SlideShare a Scribd company logo
1 of 7
Download to read offline
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:12/December-2023 Impact Factor- 7.868 www.irjmets.com
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[721]
ENHANCING SECURITY AND TRANSPARENCY: THE ROLE OF
BLOCKCHAIN IN DOCUMENT VERIFICATION
Kalpita Vilas Birhade*1, Nitesh Sopan Wani*2, Sahil Vijay Bhosale*3,
Prathmesh Yuvraj Jadhav*4, Shantanu Samir Raje*5
*1Department Of Computer Engineering, Terna Engineering College, Nerul, Navi Mumbai,
(Research Domain –WEB3 React), India.
*2Department Of Computer Engineering, Terna Engineering College, Nerul, NaviMumbai,
(Research Domain - React & WEB3), India.
*3Department Of Computer Engineering, Terna Engineering College, Nerul, Navi Mumbai,
(Research Domain –Machine Learning & WEB3), India.
*4Department Of Computer Engineering,Terna Engineering College, Nerul, Navi Mumbai,
(Research Domain - Android Development& React), India.
*5Department Of Computer Engineering, Terna Engineering College, Nerul, Navi Mumbai,
(Research Domain - Cloud Computing &IPFS), India.
DOI : https://www.doi.org/10.56726/IRJMETS47155
ABSTRACT
It is simple to produce phony certifications due to the market's easy access to inexpensive, sophisticated
equipment and the rapid growth of information technology, as well as the lack of transparency and verifiability
in the reporting process. The complicated method of authentication entails numerous difficult validation steps.
Additionally, bank statements, significant papers, transfer documents, certifications of training, etc. Each type
of content is distinctive and necessitates a different handling strategy. Students' academic transcripts are
significant records provided by their universities. The best fake credentials are always hard to spot and are
handled much like legitimate ones. Recently, blockchain technology has been cited as a potential method of
information system verification and as a crucial weapon in the conflict against information fraud and
malpractice.
This research seeks to enhance the data analysis process using blockchain technology. Our focus is to build a
decentralized and distributedledger that holds the papers and guarantees their immutability.
Keywords: Blockchain, IPFS, Digital Signature, Hashing, Document Verification, Ethereum (ETH).
I. INTRODUCTION
Documents or certifications supplied by the government, banks, or educational organizations, such as scholastic
documents, identity documents, financial documents, etc., are essential credentials for people. Working with
counterfeit credentials raises difficult circumstances for verification firms. The severity of these has really
intensified. The ability to confirm a document's legitimacy put forth the greatest obstacle. Counterfeit
documents are achallenge that we face on a frequent basis [4].
In the epoch of technology, there is a great deal of data andhackers breach data so to ensure the confidentiality
of the data we protect data from hackers using document authentication. There is a strong challenge to
fortifying document secrecy. Using the orthodox method there are many constraints and unsteady data. In
rejoinder of the orthodox method of provocation, blockchain technology has appeared adequate solution to
enact vigorous and protectedauthentication systems for electronic documents.
Our objective is to design a system for Document verification using blockchain. The technique applies
blockchain technology to corroborate the permissibility and genuineness of a document. A scattered,
decentralized automated record called blockchain enables transactions that are steady, unclouded, and
immutable. The use of blockchain for document verification has benefits for security, effectiveness, and
transparency. With blockchain technology, papers may be verified quickly and easily without the need for
middlemen. This reduces the likelihoodof fraud and ensures the consistency of the document.
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:12/December-2023 Impact Factor- 7.868 www.irjmets.com
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[722]
Blockchain was initially formed as an elemental technology for cryptocurrencies like ALtcoins, Bitcoins, and
Ethereum. That has grown scatter and apportion log system with application further on the monetary affair.
Blockchain-based authentication is Intended to bring reliability to corroborate the authenticity of electronic
documents. By exploiting the peculiar characteristics of blockchain. The system lines up to relieve the peril
equated with document falsification,forbidden variation and forbidden way in.
II. LITERATURE SURVEY
Due to technological improvements, the literature covers issues with document forgeries and the need for
effective verification. It provides a decentralized online application that uses the Ethereum blockchain, peer-to-
peer storage, andcryptography to quickly and transparently verify documents.[1]
The author put forth the idea to use Blockchain to stop document fraud in the educational industry. It suggests
a remedy incorporating an exclusive Ethereum blockchain network and IPFS off-chain storage. The
performance of Ethereum is assessed in the report based on a number of factors.[2]
In order to improve security, speed, and real-time auditing, the thesis suggests a decentralized private
Blockchain for the storing and verification of academic documents. It involves a small number of vendors
employing private IPFS storage and proof-of-stake consensus, while also investigating Ethereum and citing
Hyperledger Fabric as a possible alternate.[3]
Blockchain technology has a significant impact on many industries, including supply chains, healthcare, and
banking.It is currently being used in education to validate diplomas.Although certifications help in recruitment,
there are forgery risks, necessitating third-party verification. The study examines the advantages and
disadvantages of blockchain inthis area and emphasizes its potential for academicvalidation. It focuses on using
blockchain technology to combat false documents using the Academic Certificate Authenticity System
(ACAS).[4]
The article describes a blockchain-based electronic authentication system for Al-Zaytoonah University's secure
document management. By providing data security and deterring forgeries, it protects a variety of papers,
including financial, official, and academic records. The technology maintains authenticity and delivery
confirmation while allowing secure issuance to third parties.[5]
Despite digital choices, paper documents in South Africa arestill susceptible to fraud. Recent events highlight the
necessity of thorough verification due to integrity issues. Document security is currently a problem. 2D
barcodes, digital signatures, OCR, and cryptographic hashing all workwell together. Blockchain is used to verify
information. In the absence of tests to verify its efficacy, the study makes asuggestion for a remedy using these
methodologies.[6]
Monitoring student progress and access control pose obstacles to blockchain's promise in the educational
sector. Academic documents are prone to falsification and lack specific performance information. Verification is
necessarybut takes time. Utilizing the consortium blockchain of Ethereum, the UniverCert technology resolves
these problems by monitoring, validating, and distributing studentdata in a secure manner. It focuses on document
authenticity, data storage, registration, and verification.[7]
The potential of blockchain is used to upgrade governance processes, stop document fraud, and improve
documentsecurity. It is suggested that official papers should be authenticated using the Blockchain. The
paper presents aBlockchain-based framework with a Decentralized Autonomous Organization (DAO) and smart
contracts to enable effective execution and boost confidence in cutting- edge and secure government e-
documents.[8]
Millions of students produce numerous credentials each year in higher education in India, making it difficult to
manually track and validate them. False certificates may result from a lack of anti-forgery safeguards.
Blockchain technology is recommended as a way to improve security. The system includes the issuing of
