations as shown below ) 8: The result is a Cipher Text . |
4.3. Blockchain
Algorithm 2 Algorithm for Admin/User enroll and creation of Block |
Input: Name, Password, Authority name, AD, CT, Eth_Bal Output: Unique ID to AU, CT, Block formation 1: Submit the details of AU to the System such as Name, Password, 2: 3: Verify the information IF(Integrity(App)==True) THEN Issue unique ID ELSE reject the request 4: IF Admin Submit the academic data (AD). 5: Check Eth_Bal IF Eth_Bal ≥ Threshold_value THEN a block (block[i]) is created ELSE no block is created. 6: Eth_Bal ← Eth_Bal − Threshold_value 7: Store data in the created new block block[i] ← BCT_ID/H(CT) IPFS ← CT |
Algorithm 3 Algorithm for ( ) and Certificate_Verify() |
Input: CP, CI, Date, RP, ID, Name Output: Certificate issued details 1: Validate the credentials provided by the admin IF (valid(credentials)==True && ) ) IF (valid(credentials)==True && ) Store the credentials in local database The procedure is carried out on the blockchain network. 2: Link up with MetaMask 3: If the MetaMask request is confirmed, If the connection has been made, proceed to Step 4; otherwise, the con nection is not set up. 4: IF THEN Set up the credentials on a blockchain. Distinct will be assigned to certificate ELSE Due to a lack of ETH balance, it is not possible to generate a BCT-based certificate 5: Decrypt the data retrieved from the IPFS with help of AD D(IPFS) 6: Fill out the Web-based application with ID, Name. 7: IF Certificate_Verify(ID is valid) THEN Successfully Verified ELSE Invalid Entry, deny the user’s request. |
4.4. Decryption
Algorithm 4 Algorithm for Decryption |
Input: Cipher Text Output: Original Message 1: Read the cipher text as CT. 2: Generate random keys, i.e., Tetrahedral-based Secret key, T→ (T, T, …, T) Pentatope-based Secret key, P→ (P, P, …, P) 3: For to do up to step 7 4: Extract the substring between f, r and r, f, i.e., E← CT[f : r] RE← CT[r : f] 5: Perform homomorphic operations HO: D← Mul(E, Ps) HO: S← Add(D, RE) 6: Apply Binomial Coefficient and convert it to the original message BO← S⊕ Ts C← Ori(BO) 7: Concatenate the result as shown below C← Concat(C) 8: The final result is the original message C. |
5. Security Analysis
6. Results and Analysis
Performance Analysis
- Transaction Throughput: The rate at which transactions are committed to the network during a given period of time is known as transaction throughput.
- Transaction Latency: It is the amount of time needed for the network to process and verify a transaction. It takes into account the time required for a transaction to be broadcast, included in a block, and approved by network users.
7. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Wu, G.; Wang, S.; Ning, Z.; Zhu, B. Privacy-Preserved Electronic Medical Record Exchanging and Sharing: A Blockchain-Based Smart Healthcare System. IEEE J. Biomed. Health Inform. 2022, 26, 1917–1927. [Google Scholar] [CrossRef] [PubMed]
- Qu, J. Blockchain in medical informatics. J. Ind. Inf. Integr. 2022, 29, 100258. [Google Scholar] [CrossRef]
- Liang, W.; Zhang, D.; Lei, X.; Tang, M.; Li, K.C.; Zomaya, A.Y. Circuit Copyright Blockchain: Blockchain-Based Homomorphic Encryption for IP Circuit Protection. IEEE Trans. Emerg. Top. Comput. 2021, 9, 1410–1420. [Google Scholar] [CrossRef]
