Open Access Open Access  Restricted Access Subscription or Fee Access

Education Degree Fraud Detection and Student Certificate Verification using Blockchain Technology

Nisha Shashikant Jagtap, Shivani Shahaji Jadhav, Parimal Ganesh Sawant, Pragati Pejlekar

Abstract


To verify the genuineness of an educational degree and certificates and to avoid the fraudulent activities by corrupted officers we tend to propose a system that employs a digital signature scheme and timestamps using blockchain technology. Because the range of universities and tertiary education students, the quantity of radiates is continually increasing. thanks to this certification method of those degree certificates generates heaps of latest job opportunities. The abrupt changes within the technology and development of latest technologies like blockchain is booming, the implementation of blockchain exploitation blockcerts software provides us an answer of plausible business models. During this paper, the price of the service has been balanced between graduates and leader on the main stakeholders of that service using two financial models. A signal check of certificates for college students is finished at low value and a simple check of the believability of the certificate is finished from and trustable supply whereas recruiting by the leader.


Full Text:

PDF

References


Chung Kei Wong and S.S. Lam.Digital signatures for flows and multicasts. IEEE/ACM Transactions on Networking. 1999;7(4):502-513.

A. M. Antonopoulos. Mastering Bitcoin: Unlocking Digital. O'Reilly Media; 1st edition (December 30, 2014).

Benyuan He. An Empirical Study of Online Shopping Using Blockchain Technology. Department of Distribution Management. 2017.

Chris Dannen. Introducing Ethereum and Solidity: Foundations of Cryptocurrency and Blockchain Programming for Beginners. 2017. https://www.apress.com/br/book/9781484225349.

J. Clark and P. C. van Oorschot. SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements. IEEE Symposium on Security and Privacy. 19-22 May 2013; Berkeley, CA, USA, New York: IEEE; 2013.

L. Zhang, D. Choffnes, et al. Analysis of SSL certificate reissues and revocations in the wake of heartbleed. Communications of the ACM. 2018;61(3)109-116.

M. Carvalho and R. Ford. Moving-target defenses for computer networks. IEEE Security & Privacy. 2014;12(2):73-76.

M.P. Papazoglou. Service-oriented computing: concepts, characteristics and directions. Proceedings of the Fourth International Conference on Web Information Systems Engineering, 2003. WISE 2003. 12-12 Dec. 2003; Rome, Italy, New York: IEE; 2004.




DOI: https://doi.org/10.37591/ijowns.v7i1.709

Refbacks

  • There are currently no refbacks.