certificates, validation by a panel within an organization, and individual hash keys for validity. This strategy
makes certificate validation easier while lowering the possibility of loss and guaranteeing student comfort.[9]
Although important, diplomas are susceptible to falsification. Traditional verification is time-consuming and
costly. The study proposes a blockchain paradigm for cryptographically secure certificate issuance and
verification. This model tackles issues with authenticity andsatisfies current verification standards.[10]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:12/December-2023 Impact Factor- 7.868 www.irjmets.com
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[723]
The need for more storage space has arisen as a result of therapid growth of information brought on by web
improvements. To address this, cloud platforms are employed, but solid security measures are crucial. A
suggested solution to this problem uses blockchain technology for cloud storage and security. Blockchain's
decentralized structure guarantees security and supports theobjective of improving cloud storage security. This
paper introduces the concept of Blockchain technology and explores its current research trends.[11]
The current system of cloud storage relies on centralized suppliers, which raises concerns about pricing, the
caliber of the program, and data security. The study offers a model for a multi-user access control system in
databases that uses blockchain technology to address these issues. This strategy guarantees dispersed and
stable data processing. Through a web gateway, users can upload encrypted material that can only be accessed
by those holding the right secret key. The solution makes use of blockchain's immutability to improve data
privacy while processing data in the cloud. Overall, the suggested safe, blockchain-based solution intends to
strengthen data privacy and decentralize control to increasethe security of cloud storage.[12]
This paper describes how cryptography links records into blocks in the peer-to-peer decentralized blockchain
system, ensuring security, dependability, and transparency. In order to address the problems with different
identity document issuers and document fraud, it suggests an innovative strategy for government document
verification. An efficient and secure method of exchanging authenticated official documents between
governments, businesses, and educational institutions is provided by a private permissioned blockchain
network. This removes the need for excessive human involvement and greatly boosts the effectiveness of the
processes for document issuance and verification. Enhanced security, dependability, and transparency are
advantages of the blockchain paradigm.[13]
III. METHODOLOGY
Ensuring the authenticity and accuracy of documents through the integration of blockchain technology can be
effectively achieved with the aid of smart contracts. Smart contracts serve as automated digital protocols
designed to scrutinize the genuineness of documents, offering a refined methodological approach: Initially, the
transformation of traditional paper documents into digital format is initiated. This conversion process is
facilitated through digitizationmethods, such as scanning or photography. Subsequently,the digital iteration
of the document undergoes a crypto- graphic transformation, giving rise to a distinct "hash." Thehash functions
as an exclusive digital identifier, engendered through specialized algorithms, effectively encapsulating the
intrinsic characteristics of the document. Simultaneously, the digital document is integrated into the Inter
Planetary File System (IPFS), thereby acquiring an additional layer of distinct identification to enhance its
retrieval. Concurrently, the aforementioned hash is inscribed onto a blockchain, a steadfast digital ledger. The
blockchaincorroborates the perpetuation of hash integrity, thus avertingany form of malicious manipulation.
Subsequent to this, theformulation of a "smart contract" ensues. Thisprogrammable software mechanism acts
as a discerningarbiter of document authenticity, contingent upon the hashand predefined criteria. Verification
of documentauthenticity is effectuated by inputting the document's hashinto the smart contract. The smart
contract conducts acomparative assessment with the hash recorded on theblockchain. A congruence between
the two hashes attests tothe legitimacy of the document, whereas incongruity alludesto potential tampering.
However, prior to document utilization, substantiating ownership is a requisite. Ownership validation is
achieved through a specializeddigital signature, serving as proof of the owner's legitimateentitlement. Upon
successful validation of ownership,access to the document is facilitated via the IPFS network.This retrieval
process closely resembles the act of extractinga document from a bespoke digital repository. Insummation,
adherence to this systematic frameworkculminates in the preservation of documents within theprecincts of
the IPFS network. Document accessibility is limited exclusively to individuals who possess substantiated
ownership, thereby endowing this paradigm with pertinenceacross multifarious contexts, encompassing the
safeguarding of confidential medical records, scrutiny of pivotal legal documents, and the secure
management of classified information.
A. How a blockchain produces a hash key Hash keys are developed on a blockchain, such as Ethereum,using
cryptographic hash functions. These hash functions take an input (or message) and turn it into a fixed-
length,evidently random, distinctive string of characters. Goodcryptographic hash function features include:
Deterministic: The hash function always provides the sameresult for the same input.
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:12/December-2023 Impact Factor- 7.868 www.irjmets.com
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[724]
Quick Calculation: The hash function need to be quick tocalculate.
Pre-image Resistance: Reverse-engineering the input fromthe hashes should be impossible.
Collision Resistance: Developing the identical hash output from two separate inputs should be extremely
uncommon.
B. Hash keys have a vital role in the context of blockchain in a number of ways, involving
Block Hashes: every block that appears in a blockchain hasa hash of the header from the block that preceded it.
By interconnecting the blocks together, this makes the block- chain tamper-evident and reassures that changing
one blockrequires modifying all succeeding blocks.
Transaction Hashes: A block's transactions all get hashed. The content of the block matches this hash. It makes
the transactions' inclusion in the block and integrity more certain.
Merkle Trees: Merkle trees are used on numerous blockchains, like Bitcoin and Ethereum, to effectively
summarize and endorse the transactions within a block. Eachpair of combined transaction hashes is then hashed
once more to create a single root hash, which is subsequently written into the block header.
Smart Contracts: The address of a smart contract is derivedby hashing the code and state of the contract. To
locate andcommunicate with the agreement on the blockchain, use thisaddress.
Cryptographic Signatures: e-signatures, which are essential for confirming the legitimacy of transactions and
messages,are generated via hashing.
The input gets processed using a mathematical procedure to produce the hash output during the hashing
process. No matter how long the input is, the hash that results usually hasthe same length. This characteristic
enables reliable data storage and comparison without disclosing the original input.
The Keccak-256 hash function, which is a member of the SHA-3 family, is regularly used in Ethereum. Although
other blockchains may employ various hash functions, the fundamentals of hash function features and the ways
in which they are used in blockchain remain unchanged.
C. What is IPFS
Inter Planetary File System (IPFS) is a distributed, decentralized file-storing and sharing technology created to
make it easier and more reliable to save and access data online. On the other hand, Infura is a service that gives
