SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1932
Blockchain based Certificate Issuing and Validation
Gowri Shankar K1, 2=Dravid A2, Kamesh M3, Dr. Jaison B4
1,2,3B.E Computer Science and Engineering, RMK Engineering College, Tamil Nadu, India
4M.E, M.phil Associate Professor, RMK Engineering College, Tamil Nadu, India
---------------------------------------------------------------***--------------------------------------------------------------
Abstract: According to recent researches about three
million graduates are passing outeachyearandthecertificate
issuing authorities seems to be compromised for the data
credentials of student information. Due to the absence of
effective antiforge mechanism, events that led to the
graduation certificate to be forged often skips gettingnoticed.
In order to solve this problem digital certificate systems were
introduced even though security limitations still prevailed.
Blockchain is one of the most recent and secure technology
that can be adopted for the storage data security. The
immutable property of the block chain along with multisig
functionality and public key cryptography helps us overcome
the problem of certificate forgery and modification. Various
issuing and hashing mechanisms have also been used to
prevent the usage of duplicate certificates.
Key Words: Blockchain, Digital Certificate,Hashing,Multisig,
Public key cryptography
1. INTRODUCTION
Graduation certificates and transcripts hold information
that is easily tampered illegally by individuals and should
not be easily accessible to outside entities. Hence, there is a
high need for a efficient mechanism that can guarantee the
information in such certificates is original, which means the
document has originated from an reliable and authorized
source and is not forged .Various systems has beendesigned
to secure e-certificates for education institutions[16][17]
and to store themsecurelyin cloudbasedsystems[15].Public
key cryptography is a main tool to felicitate this need and
when combined with different hashing techniques, this
becomes a powerful method for issuing and transmission of
certificates over the internet. It also helps in eliminating the
need for constant verification of certificates. Blockchain
technology is used to reduce the incidence of certificate
forgeries and ensure that the security, validity and
confidentiality of graduationcertificateswould beimproved.
Technologies that exist in security domains include digital
signatures [14], which are used in digital documents to
provide authentication, integrity and non-repudiation. Also
with blockchain in play, storage of certificates are most
secure. With these technologies a portal has been created
that facilitates the need for safe issuing and transfer of
certificates that cannot be tampered with.
2. LITERATURE REVIEW
Holt [1] has suggested a different method to store log in a
encrypted fashion which makes it difficult to modify, and
incase if it is modified it can be detected easily. He
emphasizes on the security aspects by explaining log
creation and verification process separately.
And Rew Sutton and Reza Samavi[2] have presenteda paper
on “blockchain enabled privacy audit logs” which
concentrates on integrity and authenticity of the data based
on the linked data technique.
The Main Concept of blockchain is immutabilityitisattained
by calculating checksum using previous checksum value in
that link which makes it impossible to modify[3].are stored
in a cloud by concatenating the previous log hash with the
current log hash. In log validation process, generated local
hash and cloud hash will be compared, and it returns valid if
both hash values are same[4].
DApp(Decentralized Apps) stores the data in decentralized
manner and changes made in a single ledger will reflects in
every other ledger. Token mechanism is employed in
it[5][6].
There are three architectural patterns of DApps. In first
pattern (Self-Generated Transactions), Users can directly
send a transaction or use a web frontend such as
MyEtherWallet [7] or use a browser such as Chrome with
Metamask [8], Cipher [9], Status [10]. It doesn’t depend on
third party provider.
In second pattern(Self-ConfirmedTransactions),Usershould
trust the DApp provider since DApp provider generates the
transaction and further verification will be done by the
user[11].
In third pattern(Delegated Transactions), User can interact
with the website offered by DApp provider without the
support of cryptobrowsers. Interaction with blockchainand
sending transactions will be done by backend of website
offered by DApp provider. Common example forthispattern
is Kraken[12].
Naota Yanai[13] has suggested a ID based multi signatures,
In that signer generates a partial signature and combines it
with signatures of group of signers.
3. PROPOSED SYSTEM
Our system is being proposed to issue, store and retrieve