- El Azzaoui, A.; Chen, H.; Kim, S.H.; Pan, Y.; Park, J.H. Blockchain-Based Distributed Information Hiding Framework for Data Privacy Preserving in Medical Supply Chain Systems. Sensors 2022, 22, 1371. [Google Scholar] [CrossRef] [PubMed]
- Gao, J.; Yu, H.; Zhu, X.; Li, X. Blockchain-Based Digital Rights Management Scheme via Multiauthority Ciphertext-Policy Attribute-Based Encryption and Proxy Re-Encryption. IEEE Syst. J. 2021, 15, 5233–5244. [Google Scholar] [CrossRef]
- Butt, G.Q.; Sayed, T.A.; Riaz, R.; Rizvi, S.S.; Paul, A. Secure Healthcare Record Sharing Mechanism with Blockchain. Appl. Sci. 2022, 12, 2307. [Google Scholar] [CrossRef]
- Liu, J.; Jiang, W.; Sun, R.; Bashir, A.K.; Alshehri, M.D.; Hua, Q.; Yu, K. Conditional Anonymous Remote Healthcare Data Sharing Over Blockchain. IEEE J. Biomed. Health Inform. 2023, 27, 2231–2242. [Google Scholar] [CrossRef]
- Zhang, S.; Liu, Y.; Han, Z.; Yang, Z. A Lightweight Authentication Protocol for UAVs Based on ECC Scheme. Drones 2023, 7, 315. [Google Scholar] [CrossRef]
- Nagasree, Y.; Rupa, C.; Akshitha, P.; Srivastava, G.; Gadekallu, T.R.; Lakshmanna, K. Preserving Privacy of Classified Authentic Satellite Lane Imagery Using Proxy Re-Encryption and UAV Technologies. Drones 2023, 7, 53. [Google Scholar] [CrossRef]
- Du, R.; Ma, C.; Li, M. Privacy-Preserving Searchable Encryption Scheme Based on Public and Private Blockchains. Tsinghua Sci. Technol. 2023, 28, 13–26. [Google Scholar] [CrossRef]
- Sun, Z.; Han, D.; Li, D.; Wang, X.; Chang, C.C.; Wu, Z. A blockchain-based secure storage scheme for medical information. J. Wirel. Commun. Netw. 2022, 2022, 40. [Google Scholar] [CrossRef]
- Wang, M.; Guo, Y.; Zhang, C.; Wang, C.; Huang, H.; Jia, X. MedShare: A Privacy-Preserving Medical Data Sharing System by Using Blockchain. IEEE Trans. Serv. Comput. 2023, 16, 438–451. [Google Scholar] [CrossRef]
- Kumar, R.; Kumar, J.; Khan, A.A.; Ali, H.; Bernard, C.M.; Khan, R.U.; Zeng, S. Blockchain and homomorphic encryption based privacy-preserving model aggregation for medical images. Comput. Med Imaging Graph. 2022, 102, 102139. [Google Scholar] [CrossRef] [PubMed]
- Rahman, M.M.; Tonmoy, M.T.K.; Shihab, S.R.; Farhana, R. Blockchain-Based Certificate Authentication System with Enabling Correction. J. Comput. Commun. 2023, 11, 73–82. [Google Scholar] [CrossRef]
- Ali, S.I.M.; Farouk, H.; Sharaf, H. A blockchain-based models for student information systems. Egypt. Inform. J. 2022, 23, 187–196. [Google Scholar] [CrossRef]
- Ullah, Z.; Raza, B.; Shah, H.; Khan, S.; Waheed, A. Towards Blockchain-Based Secure Storage and Trusted Data Sharing Scheme for IoT Environment. IEEE Access 2022, 10, 36978–36994. [Google Scholar] [CrossRef]
- Agyekum, K.O.B.O.; Xia, Q.; Sifah, E.B.; Cobblah, C.N.A.; Xia, H.; Gao, J. A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain. IEEE Syst. J. 2022, 16, 1685–1696. [Google Scholar] [CrossRef]
- Hao, X.; Ren, W.; Fei, Y.; Zhu, T.; Choo, K.K.R. A Blockchain-Based Cross-Domain and Autonomous Access Control Scheme for Internet of Things. IEEE Trans. Serv. Comput. 2023, 16, 773–786. [Google Scholar] [CrossRef]