usersquick access to Ethereum and IPFS nodes, making it easier to communicate with those networks without
having to set up and manage nodes themselves. IPFS (InterPlanetary File System) to address some of the
drawbacks of traditional web-based file storage and sharing, IPFS is a protocol and network. IPFS employs a
peer-to-peer network to distribute and store files among numerous nodes as opposed to depending on
centralized servers. Files are broken up into smaller pieces and assigned a unique hash based on their content.
Even if the original uploader is not online, the filesare secure and easily retrievable because to this hash-based
addressing system. Reduced bandwidth use, more redundancy, and improved data availability are the goals of
IPFS.
IV. PROPOSED SYSTEM
The suggested document verification system incorporates utilization of IPFS (InterPlanetary File System)
storage made feasible by Infura, as well as the strength of blockchain technology, for instance Ethereum (ETH).
This technology attempts to improve the immutability, transparency, and security of documents during
verification processes.
Documents in the aforementioned format are hashed and kept on the IPFS network, guaranteeing their
availability and integrity. These papers' hashes are subsequently anchored onto the Ethereum blockchain,
resulting in an ineradicable record of the document's existence at a particular time. On the Ethereum network,
smart contracts are used to regulate the verification procedure.
The system prepares a hash of the document when a usersubmits it for verification and compares it to the hash
generated on the blockchain. The legitimacy of thedocument is verified if the hashes turn out to be identical. A
high level of trust and security is laid out by thedecentralized and impenetrable nature of blockchain,
allowing individuals to be sure that once a document isauthenticated and recorded, it cannot be disrupted
or erased. Infura's IPFS storage makes for swift and trustworthy access to the documents. The smooth
connection betweenthe Ethereum smart contracts and the documents saved inIPFS is rendered viable by
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:12/December-2023 Impact Factor- 7.868 www.irjmets.com
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[725]
Infura, which functions as agateway to the IPFS network. Utilizing this combination oftechnologies, document
verification is guaranteed to be user-friendly, scalable, and secure in addition to being transparent and
accountable.
Fig.1 Proposed system process
V. RESULT
Fig.1
Fig.2
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:12/December-2023 Impact Factor- 7.868 www.irjmets.com
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[726]
Fig.3
Fig.4
VI. CONCLUSION
Implementing blockchain for authentication basis gives outa changeful way that boosts sureness, protection,
translucency and guarantee over several management. Among its distributed and unchangeable quality,
blockchain technology establishes that data resistance is protected, decreasing the threat of scam and
inappropriate variation. The operation of cryptographic hashing and agreement contraption else solidifies the
rectitude of the details kept secretly in blockchain.
Carrying out blockchain for confirmation action provides well-being such as consolidated authentication,
structuredrecord- keeping, and abridged probe. The advantages hand out to increment practical productivity,
minimize expense,and user satisfaction. Likewise, blockchain’s courage tohabitual faith amid partners without
needed emissaries has the further ability to reconstruct an ethical authentication system and allow the
particular to have more power abovetheir independent data.
Fundamentally, the merging of blockchain technology into authentication action imprint a crucial impression
approaching a new safe, limpid and authoritative electronicprospect. As the technology carries on to progress
and grows, its collision on numerous categories could recompose how information is established and
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:12/December-2023 Impact Factor- 7.868 www.irjmets.com
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[727]
collaborative, conclusively compelling inventive and gaining the approach we reach out along data in our
mutually dependent universe.
Notwithstanding, while the possibility is momentous,objections such as adaptivity, efficiency exploitation and
ministerial threats remain to be consigned. Compelling a poise amongst distribute ammunition and resource
effectualwill be vital for the comprehensive enactment of blockchainbased verification elucidation.
VII. REFERENCES
[1] Iftekher Toufique Imam, Yamin Arafat, Kazi Saeed Alam and Shaikh Akib Shahriyar, "DOC-BLOCK: A
Blockchain Based Authentication System for Digital Documents," 2021 Proceedings of the Third
International Conference on Intelligent Communication Technologies and Virtual Mobile Networks
(ICICV 2021). IEEE Xplore Part Number: CFP21ONG-ART; 978-0-7381-1183-4.
[2] Pavitra Haveri, Rashmi U B, Narayan D.G., Nagaratna K, Shivaraj K, "EduBlock: Securing Educational
Documents using Blockchain Technology," 2020 11th ICCCNT 2020 July 1-3, 2020 - IIT – Kharagpur.
[3] Ajay Kumar Shrivastava, Chetan Vashistth, Akash Rajak, Arun Kumar Tripathi, "A Decentralized Way to
Store and Authenticate Educational Documents on Private Blockchain" 2019 2nd International
Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT) 978-1-7281-1772-0
©2019 IEEE.
[4] Abdulkareem Saber Kareem, Ahmed Chalak Shakir "Review: Verification Process of Academic
Certificates Using Blockchain Technology" Kirkuk University Journal-Scientific Studies Vol. 18, Iss. 1, p
62-75, 2023. doi:10.32894/kujss.2023.135876.1072
[5] Tarek Kanan, Ahamd Turki Obaidat, Majduleen Al- Lahham, "SmartCert BlockChain Imperative for
Educational Certificates" 2019 IEEE Jordan International Joint Conference on Electrical Engineering
and InformationTechnology (JEEIT) 978-1-5386-7942-5/19/$31.00 ©2019 IEEE.
[6] Sthembile Mthethwa, Nelisiwe Dlamini, Dr. Graham Barbour. "Proposing a Blockchain-based Solution
to Verify the Integrity of Hardcopy Documents" 2018 International Conference on Intelligent and
Innovative ComputingApplications. DOI:10.1109/ICONIC.2018.8601200
[7] Y. Shakan, B. Kumalakov, G. Mutanov, Zh. Mamykova, Y. Kistaubayev “Verification of University Student
and Graduate Data using Blockchain Technology” INTERNATIONAL JOURNAL OF COMPUTERS
COMMUNICATIONS & CONTROL Online ISSN 1841- 9844, ISSN-L 1841-9836, Volume: 16, Issue: 5,
Month: October, Year: 2021 ArticleNumber:4266,https://doi.org/10.15837/ijccc.2021.5.4266
[8] Isyak Meirobiea,Agustinus Purna Irawan, Husni Teja Sukmana, Diana Putri Lazirkha, Nuke Puji Lestari
Santoso, "Framework Authentication e-document using Blockchain Technology on the Government
system," 2022 International Journal of Artificial Intelegence Research ISSN: 2579-7298 Vol 6, No 2,
December 2022
[9] Ravi Singh Lamkoti, Devdoot Maji, Hitesh Shetty, Prof. Bharati Gondhalekar "Certificate Verification
using Blockchain and Generation of Transcript" International Journal of Engineering Research &
Technology (IJERT) ISSN: 2278-0181 IJERTV10IS030260 Vol. 10 Issue 03, March-2021
[10] Osman Ghazali and Omar S. Saleh, "A Graduation Certificate Verification Model via Utilization of
Blockchain Technology," 2018 Journal of Telecommunication, Electronic and Computer Engineering
(JTEC), 10(3-2)
[11] Aamir Mughal and Alex Joseph, "Blockchain for CloudStorage Security: A Review," 2020 Proceedings of
the International Conference on Intelligent Computing and Control Systems (ICICCS 2020) IEEE Xplore
Part Number:CFP20K74-ART; ISBN: 978-1-7281-4876-2
[12] Shubham Desai, Rahul Shelke, Omkar Deshmukh, Harish Choudhary, Arjunsingh Yadav, Prof.
S.S.Sambhare,“Blockchain based Secure Data Storage and Access ControlSystem using Cloud,” 2019 5th
International Conference onComputing Communication Control and Automation (ICCUBEA)
[13] Gunit Malik, Kshitij Parasrampuria, Sai PrasanthReddy, Dr. Seema Shah "Blockchain Based Identity
Verification Model" 2019 International Conference on Vision Towards Emerging Trends in
Communication andNetworking(ViTECoN) DOI:10.1109/ViTECoN.2019.8899569

