CHAPTER 3
CHAPTER 3
depends on the nature of the research question, the type of data needed, and the
(Morling, 2017)
the steps and procedures, it ensures that the research process is logical,
foundation and identify the key concepts and variables that will be studied.
accuracy and truthfulness of the research findings, while reliability refers to the
measures to enhance the validity and reliability of the study, such as using
research process is often iterative and may involve revisiting and refining
produce credible and valuable research outcomes. (Creswell & Creswell, 2018)
2
sframework that enables researchers to maintain focus, ensuring a streamlined,
comprehend the path taken to arrive at the study's conclusions. (Indeed, 2022).
In this part, we'll give you a closer look at how we carried out our research into
digital document signing. Our main goal was to thoroughly understand these
fields and evaluate the different methods and techniques used, and to make sure
Data Collection: We begin by collecting the necessary data for our blockchain-
datasets in various formats such as PDF and Word, as well as signer information
like names and email addresses. Additionally, we collect digital signature data,
3
Preprocessing: Before we could start analyzing the data, we had to prepare it. ,
document using algorithms like SHA-256. We also encrypt the data using
convert the digital signature formats to standardized formats like PEM or DER
like ECDSA or RSA to ensure the authenticity and integrity of the signatures.
digital fingerprints for each document, allowing for efficient verification and
tamper-evidence.
evaluation tools like stopwatches and metrics libraries to measure the system's
performance.
4
Performance Evaluation: We measure metrics such as signing time,
robustness and scalability. By doing so, we can fine-tune our system to meet the
applications.
research. We made sure our data collection followed strict rules and obtained
privacy. Additionally, we checked for any biases that might have come from the
signers
order
5
Signature validation result was 100% accurate
certificates and public key infrastructure (PKI) to authenticate and verify the
security. It aimed to automate the signing process, reducing the time and effort
signed documents. The system also provided a clear and tamper-evident audit
collaboration and reducing delays, while minimizing the need for physical
and workflows.
6
3.2.2 Operations of the Existing System
user uploads a document to the platform, which generates a unique hash value
for the document. The user then identifies the signer and their email address,
signing the document. The platform generates a digital certificate linking the
signer's identity to the document hash value. The signed document and digital
certificate are stored on the platform. When verification is required, the verifier
uploads the signed document and digital certificate, and the platform verifies the
digital certificate and checks the document hash value. The platform then
invalid. Throughout the process, the platform maintains an audit trail of all
7
record of all activities related to the signed document.
and a target for cyber attacks. Additionally, the system's security risks are
makes it prone to downtime, data breaches, and other issues. The system's
8
limited scalability can lead to performance issues and delays when handling a
high costs. Its inflexibility makes it difficult to adapt to changing business needs
and regulations. The system also raises privacy concerns, as it may not fully
protect the privacy of signers and their personal information. Moreover, the
transparent and publicly accessible ledger, allowing for real-time tracking and
9
system operates on a decentralized network, eliminating the risk of a single
in fast and efficient signing and verification processes, reducing the need for
10
against identity theft
11
3.4 Data Collection
1. User Data:
- Username
- Password (hashed)
- Email address
- Address (optional)
2. Document Data:
- Document name
3. Signature Data:
- Signer's username
- Signature timestamp
4. Blockchain Data:
12
- Block number
- Block timestamp
6. Verification Data:
- Verification timestamp
13