university certificates through a common portal. Companies
can retrieve valid certificates of students through thisportal
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1933
through permission from both the student and the
institution that’s hosting the certificates. Initiallythatissued
certificates are scanned and upload to the portal through
proper validation. The certificates are stored alongside the
student credentials in various servers. The hashes of the
certificates are stored in blockchain. A Comb structure
similar to that of blockchain has been implemented to alter
few certificates if required. When a company requests a
certificate from the institution, it retrieves the certificate
after checking it with the blockchain. If the hashes don’t
match then the system is compromisedandnewcertificateis
issued. Else the institution hashes the certificate with its
private key and sends a request to the student. When the
student accepts the request, the certificate is again hashed
with his/her private key and is sent to the organization. The
organization uses the public keys of both entities to validate
the transaction and maintain authenticity. This eliminates
the need for redundant verification at different
organizations. Confidentiality can also be enforced by using
private key cryptographic methods. The system uses PHP as
it main functional language and Angularjs for it frontend
operations.SHA-256 is used for hashing purposes. Below is
the use case of the system that briefly portrays the entire
function of the proposed system. Ledger is the database that
contains all the required certificates along with the hashes.
Multisig functionality is used to involve the user in every
authentication process.
Fig1. BLOCKCHAIN STRUCTURE OF STUDENT
CERTIFICATE DATABASE
Fig2. TECHNOLOGY STACK FOR BLOCKCHAIN BASED
CERTIFICATION SYSTEM
Fig3-USE CASE FOR BLOCKCHAIN BASED CERTIFICATION
SYSTEM
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1934
4. CONCLUSION
A blockchain-based certificate storagesystem eliminatesthe
certificate forgery. Automated certificateissuing mechanism
is open, compatible and transparent to the system and its
users. Companies and institutions can thus inquire for
information on any certificate from the system itself. The
system saves on paper use, reduces management and
maintenance costs, prevents documentforgeryandprovides
accurate, reliable and verifiable information on digital
certificates.
5. REFERENCES
[1] Holt JE. Logcrypt: forward security and public
verification for secure audit logs. Proceedings of the 4th
Australasian workshops on grid computing and e research
(ACSW '06), Tasmania, Australia, 2006; 203–211.
[2] Sutton A., Samavi R. (2017) Blockchain Enabled Privacy
Audit Logs. In: d'Amato C. et al. (eds) The Semantic Web –
ISWC 2017. ISWC 2017. Lecture Notes in Computer Science,
vol 10587. Springer, Cham
[3] Cucurull J., PuiggalĂ­ J. (2016) Distributed
Immutabilization of Secure Logs. In: Barthe G., Markatos E.,
Samarati P. (eds) Security and Trust Management. STM
2016. Lecture Notes in ComputerScience,vol 9871.Springer,
Cham.
[4] Dr. Manish Kumar, Ashish Kumar Singh, Dr. T V Suresh
Kumar (2018) Secure Log Storage Using Blockchain and
Cloud Infrastructure (ICCCNT).
[5] D. Johnston, S. O. Yilmaz, J. Kandah, N. Bentenitis, F.
Hashemi, R. Gross, S. Wilkinson, and S. Mason. Decentralized
Applications: Decentralized applications white paper and
spec. (Accessed 2018-03-15). [Online]. Available:
https://github.com/DavidJohnstonCEO/DecentralizedApplic
ations
[6] S. Raval, Decentralizedapplications:harnessingBitcoin’s
Blockchain technology, 2016, ISBN 978-1-4919-2452-5.
[7] MyEtherWallet LLC. Myetherwallet. (Accessed 2018-03-
15). [Online].Available:https://www.myetherwallet.com
[8] ConsenSys. Metamask. (Accessed 2018-03-15). [Online].
Available: https://metamask.io
[9] HardFork Inc. Cipher. (Accessed 2018-03-15). [Online].
Available: https://www.cipherbrowser.com
[10] Status Research & Development GmbH. Status – a
mobile ethereum os. (Accessed 2018-03-15). [Online].
Available: https://status.im
[11] Florian Wessling, Volker Gruhn (2018) Engineering
Software Architectures of Blockchain-OrientedApplications
(ICSA).
[12] Payward, Inc. Kraken. (Accessed 2018-03-15).[Online].
Available: https://www.kraken.com
[13] Naota Yanai(2017) Tightly Secure Identity-Based
Multisignatures (ICCE-TW).
[14] M. Warasart and P. Kuacharoen, “Paper-based
Document Authentication using Digital Signature and QR
Code,” no. Iccet, 2012.
[15] Osman Ghazali, Omar S. Saleh, “Cloud BasedGraduation
Certificate Verification Model”.
[16] Mahamat, M. B. (2016), A Web Service Based Database
Access for Nigerian Universities’ Certificate Verification
System.
[17] Lisha Chen-Wilson, Dr David Argles,”Towards a
framework of A Secure E-Qualification Certificate System

