RSETP: A Reliable Security Education and Training Platform Based on the Alliance Blockchain
Abstract
:1. Introduction
1.1. Background
1.2. Related Works
- By combining web applications and blockchain, a highly available education and training platform, based on alliance blockchain, is built to meet the needs of educational scenarios. This effectively realizes the information exchange between education departments, training institutions, human resource centers, and other nodes on the chain and improves data security and traceability. Reasonably use the advantages of PostgreSQL, MySQL, and Redis storage components to realize the optimal “on-chain and off-chain” information storage methods.
- Realize the joint management of private data and access control policies, ensure the legality of data access in the alliance, and prevent unauthorized access. Additionally, through the development of reasonable smart contracts, the credibility and reliability of the system can be improved.
- Through comparative experiments, the network configuration and transaction scale on the chain are adjusted, and the load balancing of the chain agents is realized, which greatly improves the performance of the system.
2. Preliminary
2.1. Blockchain Technology
2.2. Public Chain and Private Chain
3. The Proposed Platform
3.1. Platform Architecture
3.2. Platform Solution
- Education and Training Institutions(ETI): As an important platform and driving force for adult education, it ensures high-quality training for students. In order to prevent insufficient qualifications and false propaganda about education and training institutions, educational institutions need to apply for registration with the local education bureau and can only join the alliance chain after approval. Students can study at this educational institution and obtain corresponding training results and certificates.
- Local Education Bureau (LEB): Focus on filing information on training institutions and teachers, including basic information, working experience, educational background, and whether they have teacher qualifications. Training institutions are required to strengthen their own platform management. If personnel engaged in training activities in training institutions violate laws and regulations, the violations will be recorded.
- Local Human Resource Center (LHRC): The trainees’ information, including basic information and educational background, is filed at the LHRC. When the employer hires the trainee, the trainee’s training information and process can be clearly questioned. The trainee’s training record can be queried by accessing the alliance network, and the illegal or falsified results can be traced back to ensure the fairness of each trainee’s education and training.
- Student (S): Students who want to join the education alliance training institution need to provide their own basic information. After passing the certification process for educational institutions, they can enter the institution for training. The trainee’s information is stored on the blockchain.
- C-level Teacher (CT): Each institution has different levels of training teachers, and each teacher needs to be certified by ETI and LEB. After confirming the corresponding training qualifications, he can join the network for teaching and assessing students. The CT will judge the day’s performance based on each student’s daily performance and upload the daily training situation to the alliance network for storage.
- B-level Teacher (BT): Score each student’s one-week training situation, and after confirming that it is correct, upload the information to the alliance network for storage.
- A-level Teacher (AT): Refer to each trainee’s one-month comprehensive training situation to score the trainee. After the training is over, it will be decided, according to the trainee’s performance during the whole training period, whether the trainee can get the certificate of passing the training, and the trainee who does not meet the graduation standard will not be awarded a graduation certificate.
- Step 1.
- This step will register each role in the blockchain network. All participants in the system need to register on the network and record their identity information. The network will provide each participant with a unique identity. Before each transaction, the identity information of both parties needs to be verified. Only after the identity information has been correctly verified can the transactions and information exchange in the network continue.
- Step 2.
- When a student signs up for training at an educational institution, the corresponding institution will record basic information, such as the student’s identity information, training courses, and time. After the information is confirmed to be correct, all information will be uploaded to the blockchain network through the designated ordering node for storage.
- Step 3.
- After the training every day, the CT will evaluate the performance of all the students on the day, according to the pre-established assessment standards and upload the evaluation information for each S to the blockchain network. The corresponding contract will automatically detect the evaluation information, and the information of an authentication failure will not be recorded in the blockchain network. for example, if the assessment score exceeds the maximum standard score. After confirming that the information is correct, the ledger will be updated.
- Step 4.
- The BT judges the weekly results of the students, scores them weekly, and uploads them to the blockchain network. In order to execute the smart contract corresponding to the weekly assessment, and after confirming that the information is correct, it will be uploaded to the blockchain network for storage.
- Step 5.
- The AT will give students a monthly score after the monthly training. The AT will carry out the final assessment and certification of each S after all the training courses are over. Whether the S has passed the education and training, based on his or her performance throughout the entire training period, is determined. All data will be operated at various stages in the chain, and the integrity of the data will be guaranteed.
- Step 6.
