SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1235
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEM
, ,
, Dr Ambedkar Institute of Technology Bengaluru-56
--------------------------------------------------------------------***---------------------------------------------------------------------
Abstract: In order to create a chronological single-
source-of-truth for the data, a blockchain is a database
that stores encrypted chunks of data before chaining them
together. Instead of being copied or moved, digital assets
are distributed, resulting in an immutable record of the
asset. Due to the asset's decentralised nature, the public
has complete real-time access and transparency. The
public ledger and built-in security features of blockchain
make it a top solution for practically every industry. Thus,
in this paper we try to implement blockchain system to
select an IDE Subject (INTER-DEPARTMENT ELECTIVE)
which makes sure that the data isn’t tampered through
external source and the information is stored securely and
is transparent to the college authorities and students.
Keywords—Block-chain, Database, Encrypted, Digital
assets, Data Storage, Security, Immutable, Transparency,
IDE (Inter-department elective)
1.INTRODUCTION
Blockchain [1] is a constantly growing set of data with
certain records in it called blocks, it is a particularly
encouraging and progressive innovation since it lessens
risk, gets rid of extortion and acquires straight
forwardness. They are secured and linked together using
cryptographic methods. Here we developed a program
that simulates a real time block chain technology
blockchain for choice of IDE (INTER-DEPARTMENT
ELECTIVE), which ensure that the chosen IDE (INTER-
DEPARTMENT ELECTIVE) can't be changed by any
outside source and it is likewise straightforward to
people in general. A block of data it consists of data of
students such as the name, the college seat number and
the subject selected .The Blocks containing these data
are then encrypted [1] ,it’s a way when normal readable
text is converted into unreadable text so that it cannot be
accessed and changed, the encryption works in such a
way that if any word or spacing or caps is changed in the
original text the encryption text gets changed .The
encryption text is irreversible so the original text cannot
be retrieved .The entire project is bound by using python
and flask framework that helps us to host the website, to
make entries these entries are then passed on to the
databases these databases are distributed in nature
which is the core concept of block chain. Any changes in
any one of the database the data in other databases will
not be changed unless the third person changes the data
in all the database that make up more than 51% .
2.BACKGROUND
A blockchain [2] is an very advanced technology for
safety and security of data. Every time a certain
the exchange is done on the network, a record
of this exchange is added to the registration of each
member. Every exchange on the blockchain is
represented by a square in the chain, and each time an
exchange takes place, a record of that exchange is added
to the record of every member. Ethereum the second
biggest blockchain execution after bitcoin. Ethereum
disperses a money called ether, yet additionally
considers the capacity and activity of PC code, taking into
account brilliant agreements. Starting around 2008
square chain has been seeing persistent development in
all fields.
3.LITERATURE SURVEY
There are several distinct financial advantages of
blockchain development [3]. The producers begin by
utilising, for instance, a bank and all of the resources that
are essentially squandered given that they handle and
address all transactions themselves. With the use of this
new record, the bank would be able to maintain safer
records that are less likely to be tampered with and gain
a more accurate understanding of prospective
opportunities.
For security purpose, Tranquillini examines recent
concerns with the prosperity and adequacy of European
financial business sectors and government control [7]. In
light of everything, he avoids a particular end and
resolves that execution of such development would be
inconvenient, most ideal situation, and that it will not
happen as soon as possible.
In food security, researchers from Montana school figure
out a couple of creating examples to address the need
and potential for blockchain progresses for food security
[7]. The major question in this issue is recognizability of
food things, from their sources, on all through their
dissemination frameworks, and on to their last client.
This could assist with hindering blackmail and deflect -
,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1236