Weitere ähnliche Inhalte

Was ist angesagt?

All about Bitcoins!
All about Bitcoins!All about Bitcoins!
All about Bitcoins!Prajakta Nimje
 
How Can Blockchain Technology Impact The Travel & Tourism Industry?
How Can Blockchain Technology Impact The Travel & Tourism Industry?How Can Blockchain Technology Impact The Travel & Tourism Industry?
How Can Blockchain Technology Impact The Travel & Tourism Industry?Pulsehyip
 
Exploring Blockchain Technology, Risks, and Emerging Trends
Exploring Blockchain Technology, Risks, and Emerging TrendsExploring Blockchain Technology, Risks, and Emerging Trends
Exploring Blockchain Technology, Risks, and Emerging TrendsAmazon Web Services
 
Introduction to Blockchain-as-a-Service (BaaS)
Introduction to Blockchain-as-a-Service (BaaS)Introduction to Blockchain-as-a-Service (BaaS)
Introduction to Blockchain-as-a-Service (BaaS)Cygnet Infotech
 
DIGITAL SIGNATURE
DIGITAL SIGNATUREDIGITAL SIGNATURE
DIGITAL SIGNATUREravijain90
 
Digital certificates
Digital certificatesDigital certificates
Digital certificatesSimmi Kamra
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain PresentationZied GUESMI
 
IoT 2019 overview
IoT 2019 overviewIoT 2019 overview
IoT 2019 overviewengIT
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...Bharath Nair
 
The Potential of Blockchain Technology
The Potential of Blockchain TechnologyThe Potential of Blockchain Technology
The Potential of Blockchain TechnologyPioneers.io
 
Kerberos authentication
Kerberos authenticationKerberos authentication
Kerberos authenticationSuraj Singh
 
Protocol for Secure Communication
Protocol for Secure CommunicationProtocol for Secure Communication
Protocol for Secure Communicationchauhankapil
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signaturejolly9293
 
Blockchain
BlockchainBlockchain
BlockchainMohit Singh
 
Introduction to Ethereum Blockchain & Smart Contract
Introduction to Ethereum Blockchain & Smart ContractIntroduction to Ethereum Blockchain & Smart Contract
Introduction to Ethereum Blockchain & Smart ContractThanh Nguyen
 

Was ist angesagt? (20)

Blockchain with iot
Blockchain with iotBlockchain with iot
Blockchain with iot
 
All about Bitcoins!
All about Bitcoins!All about Bitcoins!
All about Bitcoins!
 
How Can Blockchain Technology Impact The Travel & Tourism Industry?
How Can Blockchain Technology Impact The Travel & Tourism Industry?How Can Blockchain Technology Impact The Travel & Tourism Industry?
How Can Blockchain Technology Impact The Travel & Tourism Industry?
 
