<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>International Conference on Business Information
Security, November</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Secure Course Completion Credentialing Using Hyperledger Fabric</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Stefan Gogić</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nemanja Zdravković</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Emilija Kisić</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ponnusamy Vijayakumar</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Faculty of Information Technology, Belgrade Metropolitan University</institution>
          ,
          <addr-line>Tadeuša Košćuška 63, 11000 Belgrade</addr-line>
          ,
          <country country="RS">Serbia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>SRM IST, ECE Department</institution>
          ,
          <addr-line>Kattankulathur, Chennai</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2024</year>
      </pub-date>
      <volume>24</volume>
      <issue>2023</issue>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>In this paper, we present a blokchain solution, based on Hyperledger Fabric, for issuing and validating documents from Higher Education Institutions (HEIs), such as diplomas and diploma supplements. By utilizing Hyperledger Fabric, the most popular distributed ledger technology for private blockchains, we propose a lightweight and secure credentialing three layer blockchain system - the smart contract layer, the blockchain layer itself, and the network layer. With a minimal needed number of functionalities such as issuance and verification, our lightweight system can be deployed on a trustful environment, e. g. faculties from the same university, or a consortium of universities. With such an environment, we eliminate the need for a computationally complex consensus mechanism for adding blocks to the ledger, while retaining easy implementation with the HEIs information system and/or learning management system. Based on previous research and prototyping, our model acts as an additional security layer on top of and HEI's information system and utilizes blockchain's immutable property to keep student's records secure.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;blockchain</kwd>
        <kwd>credentialing</kwd>
        <kwd>distributed ledger</kwd>
        <kwd>Hyperledger</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        ify the validity of certificates in a direct manner, without
contacting the HEI that originally issued the documents
Blockchain technologies (BCTs) and distributed ledger [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Indeed, the authors of [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] state that BCT/DLT-based
technologies (DLTs) have surpassed their initial use systems promise a permanent authentication and
storin cryprocurrencies, and are already being used in a age solution for the alternative credentials market. This
plethora of fields – from supply chain managements and continuously growing market consists of various kinds
healthcare, to predictive maintenance systems and pub- of microcredentials, nanodegrees, MOOCs/SPOCs,
cerlic sector [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5">1, 2, 3, 4, 5</xref>
        ]. With the rise of Ethereum and tificates and/or badges from various types of training
its smart contracts written in Solidity, presenting code and pre-qualification programs. The authors also
emphawhich can be directly run on the chain itself, paired with size scalability issues, most noticeably if the BCT/DLT
a robust consensus mechanism, a secure and immutable use the computationally complex Proof-of-Work (PoW)
record keeping solution in a trustless environment with- consensus mechanism, as does Bitcoin and many other
out the need of third-party stakeholder has risen, identi- cryptocurrency networks. The PoW approach will likely
fying BCTs/DLTs as disruptive technologies [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. remove the need for educational organizations to
vali
      </p>
      <p>
        Credentialing solutions for Higher Education Institu- date credentials, and other lightweight approaches are
tions (HEIs) based on blockchain and similar technologies needed.
are still few. As of writing this paper, only a small number Since the initial hype of using BCT/DLT for various
of papers have been published [
        <xref ref-type="bibr" rid="ref7 ref8 ref9">7, 8, 9</xref>
        ] compared to other use cases including ones in education, the authors of [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]
blockchain-based use cases. For instance, one of the main conducted a literature review of solutions based on public
conclusions found in one of the earliest studies on the blockchains, highlighting the need for a standardized
topic of blockchain in education state that BCTs (and later approach built on a public blockchain to promote faster
DLTs) should allow users to be able to automatically ver- adoption and acceptance. This recent study states that
full functioning and active prototypes are still low in
numbers; however, one of the conclusions was that the
blockchain application should run on a stable, secure,
and trustworthy network.