More Related Content

Similar to ENHANCING SECURITY AND TRANSPARENCY: THE ROLE OF BLOCKCHAIN IN DOCUMENT VERIFICATION

Bibliometric review of application of blockchain in supply chain management
Bibliometric review of application of blockchain in supply chain managementBibliometric review of application of blockchain in supply chain management
Bibliometric review of application of blockchain in supply chain managementIRJET Journal
 
Enhancing cryptographic protection, authentication, and authorization in cell...
Enhancing cryptographic protection, authentication, and authorization in cell...Enhancing cryptographic protection, authentication, and authorization in cell...
Enhancing cryptographic protection, authentication, and authorization in cell...IJECEIAES
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using BlockchainIRJET Journal
 
An interactive Study on secure data sharing in the IOT through Blockchain
An interactive Study on secure data sharing in the IOT through BlockchainAn interactive Study on secure data sharing in the IOT through Blockchain
An interactive Study on secure data sharing in the IOT through BlockchainIRJET Journal
 
IRJET- Digital Certification using Blockchain
IRJET- Digital Certification using BlockchainIRJET- Digital Certification using Blockchain
IRJET- Digital Certification using BlockchainIRJET Journal
 
5 Methods Of Blockchain Technology To Authenticate Academic Credentials And C...
5 Methods Of Blockchain Technology To Authenticate Academic Credentials And C...5 Methods Of Blockchain Technology To Authenticate Academic Credentials And C...
5 Methods Of Blockchain Technology To Authenticate Academic Credentials And C...Future Education Magazine
 
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdfAnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdftonkung6
 
Challenges In BlockChain Technology For Future Supply Chain- Future Research ...
Challenges In BlockChain Technology For Future Supply Chain- Future Research ...Challenges In BlockChain Technology For Future Supply Chain- Future Research ...
Challenges In BlockChain Technology For Future Supply Chain- Future Research ...PhD Assistance
 
AN EVALUATION OF SECURITY IN BLOCKCHAIN-BASED SHARING OF STUDENT RECORDS IN H...
AN EVALUATION OF SECURITY IN BLOCKCHAIN-BASED SHARING OF STUDENT RECORDS IN H...AN EVALUATION OF SECURITY IN BLOCKCHAIN-BASED SHARING OF STUDENT RECORDS IN H...
AN EVALUATION OF SECURITY IN BLOCKCHAIN-BASED SHARING OF STUDENT RECORDS IN H...IJNSA Journal
 
Blockchain-based protocol of autonomous business activity for multi-agent sys...
Blockchain-based protocol of autonomous business activity for multi-agent sys...Blockchain-based protocol of autonomous business activity for multi-agent sys...
Blockchain-based protocol of autonomous business activity for multi-agent sys...eraser Juan José Calderón
 
Improving System Security and User Privacy in Secure Electronic Transaction (...
Improving System Security and User Privacy in Secure Electronic Transaction (...Improving System Security and User Privacy in Secure Electronic Transaction (...
Improving System Security and User Privacy in Secure Electronic Transaction (...IJERA Editor
 
IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET Journal
 
Secure and Transparent Insurance Application using Blockchain Technology
Secure and Transparent Insurance Application using Blockchain TechnologySecure and Transparent Insurance Application using Blockchain Technology
Secure and Transparent Insurance Application using Blockchain TechnologyIRJET Journal
 
"Unravelling the Challenges: A Deep Dive into the Problems of Blockchain Tech...
"Unravelling the Challenges: A Deep Dive into the Problems of Blockchain Tech..."Unravelling the Challenges: A Deep Dive into the Problems of Blockchain Tech...
"Unravelling the Challenges: A Deep Dive into the Problems of Blockchain Tech...IRJET Journal
 
Blockchain and the Future of Digital Learning Credential Assessment and Manag...
Blockchain and the Future of Digital Learning Credential Assessment and Manag...Blockchain and the Future of Digital Learning Credential Assessment and Manag...
Blockchain and the Future of Digital Learning Credential Assessment and Manag...eraser Juan José Calderón
 
KYC using Blockchain
KYC using BlockchainKYC using Blockchain
KYC using Blockchainijtsrd
 
The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...Arab Federation for Digital Economy
 
Rui zhang and rui xue, georgia tech
Rui zhang and rui xue, georgia techRui zhang and rui xue, georgia tech
Rui zhang and rui xue, georgia techIT Strategy Group
 
A survey on security and policy aspects of blockchain technology
A survey on security and policy aspects of blockchain technologyA survey on security and policy aspects of blockchain technology
A survey on security and policy aspects of blockchain technologyTELKOMNIKA JOURNAL
 