Exploring Blockchain Technology, Risks, and Emerging Trends
Exploring Blockchain Technology, Risks, and Emerging TrendsExploring Blockchain Technology, Risks, and Emerging Trends
Exploring Blockchain Technology, Risks, and Emerging Trends
 
Introduction to Blockchain-as-a-Service (BaaS)
Introduction to Blockchain-as-a-Service (BaaS)Introduction to Blockchain-as-a-Service (BaaS)
Introduction to Blockchain-as-a-Service (BaaS)
 
DIGITAL SIGNATURE
DIGITAL SIGNATUREDIGITAL SIGNATURE
DIGITAL SIGNATURE
 
IBM TradeLens.pptx
IBM TradeLens.pptxIBM TradeLens.pptx
IBM TradeLens.pptx
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain Presentation
 
IoT 2019 overview
IoT 2019 overviewIoT 2019 overview
IoT 2019 overview
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
 
The Potential of Blockchain Technology
The Potential of Blockchain TechnologyThe Potential of Blockchain Technology
The Potential of Blockchain Technology
 
Blockchain
Blockchain Blockchain
Blockchain
 
Kerberos authentication
Kerberos authenticationKerberos authentication
Kerberos authentication
 
NFT Fundamentals
NFT FundamentalsNFT Fundamentals
NFT Fundamentals
 
Protocol for Secure Communication
Protocol for Secure CommunicationProtocol for Secure Communication
Protocol for Secure Communication
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
Blockchain
BlockchainBlockchain
Blockchain
 
Introduction to Ethereum Blockchain & Smart Contract
Introduction to Ethereum Blockchain & Smart ContractIntroduction to Ethereum Blockchain & Smart Contract
Introduction to Ethereum Blockchain & Smart Contract
 
Jini technology ppt
Jini technology pptJini technology ppt
Jini technology ppt
 

Ă„hnlich wie IRJET- Blockchain based Certificate Issuing and Validation

IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET Journal
 
Fake Certificate Detection by using Blockchain
Fake Certificate Detection by using BlockchainFake Certificate Detection by using Blockchain
Fake Certificate Detection by using BlockchainIRJET Journal
 
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINAN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINIRJET Journal
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET Journal
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through TokenIRJET Journal
 
CauseVCare - A Blockchain based Charity DApp
CauseVCare - A Blockchain based Charity DAppCauseVCare - A Blockchain based Charity DApp
CauseVCare - A Blockchain based Charity DAppIRJET Journal
 
A Survey on Use of Blockchain Technology in Introducing Transparency in Charity
A Survey on Use of Blockchain Technology in Introducing Transparency in CharityA Survey on Use of Blockchain Technology in Introducing Transparency in Charity
A Survey on Use of Blockchain Technology in Introducing Transparency in CharityIRJET Journal
 
IRJET- Decentralized Kyc System
IRJET- Decentralized Kyc SystemIRJET- Decentralized Kyc System
IRJET- Decentralized Kyc SystemIRJET Journal
 
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET Journal
 
IRJET- Credible Data through Distributed Ledger Technology
IRJET-  	  Credible Data through Distributed Ledger TechnologyIRJET-  	  Credible Data through Distributed Ledger Technology
IRJET- Credible Data through Distributed Ledger TechnologyIRJET Journal
 
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONSA CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONSIJNSA Journal
 
Blockchain Based E-Voting
Blockchain Based E-VotingBlockchain Based E-Voting
Blockchain Based E-VotingIRJET Journal
 
Decentralized Car Hailing Application
Decentralized Car Hailing ApplicationDecentralized Car Hailing Application
Decentralized Car Hailing ApplicationIRJET Journal
 
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using BlockchainIRJET - Improving Password System using Blockchain
IRJET - Improving Password System using BlockchainIRJET Journal
 
ENHANCING SECURITY AND TRANSPARENCY: THE ROLE OF BLOCKCHAIN IN DOCUMENT VERIF...
ENHANCING SECURITY AND TRANSPARENCY: THE ROLE OF BLOCKCHAIN IN DOCUMENT VERIF...ENHANCING SECURITY AND TRANSPARENCY: THE ROLE OF BLOCKCHAIN IN DOCUMENT VERIF...
ENHANCING SECURITY AND TRANSPARENCY: THE ROLE OF BLOCKCHAIN IN DOCUMENT VERIF...Terna Engineering College
 