- Mubashar, A.; Asghar, K.; Javed, A.R.; Rizwan, M.; Srivastava, G.; Gadekallu, T.R.; Wang, D.; Shabbir, M. Storage and proximity management for centralized personal health records using an ipfs-based optimization algorithm. J. Circuits Syst. Comput. 2022, 31, 2250010. [Google Scholar] [CrossRef]
- Rupa, C.; Chakkarvarthy, D.M. Web-Based Knowledge Management Distributed Application for Medical Certificates Using Blockchain Technology. In Knowledge Management and Web 3.0: Next Generation Business Models; Walter de Gruyter GmbH & Co. KG: Berlin, Germany, 2021; pp. 141–162. [Google Scholar]
- Gadekallu, T.R.; Manoj, M.K.; Kumar, N.; Hakak, S.; Bhattacharya, S. Blockchain-based attack detection on machine learning algorithms for IoT-based e-health applications. IEEE Internet Things Mag. 2021, 4, 30–33. [Google Scholar] [CrossRef]
- Xu, G.; Qi, C.; Dong, W.; Gong, L.; Liu, S.; Chen, S.; Liu, J.; Zheng, X. A Privacy-Preserving Medical Data Sharing Scheme Based on Blockchain. IEEE J. Biomed. Health Inform. 2023, 27, 698–709. [Google Scholar] [CrossRef]
- Sirajuddin, M.; Rupa, C.; Bhatia, S.; Thakur, R.N.; Mashat, A. Hybrid Cryptographic Scheme for Secure Communication in Mobile Ad Hoc Network-Based E-Healthcare System. Wirel. Commun. Mob. Comput. 2022, 2022, 9134036. [Google Scholar] [CrossRef]
- Lutfiani, N.; Apriani, D.; Nabila, E.A.; Juniar, H.L. Academic Certificate Fraud Detection System Framework Using Blockchain Technology. Blockchain Front. Technol. 2022, 2, 55–64. [Google Scholar] [CrossRef]
- Selvi, C.; Victor, N.; Chengoden, R.; Bhattacharya, S.; Maddikunta, P.K.R.; Lee, D.; Piran, M.J.; Khare, N.; Yendri, G.; Gadekallu, T.R.; et al. A Comprehensive Analysis of Blockchain Applications for Securing Computer Vision Systems. arXiv 2023, arXiv:2307.06659. [Google Scholar]
- Rupa, C.; Greeshmanth; Shah, M.A. Novel secure data protection scheme using Martino homomorphic encryption. J Cloud Comp. 2023, 47, 1–12. [Google Scholar] [CrossRef]
- Rupa, C.; MidhunChakkarvarthy, D.; Patan, R.; Prakash, A.B.; Pradeep, G.G. Knowledge engineering–based DApp using blockchain technology for protract medical certificates privacy. IET Commun. 2022, 16, 1853–1864. [Google Scholar] [CrossRef]
- Bhattacharya, S.; Victor, N.; Chengoden, R.; Ramalingam, M.; Selvi, G.C.; Maddikunta, P.K.R.; Donta, P.K.; Dustdar, S.; Jhaveri, R.H.; Gadekallu, T.R. Blockchain for internet of underwater things: State-of-the-art, applications, challenges, and future directions. Sustainability 2022, 14, 15659. [Google Scholar] [CrossRef]
- Chaganti, R.; Varadarajan, V.; Gorantla, V.S.; Gadekallu, T.R.; Ravi, V. Blockchain-Based Cloud-Enabled Security Monitoring Using Internet of Things in Smart Agriculture. Future Internet 2022, 14, 250. [Google Scholar] [CrossRef]
- Zhang, L.; Zhang, T.; Wu, Q.; Mu, Y.; Rezaeibagha, F. Secure Decentralized Attribute-Based Sharing of Personal Health Records with Blockchain. IEEE Internet Things J. 2022, 9, 12482–12496. [Google Scholar] [CrossRef]
- Jangirala, S.; Das, A.K.; Vasilakos, A.V. Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment. IEEE Trans. Ind. Inform. 2020, 16, 7081–7093. [Google Scholar] [CrossRef]
- Niu, S.; Chen, L.; Wang, J.; Yu, F. Electronic Health Record Sharing Scheme with Searchable Attribute-Based Encryption on Blockchain. IEEE Access 2020, 8, 7195–7204. [Google Scholar] [CrossRef]