Similar to ENHANCING SECURITY AND TRANSPARENCY: THE ROLE OF BLOCKCHAIN IN DOCUMENT VERIFICATION (20)

Bibliometric review of application of blockchain in supply chain management
Bibliometric review of application of blockchain in supply chain managementBibliometric review of application of blockchain in supply chain management
Bibliometric review of application of blockchain in supply chain management
 
Enhancing cryptographic protection, authentication, and authorization in cell...
Enhancing cryptographic protection, authentication, and authorization in cell...Enhancing cryptographic protection, authentication, and authorization in cell...
Enhancing cryptographic protection, authentication, and authorization in cell...
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
 
An interactive Study on secure data sharing in the IOT through Blockchain
An interactive Study on secure data sharing in the IOT through BlockchainAn interactive Study on secure data sharing in the IOT through Blockchain
An interactive Study on secure data sharing in the IOT through Blockchain
 
IRJET- Digital Certification using Blockchain
IRJET- Digital Certification using BlockchainIRJET- Digital Certification using Blockchain
IRJET- Digital Certification using Blockchain
 
5 Methods Of Blockchain Technology To Authenticate Academic Credentials And C...
5 Methods Of Blockchain Technology To Authenticate Academic Credentials And C...5 Methods Of Blockchain Technology To Authenticate Academic Credentials And C...
5 Methods Of Blockchain Technology To Authenticate Academic Credentials And C...
 
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdfAnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
 
Challenges In BlockChain Technology For Future Supply Chain- Future Research ...
Challenges In BlockChain Technology For Future Supply Chain- Future Research ...Challenges In BlockChain Technology For Future Supply Chain- Future Research ...
Challenges In BlockChain Technology For Future Supply Chain- Future Research ...
 
AN EVALUATION OF SECURITY IN BLOCKCHAIN-BASED SHARING OF STUDENT RECORDS IN H...
AN EVALUATION OF SECURITY IN BLOCKCHAIN-BASED SHARING OF STUDENT RECORDS IN H...AN EVALUATION OF SECURITY IN BLOCKCHAIN-BASED SHARING OF STUDENT RECORDS IN H...
AN EVALUATION OF SECURITY IN BLOCKCHAIN-BASED SHARING OF STUDENT RECORDS IN H...
 
Blockchain-based protocol of autonomous business activity for multi-agent sys...
Blockchain-based protocol of autonomous business activity for multi-agent sys...Blockchain-based protocol of autonomous business activity for multi-agent sys...
Blockchain-based protocol of autonomous business activity for multi-agent sys...
 
Improving System Security and User Privacy in Secure Electronic Transaction (...
Improving System Security and User Privacy in Secure Electronic Transaction (...Improving System Security and User Privacy in Secure Electronic Transaction (...
Improving System Security and User Privacy in Secure Electronic Transaction (...
 
ICITSI Slide Fix.pptx
ICITSI Slide Fix.pptxICITSI Slide Fix.pptx
ICITSI Slide Fix.pptx
 
IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate System
 
Secure and Transparent Insurance Application using Blockchain Technology
Secure and Transparent Insurance Application using Blockchain TechnologySecure and Transparent Insurance Application using Blockchain Technology
Secure and Transparent Insurance Application using Blockchain Technology
 
"Unravelling the Challenges: A Deep Dive into the Problems of Blockchain Tech...
"Unravelling the Challenges: A Deep Dive into the Problems of Blockchain Tech..."Unravelling the Challenges: A Deep Dive into the Problems of Blockchain Tech...
"Unravelling the Challenges: A Deep Dive into the Problems of Blockchain Tech...
 
Blockchain and the Future of Digital Learning Credential Assessment and Manag...
Blockchain and the Future of Digital Learning Credential Assessment and Manag...Blockchain and the Future of Digital Learning Credential Assessment and Manag...
Blockchain and the Future of Digital Learning Credential Assessment and Manag...
 
KYC using Blockchain
KYC using BlockchainKYC using Blockchain
KYC using Blockchain
 
The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...
 
Rui zhang and rui xue, georgia tech
Rui zhang and rui xue, georgia techRui zhang and rui xue, georgia tech
Rui zhang and rui xue, georgia tech
 
A survey on security and policy aspects of blockchain technology
A survey on security and policy aspects of blockchain technologyA survey on security and policy aspects of blockchain technology
A survey on security and policy aspects of blockchain technology
 

Recently uploaded

IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...Call girls in Ahmedabad High profile
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 

Recently uploaded (20)