A cryptographic mutual authentication scheme for web applications
A cryptographic mutual authentication scheme for web applicationsA cryptographic mutual authentication scheme for web applications
A cryptographic mutual authentication scheme for web applicationsIJNSA Journal
 
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...ijcisjournal
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET Journal
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET Journal
 

Ă„hnlich wie IRJET- Blockchain based Certificate Issuing and Validation (20)

IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate System
 
Fake Certificate Detection by using Blockchain
Fake Certificate Detection by using BlockchainFake Certificate Detection by using Blockchain
Fake Certificate Detection by using Blockchain
 
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINAN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through Token
 
CauseVCare - A Blockchain based Charity DApp
CauseVCare - A Blockchain based Charity DAppCauseVCare - A Blockchain based Charity DApp
CauseVCare - A Blockchain based Charity DApp
 
A Survey on Use of Blockchain Technology in Introducing Transparency in Charity
A Survey on Use of Blockchain Technology in Introducing Transparency in CharityA Survey on Use of Blockchain Technology in Introducing Transparency in Charity
A Survey on Use of Blockchain Technology in Introducing Transparency in Charity
 
IRJET- Decentralized Kyc System
IRJET- Decentralized Kyc SystemIRJET- Decentralized Kyc System
IRJET- Decentralized Kyc System
 
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing Framework
 
IRJET- Credible Data through Distributed Ledger Technology
IRJET-  	  Credible Data through Distributed Ledger TechnologyIRJET-  	  Credible Data through Distributed Ledger Technology
IRJET- Credible Data through Distributed Ledger Technology
 
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONSA CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
 
Blockchain Based E-Voting
Blockchain Based E-VotingBlockchain Based E-Voting
Blockchain Based E-Voting
 
Decentralized Car Hailing Application
Decentralized Car Hailing ApplicationDecentralized Car Hailing Application
Decentralized Car Hailing Application
 
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using BlockchainIRJET - Improving Password System using Blockchain
IRJET - Improving Password System using Blockchain
 
ENHANCING SECURITY AND TRANSPARENCY: THE ROLE OF BLOCKCHAIN IN DOCUMENT VERIF...
ENHANCING SECURITY AND TRANSPARENCY: THE ROLE OF BLOCKCHAIN IN DOCUMENT VERIF...ENHANCING SECURITY AND TRANSPARENCY: THE ROLE OF BLOCKCHAIN IN DOCUMENT VERIF...
ENHANCING SECURITY AND TRANSPARENCY: THE ROLE OF BLOCKCHAIN IN DOCUMENT VERIF...
 
A cryptographic mutual authentication scheme for web applications
A cryptographic mutual authentication scheme for web applicationsA cryptographic mutual authentication scheme for web applications
A cryptographic mutual authentication scheme for web applications
 
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
 
ICITSI Slide Fix.pptx
ICITSI Slide Fix.pptxICITSI Slide Fix.pptx
ICITSI Slide Fix.pptx
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 

Mehr von IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

KĂĽrzlich hochgeladen

Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsSachinPawar510423
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadaditya806802
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...Amil Baba Dawood bangali
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptJasonTagapanGulla
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 

KĂĽrzlich hochgeladen (20)

Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 

IRJET- Blockchain based Certificate Issuing and Validation

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1932 Blockchain based Certificate Issuing and Validation Gowri Shankar K1, 2=Dravid A2, Kamesh M3, Dr. Jaison B4 1,2,3B.E Computer Science and Engineering, RMK Engineering College, Tamil Nadu, India 4M.E, M.phil Associate Professor, RMK Engineering College, Tamil Nadu, India ---------------------------------------------------------------***-------------------------------------------------------------- Abstract: According to recent researches about three million graduates are passing outeachyearandthecertificate issuing authorities seems to be compromised for the data credentials of student information. Due to the absence of effective antiforge mechanism, events that led to the graduation certificate to be forged often skips gettingnoticed. In order to solve this problem digital certificate systems were introduced even though security limitations still prevailed. Blockchain is one of the most recent and secure technology that can be adopted for the storage data security. The immutable property of the block chain along with multisig functionality and public key cryptography helps us overcome the problem of certificate forgery and modification. Various issuing and hashing mechanisms have also been used to prevent the usage of duplicate certificates. Key Words: Blockchain, Digital Certificate,Hashing,Multisig, Public key cryptography 1. INTRODUCTION Graduation certificates and transcripts hold information that is easily tampered illegally by individuals and should not be easily accessible to outside entities. Hence, there is a high need for a efficient mechanism that can guarantee the information in such certificates is original, which means the document has originated from an reliable and authorized source and is not forged .Various systems has beendesigned to secure e-certificates for education institutions[16][17] and to store themsecurelyin cloudbasedsystems[15].Public key cryptography is a main tool to felicitate this need and when combined with different hashing techniques, this becomes a powerful method for issuing and transmission of certificates over the internet. It also helps in eliminating the need for constant verification of certificates. Blockchain technology is used to reduce the incidence of certificate forgeries and ensure that the security, validity and confidentiality of graduationcertificateswould beimproved. Technologies that exist in security domains include digital signatures [14], which are used in digital documents to provide authentication, integrity and non-repudiation. Also with blockchain in play, storage of certificates are most secure. With these technologies a portal has been created that facilitates the need for safe issuing and transfer of certificates that cannot be tampered with. 2. LITERATURE REVIEW Holt [1] has suggested a different method to store log in a encrypted fashion which makes it difficult to modify, and incase if it is modified it can be detected easily. He emphasizes on the security aspects by explaining log creation and verification process separately. And Rew Sutton and Reza Samavi[2] have presenteda paper on “blockchain enabled privacy audit logs” which concentrates on integrity and authenticity of the data based on the linked data technique. The Main Concept of blockchain is immutabilityitisattained by calculating checksum using previous checksum value in that link which makes it impossible to modify[3].are stored in a cloud by concatenating the previous log hash with the current log hash. In log validation process, generated local hash and cloud hash will be compared, and it returns valid if both hash values are same[4]. DApp(Decentralized Apps) stores the data in decentralized manner and changes made in a single ledger will reflects in every other ledger. Token mechanism is employed in it[5][6]. There are three architectural patterns of DApps. In first pattern (Self-Generated Transactions), Users can directly send a transaction or use a web frontend such as MyEtherWallet [7] or use a browser such as Chrome with Metamask [8], Cipher [9], Status [10]. It doesn’t depend on third party provider. In second pattern(Self-ConfirmedTransactions),Usershould trust the DApp provider since DApp provider generates the transaction and further verification will be done by the user[11]. In third pattern(Delegated Transactions), User can interact with the website offered by DApp provider without the support of cryptobrowsers. Interaction with blockchainand sending transactions will be done by backend of website offered by DApp provider. Common example forthispattern is Kraken[12]. Naota Yanai[13] has suggested a ID based multi signatures, In that signer generates a partial signature and combines it with signatures of group of signers. 3. PROPOSED SYSTEM Our system is being proposed to issue, store and retrieve university certificates through a common portal. Companies can retrieve valid certificates of students through thisportal
