Preventing Identity Theft Using Blockchain Technology
Preventing Identity Theft Using Blockchain Technology
https://doi.org/10.22214/ijraset.2022.44813
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VI June 2022- Available at www.ijraset.com
Abstract: This paper's purpose is to describe what Blockchain Technology is and how it can be used to combat identity theft.
Despite the fact that blockchain technology came to existence with Bitcoin, blockchain encompasses a comprehensive potential
outside of cryptocurrency. Basically, blockchain could be a shared database that permits multiple parties to access information
and verify that data in real-time It can transform the approach that we do things in various industries. It is used for a variety of
things besides bitcoin, such as tracking ownership, digital assets, physical assets, and voting rights. It can store and run
computer code known as smart contracts.
Keywords: Blockchain, Bitcoin, Ethereum, Cryptocurrency, Assets.
I. INTRODUCTION
This paper presents the method of detecting or tracking the originality or the ownership of the documents presented by the students
for admission purposes or by the medical practitioners whether they are genuine or not (identity theft) by using the blockchain
technology. Blockchain is a distributed database system which is decentralised and secure. It is a distributed ledger that records and
shares transaction details across many nodes (computers) that are part of the network so that the data is not modified. Each
transaction that occurs on a blockchain network is distributed across all nodes on the blockchain, every participant has an equivalent
copy of the ledger, and it is a changeless ledger once a record or a transaction is made [1].
Blockchain was originally introduced to timestamp digital documents and prevent tampering with records, in simple terms, a
blockchain is a chain of blocks that contain information. When a transaction occurs, its related information is recorded into a block,
so a transaction initiated in one corner of the globe can be registered on the block, which is then verified, validated, and added to the
main blockchain by the miners of the public ledgers.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 5048
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VI June 2022- Available at www.ijraset.com
IV. OBJECTIVE
The main objective of this paper is to inform others about how blockchain technology can be used to verify fraud such as counterfeit
certificates, documents, passports, and so on. Identity theft has become one of the most pressing worries in today's fast-paced world,
and we can combat it by utilising blockchain technology.
One of the areas where blockchain offers a well-timed and primary solid solution technique to use significantly extended that
provides a powerful public blockchain that can be used for secondary purposes such as a verification device in a variety of markets
is the simple, trustworthy, and reasonably-priced verification of authentic documents, such as various certificates, and college
degrees.
V. RESEARCH METHODOLOGY
Nowadays many folks achieve numerous academic certificates, documents, passports, etc. It's not uncommon for these folks to
produce forged certifications or documents, and it's difficult to track them down [4]. This drawback of faux documents and
certificates has been a long issue within the various sectors, and communities. Because it is the potential to make such certificates at
a low price and also the method to verify them is extremely complex, as they are manually required to be verified. This problem can
be addressed by storing digital certificates on the Blockchain. To create the blockchain-based system of unalterable documents
/certificates, in the beginning, the departments ought to get registered. Any transaction is frequently sent through the registered
departments' wallet addresses. Only the owner of the smart contract has the authority to create new departments. The department
will be able to access the system and create documents/certificates with data fields once it has been added. Each
document/certificate that is created will be saved in the Interplanetary file system (IPFS). It can return a unique hash address SHA-
256, This will serve as a distinctive identity for each document. This will generate a hash node and the details of certificates and
papers that can be saved in the blockchain, and the person will be provided with the resultant transaction id. Using the IPFS hash
value recorded with the data and this transaction id, anyone can verify certificate information and inspect the authentic copy of
certificates. And it isn't viable to alter these certificates or to create faux certificates, and documents using the same data. As a result,
we can solve the problem of identity theft.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 |
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VI June 2022- Available at www.ijraset.com
VIII. CONCLUSION
Although there are numerous restrictions to data security and privacy, various technologies are suggested to reduce the incidence of
fraud and ensure the safety, authenticity, and secrecy of various documents. A new blockchain-based approach is helping to reduce
identity theft. The system's automated certificate giving is transparent and easy to understand. Companies or organisations can thus
query the system for information about any certificate. The recommended approach lowers administrative costs, prevents document
fraud, and ensures that data on digital certificates is accurate and reliable.
REFERENCES
[1] Zibin Zheng, Shaoan Xie, Hong-Ning Dai, Xiangping Chen, An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends, IEEE 6th
International Congress on Big Data, 2017.
[2] Jiin-Chiou Chen, Narn-Yih Lee, Chien Chi, and Yi-Hua Chen "Blockchain and Smart Contract for Digital Certificate" Proceedings of IEEE International
Conference on Applied System Innovation 2018 IEEE ICASI 2018- Meen, Prior & Lam (Eds)
[3] S. Sunitha kumara, D. Saveetha "Blockchain and Smart Contract for Digital Document Verification"
[4] Gunit Malik, Kshitij Parasrampuria, Sai Prasanth Reddy, Dr. Seema Shah, Blockchain Based Identity Verification Model, International Conference on Vision
Towards Emerging Trends in Communication and Networking (ViTECoN), 2019
[5] Neethu Gopal, Vani V Prakash "Survey on Blockchain Based Digital Certificate System" International Research Journal of Engineering and Technology
(IRJET) Nov 2018
[6] Maharshi Shah, Priyanka Kumar, Tamper Proof Birth Certificate Using Blockchain Technology, International Journal of Recent Technology and Engineering
(IJRTE), Volume-7, Issue-5S3, February 2019.
[7] Marco Baldi, Franco Chiaraluce, Emanuele Frontoni, Giuseppe Gottardi, Daniele Sciarroni and Luca Spalazzi Certificate “Validation hrough Public Ledgers
and Blockchains” In Proceedings of the First Italian Conference on Cybersecurity (ITASEC17) 2017
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 |