Decentralization of Credential Verification System using Blockchain

نویسندگان

چکیده

After successful completion of graduation, students receive the credits courses in form certificate issued by respective University. A Student have to produce his/her documents employers or authorities for employment higher education. Today ,as system is centralized all data resides on server which can be hacked lost if crushes down. However, verifying a authorities, time-consuming process as there an involvement human resources ,for validating details candidate from its , with advancement technologies and due easy availability many efficient soft wares that led forgery credentials/certificates. The lack anti-tampering mechanisms resulted incidents where forged graduation certificates are often found. Also ,in case out place applying duplicate issuance University consumes lot time. Use blockchain technology this will make decentralized blocks cryptographically connected nodes network shares entire chain .Hence proposed verification system, uses incorporating essential features developing DAPP. This address issue counterfeiting, faster issuance. Putting across issues, aims at addressing problems provide solutions current Certificate Issuance, Validation Process.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

Authentication Without Identification using Anonymous Credential System

Privacy and security are often intertwined. For example, identity theft is rampant because we have become accustomed to authentication by identification. To obtain some service, we provide enough information about our identity for an unscrupulous person to steal it (for example, we give our credit card number to Amazon.com). One of the consequences is that many people avoid e-commerce entirely ...

متن کامل

Privacy-Preserving Credential Verification for Non-monotonic Trust Management Systems

Trust management systems provide a flexible way for performing decentralized security management. However, most trust management systems only support monotonic policies. Compared with nonmonotonic policies, monotonic ones are less flexible and cannot express policies such as “Chinese wall policies” and “separation of duties”. To support non-monotonic policies, trust management systems must be a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of innovative technology and exploring engineering

سال: 2021

ISSN: ['2278-3075']

DOI: https://doi.org/10.35940/ijitee.k9514.09101121