or on the other hand if nothing else address issues of
food borne ailment.
In Product Traceability, Tranquillini examines recent
concerns with the prosperity and adequacy of European
financial business sectors and government control [8].
His article serves more as a source for his insightful
considerations on the capacity of the utilization of such
advancement to the protections business. In light of
everything, he avoids a particular end and resolves that
execution of such development would be inconvenient,
most ideal situation, and that it will not happen at
whatever point as soon as possible.
4.PROPOSED WORK
Proposed a system that uses the blockchain core basics
such as distributed database, immutable, Better Security
by storing data in encrypted format with the encryption
of the previous block[5].
Here the main approach was to create a distributed
database, the creation of distributed database was done
my initialize multiple database instances in various
systems that was connected with our main program, an
exact copy of the data from our program is sent to all the
databases, the main data base used here is the MySQL
database that stores data in a relational table, and a copy
of a data is also sent to cloud database Firebase for
added security.
Here the front end is controlled by the flask Framework
to host the website on the person server which is a
raspberry pi 4
Back end is programmed with python that handles all
the requests and the API calls to all the software and also
the encryption of the data.
The encryption method used here is SHA256 .
The distributed database is created by using multiple
cloud server instances and local machine to host the
database.
For the local machine database MySQL database the
community version is used. Here the data is stored as
records and in a table format. The data stored here will
be the Student name, student college seat number, the
subject selection. These data will not only be stored in
one database but in different MySQL instance running in
the different local host. In this project we had three
MySQL instances running. Thus there were three copies
of the same data at three different location.
As python was used to communicate with the databases.
The connection was made:-
Fig 1:- Flowchart for credentials
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1237
Fig 2:- flow chart of the entire program
The data was sent or written into the database my pre-
defining the SQL query with variables that would be
entered by the Student
For the database instance in the cloud FireBase Realtime
Database was used, The Firebase Realtime Database is a
database stored in the cloud. Every connected client
receives real-time synchronisation of data saved as JSON.
to develop cross-platform applications.
The Firebase Realtime Database enables safe access to
the database from client-side code, enabling you to
create robust, collaborative apps. The end user has a
responsive experience because to local data persistence
and real-time events that continue to happen even while
the system is offline. The local data is updated when the
device regains connectivity with the distant updates that
took place while the client was offline.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1238
Fig 3:- block diagram of the working process
Thus totally four duplicate copies were getting saved in
four different location which eliminated the centralized
structure database.
Each copy the same data with the same capitalization
and the encryption method.
Our website was developed using HTML, CSS that is used
for the user/student to interact. It consists of the basic
login page for the different authorities of the college and
the student authentication. the information provided in
the front end is then feed into the backend python
program to create the block and also feed the block data
in the database
The entire project is bound by the python code. It helps
in sending and receiving data and also the check the
integrity of the blocks, for any change in data.
The code takes in the values of the student and the
encrypted value of the previous block and forms a
dictionary which is a JSON type format and encrypts the
data using SHA256 algorithm.
When a block is created the data of the block is
encrypted and then the encrypted text is then stored in
the block.
When the next new block is created it consists the
encryption text of the previous block and the data of its
block it encrypts the data with the encryption text of the
previous block .
When a new block is created it checks the integrity of the
other blocks like if any data has been changed and
reports the change in data.
The integrity check is done by taking the human
