web based project 14

Blockchain-based Personal Identity Security System

1.Background/ Problem Statement

 Identity theft is the unauthorized acquisition of another person’s confidential information in order to misuse it. Organizations and individuals should exercise caution when it comes to protecting their identities in order to avoid fraud as a result of identity theft. This information is freely available to attackers in user profiles. Attackers use this information to obtain additional information without raising suspicions about a final attack, identity theft, or fraud.

The blockchain is a decentralized storage system that stores data in a sequence of blocks connected by cryptographic hashing of previous blocks. In this project, the front-end involves Html, CSS, and JavaScript and the back-end involves ASP.NET. The IDE used is Visual Studio and the database is MSSQL.

Our blockchain-based Personal Identity Security System assists in securely storing personal identity data without fear of it being compromised or lost. 

  1. Working of the Project 

In this system, the admin can all the users and verify those accounts. The admin has access to all of the user’s documents that have been uploaded to the system. They can view all of the user’s activity logs. The admin can view the status and see if any fabrication is taking place. The admin can view the user’s complaints.

To log in to the system, the user must first register; once the account has been verified by the admin, the user can log in with a username and password. The user can update the profile as needed. The user can manage their documents in the system by adding, updating, and deleting them. All documents uploaded by the user are also verified by the admin. The user can view the QR Code as well as the status of the documents that are being fabricated.

The user can view if logs have been updated or deleted, as well as the status of fabricated document details. If a user discovers a fabrication or an action that they did not perform, they can notify the admin. The user can view all of the details by scanning the QR Code. They can add and verify all the documents with the ledger.

  1. Advantages
  • It is easy to maintain.
  • It is user-friendly.
  • If a user discovers any fabrication, they can easily notify the admin.
  • The user can also view document details by scanning the QR Code.
  1. System Description

The system comprises 2 major modules with their sub-modules as follows:

  • USER:
  • Register
  • The user needs to register with their basic details.
  • Login
  • After account verification, the user can log in to the system.
  • Profile
  • The user can add or update their profile details.
  • Change Password
  • They can also change their password to the new one.
  • Manage Documents
  • The user can add, update or delete documents in the system.
  • The documents the user uploads are verified by the admin.
  • The user can view the QR Code.
  • They can also check the status of documents that are being fabricated.
  • View logs
  • The user can see if logs have been updated or deleted, as well as the status of document details being fabricated.
  • If the user discovers a fabrication or an action that was not performed by them, they can notify the admin.
  • Scan QR Code
  • The user can scan the QR Code and view all the details.
  • Verify Document
  • They can add all the details & verify with the ledger. 
  • ADMIN: 
  • Login
  • The admin can log in using a username and password.
  • View Users
  • The account of the user is verified by the admin.
  • The admin has access to all of the documents that the user has uploaded.
  • They have access to all of the user’s logs.
  • The admin can view the status of the fabrication.
  • All the complaints can be viewed by the admin.

     

  1. Project Life Cycle

 The waterfall model is a classical model used in the system development life cycle to create a system with a linear and sequential approach. It is termed a waterfall because the model develops systematically from one phase to another in a downward fashion. The waterfall approach does not define the process to go back to the previous phase to handle changes in requirements. The waterfall approach is the earliest approach that was used for software development.

  1. System Requirements
  1. Hardware Requirement 
  1. Laptop or PC
  • Windows 7 or higher
  • I3 processor system or higher
  • 4 GB RAM or higher
  • 100 GB ROM or higher
  1. Software Requirement
  1. Laptop or PC
  • Visual Studio 2019
  • SQL Server Management Studio’s latest
  1. Limitation/Disadvantages
  • The user must wait until the admin verifies this account before attempting to log in to the system.
  1. Application This application helps in the secure storage of a user’s personal identity.
  1. Reference
  • https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7013169/
  • https://academicjournals.org/journal/JLCR/article-full-text-pdf/8599A6F7684
  • https://www.researchgate.net/publication/222808883_Biometric-based_personal_identity-authentication_system_and_security_analysis

 

 

 

 

 

 

 

 

 

 

 

 

 

 

For support

Scroll to Top