★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 

ENHANCING SECURITY AND TRANSPARENCY: THE ROLE OF BLOCKCHAIN IN DOCUMENT VERIFICATION

  • 1. e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science ( Peer-Reviewed, Open Access, Fully Refereed International Journal ) Volume:05/Issue:12/December-2023 Impact Factor- 7.868 www.irjmets.com www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science [721] ENHANCING SECURITY AND TRANSPARENCY: THE ROLE OF BLOCKCHAIN IN DOCUMENT VERIFICATION Kalpita Vilas Birhade*1, Nitesh Sopan Wani*2, Sahil Vijay Bhosale*3, Prathmesh Yuvraj Jadhav*4, Shantanu Samir Raje*5 *1Department Of Computer Engineering, Terna Engineering College, Nerul, Navi Mumbai, (Research Domain –WEB3 React), India. *2Department Of Computer Engineering, Terna Engineering College, Nerul, NaviMumbai, (Research Domain - React & WEB3), India. *3Department Of Computer Engineering, Terna Engineering College, Nerul, Navi Mumbai, (Research Domain –Machine Learning & WEB3), India. *4Department Of Computer Engineering,Terna Engineering College, Nerul, Navi Mumbai, (Research Domain - Android Development& React), India. *5Department Of Computer Engineering, Terna Engineering College, Nerul, Navi Mumbai, (Research Domain - Cloud Computing &IPFS), India. DOI : https://www.doi.org/10.56726/IRJMETS47155 ABSTRACT It is simple to produce phony certifications due to the market's easy access to inexpensive, sophisticated equipment and the rapid growth of information technology, as well as the lack of transparency and verifiability in the reporting process. The complicated method of authentication entails numerous difficult validation steps. Additionally, bank statements, significant papers, transfer documents, certifications of training, etc. Each type of content is distinctive and necessitates a different handling strategy. Students' academic transcripts are significant records provided by their universities. The best fake credentials are always hard to spot and are handled much like legitimate ones. Recently, blockchain technology has been cited as a potential method of information system verification and as a crucial weapon in the conflict against information fraud and malpractice. This research seeks to enhance the data analysis process using blockchain technology. Our focus is to build a decentralized and distributedledger that holds the papers and guarantees their immutability. Keywords: Blockchain, IPFS, Digital Signature, Hashing, Document Verification, Ethereum (ETH). I. INTRODUCTION Documents or certifications supplied by the government, banks, or educational organizations, such as scholastic documents, identity documents, financial documents, etc., are essential credentials for people. Working with counterfeit credentials raises difficult circumstances for verification firms. The severity of these has really intensified. The ability to confirm a document's legitimacy put forth the greatest obstacle. Counterfeit documents are achallenge that we face on a frequent basis [4]. In the epoch of technology, there is a great deal of data andhackers breach data so to ensure the confidentiality of the data we protect data from hackers using document authentication. There is a strong challenge to fortifying document secrecy. Using the orthodox method there are many constraints and unsteady data. In rejoinder of the orthodox method of provocation, blockchain technology has appeared adequate solution to enact vigorous and protectedauthentication systems for electronic documents. Our objective is to design a system for Document verification using blockchain. The technique applies blockchain technology to corroborate the permissibility and genuineness of a document. A scattered, decentralized automated record called blockchain enables transactions that are steady, unclouded, and immutable. The use of blockchain for document verification has benefits for security, effectiveness, and transparency. With blockchain technology, papers may be verified quickly and easily without the need for middlemen. This reduces the likelihoodof fraud and ensures the consistency of the document.
  • 2. e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science ( Peer-Reviewed, Open Access, Fully Refereed International Journal ) Volume:05/Issue:12/December-2023 Impact Factor- 7.868 www.irjmets.com www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science [722] Blockchain was initially formed as an elemental technology for cryptocurrencies like ALtcoins, Bitcoins, and Ethereum. That has grown scatter and apportion log system with application further on the monetary affair. Blockchain-based authentication is Intended to bring reliability to corroborate the authenticity of electronic documents. By exploiting the peculiar characteristics of blockchain. The system lines up to relieve the peril equated with document falsification,forbidden variation and forbidden way in. II. LITERATURE SURVEY Due to technological improvements, the literature covers issues with document forgeries and the need for effective verification. It provides a decentralized online application that uses the Ethereum blockchain, peer-to- peer storage, andcryptography to quickly and transparently verify documents.[1] The author put forth the idea to use Blockchain to stop document fraud in the educational industry. It suggests a remedy incorporating an exclusive Ethereum blockchain network and IPFS off-chain storage. The performance of Ethereum is assessed in the report based on a number of factors.[2] In order to improve security, speed, and real-time auditing, the thesis suggests a decentralized private Blockchain for the storing and verification of academic documents. It involves a small number of vendors employing private IPFS storage and proof-of-stake consensus, while also investigating Ethereum and citing Hyperledger Fabric as a possible alternate.[3] Blockchain technology has a significant impact on many industries, including supply chains, healthcare, and banking.It is currently being used in education to validate diplomas.Although certifications help in recruitment, there are forgery risks, necessitating third-party verification. The study examines the advantages and disadvantages of blockchain inthis area and emphasizes its potential for academicvalidation. It focuses on using blockchain technology to combat false documents using the Academic Certificate Authenticity System (ACAS).[4] The article describes a blockchain-based electronic authentication system for Al-Zaytoonah University's secure document management. By providing data security and deterring forgeries, it protects a variety of papers, including financial, official, and academic records. The technology maintains authenticity and delivery confirmation while allowing secure issuance to third parties.[5] Despite digital choices, paper documents in South Africa arestill susceptible to fraud. Recent events highlight the necessity of thorough verification due to integrity issues. Document security is currently a problem. 2D barcodes, digital signatures, OCR, and cryptographic hashing all workwell together. Blockchain is used to verify information. In the absence of tests to verify its efficacy, the study makes asuggestion for a remedy using these methodologies.[6] Monitoring student progress and access control pose obstacles to blockchain's promise in the educational sector. Academic documents are prone to falsification and lack specific performance information. Verification is necessarybut takes time. Utilizing the consortium blockchain of Ethereum, the UniverCert technology resolves these problems by monitoring, validating, and distributing studentdata in a secure manner. It focuses on document authenticity, data storage, registration, and verification.[7] The potential of blockchain is used to upgrade governance processes, stop document fraud, and improve documentsecurity. It is suggested that official papers should be authenticated using the Blockchain. The paper presents aBlockchain-based framework with a Decentralized Autonomous Organization (DAO) and smart contracts to enable effective execution and boost confidence in cutting- edge and secure government e- documents.[8] Millions of students produce numerous credentials each year in higher education in India, making it difficult to manually track and validate them. False certificates may result from a lack of anti-forgery safeguards. Blockchain technology is recommended as a way to improve security. The system includes the issuing of certificates, validation by a panel within an organization, and individual hash keys for validity. This strategy makes certificate validation easier while lowering the possibility of loss and guaranteeing student comfort.[9] Although important, diplomas are susceptible to falsification. Traditional verification is time-consuming and costly. The study proposes a blockchain paradigm for cryptographically secure certificate issuance and verification. This model tackles issues with authenticity andsatisfies current verification standards.[10]