readable data and the entire data is encrypted and
checked with the encrypted text inside the block that has
the encryption of the block thus this two must match to
show that the block is not tampered. For the next block it
takes the data of the previous block and the data of the
current block and encrypts the data and then checks the
encryption text with that stored inside the block.
Hashing the process to convert normal plain text to non
readable text which cannot be reversible it is similar to
encryption but in encryption the text can be reversed
with a key here in hashing it cannot be reversed.
Thus when storing data we use hasing so when an
unauthorized person gets access to the code he cannot
reverse the string. even a slight change in the plain text
will create an exponetial change in the hashed texted
we use the sha256 algorithm to hash the entire block.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1239
Fig 4 :- Block creation
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1240
Result:
The developed safe and secure database of
student ledger showed promising results by using the
blockchain technology. Since the existing way of
recording the student academic detail of the number of
subjects taken by the student and the difficulty in
segregating the repeated subjects, the blockchain
technology will eliminate the entire difficulty since it
uses the technology of hashing which enables the portal
to give students a different subject apart from the
subjects already finished.
There are 3 different types of logins namely hod login
student login and the admin login
The student login is only for the students where they will
have to login with their respective email ids and
password which will take them to their home page which
displays the name of the student semester of the student
and the university seat number of the student and all the
subjects the student has already studied in the previous
semester and the option to select the available subjects.
Upon selecting the subject, a new block will be generated
connecting to the hash of the previous block and records
the data in the decentralized database which is now
permanent and cannot be altered.
The hod login is primarily to monitor the student’s
history of the subjects taken and to assign the teachers
for a particular class from the student’s response to a
specified course. The hod (head of the department) will
be given the privileges to check how many have opted
for each individual subject or course.
The hods are given a login id and password with which
they can login to the document and download the
required documents
The admin section is to control, monitor and maintain
the entire process without anyone facing issues
regarding the selection process and to keep track of the
entire process of subject selection. The admin will have
the complete control on the entire network and can
resolve the issues faced by the students or the professors
or the head of the departments.
REFERENCES
[1] Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H.
(2017). An Overview of Blockchain Technology:
Architecture, Consensus, and Future Trends.
2017 IEEE International Congress on Big Data
(BigData Congress).
[2] Ahram, T., Sargolzaei, A., Sargolzaei, S., Daniels,
J., & Amaba, B. (2017). Blockchain technology
innovations. 2017 IEEE Technology &
Engineering Management Conference
(TEMSCON)
[3] S K, V., R S, Y., Prashanth, Y., N, Y., & M, N. (2020).
E-Voting Systems using Blockchain: An
Exploratory Literature Survey. 2020 Second
International Conference on Inventive Research
in Computing Applications (ICIRCA).
[4] Hjalmarsson, F. P., Hreioarsson, G. K., Hamdaqa,
M., & Hjalmtysson, G. (2018). Blockchain-Based
E-Voting System. 2018 IEEE 11th International
Conference on Cloud Computing (CLOUD).
[5] Sachchidanand Singh IBM Software Lab Pune,
India - 411 057. Nirmala Singh Tech Mahindra
Pune, India - 411 057.
[6] D Sathya1 , S Nithyaroopa2 , D Jagadeesan3 , I
Jeena Jacob4 1 Assistant Professor II, Dept. of
CSE, Kumaraguru College of Technology,
Coimbatore 2 Assistant Professor, Dept. of CSE,
Kumaraguru College of Technology, Coimbatore
3 Assistant Professor, Department of
Management Studies, Rathinam College of Arts
and Science, Coimbatore 4Associate Professor,
Department of CSE, GITAM School of
Technology, GITAM University, Bengaluru.
[7] Ahmed, S., & Broek, N. t. (2017). Food supply:
Blockchain could boost food security.(brief
article). Nature, 550 (7674).
[8] Lu, Q., & Xu, X. (2017). Adaptable blockchain-
based systems: A case study for product
traceability. IEEE Software.
[9] Cocco, L., Pinna, A., & Marchesi, M. (2017).
Banking on blockchain: Costs savings thanks to
the blockchain technology. Future Internet.