      </p>
      <p>
        Indeed, in a trustless environment where actors are not
known, public BCTs with robust consensus mechanisms
such as Biction are imperative [
        <xref ref-type="bibr" rid="ref10 ref11 ref12">10, 11, 12</xref>
        ]. However,
mechanisms such as PoW or various variations of Proof
powerful central processing unit (CPU) and/or graphic copy of the ledger, all network nodes are updated in real
processing unit (GPU). Conversely, in a more specific time, simultaneously. Furher, a block can be viewed as a
environment, i. e. where the nodes in the blockchain data structure consisting of the follwing:
network are known (and trusted) parties, a
blockchainbased solution with less complex consensus mechanism 1. a header which connects the new block to the
previous one.
can be implemented, retaining security with the added
benefit of not needing a powerful CPU/GPU to handle 2. a list of transactions;
blockchain transactions. Usually, this approach is called Each transaction, besides the data, contains a header
a distributed ledger technology (DLT). with a timestamp, paired with an unique cryptographic
      </p>
      <p>The authors’ main motivation is to utilize a trustful en- signature, thus enablig the ledger to be resistant to
modvironment and propose a lightweight framework for doc- ifications. This chain of blocks that is formed and
conument credentialing, tailored specifically to HEIs and the tinuously updated can be traced back all the way to the
issuance and validation of student diplomas and diploma first block, named the genesis block.
supplements. The combination of peer-to-peer networking,
public</p>
      <p>Based on literature, commercially (un)available solu- key cryptography, and distributed consensus is what
tions and our own previous attempts, we have identified secures blockchain transactions. Conversely to a
centralthe following research questions: ized system, no single entity i.e. node should be able to
control the process of adding a block to the chain. As
• RQ1: Is it possible to design a lightweight frame- the blockchain is a distributed system, each new block
work for the specific needs of HEIs to incorpo- addition is managed by all nodes who share equal rights.
rate document issuance and validation in a secure This mechanism is utilized in order to overcome
secumanner, without relying on complex solutions? rity issues, and is achieved through the process known
• RQ2: Can the flexibility of Hyperledger Fabric as distributed consensus. This process can be viewed
be used as a basis for incorporating a BCT/DLT- as an agreement among the nodes in the network how
based addition to an existing HEI information to validate each block yet to be added to the chain.
Desystem (IS)? pending on the consensus mechanism, nodes can either
The rest of the paper is organized as follows. Section compete for correct transaction validation (PoW), be
cho2 gives a brief introduction on blockchain technolgies, sen randomly (PoS and its variations), or apply a diferent
focusing on Hyperledger Fabric. Afterwards, Section algorithm altogether. The algorithms used can vary in
3 gives presented the proposed system, developed at computational complexity.</p>
      <p>Belgrade Metropolitan University’s (BMU’s) Blockchain Finally, it is important to note that blockahins are a
Technology Laboratory. Finally, Section 4 gives a con- class of technology; the term refers to diferent forms of
clusion, with current limitations and further research distributed databases with variations in their technical
ideas. and governance arrangements and complexity.
2.2. Hyperledger and its use cases</p>
    </sec>
    <sec id="sec-2">
      <title>2. Blockchain and Hyperledger overview</title>
      <sec id="sec-2-1">
        <title>Hyperledger is the leading open source community fo</title>
        <p>
          cused on developing various stable frameworks, tools and
In this Section, we firstly provide a briew overview of libraries for enterprise-grade distributed ledger
deploythe building blocks of a general blockchain system. Af- ments [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. This community aims to advance BCT/DLT
terwards, we focus on the Hyperledger DLT solution, of technologies by identifying and more importantly
realwhich Hyperledger Fabric is used to develop the creden- izing a cross-industry open standard platform for DLTs.
tialing system. The aim of the open standard is to transform the approach
to business transactions on a global level [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ].