- As an authoritative third party, the local education bureau needs to authenticate and record various information about the teachers in the education alliance institution. Only teachers who meet the teaching conditions can serve in the institution and assess the students to ensure the teaching quality of the teachers. The local human resources center mainly records the training situation of the training and assessment personnel. According to actual needs, managers can trace the specified training records in the alliance network to check whether the assessment records for each S are accurate. By viewing the signature information of each administrator, the legitimacy and validity of the assessment information can be verified. Once the assessment information is untrue and the student’s grades are unqualified, etc., the assessment teacher can be traced back according to the transaction records.
3.3. Ledger Design
4. System Implementation
4.1. Configuration
4.2. Implementation
- (a)
- Registration contracts
Algorithm 1: Institution Registration. |
Algorithm 2: Student Registration. |
- (b)
- Transaction contracts
Algorithm 3: Student Assessment Function. |
Algorithm 4: Obtain student training records. |
4.3. Application User Interface
- (a)
- Student information management interface
- (b)
- Daily, weekly, and monthly points assessment interface
- (c)
- Blockchain operation monitoring comprehensive platform interface
5. Performance Testing
5.1. Response Time Test
5.2. Data Access Controllability RSETP
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Alammary, A.; Alhazmi, S.; Almasri, M.; Gillani, S. Blockchain-based applications in education: A systematic review. Appl. Sci. 2019, 9, 2400. [Google Scholar] [CrossRef] [Green Version]
- Li, Z.Z.; Joseph, K.L.; Yu, J.; Gasevic, D. Blockchain-based solutions for education credentialing system: Comparison and implications for future development. In Proceedings of the 2022 IEEE International Conference on Blockchain (Blockchain), Espoo, Finland, 22–25 August 2022; pp. 79–86. [Google Scholar]
- The Ministry of Education Has Surveyed 82,246 Training Institutions Across the Country. Available online: https://t.ynet.cn/baijia/32779121.html (accessed on 17 May 2022).
- Zhang, X.; Chen, X. Data security sharing and storage based on a consortium blockchain in a vehicular ad-hoc network. IEEE Access 2019, 7, 58241–58254. [Google Scholar] [CrossRef]
- Taylor, P.; Dargahi, T.; Dehghantanha, A.; Parizi, R.; Choo, K.-K.R. A systematic literature review of blockchain cyber security. Digit. Commun. Netw. 2020, 6, 147–156. [Google Scholar] [CrossRef]
- Tanwar, S.; Parekh, K.; Evans, R. Blockchain-based electronic healthcare record system for healthcare 4.0 applications. J. Inf. Secur. Appl. 2020, 50, 102407. [Google Scholar] [CrossRef]
- Vasishta, M.V.A.; Palanisamy, B.; Sural, S. Decentralized Authorization using Hyperledger Fabric. In Proceedings of the 2022 IEEE International Conference on Blockchain (Blockchain), Espoo, Finland, 22–25 August 2022; pp. 238–243. [Google Scholar]
- Nabben, K. Blockchain security as “people security”: Applying sociotechnical security to blockchain technology. In Principles and Practice of Blockchains; Springer: Berlin/Heidelberg, Germany, 2023; pp. 367–392. [Google Scholar]
- Mohanta, B.; Jena, D.; Panda, S.S.; Sobhanayak, S. Blockchain technology: A survey on applications and security privacy challenges. Internet Things 2019, 8, 100107. [Google Scholar] [CrossRef]
- Kochovski, P.; Gec, S.; Stankovski, V.; Bajec, M.; Drobintsev, P.D. Trust management in a blockchain based fog computing platform with trustless smart oracles. Future Gener. Comput. Syst. 2019, 101, 747–759. [Google Scholar] [CrossRef] [Green Version]
- Ichikawa, D.; Kashiyama, M.; Ueno, T. Tamper-resistant mobile health using blockchain technology. JMIR mHealth uHealth 2017, 5, e7938. [Google Scholar] [CrossRef] [Green Version]
- Hughes, L.; Dwivedi, Y.K.; Misra, S.K.; Rana, N.P.; Raghavan, V.; Akella, V. Blockchain research, practice and policy: Applications, benefits, limitations, emerging research themes and research agenda. Int. J. Inf. Manag. 2019, 49, 114–129. [Google Scholar] [CrossRef]