More Related Content

Similar to BLOCKCHAIN IMPLEMENTATION IN EDUCATION

IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET-  	  Secured Real Estate Transactions using Blockchain TechnologyIRJET-  	  Secured Real Estate Transactions using Blockchain Technology
IRJET- Secured Real Estate Transactions using Blockchain TechnologyIRJET Journal
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET Journal
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in CloudIRJET Journal
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET Journal
 
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRYBEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRYRaushan Kumar Singh
 
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...IRJET Journal
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like DropboxIRJET Journal
 
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET Journal
 
CauseVCare - A Blockchain based Charity DApp
CauseVCare - A Blockchain based Charity DAppCauseVCare - A Blockchain based Charity DApp
CauseVCare - A Blockchain based Charity DAppIRJET Journal
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET Journal
 
Ethereum Decentralized Application for Storing Student Results
Ethereum Decentralized Application for Storing Student ResultsEthereum Decentralized Application for Storing Student Results
Ethereum Decentralized Application for Storing Student ResultsIRJET Journal
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...IRJET Journal
 
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET Journal
 
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONSECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONIRJET Journal
 
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET Journal
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET Journal
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET Journal
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...IRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET Journal
 

Similar to BLOCKCHAIN IMPLEMENTATION IN EDUCATION (20)

IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET-  	  Secured Real Estate Transactions using Blockchain TechnologyIRJET-  	  Secured Real Estate Transactions using Blockchain Technology
IRJET- Secured Real Estate Transactions using Blockchain Technology
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
 
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRYBEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
 
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like Dropbox
 
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
 
CauseVCare - A Blockchain based Charity DApp
CauseVCare - A Blockchain based Charity DAppCauseVCare - A Blockchain based Charity DApp
CauseVCare - A Blockchain based Charity DApp
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
Ethereum Decentralized Application for Storing Student Results
Ethereum Decentralized Application for Storing Student ResultsEthereum Decentralized Application for Storing Student Results
Ethereum Decentralized Application for Storing Student Results
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
 
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
 
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONSECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
 
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 

Recently uploaded (20)