Hyperledger has a modular approach to hosting projects similar
2.1. Brief blockchain overview to the approach of the Linux Foundation, as shown in Fig.
In general, BCTs impose a fundamental change to manner 1. All Hyperledger projects are open source, they are easy
various types of data are processed, and can improve ex- to obtain [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]. All Hyperledger projects, with the
excepisting data security solutions. A blockchain can be viewed tion of Hyperledger Indy, are used for general purpose
as a shared, append-only distributed ledger, in which all blockchain-based applications and solutions, whereas
events are stored in linked blocks [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]. These events are Hyperledger Indy focuses on decentralized identity [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ].
often referred as transactions. A copy of the ledger is One of the key diferences between the various
BCTtherefore kept by all nodes which form the blockchain s/DLTs systems is the utilized consensus mechanism. Due
network. Due to the fact that all member nodes have a
to the variety of blockchain usage requirements, Hyper- Table 1
ledger provides several diferent consensus mechanisms Hyperledger Fabric features
[
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]. For instance, Fabric uses the Apache Kafka platform
[
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] as the main Crash Fault Tolerance (CFT) protocol Advantages ERneltaetripvreisme abtaucrkitinyg
on the network which is permissioned i.e. private, and it Private channels
is voting-based. Hyperledger Indy utilized a consensus Modular architecture
based on Redundant Byzantine Fault Tolerance (RBFT), a Smart contracts
protocol inspired by Plenum Byzantine Fault Tolerance
(Plenum). Hyperledger Iroha used a variant of the BFT al- Consensus mechanism RKAafFkTa
gorithm called Sumeragi, which tolerates more than one Solo
Byzantine faulty network nodes. Hyperledger Sawtooth
facilitates the so-called pluggable consensus for both lot- Smart contract technology Chaincode
tery and voting algorithms. By default, Hyperledger Saw- Smart contract type Installed
tooth uses a lottery-based, Nakamoto consensus algo- Smart contract language Go
rithm called Proof of elapsed time (PoET). Hyperledger Java
Burrow comes with Byzantine Fault-Tolerant Tendermint Javascript
protocol with a greater transaction rate, whereas Buru Solidity
implements various consensus algorithms that are in- State storage CoudhBD
volved in transaction validation, block validation, and leveldb
block production, i.e. mining in the PoW mechanism,
while Hyperledger Sawtooth has the most support for
smart contract languages [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. 3. System model
        </p>
        <p>
          The core Hyperledger-based use cases include banking,
healthcare, supply chain management, financial services, BMU’s ongoing internal R&amp;D includes
implementinformation technology, government, and media and en- ing blockchain in education and e-learning. BMU’s
tertainment. Indeed, the Hyperledger Foundation pro- Blockchain Technology Laboratory (BCT Lab) is
investimotes a range of business DLTs, including many libraries gating which blockchain technology is most suitable for
and tools that provide support for the creation, mainte- applying in education, with emphasis on data protection.
nance, deployment, providing cryptographic work, etc BMU’s BCT Lab is collaborating with ISUM
(Informa[
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]. tion System of University Metropolitan) and BMU’s
e
        </p>
        <p>For the proposed system, the authors have opted to Learning center. During a four month testing developing
use Hyperledger Fabric, as it is the Hyperledger project and period, a working prototype for credentialing was
with most testing, working real-world applications com- developed. The proposed model is comprised of three
munity, and documentation. The details of Hyperledger layers, stacked on top of the zeroth layer, which is the
Fabric are listed in Table 1. HEI’s IS:</p>
      </sec>
      <sec id="sec-2-2">
        <title>The smart contract layer runs the chaincode to add</title>
        <p>the data to a block. It is present on every node, denoted
as a peer. The blockchain layer consists of the peer itself,
a Certification Authority (CA) for that peer, and a local Figure 3: Asynchronous promise function.
NoSQL database - CouchDB. The network layer consists
of the test network with two peers, denoted with org1
and org2. const diplomas =</p>
        <p>The system was developed in two stages – Stage 1 [
consists of using an isolated GIT branch of the HEIs to add {
a functionality to export diploma supplemental materials "name": "Firstname",
as an API to the blockchain network. Stage 2 comprised "surname": "Surname",
of developing a lightweight blockchain application, based "studygroup": "StudyGroup",
on Hyperledger Fabric, to connect the the API and add "grades":
the data to a block. The architecture of the two-stage [
system is shown in Fig. 2. {</p>
        <p>The main parameter which Hyperledger Fabric uses "grade": "GradeValue",
is the transaction context ctx. It holds the needed in- "course": "CourseCode",
formation for transaction logic "per transaction" or "per },
contract". IT enables to access the stub which allows var- ...