- Zhou, P.; Du, Y.; Li, B.; Li, Y.; Li, S.; Ji, Z.; Su, X.; Yu, W.; Chen, J.; Tang, X.; et al. China blockchain technology and application development white paper. In Proceedings of the China Blockchain Technology and Application Forum, Beijing, China, 18 October 2016. [Google Scholar]
- Bhaskar, P.; Tiwari, C.K.; Joshi, A. Blockchain in education management: Present and future applications. Interact. Technol. Smart Educ. 2020, 18, 1–17. [Google Scholar] [CrossRef]
- Guo, J.; Li, C.; Zhang, G.; Sun, Y.; Bie, R. Blockchain-enabled digital rights management for multimedia resources of online education. Multimed. Tools Appl. 2020, 79, 9735–9755. [Google Scholar] [CrossRef]
- Zhang, L.; Ma, Z.; Ji, X.; Wang, C. Blockchain: Application in the System of Teaching Informatization Management of Higher Education. In Proceedings of the 2020 3rd International Conference on Smart BlockChain (SmartBlock), Zhengzhou, China, 23–25 October 2020; pp. 185–190. [Google Scholar]
- Turkanović, M.; Hölbl, M.; Košič, K.; Heričko, M.; Kamišalić, A. EduCTX: A blockchain-based higher education credit platform. IEEE Access 2018, 6, 5112–5127. [Google Scholar] [CrossRef]
- Li, Z.; Gao, S.; Peng, Z.; Guo, S.; Yang, Y.; Xiao, B. B-DNS: A secure and efficient DNS based on the blockchain technology. IEEE Trans. Netw. Sci. Eng. 2021, 8, 1674–1686. [Google Scholar] [CrossRef]
- Gao, S.; Peng, Z.; Tan, F.; Zheng, Y.; Xiao, B. SymmeProof: Compact zero-knowledge argument for blockchain confidential transactions. IEEE Trans. Dependable Secur. Comput. 2022. [Google Scholar] [CrossRef]
- Peng, Z.; Xu, J.; Hu, H.; Chen, L.; Kong, H. BlockShare: A Blockchain empowered system for privacy-preserving verifiable data sharing. Bull. IEEE Comput. Soc. Tech. Comm. Data Eng. 2022, 1, 14–24. [Google Scholar]
- Wang, H.; Xu, C.; Zhang, C.; Xu, J.; Peng, Z.; Pei, J. vChain+: Optimizing verifiable blockchain boolean range queries. In Proceedings of the 2022 IEEE 38th International Conference on Data Engineering (ICDE), Kuala Lumpur, Malaysia, 9–12 May 2022; pp. 1927–1940. [Google Scholar]
- Peng, Z.; Zhang, Y.; Xu, Q.; Liu, H.; Gao, Y.; Li, X.; Yu, G. NeuChain: A fast permissioned blockchain system with deterministic ordering. Proc. VLDB Endow. 2022, 15, 2585–2598. [Google Scholar] [CrossRef]
- Ozili, P.K. Blockchain finance: Questions regulators ask. In Disruptive Innovation in Business and Finance in the Digital World; Emerald Publishing Limited: Bingley, UK, 2019. [Google Scholar]
- Truong, N.B.; Sun, K.; Lee, G.M.; Guo, Y. Gdpr-compliant personal data management: A blockchain-based solution. IEEE Trans. Inf. Forensics Secur. 2019, 15, 1746–1761. [Google Scholar] [CrossRef] [Green Version]
- Kaufman, M.; Heister, S.; Yuthas, K. Consortium Capabilities for Enterprise Blockchain Success. J. Br. Blockchain Assoc. 2021, 27744. [Google Scholar] [CrossRef]
- Yang, D.; Long, C.; Xu, H.; Peng, S. A review on scalability of blockchain. In Proceedings of the 2020 The 2nd International Conference on Blockchain Technology, Hilo, HI, USA, 12–14 March 2020; pp. 1–6. [Google Scholar]
- Walsh, C.; O’Reilly, P.; Gleasure, R.; McAvoy, J.; O’Leary, K. Understanding manager resistance to blockchain systems. Eur. Manag. J. 2021, 39, 353–365. [Google Scholar] [CrossRef]
- Peng, Z.; Xu, J.; Chu, X.; Gao, S.; Yao, Y.; Gu, R.; Tang, Y. Vfchain: Enabling verifiable and auditable federated learning via blockchain systems. IEEE Trans. Netw. Sci. Eng. 2021, 9, 173–186. [Google Scholar] [CrossRef]
- Wu, H.; Peng, Z.; Guo, S.; Yang, Y.; Xiao, B. VQL: Efficient and verifiable cloud query services for blockchain systems. IEEE Trans. Parallel Distrib. Syst. 2021, 33, 1393–1406. [Google Scholar] [CrossRef]
- Dinh, T.T.A.; Wang, J.; Chen, G.; Liu, R.; Ooi, B.C.; Tan, K.L. Blockbench: A framework for analyzing private blockchains. In Proceedings of the 2017 ACM International Conference on Management of Data, Chicago, IL, USA, 14–19 May 2017; pp. 1085–1100. [Google Scholar]