- Jia, X.; Luo, M.; Wang, H.; Shen, J.; He, D. A Blockchain-Assisted Privacy-Aware Authentication Scheme for Internet of Medical Things. IEEE Internet Things J. 2022, 9, 21838–21850. [Google Scholar] [CrossRef]
- Ch, R.; Kumari, D.J.; Gadekallu, T.R.; Iwendi, C. Distributed-Ledger-Based Blockchain Technology for Reliable Electronic Voting System with Statistical Analysis. Electronics 2022, 22, 3308. [Google Scholar] [CrossRef]
- Ghazal, T.M.; Hasan, M.K.; Abdullah, S.N.H.S.; Bakar, K.A.A.; Al Hamadi, H. Private blockchain-based encryption framework using computational intelligence approach. Egypt. Inform. J. 2022, 23, 69–75. [Google Scholar] [CrossRef]
- Sultana, S.A.; Ch, R.; Malleswari, R.P. Keyless Lightweight Encipher using Homomorphic and Binomial Coefficients for Smart Computing Applications. In Proceedings of the International Conference on Vision Towards Emerging Trends in Communication and Networking Technologies (ViTECoN), Vellore, India, 5–6 May 2023; pp. 1–6. [Google Scholar] [CrossRef]
- Kiania, K.; Jameii, S.M.; Rahmani, A.M. Blockchain-based privacy and security preserving in electronic health: A systematic review. Multimed. Tools Appl. 2023, 82, 28493–28519. [Google Scholar] [CrossRef]
Author | Admin | BCT Type | Encryption | BCT Tool | Integrity Check | Application |
---|---|---|---|---|---|---|
Sun et al. [11] | Yes | Hyperledger | No | Not Specified | Yes | Health care information |
Wang et al. [12] | No | Not Specified | Yes | Ethereum | Yes | EHR data |
Zeng et al. [13] | No | Not Specified | Yes | Not Specified | No | Medical image data |
Rahman et al. [14] | Yes | Not Specified | No | Not Specified | Yes | Academic Certificates authentication |
Farouk et al. [15] | No | Not Specified | No | Not Specified | No | Student information system |
Ullah et al. [16] | No | Not Specified | Yes | Ethereum | Yes | IoT data |
Agyekum et al. [17] | No | Not Specified | Yes | Not Specified | No | IoT data |
Hao et al. [18] | No | Consortium | No | Not Specified | Yes | Access control for IoT devices |
Symbol | Description |
---|---|
BCT | Blockchain |
CT | Cipher Text |
C | Original Message |
Tetrahedral-based Secret key | |
Pentatope-based Secret key | |
ASCII value of the character | |
BO | Binomial Coefficient |
Homomorphic operation-1: Homomorphic division | |
Homomorphic operation-1: Homomorphic modulus | |
Homomorphic operation-3: Homomorphic multiplication | |
Homomorphic operation-4: Homomorphic addition | |
AU | Admin/User |
D() | Decryption |
H(CT) | Hash digest of the cipher text |
Applicant credentials | |
Ethereum Balance (ETH value) | |
CP | Certificate Type |
CI | Certificate Issuer |
RP | Certificate receiving Person |
AD | Academic Data |
E() | Encryption |
ID of the Encrypted data | |
ID | Admin/User id |
Transaction Throughput | |
Transaction Latency | |
Total no. of transactions | |
Total time in seconds | |
Time that the transaction’s block is added to the blockchain | |
Time that the transaction was started and sent to the network |
Actor | Operation | Description |
---|---|---|
Admin | Registration () | Each administrator must register with a distinct ID (ID). |
Issue certificate () | It requires user document IDs, the type of certificate, the certificate’s issuer, the date, and the recipient. | |