  • 3. e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science ( Peer-Reviewed, Open Access, Fully Refereed International Journal ) Volume:05/Issue:12/December-2023 Impact Factor- 7.868 www.irjmets.com www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science [723] The need for more storage space has arisen as a result of therapid growth of information brought on by web improvements. To address this, cloud platforms are employed, but solid security measures are crucial. A suggested solution to this problem uses blockchain technology for cloud storage and security. Blockchain's decentralized structure guarantees security and supports theobjective of improving cloud storage security. This paper introduces the concept of Blockchain technology and explores its current research trends.[11] The current system of cloud storage relies on centralized suppliers, which raises concerns about pricing, the caliber of the program, and data security. The study offers a model for a multi-user access control system in databases that uses blockchain technology to address these issues. This strategy guarantees dispersed and stable data processing. Through a web gateway, users can upload encrypted material that can only be accessed by those holding the right secret key. The solution makes use of blockchain's immutability to improve data privacy while processing data in the cloud. Overall, the suggested safe, blockchain-based solution intends to strengthen data privacy and decentralize control to increasethe security of cloud storage.[12] This paper describes how cryptography links records into blocks in the peer-to-peer decentralized blockchain system, ensuring security, dependability, and transparency. In order to address the problems with different identity document issuers and document fraud, it suggests an innovative strategy for government document verification. An efficient and secure method of exchanging authenticated official documents between governments, businesses, and educational institutions is provided by a private permissioned blockchain network. This removes the need for excessive human involvement and greatly boosts the effectiveness of the processes for document issuance and verification. Enhanced security, dependability, and transparency are advantages of the blockchain paradigm.[13] III. METHODOLOGY Ensuring the authenticity and accuracy of documents through the integration of blockchain technology can be effectively achieved with the aid of smart contracts. Smart contracts serve as automated digital protocols designed to scrutinize the genuineness of documents, offering a refined methodological approach: Initially, the transformation of traditional paper documents into digital format is initiated. This conversion process is facilitated through digitizationmethods, such as scanning or photography. Subsequently,the digital iteration of the document undergoes a crypto- graphic transformation, giving rise to a distinct "hash." Thehash functions as an exclusive digital identifier, engendered through specialized algorithms, effectively encapsulating the intrinsic characteristics of the document. Simultaneously, the digital document is integrated into the Inter Planetary File System (IPFS), thereby acquiring an additional layer of distinct identification to enhance its retrieval. Concurrently, the aforementioned hash is inscribed onto a blockchain, a steadfast digital ledger. The blockchaincorroborates the perpetuation of hash integrity, thus avertingany form of malicious manipulation. Subsequent to this, theformulation of a "smart contract" ensues. Thisprogrammable software mechanism acts as a discerningarbiter of document authenticity, contingent upon the hashand predefined criteria. Verification of documentauthenticity is effectuated by inputting the document's hashinto the smart contract. The smart contract conducts acomparative assessment with the hash recorded on theblockchain. A congruence between the two hashes attests tothe legitimacy of the document, whereas incongruity alludesto potential tampering. However, prior to document utilization, substantiating ownership is a requisite. Ownership validation is achieved through a specializeddigital signature, serving as proof of the owner's legitimateentitlement. Upon successful validation of ownership,access to the document is facilitated via the IPFS network.This retrieval process closely resembles the act of extractinga document from a bespoke digital repository. Insummation, adherence to this systematic frameworkculminates in the preservation of documents within theprecincts of the IPFS network. Document accessibility is limited exclusively to individuals who possess substantiated ownership, thereby endowing this paradigm with pertinenceacross multifarious contexts, encompassing the safeguarding of confidential medical records, scrutiny of pivotal legal documents, and the secure management of classified information. A. How a blockchain produces a hash key Hash keys are developed on a blockchain, such as Ethereum,using cryptographic hash functions. These hash functions take an input (or message) and turn it into a fixed- length,evidently random, distinctive string of characters. Goodcryptographic hash function features include: Deterministic: The hash function always provides the sameresult for the same input.
  • 4. e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science ( Peer-Reviewed, Open Access, Fully Refereed International Journal ) Volume:05/Issue:12/December-2023 Impact Factor- 7.868 www.irjmets.com www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science [724] Quick Calculation: The hash function need to be quick tocalculate. Pre-image Resistance: Reverse-engineering the input fromthe hashes should be impossible. Collision Resistance: Developing the identical hash output from two separate inputs should be extremely uncommon. B. Hash keys have a vital role in the context of blockchain in a number of ways, involving Block Hashes: every block that appears in a blockchain hasa hash of the header from the block that preceded it. By interconnecting the blocks together, this makes the block- chain tamper-evident and reassures that changing one blockrequires modifying all succeeding blocks. Transaction Hashes: A block's transactions all get hashed. The content of the block matches this hash. It makes the transactions' inclusion in the block and integrity more certain. Merkle Trees: Merkle trees are used on numerous blockchains, like Bitcoin and Ethereum, to effectively summarize and endorse the transactions within a block. Eachpair of combined transaction hashes is then hashed once more to create a single root hash, which is subsequently written into the block header. Smart Contracts: The address of a smart contract is derivedby hashing the code and state of the contract. To locate andcommunicate with the agreement on the blockchain, use thisaddress. Cryptographic Signatures: e-signatures, which are essential for confirming the legitimacy of transactions and messages,are generated via hashing. The input gets processed using a mathematical procedure to produce the hash output during the hashing process. No matter how long the input is, the hash that results usually hasthe same length. This characteristic enables reliable data storage and comparison without disclosing the original input. The Keccak-256 hash function, which is a member of the SHA-3 family, is regularly used in Ethereum. Although other blockchains may employ various hash functions, the fundamentals of hash function features and the ways in which they are used in blockchain remain unchanged. C. What is IPFS Inter Planetary File System (IPFS) is a distributed, decentralized file-storing and sharing technology created to make it easier and more reliable to save and access data online. On the other hand, Infura is a service