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1933 through permission from both the student and the institution that’s hosting the certificates. Initiallythatissued certificates are scanned and upload to the portal through proper validation. The certificates are stored alongside the student credentials in various servers. The hashes of the certificates are stored in blockchain. A Comb structure similar to that of blockchain has been implemented to alter few certificates if required. When a company requests a certificate from the institution, it retrieves the certificate after checking it with the blockchain. If the hashes don’t match then the system is compromisedandnewcertificateis issued. Else the institution hashes the certificate with its private key and sends a request to the student. When the student accepts the request, the certificate is again hashed with his/her private key and is sent to the organization. The organization uses the public keys of both entities to validate the transaction and maintain authenticity. This eliminates the need for redundant verification at different organizations. Confidentiality can also be enforced by using private key cryptographic methods. The system uses PHP as it main functional language and Angularjs for it frontend operations.SHA-256 is used for hashing purposes. Below is the use case of the system that briefly portrays the entire function of the proposed system. Ledger is the database that contains all the required certificates along with the hashes. Multisig functionality is used to involve the user in every authentication process. Fig1. BLOCKCHAIN STRUCTURE OF STUDENT CERTIFICATE DATABASE Fig2. TECHNOLOGY STACK FOR BLOCKCHAIN BASED CERTIFICATION SYSTEM Fig3-USE CASE FOR BLOCKCHAIN BASED CERTIFICATION SYSTEM
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1934 4. CONCLUSION A blockchain-based certificate storagesystem eliminatesthe certificate forgery. Automated certificateissuing mechanism is open, compatible and transparent to the system and its users. Companies and institutions can thus inquire for information on any certificate from the system itself. The system saves on paper use, reduces management and maintenance costs, prevents documentforgeryandprovides accurate, reliable and verifiable information on digital certificates. 5. REFERENCES [1] Holt JE. Logcrypt: forward security and public verification for secure audit logs. Proceedings of the 4th Australasian workshops on grid computing and e research (ACSW '06), Tasmania, Australia, 2006; 203–211. [2] Sutton A., Samavi R. (2017) Blockchain Enabled Privacy Audit Logs. In: d'Amato C. et al. (eds) The Semantic Web – ISWC 2017. ISWC 2017. Lecture Notes in Computer Science, vol 10587. Springer, Cham [3] Cucurull J., PuiggalĂ­ J. (2016) Distributed Immutabilization of Secure Logs. In: Barthe G., Markatos E., Samarati P. (eds) Security and Trust Management. STM 2016. Lecture Notes in ComputerScience,vol 9871.Springer, Cham. [4] Dr. Manish Kumar, Ashish Kumar Singh, Dr. T V Suresh Kumar (2018) Secure Log Storage Using Blockchain and Cloud Infrastructure (ICCCNT). [5] D. Johnston, S. O. Yilmaz, J. Kandah, N. Bentenitis, F. Hashemi, R. Gross, S. Wilkinson, and S. Mason. Decentralized Applications: Decentralized applications white paper and spec. (Accessed 2018-03-15). [Online]. Available: https://github.com/DavidJohnstonCEO/DecentralizedApplic ations [6] S. Raval, Decentralizedapplications:harnessingBitcoin’s Blockchain technology, 2016, ISBN 978-1-4919-2452-5. [7] MyEtherWallet LLC. Myetherwallet. (Accessed 2018-03- 15). [Online].Available:https://www.myetherwallet.com [8] ConsenSys. Metamask. (Accessed 2018-03-15). [Online]. Available: https://metamask.io [9] HardFork Inc. Cipher. (Accessed 2018-03-15). [Online]. Available: https://www.cipherbrowser.com [10] Status Research & Development GmbH. Status – a mobile ethereum os. (Accessed 2018-03-15). [Online]. Available: https://status.im [11] Florian Wessling, Volker Gruhn (2018) Engineering Software Architectures of Blockchain-OrientedApplications (ICSA). [12] Payward, Inc. Kraken. (Accessed 2018-03-15).[Online]. Available: https://www.kraken.com [13] Naota Yanai(2017) Tightly Secure Identity-Based Multisignatures (ICCE-TW). [14] M. Warasart and P. Kuacharoen, “Paper-based Document Authentication using Digital Signature and QR Code,” no. Iccet, 2012. [15] Osman Ghazali, Omar S. Saleh, “Cloud BasedGraduation Certificate Verification Model”. [16] Mahamat, M. B. (2016), A Web Service Based Database Access for Nigerian Universities’ Certificate Verification System. [17] Lisha Chen-Wilson, Dr David Argles,”Towards a framework of A Secure E-Qualification Certificate System