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 

BLOCKCHAIN IMPLEMENTATION IN EDUCATION

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1235 BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEM , , , Dr Ambedkar Institute of Technology Bengaluru-56 --------------------------------------------------------------------***--------------------------------------------------------------------- Abstract: In order to create a chronological single- source-of-truth for the data, a blockchain is a database that stores encrypted chunks of data before chaining them together. Instead of being copied or moved, digital assets are distributed, resulting in an immutable record of the asset. Due to the asset's decentralised nature, the public has complete real-time access and transparency. The public ledger and built-in security features of blockchain make it a top solution for practically every industry. Thus, in this paper we try to implement blockchain system to select an IDE Subject (INTER-DEPARTMENT ELECTIVE) which makes sure that the data isn’t tampered through external source and the information is stored securely and is transparent to the college authorities and students. Keywords—Block-chain, Database, Encrypted, Digital assets, Data Storage, Security, Immutable, Transparency, IDE (Inter-department elective) 1.INTRODUCTION Blockchain [1] is a constantly growing set of data with certain records in it called blocks, it is a particularly encouraging and progressive innovation since it lessens risk, gets rid of extortion and acquires straight forwardness. They are secured and linked together using cryptographic methods. Here we developed a program that simulates a real time block chain technology blockchain for choice of IDE (INTER-DEPARTMENT ELECTIVE), which ensure that the chosen IDE (INTER- DEPARTMENT ELECTIVE) can't be changed by any outside source and it is likewise straightforward to people in general. A block of data it consists of data of students such as the name, the college seat number and the subject selected .The Blocks containing these data are then encrypted [1] ,it’s a way when normal readable text is converted into unreadable text so that it cannot be accessed and changed, the encryption works in such a way that if any word or spacing or caps is changed in the original text the encryption text gets changed .The encryption text is irreversible so the original text cannot be retrieved .The entire project is bound by using python and flask framework that helps us to host the website, to make entries these entries are then passed on to the databases these databases are distributed in nature which is the core concept of block chain. Any changes in any one of the database the data in other databases will not be changed unless the third person changes the data in all the database that make up more than 51% . 2.BACKGROUND A blockchain [2] is an very advanced technology for safety and security of data. Every time a certain the exchange is done on the network, a record of this exchange is added to the registration of each member. Every exchange on the blockchain is represented by a square in the chain, and each time an exchange takes place, a record of that exchange is added to the record of every member. Ethereum the second biggest blockchain execution after bitcoin. Ethereum disperses a money called ether, yet additionally considers the capacity and activity of PC code, taking into account brilliant agreements. Starting around 2008 square chain has been seeing persistent development in all fields. 3.LITERATURE SURVEY There are several distinct financial advantages of blockchain development [3]. The producers begin by utilising, for instance, a bank and all of the resources that are essentially squandered given that they handle and address all transactions themselves. With the use of this new record, the bank would be able to maintain safer records that are less likely to be tampered with and gain a more accurate understanding of prospective opportunities. For security purpose, Tranquillini examines recent concerns with the prosperity and adequacy of European financial business sectors and government control [7]. In light of everything, he avoids a particular end and resolves that execution of such development would be inconvenient, most ideal situation, and that it will not happen as soon as possible. In food security, researchers from Montana school figure out a couple of creating examples to address the need and potential for blockchain progresses for food security [7]. The major question in this issue is recognizability of food things, from their sources, on all through their dissemination frameworks, and on to their last client. This could assist with hindering blackmail and deflect - ,
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1236 or on the other hand if nothing else address issues of food borne ailment. In Product Traceability, Tranquillini examines recent concerns with the prosperity and adequacy of European financial business sectors and government control [8]. His article serves more as a source for his insightful considerations on the capacity of the utilization of such advancement to the protections business. In light of everything, he avoids a particular end and resolves that execution of such development would be inconvenient, most ideal situation, and that it will not happen at whatever point as soon as possible. 4.PROPOSED WORK Proposed a system that uses the blockchain core basics such as distributed database, immutable, Better Security by storing data in encrypted format with the encryption of the previous block[5]. Here the main approach was to create a distributed database, the creation of distributed database was done my initialize multiple database instances in various systems that was connected with our main program, an exact copy of the data from our program is sent to all the databases, the main data base used here is the MySQL database that stores data in a relational table, and a copy of a data is also sent to cloud database Firebase for added security. Here the front end is controlled by the flask Framework to host the website on the person server which is a raspberry pi 4 Back end is programmed with python that handles all the requests and the API calls to all the software and also the encryption of the data. The encryption method used here is SHA256 . The distributed database is created by using multiple cloud server instances and local machine to host the database. For the local machine database MySQL database the community version is used. Here the data is stored as records and in a table format. The data stored here will be the Student name, student college seat number, the subject selection. These data will not only be stored in one database but in different MySQL instance running in the different local host. In this project we had three MySQL instances running. Thus there were three copies of the same data at three different location. As python was used to communicate with the databases. The connection was made:- Fig 1:- Flowchart for credentials
