Egyptian Informatics Journal (Dec 2023)
Modeling of blockchain with encryption based secure education record management system
Abstract
Blockchain technology can be employed in the education sector by building a decentralized system to store and share student records. The records can be encrypted to guarantee their confidentiality and security. With a blockchain-based system, student records can be saved in blocks that are linked and secured via cryptography. The records are decentralized and not controlled by any single entity, making them less susceptible to hacking or tampering. By using blockchain technology, educational institutions can create a more secure and efficient system for storing and sharing student records. This can streamline the process of transferring records between schools, and provide a secure and transparent way for students to access their own records. In this study, we provide a novel Merkle tree-based strategy for preserving the accuracy of student records and outline how to put it into practice. The software architecture resembled blockchain technology and was developed for private network deployment. The key components of our strategy are replacing conventional audit trails with their cryptographically secure equivalent and simplifying the Blockchain framework by avoiding mining. The cryptography system's framework is presented, and the new five dimensions of chaotic map academic records are proposed. Our study utilizes deoxyribonucleic acid (DNA) sequences and operations and the chaotic system to strengthen the cryptosystem in the blockchain authentication and authorization process. The significant advantage of this method is enhancing the generation of the hash function, which is the most critical challenge in the blockchain concept. The experimental outcomes and security analysis demonstrated that the proposed method works well in terms of different aspects. The suggested hash function's hash value distribution, sensitivity to tiny message modifications, confusion and diffusion qualities, resilience against birthday attacks, keyspace analysis, collision resistance, efficiency, and flexibility were all considered throughout the study.