Certificate Details () | By using the user ID, the information from the blockchain provided by the relevant authority for the matching user certificate data is presented. | |
Verify Certificate() | When checking a certificate, the registration number and ID are required. | |
Authentication () | No admin can issue or get certificate details unless they are authorized. | |
User | Registration () | Every user should register using a special ID (ID). |
Verify Certificate () | To check the certificate, the registration number and ID must be present. | |
Authentication () | Unless they are authorized, no user is ever able to obtain certificate details. |
Security Property | [23] | [24] | [25] | Proposed System |
---|---|---|---|---|
Known Plain Text Attacks | ✓ | ✓ | ✓ | ✓ |
Cipher-text only analysis Attacks | ✓ | ✗ | ✓ | ✓ |
Brute Force Attacks | ✗ | ✓ | ✓ | ✓ |
Chosen ciphertext Attack | ✓ | ✗ | ✓ | ✓ |
51% Attack | ✓ | ✓ | ✗ | ✓ |
Eclipse Attack | ✓ | ✗ | ✓ | ✓ |
Sybil Attack | ✗ |
Function Name | Nonce | Gas Limit (Units) | Gas Used (Units) | Gas Price | Transaction Hash |
---|---|---|---|---|---|
Issue() | 8 | 239,653 | 159,769 | 20 | 0x0219261e01550957dd8baa8527790c a1f8526fda956d93ce6f229f90bcf114B9 |
Verify() | 4 | 239,653 | 256,962 | 24 | 0x7dE16Fb7f44E2715c614C15B9aB6 2b6a4184aa84c007763213d3141913Dc |
Revoke() | 5 | 239,653 | 195,774 | 18 | 0x1201c0b33b37b034ec879d21648952 d0f14a01205e3f83b19e6c8334cc245d5 |
View() | 7 | 239,653 | 137,924 | 14 | 0x5c895c20880c429595ef922b23bd52 94a43aec1833584712658751152D5431 |
No of Certificates | Encryption Time (ms) | BCT Storage Time (ms) |
---|---|---|
2 | 0.00078 | 0.00023 |
9 | 0.0019 | 0.00098 |
15 | 0.006 | 0.0021 |
25 | 0.013 | 0.0086 |
37 | 0.056 | 0.027 |
50 | 0.12 | 0.098 |
No of Certificates | Total ETH Value |
---|---|
1 | 0.01124786 |
5 | 1.25874638 |
10 | 3.58746931 |
15 | 5.18796248 |
20 | 7.15298648 |
25 | 12.2580136 |
No. of Transactions | Throughput | Max Latency (s) | Min Latency (s) | Avg Latency (s) |
---|---|---|---|---|
10 | 3.4 | 42.16 | 0.12 | 21.14 |
20 | 4.6 | 54.31 | 0.18 | 27.25 |
30 | 3.7 | 72.49 | 0.13 | 36.31 |
40 | 5.1 | 104.57 | 0.15 | 52.36 |
50 | 4.2 | 112.78 | 0.17 | 56.48 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sultana, S.A.; Rupa, C.; Malleswari, R.P.; Gadekallu, T.R. IPFS-Blockchain Smart Contracts Based Conceptual Framework to Reduce Certificate Frauds in the Academic Field. Information 2023, 14, 446. https://doi.org/10.3390/info14080446
Sultana SA, Rupa C, Malleswari RP, Gadekallu TR. IPFS-Blockchain Smart Contracts Based Conceptual Framework to Reduce Certificate Frauds in the Academic Field. Information. 2023; 14(8):446. https://doi.org/10.3390/info14080446
Chicago/Turabian StyleSultana, Shaik Arshiya, Chiramdasu Rupa, Ramanadham Pavana Malleswari, and Thippa Reddy Gadekallu. 2023. "IPFS-Blockchain Smart Contracts Based Conceptual Framework to Reduce Certificate Frauds in the Academic Field" Information 14, no. 8: 446. https://doi.org/10.3390/info14080446
APA StyleSultana, S. A., Rupa, C., Malleswari, R. P., & Gadekallu, T. R. (2023). IPFS-Blockchain Smart Contracts Based Conceptual Framework to Reduce Certificate Frauds in the Academic Field. Information, 14(8), 446. https://doi.org/10.3390/info14080446