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1237 Fig 2:- flow chart of the entire program The data was sent or written into the database my pre- defining the SQL query with variables that would be entered by the Student For the database instance in the cloud FireBase Realtime Database was used, The Firebase Realtime Database is a database stored in the cloud. Every connected client receives real-time synchronisation of data saved as JSON. to develop cross-platform applications. The Firebase Realtime Database enables safe access to the database from client-side code, enabling you to create robust, collaborative apps. The end user has a responsive experience because to local data persistence and real-time events that continue to happen even while the system is offline. The local data is updated when the device regains connectivity with the distant updates that took place while the client was offline.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1238 Fig 3:- block diagram of the working process Thus totally four duplicate copies were getting saved in four different location which eliminated the centralized structure database. Each copy the same data with the same capitalization and the encryption method. Our website was developed using HTML, CSS that is used for the user/student to interact. It consists of the basic login page for the different authorities of the college and the student authentication. the information provided in the front end is then feed into the backend python program to create the block and also feed the block data in the database The entire project is bound by the python code. It helps in sending and receiving data and also the check the integrity of the blocks, for any change in data. The code takes in the values of the student and the encrypted value of the previous block and forms a dictionary which is a JSON type format and encrypts the data using SHA256 algorithm. When a block is created the data of the block is encrypted and then the encrypted text is then stored in the block. When the next new block is created it consists the encryption text of the previous block and the data of its block it encrypts the data with the encryption text of the previous block . When a new block is created it checks the integrity of the other blocks like if any data has been changed and reports the change in data. The integrity check is done by taking the human readable data and the entire data is encrypted and checked with the encrypted text inside the block that has the encryption of the block thus this two must match to show that the block is not tampered. For the next block it takes the data of the previous block and the data of the current block and encrypts the data and then checks the encryption text with that stored inside the block. Hashing the process to convert normal plain text to non readable text which cannot be reversible it is similar to encryption but in encryption the text can be reversed with a key here in hashing it cannot be reversed. Thus when storing data we use hasing so when an unauthorized person gets access to the code he cannot reverse the string. even a slight change in the plain text will create an exponetial change in the hashed texted we use the sha256 algorithm to hash the entire block.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1239 Fig 4 :- Block creation
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1240 Result: The developed safe and secure database of student ledger showed promising results by using the blockchain technology. Since the existing way of recording the student academic detail of the number of subjects taken by the student and the difficulty in segregating the repeated subjects, the blockchain technology will eliminate the entire difficulty since it uses the technology of hashing which enables the portal to give students a different subject apart from the subjects already finished. There are 3 different types of logins namely hod login student login and the admin login The student login is only for the students where they will have to login with their respective email ids and password which will take them to their home page which displays the name of the student semester of the student and the university seat number of the student and all the subjects the student has already studied in the previous semester and the option to select the available subjects. Upon selecting the subject, a new block will be generated connecting to the hash of the previous block and records the data in the decentralized database which is now permanent and cannot be altered. The hod login is primarily to monitor the student’s history of the subjects taken and to assign the teachers for a particular class from the student’s response to a specified course. The hod (head of the department) will be given the privileges to check how many have opted for each individual subject or course. The hods are given a login id and password with which they can login to the document and download the required documents The admin section is to control, monitor and maintain the entire process without anyone facing issues regarding the selection process and to keep track of the entire process of subject selection. The admin will have the complete control on the entire network and can resolve the issues faced by the students or the professors or the head of the departments. REFERENCES [1] Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017). An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends. 2017 IEEE International Congress on Big Data (BigData Congress). [2] Ahram, T., Sargolzaei, A., Sargolzaei, S., Daniels, J., & Amaba, B. (2017). Blockchain technology innovations. 2017 IEEE Technology & Engineering Management Conference (TEMSCON) [3] S K, V., R S, Y., Prashanth, Y., N, Y., & M, N. (2020). E-Voting Systems using Blockchain: An Exploratory Literature Survey. 2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA). [4] Hjalmarsson, F. P., Hreioarsson, G. K., Hamdaqa, M., & Hjalmtysson, G. (2018). Blockchain-Based E-Voting System. 2018 IEEE 11th International Conference on Cloud Computing (CLOUD). [5] Sachchidanand Singh IBM Software Lab Pune, India - 411 057. Nirmala Singh Tech Mahindra Pune, India - 411 057. [6] D Sathya1 , S Nithyaroopa2 , D Jagadeesan3 , I Jeena Jacob4 1 Assistant Professor II, Dept. of CSE, Kumaraguru College of Technology, Coimbatore 2 Assistant Professor, Dept. of CSE, Kumaraguru College of Technology, Coimbatore 3 Assistant Professor, Department of Management Studies, Rathinam College of Arts and Science, Coimbatore 4Associate Professor, Department of CSE, GITAM School of Technology, GITAM University, Bengaluru. [7] Ahmed, S., & Broek, N. t. (2017). Food supply: Blockchain could boost food security.(brief article). Nature, 550 (7674). [8] Lu, Q., & Xu, X. (2017). Adaptable blockchain- based systems: A case study for product traceability. IEEE Software. [9] Cocco, L., Pinna, A., & Marchesi, M. (2017). Banking on blockchain: Costs savings thanks to the blockchain technology. Future Internet.