0% found this document useful (0 votes)
48 views10 pages

New New New Thisthat

Uploaded by

Tejas Aditya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views10 pages

New New New Thisthat

Uploaded by

Tejas Aditya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

A PROJECT REPORT

ON

“METHOD FOR TRANSMUTING AND SECURING


DOCUMENT SYSTEM USING BLOCKCHAIN”

Submitted to
BHARATI VIDYAPEETH
(DEEMED TO BE UNIVERSITY)
DEPARTMENT OF ENGINEERING AND
TECHNOLOGY, NAVI MUMBAI

In Partial Fulfillment of the Requirement for the Award of


BACHELOR’S DEGREE IN
COMPUTER SCIENCE AND ENGINEERING
BY

TEJAS ADITYA PRN No: 2043110101


VIKRAM SAWANT PRN No: 2043110126
SURAJ SINGH PRN No: 2143110140
ANAND GAURAV PRN No: 2043110150

UNDER THE GUIDANCE OF


PROF. SUMITA BARUN KUMAR

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


BHARATI VIDYAPEETH DEEMED TO BE UNIVERSITY DEPARTMENT OF
ENGINEERING AND TECHNOLOGY, NAVI MUMBAI

2023–2024
A PROJECT REPORT
ON
“METHOD FOR TRANSMUTING AND SECURING
DOCUMENT SYSTEM USING BLOCKCHAIN”

Submitted to
BHARATI VIDYAPEETH
(DEEMED TO BE UNIVERSITY)
DEPARTMENT OF ENGINEERING AND
TECHNOLOGY, NAVI MUMBAI
In Partial Fulfillment of the Requirement for the Award of

BACHELOR’S DEGREE IN
COMPUTER SCIENCE AND ENGINEERING
BY

TEJAS ADITYA PRN No: 2043110101


VIKRAM SAWANT PRN No: 2043110126
SURAJ SINGH PRN No: 2143110140
ANAND GAURAV PRN No: 2043110150

UNDER THE GUIDANCE OF


PROF. SUMITA BARUN KUMAR

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


BHARATI VIDYAPEETH DEEMED TO BE UNIVERSITY DEPARTMENT OF
ENGINEERING AND TECHNOLOGY, NAVI MUMBAI

2023–2024
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
BHARATI VIDYAPEETH DEEMED TO BE UNIVERSITY DEPARTMENT OF
ENGINEERING AND TECHNOLOGY, NAVI MUMBAI

2023–2024

CERTIFICATE
This is certified that the project entitled
“METHOD FOR TRANSMUTING AND SECURING
DOCUMENT SYSTEM USING BLOCKCHAIN”
submitted by

TEJAS ADITYA PRN No: 2043110101


VIKRAM SAWANT PRN No: 2043110126
SURAJ SINGH PRN No: 2143110140
ANAND GAURAV PRN No: 2043110150

is a record of bonafide work carried out by them, in the partial fulfillment of the
requirement for the award of Degree of Bachelor of Technology in COMPUTER SCIENCE
AND ENGINEERING at BHARATI VIDYAPEETH DEEMED TO BE UNIVERSITY
DEPARTMENT OF ENGINEERING AND TECHNOLOGY, NAVI MUMBAI. This
work is done during academic year 2023-24

Date: / /

Signature Signature Signature

Dr. Nusrat Parveen Prof. Sumita Barun Kumar Prof. Dr. Mohan Awasthy
HOD, Computer Science and
Engineering Project Guide Principal
UNDERTAKING
We declare that the work presented in this project report titled “Method for transmuting and
securing document system using blockchain”, submitted to the Computer Science and
Engineering Department, Bharati Vidyapeeth Deemed to be University, Pune, Department
of Engineering and Technology, Off Campus, Navi Mumbai, for the award of the
Bachelor of Technology degree in Computer Science and Engineering, is our original
work. We have not plagiarized or submitted the same work for the award of any other
degree. In case this undertaking is found incorrect, We accept that my degree may be
unconditionally withdrawn.

