{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T08:38:31Z","timestamp":1722933511777},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,6,26]],"date-time":"2021-06-26T00:00:00Z","timestamp":1624665600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,6,26]],"date-time":"2021-06-26T00:00:00Z","timestamp":1624665600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. on Info. Security"],"published-print":{"date-parts":[[2021,12]]},"abstract":"Abstract<\/jats:title>Education acts as a soul in the overall societal development, in one way or the other. Aspirants, who gain their degrees genuinely, will help society with their knowledge and skills. But, on the other side of the coin, the problem of fake certificates is alarming and worrying. It has been prevalent in different forms from paper-based dummy certificates to replicas backed with database tampering and has increased to astronomic levels in this digital era. In this regard, an overlay mechanism using blockchain technology is proposed to store the genuine certificates in digital form and verify them firmly whenever needed without delay. The proposed system makes sure that the certificates, once verified, can be present online in an immutable form for further reference and provides a tamper-proof concealment to the existing certification system. To confirm the credibility of the proposed method, a prototype of blockchain-based credential securing and verification system is developed in ethereum test network. The implementation and test results show that it is a secure and feasible solution to online credential management system.<\/jats:p>","DOI":"10.1186\/s13635-021-00122-5","type":"journal-article","created":{"date-parts":[[2021,6,26]],"date-time":"2021-06-26T18:02:16Z","timestamp":1624730536000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Proposing a reliable method of securing and verifying the credentials of graduates through blockchain"],"prefix":"10.1186","volume":"2021","author":[{"given":"T.","family":"Rama Reddy","sequence":"first","affiliation":[]},{"given":"P. V. G. D.","family":"Prasad Reddy","sequence":"additional","affiliation":[]},{"given":"Rayudu","family":"Srinivas","sequence":"additional","affiliation":[]},{"given":"Ch. V.","family":"Raghavendran","sequence":"additional","affiliation":[]},{"given":"R. V. S.","family":"Lalitha","sequence":"additional","affiliation":[]},{"given":"B.","family":"Annapurna","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,26]]},"reference":[{"key":"122_CR1","unstructured":"S.G.K. Murthy, M.V.R. Murthy, A.C. Sarma, Elliptic curve based signature method to control fake paper based certificates; Proceedings of the World Congress on Engineering and Computer Science 2011 Vol I WCECS 2011, October 19-21, 2011, San Francisco, USA, ISBN: 978-988-18210-9-6 ISSN: 2078-0958 (Print); ISSN: 2078-0966 (Online)"},{"key":"122_CR2","doi-asserted-by":"publisher","first-page":"3806","DOI":"10.3390\/e17063806","volume":"17","author":"X Gu","year":"2015","unstructured":"X. Gu, X. Gu, On the detection of fake certificates via attribute correlation. Entropy 17, 3806\u20133837 (2015). https:\/\/doi.org\/10.3390\/e17063806","journal-title":"Entropy"},{"key":"122_CR3","unstructured":"J.M. Muthoni, A.M. Kahonge, E-verification \u2013 a case of academic testimonials (2015) UoN Digital Repository Home (http:\/\/erepository.uonbi.ac.ke)"},{"issue":"03","key":"122_CR4","first-page":"24546135","volume":"02","author":"KP Chavan","year":"2016","unstructured":"K.P. Chavan, R.R. Kamble, P.P. Meshram, K.K. Doke, QR code based digitized marksheet system. Int. J. Eng. Res. Adv. Technol. ISSN 02(03), 24546135 (2016)","journal-title":"Int. J. Eng. Res. Adv. Technol."