CFP last date
20 February 2025
Reseach Article

Certificate Verification using Blockchain

Published on January 2025 by Monika Sharma, Srishti Sharma, Yash Gupta
International Conference on Artificial Intelligence and Data Science Applications - 2023
Control System labs
ICAIDSC2023 - Number 1
January 2025
Authors: Monika Sharma, Srishti Sharma, Yash Gupta
10.5120/icaidsc202407

Monika Sharma, Srishti Sharma, Yash Gupta . Certificate Verification using Blockchain. International Conference on Artificial Intelligence and Data Science Applications - 2023. ICAIDSC2023, 1 (January 2025), 16-19. DOI=10.5120/icaidsc202407

@article{ 10.5120/icaidsc202407,
author = { Monika Sharma, Srishti Sharma, Yash Gupta },
title = { Certificate Verification using Blockchain },
journal = { International Conference on Artificial Intelligence and Data Science Applications - 2023 },
issue_date = { January 2025 },
volume = { ICAIDSC2023 },
number = { 1 },
month = { January },
year = { 2025 },
issn = 0975-8887,
pages = { 16-19 },
numpages = 4,
url = { /proceedings/icaidsc2023/number1/certificate-verification-using-blockchain/ },
doi = { 10.5120/icaidsc202407 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Artificial Intelligence and Data Science Applications - 2023
%A Monika Sharma
%A Srishti Sharma
%A Yash Gupta
%T Certificate Verification using Blockchain
%J International Conference on Artificial Intelligence and Data Science Applications - 2023
%@ 0975-8887
%V ICAIDSC2023
%N 1
%P 16-19
%D 2025
%I International Journal of Computer Applications
Abstract

Blockchain technology is arguably best known for its use in the digital currency Bitcoin, which is even more well-known than the Blockchain technology itself. Blocks in a distributed environment—one in which storage devices are not all linked to a single processor—that makes up the Blockchain are immutable. It is a collection of records/public ledger of every digital transaction that has taken place, and information is exchanged between involved parties. The system's participants all agree to verify each submission before it is made. Blockchain data cannot be deleted once it has been inputted. A secure and open method might be offered as a result. We still need to uphold confidence in certification, and proof of learning as education becomes more diverse, decentralized, and democratic. Nowadays, everyone is required to present their documents and credentials to anyone they meet for a job or other reason. A third party cannot verify the authenticity of the certificate after seeing it. Using blockchain technology, we can get confidence or find a solution to this issue. There is no requirement for a central authority to verify certificates when using this technology.

References
  1. C. K. Wong and S, S. Lam “Digital signatures for flows and multicasts”, WEEE/ACM Transactions on Networking, 7(4): 502- 513, 1999.
  2. A. M. Antonopoulos, Mastering Bitcoin: Unlocking Digital. Sebastopol, CA, USA: O’Reilly Media, 2015.
  3. Benyuan He, “An Empirical Study of Online Shopping Using Blockchain Technology“, Department of Distribution Management, Takming University of Science and Technology, Taiwan, R.O.C., 2017.
  4. Chris Dannen, Introducing Ethereum and Solidity, https://www.apress.com/br/book/9781484225349
  5. J. Clark and P. C. van Oorschot, “SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements,” in proc. IEEE S&P’13, May 2013, pp. 511–525.
  6. L. Zhang, D. Choffnes, D. Levin,et al., “Analysis of SSL certificate reissues and revocations in the wake of Heartbleed,” in proc. ACMIMC’14, Nov 2014, pp. 489– 502.
  7. M. Carvalho and R. Ford, “Moving-target defenses for computer networks,” IEEE Security & Privacy, vol. 12, no. 2, pp. 73–76, Mar.- Apr.2014.
  8. Papazoglou, M., Service-Orientated Computing: Concepts, Characteristics and Directions, in International Conference on Web Information Systems Engineering. 2003, IEEE: Rome.
  9. D. Ferraiolo, R. Kuhn, and R. Sandhu, “Rbac standard rationale: Comments on ”a critique of the ansi standard on role-based access control”, ”IEEE Security Privacy, vol. 5, no. 6, pp. 51–53, Nov 2007.
  10. A. Ouaddah, A. A. Elkalam, and A. A. Ouahman, “Towards a novel privacy- preserving access control model based on blockchain technology in IOT,” in Europe and MENA Cooperation Advances in Information and Communication Technologies. Springer, 2017, pp. 523– 533.
  11. L. Y. Chen and H. P. Reiser, “Distributed applications and interoperable systems, 17th ifip wg 6.1 international conference, dais 2017, held as part of the 12th international federated conference on distributed computing
  12. Q. Xia, E. B. Sifah, K. O. Asamoah, J. Gao, X. Du, and M. Guizani, “Medshare: Trust-less medical datasharing among cloud service providers via blockchain,” IEEE Access, vol. 5, pp. 14 757–14 767, 2017.
Index Terms

Computer Science
Information Sciences

Keywords

Blockchain Digital Certificates Confidentiality Integrity Availability.