Authors: Jashuva Peyyala
Certificate: View Certificate
In this digital world, everything is digitalized but still, some practices are a bit unvarying, one of those is the certificate verification process. The foremost important documents are certificates for graduates from universities and other educational institutions. However, it is costly and time-consuming to check certificates using traditional methods. This paper aims to introduce a theoretical model, which can give the possible infusion for the issue and verification process of any type of document. We need to consider strong points on blockchain apart from finance, those are tracking, supply chain, etc. In this model, we are using blockchain and distributed storage. There are many functions such as hash, public and private key cryptography, digital signatures, peer-to-peer networks and work evidence in blockchain technology. In This model, we are using IPFS for distributed storage (peer-to-peer) everything in ipfs is globally available with the appropriate hash generated by ipfs, for this reason, we added multi-layer security at the Client-side, as an encryption mechanism. To Protect the documents uploaded by the issuer, we enabled an encryption mechanism at the client This Dapp (decentralize) has been divided into two parts one is the document issuer and the other one is the verifier.
In India, the educational certificate verification process is strict than promoting work in multinational corporations. From a university to another university from another university or the cycle continues, it will take a few months to handle the cycle. To interfere with this barrier, we provide this model of the online certificate verification process. We all know that everything on the internet is vulnerable at some point. The centralized network is always vulnerable to creating networks in relation to confidential data. Always dangerous. To overcome these security issues, we use distributed storage for document load and integrity of distributed networks (Ethereum). Decrypted Storage the IPFS used by this model has many distributed storage applications, but it prefers IPF because free and IPFS have no single failure point. The node should not trust each other. Distributed storage is always safe because it does not depend on all the property. One of the reasons for Industries is not interested in IPF is because the IPF is data and all people are available publicly. Do not enter confidential data for confidential data. However, this model adds security levels (client encryption) to this model and overcomes this security issue through the development of this DAPP (distributed application). The encryption algorithm used in this model is a symmetric-key method like one password will be used vice versa, using the same keys, using the same keys, and is symmetric-key encryption. One of the major significant benefits of a distributed network is often that there is no real single point, but it seems that the individual user's computer no need to rely on one central server to handle all processes. Distributed networks are expanded to add more computing power to the network by adding additional machines to the network.
II. PROBLEM STATEMENT
A. Why Blockchain?
Unfortunately, counterfeit documents are rampant in today's world, and as most of you know, it is not difficult to obtain counterfeit documents. Because counterfeit documents look exactly like the originals, it is difficult for non-professionals to distinguish real documents from replicas. Service providers have to spend millions of dollars to verify candidates' documents.
However, blockchain is also used in the document verification process. In the underhood of blockchain technology, digital certificates can solve the above problems. Let's see how detailed it is in this article.
The identification of the document today is not only intense as well as defective ideas through blockchain technology. In Blockchain technology, documents that need to be calm are installed in a distributed book. This is not a digital replica or not a copy of the encryption stored on the blockchain network.
III. LITERATURE REVIEW
On the modern web, HTTP is the preferred protocol for transferring files. Effective for moving small files. However, HTTP cannot implement any other more efficient file distribution method. The IPFS is a wide-ranging p2p file system that addresses issues related to data reliability, fault tolerance, consistency, and non-repudiation of current systems. In this model, we have proposed an innovative and efficient way to store and retrieve files on the Internet using IPFS. uploading files is simplified and high data security is ensured. Although there are so many effective approaches in which files are stored in distributed systems, approaches using distributed storage protocols are deprecated and provide a new dimension to applications. [A. Manoj Athreya, Ashwin A. Kumar, S. M. Nagarajath, H. L. Gururaj,V. Ravi Kumar, D. N. Sachin, and K. R. Rakesh]
2. Review 3
Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data:
The encryption algorithm used in this model is Advanced Encryption Standard is an encryption algorithm that uses a symmetric key approach cryptographic developers use this model widely. The functionalities of This algorithm have their own structure to encrypt and decrypt file content in their own way. It is difficult for malicious users to get the original data when encrypting by the AES algorithm. No way to crack this algorithm so far. There are countless beautiful features we have found in this research when compared to other algorithms in the cryptographic world DES, 3DES, Blowfish, etc. this is the main reason we have picked this algorithm for this model.
III. DESIGN AND IMPLEMENTATION
A. Dapp Design
B. DAPP ER-Diagram
Implementation: The implementation of the model is followed by two steps as Document issuer and document verifier.
C. Functionalities of Document Issuer
D. Functionalities of Verifier
E. Application Model
Modules in this Project: there are so many modules we are used in this module but the major modules are:
F.. Brief Explanation of These Modules
Crypto is a module in Node.js that deals with an algorithm that performs data encryption and decryption. This is used for security purposes like user authentication were storing the password in the Database in the encrypted form.
The Crypto module provides a set of classes like hash, HMAC, cipher, decipher, sign, and verify. The instance of that class is used to create Encryption and Decryption. Node.js cannot create a class object using the new keyword.
a. The has been encrypted with AES CBC encryption method
b. The cryptoJS not only encrypt the file itself and also encode the password with the latin1 encoding.
c. After successful submission of the file, we will get the ipfs hash that has been returned on the web browser.
Despite many restrictions on data security and confidentiality, various techniques have been discussed to reduce certificate counterfeiting and ensure the security, validity, and confidentiality of graduation certificates. A new blockchain-based system reduces the possibility of certificate forgery. The automatic issuance of certificates is open and transparent in the system. Thus, a company or organization can request information about any certificate from the system. The proposed system Lower management expenses and forbid document forgery, and provides accurate and reliable information about digital certificates. Despite many security and data privacy restrictions, various techniques have been discussed to reduce certificate counterfeiting and ensure the security, validity, and confidentiality of graduation certificates. A new blockchain-based system reduces the possibility of certificate forgery. The automatic issuance of certificates is open and transparent in the system. Thus, a company or organization can request information about any certificate from the system. In this way, the verifier can lower the organization’s cost while doing the background verification.
 Jiin-Chiou Chen, Narn-Yih Lee, Chien Chi, and Yi-Hua Chen “Blockchain and Smart Contract for Digital Certificate” Proceedings of IEEE International Conference on Applied System Innovation 2018 IEEE ICASI 2018- Meen, Prior & Lam (Eds)  Austin Draper, Aryan Familrouhani, Devin Cao, Tevisophea Heng, Wenlin Han “Security Applications and Challenges in Blockchain” Published in IEEE International Conference on Consumer Electronics (ICCE) 2019  Marco Baldi, Franco Chiaraluce, Emanuele Frontoni, Giuseppe Gottardi, Daniele Sciarroni and Luca Spalazzi Certificate “Validation through Public Ledgers and Blockchains” In Proceedings of the First Italian Conference on Cybersecurity (ITASEC17) 2017  Neethu Gopal, Vani V Prakash “Survey on Blockchain Based Digital Certificate System” International Research Journal of Engineering and Technology (IRJET) Nov 2018  Jiin-Chiou, Narn-Yih Lee, Chien Chi, YI-Hua Chen, “Blockchain and Smart Contract for Digital Certificate,” Proceedings of IEEE International Conference on Applied System Innovation 2018.  Maharshi Shah, Priyanka Kumar, “Tamper Proof Birth Certificate Using Blockchain Technology”, International Journal of Recent Technology and Engineering (IJRTE), Volume-7, Issue-5S3, February 2019.
Copyright © 2022 Jashuva Peyyala. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.