},{"key":"122_CR5","doi-asserted-by":"publisher","unstructured":"D. Zheng, K. Kane, L.J. Camp, Detection of rogue certificates from trusted certificate authorities using deep neural networks,\u00a0ACM Transactions on Privacy and Security,\u00a019(2), 1\u201331 (2016) https:\/\/doi.org\/10.1145\/2975591","DOI":"10.1145\/2975591"},{"key":"122_CR6","doi-asserted-by":"publisher","unstructured":"M. Li et al.\u00a0CrowdBC: A Blockchain-Based Decentralized Framework for Crowdsourcing. IEEE Trans Parall Distrib Syst, 30(6), 1251-1266 (2019) https:\/\/doi.org\/10.1109\/TPDS.2018.2881735.","DOI":"10.1109\/TPDS.2018.2881735"},{"key":"122_CR7","doi-asserted-by":"publisher","unstructured":"Yi, H. Securing e-voting based on blockchain in P2P network.\u00a0J Wireless Com Network 2019,\u00a0137 (2019). https:\/\/doi.org\/10.1186\/s13638-019-1473-6","DOI":"10.1186\/s13638-019-1473-6"},{"key":"122_CR8","doi-asserted-by":"publisher","unstructured":"Chen, Y., Ding, S., Xu, Z.\u00a0et al.\u00a0Blockchain-Based Medical Records Secure Storage and Medical Service Framework.\u00a0J Med Syst, 43,\u00a05 (2019). https:\/\/doi.org\/10.1007\/s10916-018-1121-4","DOI":"10.1007\/s10916-018-1121-4"},{"key":"122_CR9","doi-asserted-by":"publisher","unstructured":"A. Dorri, M. Steger, S. S. Kanhere and R. Jurdak.\u00a0BlockChain: A Distributed Solution to Automotive Security and Privacy.\u00a0IEEE Communications Magazine, 55(12) :119-125 (2017). https:\/\/doi.org\/10.1109\/MCOM.2017.1700879","DOI":"10.1109\/MCOM.2017.1700879"},{"key":"122_CR10","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/s10916-016-0574-6","volume":"40","author":"X Yue","year":"2016","unstructured":"X. Yue, H. Wang, D. Jin, M. Li, W. Jiang, Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control. J. Med. Syst. 40, 218 (2016). https:\/\/doi.org\/10.1007\/s10916-016-0574-6","journal-title":"J. Med. Syst."},{"key":"122_CR11","doi-asserted-by":"publisher","unstructured":"D. Kraft, Difficulty control for blockchain-based consensus systems. Peer-to-Peer Netw. Appl.. https:\/\/doi.org\/10.1007\/s12083-015-0347-x","DOI":"10.1007\/s12083-015-0347-x"},{"key":"122_CR12","doi-asserted-by":"publisher","unstructured":"T. Aste, P. Tasca, T. Di Matteo.\u00a0Blockchain Technologies: The Foreseeable Impact on Society and Industry. Computer, 50(9), 18-28 (2017). https:\/\/doi.org\/10.1109\/MC.2017.3571064","DOI":"10.1109\/MC.2017.3571064"},{"issue":"1","key":"122_CR13","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1109\/TSC.2018.2791538","volume":"14","author":"J Ning","year":"2021","unstructured":"J. Ning, Z. Cao, X. Dong, K. Liang, L. Wei, K.-K.R. Choo, CryptCloud$^+$+: secure and expressive data access control for cloud storage. IEEE Trans. Serv. Comput. 14(1), 111\u2013124 (2021). https:\/\/doi.org\/10.1109\/TSC.2018.2791538","journal-title":"IEEE Trans. Serv. Comput."}],"container-title":["EURASIP Journal on Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-021-00122-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13635-021-00122-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-021-00122-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,26]],"date-time":"2021-06-26T18:03:35Z","timestamp":1624730615000},"score":1,"resource":{"primary":{"URL":"https:\/\/jis-eurasipjournals.springeropen.com\/articles\/10.1186\/s13635-021-00122-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,26]]},"references-count":13,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["122"],"URL":"https:\/\/doi.org\/10.1186\/s13635-021-00122-5","relation":{},"ISSN":["2510-523X"],"issn-type":[{"value":"2510-523X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,26]]},"assertion":[{"value":"23 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 June 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 June 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"7"}}