- Yang, R.; Wakefield, R.; Lyu, S.; Jayasuriya, S.; Han, F.; Yi, X.; Yang, X.; Amarasinghe, G.; Chen, S. Public and private blockchain in construction business process and information integration. Autom. Constr. 2020, 118, 103276. [Google Scholar] [CrossRef]
- Aswin, A.; Kuriakose, B. An Analogical Study of Hyperledger Fabric and Ethereum. In Intelligent Communication Technologies and Virtual Mobile Networks; Springer: Berlin/Heidelberg, Germany, 2019; pp. 412–420. [Google Scholar]
- Nasir, Q.; Qasse, I.; Talib, M.A.; Nassif, A. Performance analysis of Hyperledger Fabric platforms. Secur. Commun. Netw. 2018, 2018, 3976093. [Google Scholar] [CrossRef] [Green Version]
- Alexandridis, A.; Al-Sumaidaee, G.; Alkhudary, R.; Zilic, Z. Making Case for Using RAFT in Healthcare Through Hyperledger Fabric. In Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), Orlando, FL, USA, 15–18 December 2021; pp. 2185–2191. [Google Scholar]
- Hu, J.; Liu, K. Raft consensus mechanism and the applications. J. Phys. Conf. Ser. 2020, 1544, 012079. [Google Scholar] [CrossRef]
- Fan, K.; Wang, S.; Ren, Y.; Li, H.; Yang, Y. Medblock: Efficient and secure medical data sharing via blockchain. J. Med. Syst. 2018, 42, 1–11. [Google Scholar] [CrossRef]
- Kabra, N.; Bhattacharya, P.; Tanwar, S.; Tyagi, S. MudraChain: Blockchain-based framework for automated cheque clearance in financial institutions. Future Gener. Comput. Syst. 2020, 102, 574–587. [Google Scholar] [CrossRef]
- Babu, E.S.; Rao, M.S.; Naganjaneyulu, S.; Sai, M.S.S.; Ganiya, R.K. Secure exchange and effectual verification of educational academic records using hyperledger fabric block chain system. Int. J. Ad Hoc Ubiquitous Comput. 2022, 40, 194–213. [Google Scholar] [CrossRef]
- Wang, S. Performance evaluation of hyperledger fabric with malicious behavior. In Blockchain–ICBC 2019: Second International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, 25–30 June 2019, Proceedings 2; Springer: Berlin/Heidelberg, Germany, 2019; pp. 211–219. [Google Scholar]
- Fu, W.; Wei, X.; Tong, S. An improved blockchain consensus algorithm based on raft. Arab. J. Sci. Eng. 2021, 46, 8137–8149. [Google Scholar] [CrossRef]
- Wang, C.; Chu, X. Performance characterization and bottleneck analysis of hyperledger fabric. In Proceedings of the 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS), Singapore, 29 November–1 December 2020; pp. 1281–1286. [Google Scholar]
Type | Description |
---|---|
Hyperledger fabric | • The most active Hyperledger application project |
• An architecture that provides MSP-based access control and forms transaction blocks through a consensus mechanism | |
Hyperledger sawtooth | • Access to non-permissioned networks is supported |
• Based on the Secure Guard Extension algorithm, it is more suitable for developing decentralized applications | |
Hyperledger iroha | • The project is consensused by block hash voting |
• The project mainly provides basic services for Android, iOS, and other mobile network environments | |
Hyperledger indy | • The project is led by the Sovrin organization |
• Provide digital identity in the Internet without intermediaries |
Configuration | Parameter |
---|---|
Operating System | Ubuntu 18.04 |
Number of Processors | 6 |
CPU | 3.10 GHz |
RAM | 8 GB |
Storage | 60 GB |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Chen, R.; Wu, X.; Liu, X. RSETP: A Reliable Security Education and Training Platform Based on the Alliance Blockchain. Electronics 2023, 12, 1427. https://doi.org/10.3390/electronics12061427
Chen R, Wu X, Liu X. RSETP: A Reliable Security Education and Training Platform Based on the Alliance Blockchain. Electronics. 2023; 12(6):1427. https://doi.org/10.3390/electronics12061427
Chicago/Turabian StyleChen, Ran, Xiaoming Wu, and Xiangzhi Liu. 2023. "RSETP: A Reliable Security Education and Training Platform Based on the Alliance Blockchain" Electronics 12, no. 6: 1427. https://doi.org/10.3390/electronics12061427
APA StyleChen, R., Wu, X., & Liu, X. (2023). RSETP: A Reliable Security Education and Training Platform Based on the Alliance Blockchain. Electronics, 12(6), 1427. https://doi.org/10.3390/electronics12061427