that gives usersquick access to Ethereum and IPFS nodes, making it easier to communicate with those networks without having to set up and manage nodes themselves. IPFS (InterPlanetary File System) to address some of the drawbacks of traditional web-based file storage and sharing, IPFS is a protocol and network. IPFS employs a peer-to-peer network to distribute and store files among numerous nodes as opposed to depending on centralized servers. Files are broken up into smaller pieces and assigned a unique hash based on their content. Even if the original uploader is not online, the filesare secure and easily retrievable because to this hash-based addressing system. Reduced bandwidth use, more redundancy, and improved data availability are the goals of IPFS. IV. PROPOSED SYSTEM The suggested document verification system incorporates utilization of IPFS (InterPlanetary File System) storage made feasible by Infura, as well as the strength of blockchain technology, for instance Ethereum (ETH). This technology attempts to improve the immutability, transparency, and security of documents during verification processes. Documents in the aforementioned format are hashed and kept on the IPFS network, guaranteeing their availability and integrity. These papers' hashes are subsequently anchored onto the Ethereum blockchain, resulting in an ineradicable record of the document's existence at a particular time. On the Ethereum network, smart contracts are used to regulate the verification procedure. The system prepares a hash of the document when a usersubmits it for verification and compares it to the hash generated on the blockchain. The legitimacy of thedocument is verified if the hashes turn out to be identical. A high level of trust and security is laid out by thedecentralized and impenetrable nature of blockchain, allowing individuals to be sure that once a document isauthenticated and recorded, it cannot be disrupted or erased. Infura's IPFS storage makes for swift and trustworthy access to the documents. The smooth connection betweenthe Ethereum smart contracts and the documents saved inIPFS is rendered viable by
  • 5. e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science ( Peer-Reviewed, Open Access, Fully Refereed International Journal ) Volume:05/Issue:12/December-2023 Impact Factor- 7.868 www.irjmets.com www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science [725] Infura, which functions as agateway to the IPFS network. Utilizing this combination oftechnologies, document verification is guaranteed to be user-friendly, scalable, and secure in addition to being transparent and accountable. Fig.1 Proposed system process V. RESULT Fig.1 Fig.2
  • 6. e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science ( Peer-Reviewed, Open Access, Fully Refereed International Journal ) Volume:05/Issue:12/December-2023 Impact Factor- 7.868 www.irjmets.com www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science [726] Fig.3 Fig.4 VI. CONCLUSION Implementing blockchain for authentication basis gives outa changeful way that boosts sureness, protection, translucency and guarantee over several management. Among its distributed and unchangeable quality, blockchain technology establishes that data resistance is protected, decreasing the threat of scam and inappropriate variation. The operation of cryptographic hashing and agreement contraption else solidifies the rectitude of the details kept secretly in blockchain. Carrying out blockchain for confirmation action provides well-being such as consolidated authentication, structuredrecord- keeping, and abridged probe. The advantages hand out to increment practical productivity, minimize expense,and user satisfaction. Likewise, blockchain’s courage tohabitual faith amid partners without needed emissaries has the further ability to reconstruct an ethical authentication system and allow the particular to have more power abovetheir independent data. Fundamentally, the merging of blockchain technology into authentication action imprint a crucial impression approaching a new safe, limpid and authoritative electronicprospect. As the technology carries on to progress and grows, its collision on numerous categories could recompose how information is established and
  • 7. e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science ( Peer-Reviewed, Open Access, Fully Refereed International Journal ) Volume:05/Issue:12/December-2023 Impact Factor- 7.868 www.irjmets.com www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science [727] collaborative, conclusively compelling inventive and gaining the approach we reach out along data in our mutually dependent universe. Notwithstanding, while the possibility is momentous,objections such as adaptivity, efficiency exploitation and ministerial threats remain to be consigned. Compelling a poise amongst distribute ammunition and resource effectualwill be vital for the comprehensive enactment of blockchainbased verification elucidation. VII. REFERENCES [1] Iftekher Toufique Imam, Yamin Arafat, Kazi Saeed Alam and Shaikh Akib Shahriyar, "DOC-BLOCK: A Blockchain Based Authentication System for Digital Documents," 2021 Proceedings of the Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV 2021). IEEE Xplore Part Number: CFP21ONG-ART; 978-0-7381-1183-4. [2] Pavitra Haveri, Rashmi U B, Narayan D.G., Nagaratna K, Shivaraj K, "EduBlock: Securing Educational Documents using Blockchain Technology," 2020 11th ICCCNT 2020 July 1-3, 2020 - IIT – Kharagpur. [3] Ajay Kumar Shrivastava, Chetan Vashistth, Akash Rajak, Arun Kumar Tripathi, "A Decentralized Way to Store and Authenticate Educational Documents on Private Blockchain" 2019 2nd International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT) 978-1-7281-1772-0 ©2019 IEEE. [4] Abdulkareem Saber Kareem, Ahmed Chalak Shakir "Review: Verification Process of Academic Certificates Using Blockchain Technology" Kirkuk University Journal-Scientific Studies Vol. 18, Iss. 1, p 62-75, 2023. doi:10.32894/kujss.2023.135876.1072 [5] Tarek Kanan, Ahamd Turki Obaidat, Majduleen Al- Lahham, "SmartCert BlockChain Imperative for Educational Certificates" 2019 IEEE Jordan International Joint Conference on Electrical Engineering and InformationTechnology (JEEIT) 978-1-5386-7942-5/19/$31.00 ©2019 IEEE. [6] Sthembile Mthethwa, Nelisiwe Dlamini, Dr. Graham Barbour. "Proposing a Blockchain-based Solution to Verify the Integrity of Hardcopy Documents" 2018 International Conference on Intelligent and Innovative ComputingApplications. DOI:10.1109/ICONIC.2018.8601200 [7] Y. Shakan, B. Kumalakov, G. Mutanov, Zh. Mamykova, Y. Kistaubayev “Verification of University Student and Graduate Data using Blockchain Technology” INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL Online ISSN 1841- 9844, ISSN-L 1841-9836, Volume: 16, Issue: 5, Month: October, Year: 2021 ArticleNumber:4266,https://doi.org/10.15837/ijccc.2021.5.4266 [8] Isyak Meirobiea,Agustinus Purna Irawan, Husni Teja Sukmana, Diana Putri Lazirkha, Nuke Puji Lestari Santoso, "Framework Authentication e-document using Blockchain Technology on the Government system," 2022 International Journal of Artificial Intelegence Research ISSN: 2579-7298 Vol 6, No 2, December 2022 [9] Ravi Singh Lamkoti, Devdoot Maji, Hitesh Shetty, Prof. Bharati Gondhalekar "Certificate Verification using Blockchain and Generation of Transcript" International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 IJERTV10IS030260 Vol. 10 Issue 03, March-2021 [10] Osman Ghazali and Omar S. Saleh, "A Graduation Certificate Verification Model via Utilization of Blockchain Technology," 2018 Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 10(3-2) [11] Aamir Mughal and Alex Joseph, "Blockchain for CloudStorage Security: A Review," 2020 Proceedings of the International Conference on Intelligent Computing and Control Systems (ICICCS 2020) IEEE Xplore Part Number:CFP20K74-ART; ISBN: 978-1-7281-4876-2 [12] Shubham Desai, Rahul Shelke, Omkar Deshmukh, Harish Choudhary, Arjunsingh Yadav, Prof. S.S.Sambhare,“Blockchain based Secure Data Storage and Access ControlSystem using Cloud,” 2019 5th International Conference onComputing Communication Control and Automation (ICCUBEA) [13] Gunit Malik, Kshitij Parasrampuria, Sai PrasanthReddy, Dr. Seema Shah "Blockchain Based Identity Verification Model" 2019 International Conference on Vision Towards Emerging Trends in Communication andNetworking(ViTECoN) DOI:10.1109/ViTECoN.2019.8899569