Date:
Place: Navi Mumbai

TEJAS ADITYA

VIKRAM SAWANT

SURAJ SINGH

ANAND GAURAV
Bharati Vidyapeeth
Deemed to be University
Department of Engineering and Technology,
Navi Mumbai

APPROVAL CERTIFICATE
This project title “Method for transmuting and securing document system using blockchain”
by the following students:

Mr. Tejas Aditya PRN No.:2043110101


Mr. Vikram Sawant PRN No.:2043110126
Mr. Suraj Singh PRN No.:2143110140
Mr. Anand Gaurav PRN No.:2043110150

has been approved for the degree of Bachelor of Technology in Computer Science and Engineering
from Department of Engineering and Technology, Navi Mumbai, Bharati Vidyapeeth (Deemed to be
University), Pune.

Examiners:

External Examiner Name and Sign

Internal Examiner Name and Sign

Date of Approval:
Acknowledgements

We would like to express deepest appreciation towards Prof. Dr. Mohan Awasthy, Principal,
Bharati Vidyapeeth Deemed to Be University Department Of Engineering And Technology,
Navi Mumbai, and Dr. Nusrat Parveen, Head of Computer Science and Engineering, who
invaluable supported us in completing this project.
We are profoundly grateful to Prof. Sumita Barun Kumar, Project guide for her expert
guidance and continuous encouragement throughout to see that this project rights, its target
since its commencement to its completion.
At last, we must express our sincere heartfelt gratitude to all the staff members of the
department of CSE who helped me directly or indirectly during this course of work.

TEJAS ADITYA
VIKRAM SAWANT
SURAJ SINGH
ANAND GAURAV
ABSTRACT

This project presents a groundbreaking approach to citizen data management through the integration of
blockchain technology in collaboration with the Government of India. The initiative aims to streamline and
secure the storage, retrieval, and sharing of citizens' data by leveraging a blockchain-based system. The
dataset, initially composed of authorized government data such as Aadhaar details and criminal records,
serves as a foundation for a dynamic and append-only structure. Verified authorities, including hospitals,
educational institutions, and licensing agencies, play a pivotal role in expanding the dataset by appending
new, verified data such as medical history, academic records, and licensing information. The blockchain's
append-only design ensures the immutability and transparency of citizens' information.

Key components of the proposed technology include advanced encryption standards (AES) for securing
data, a MySQL Database for storing encryption keys, and cloud storage for scalability. The project
establishes a robust framework for data integrity, security, and accessibility. Authorized requests from
institutes or authorities trigger a meticulous process of data retrieval, decryption, and secure transmission.
The outcomes of this project include enhanced data security, transparency in government citizen
interactions, and a streamlined process for authorized entities to access comprehensive and validated
citizen information. By harnessing the power of blockchain and encryption technologies, this initiative
paves the way for a secure, decentralized, and trustworthy system for managing citizens' data in the digital
age.
Contents

1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

1.1 Motivation 2

1.2 Problem Statement 3

1.3 Objective 3

2 Literature Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

2.1 Literature review on Security and privacy 6

2.2 Literature review on AES 7

2.3 Literature review on synopsis of blockchain. . . . . . . . . . . . . . . . . . . . . . . . 8

2.4 Literature review on computation privacy 9

2.5 Literature review on data privacy 11

2.6 Literature review on supply chain management 12

3 Proposed Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

4 Software Requirements Specification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

5 Requirement Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

6 System Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

7 System Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

8 Project Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

9 Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

10 Screenshots of Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

11 Conclusion and Future Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

11.1 Conclusion 42

11.2 Future Scope 42

12 Research Publication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
List of Figures

3.1 Block diagram of Proposed Methodology . . . . . . . . . . . . . . . . . . . . . . . 14

10.1 Login Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

10.2 Login Successful . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

10.3 Welcome Page with personal details .. . . . . . . . . . . . . . . . . . . . . . . . . . 37

10.4 Record of Individual. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

10.5 OTP verification page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

10.6 OTP verified . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

10.7 OTP generated through email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

10.8 Backend started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . 39

10.9 Creation of Blockchain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

10.10 Chain creation with hashing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

10.11 Terminal output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41


List of Tables

2.1 Literature review on Security and privacy[1]. . . . . . . . . . . . . . . . . . . . . . . . . 7

2.2 Literature review on AES[2]. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8


.
2.3 Literature review on synopsis of blockchain[3]. . . . . . . . . . . . . . . . . . . . . . . . 9

2.4 Literature review on computation privacy. . . . . . . . . . . . . . . . . . . . . . . . . . . 10

2.5 Literature review on data privacy[5]. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

2.6 Literature review on supply chain management. . . . . . . . . . . . . . . . . . . . . . . 12

7.1 Test Cases and Test Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

You might also like