ious blockchain operations such as state returns, adding ]
a new item to the block, or getting all blocks (in our case }
diploma supplements). ...</p>
        <p>To add a diploma supplement, it is needed to connect ]
toe the peer node using a gateway, and to get the
chaincode from the network. When data is added, a message can be viewed in the</p>
        <p>To write the transaction i.e. diploma object, an asyn- console terminal to confirm a successful transaction, as
chronous promise function will get all the necessary shown in Fig. 4. In our testbed, and endpoint was not
parameters for add a new diploma supplement, as shown deployed from the IS’s side; therefore we have manually
in Fig. 3. It will create a new object with those param- added the data in the same format as the HEI’s IS would
eters which will be later added to teh blockchain using provide.
stub API operations.</p>
        <p>The data which is added to the blockchain has the
following structure:</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>4. Conclusion</title>
    </sec>
    <sec id="sec-4">
      <title>Acknowledgment</title>
      <p>In this paper, we have used Hyperledger Fabric to de- This paper was supported by the Blockchain
Technolvelop a lightweight blockchain network for credentialing ogy Laboratory at Belgrade Metropolitan University,
BelHEI’s diplomas and diploma supplements. Currently, grade, Serbia.
our system only addresses the issuance use-case, while
validation use-case remains open. As prototyping was
conducted in an isolated environment, several open is- References
sues still remain. Firstly, should the blockchain remain
private, or be public (where anyone can be a part of the
network)? As the target group of the system are first and
foremost HEIs, the authors, as was discussed in other
literature as well, opt for a private blockchain solution,
where the HEIs comprise the network. Still, there exists
a possibility to add the learners as nodes as well.</p>
      <p>Using Hyperledger Fabric, data such as diplomas
and supplements can be issued and verified reliably.</p>
      <p>Blockchain can help learning platforms to add an
additional layer to their credentialing process. We have
presented a blockchain-based credentialing system can
be easily deployable and connected to a learning
platform. Within our proposed system, upon generating the
certificate file for the diploma and/or supplement, the
HEI’s IS will make a transaction to the blockchain. This
entry will also have the certificate information,
alongside metadata required for the transaction header. This
information will be encrypted, and can be accessed only
by the IS, the student, and an authorized third party.</p>
      <p>This new issuance transaction is sent to the blockchain,
where the other nodes in the network will verify it and
add it to the blockchain using a simpler consensus
mechanism. Each node will have a local copy of the blockchain
on a NoSQL database like CouchDB. For certificate
validation, upon receiving the access link, the student or an
authorized third party can verify the digital credential by
accessing the blockchain through a query. If a match is
found on the blockchain, the certificate file is validated
and a corresponding message appears.</p>
      <p>The innate immutability property of BCT/DLT does
not allow fraudulent or modified certificate files to be
deemed as verified. Any tampering to the certificate file
will result in a vastly diferent hashed value of the file,
ensuring impossible verification.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>B. K.</given-names>
            <surname>Mohanta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. S.</given-names>
            <surname>Panda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Jena</surname>
          </string-name>
          ,
          <article-title>An overview of smart contract and use cases in blockchain technology, in: 2018 9th international conference on computing, communication and networking technologies (ICCCNT)</article-title>
          , IEEE,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>K.</surname>
          </string-name>
          <article-title>Z¯ıle</article-title>
          , R. Strazdin,
          <article-title>a, Blockchain use cases and their feasibility</article-title>
          ,
          <source>Applied Computer Systems</source>
          <volume>23</volume>
          (
          <year>2018</year>
          )
          <fpage>12</fpage>
          -
          <lpage>20</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>P.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. C.</given-names>
            <surname>Schmidt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>White</surname>
          </string-name>
          , G. Lenz,
          <article-title>Blockchain technology use cases in healthcare</article-title>
          , in: Advances in computers, volume
          <volume>111</volume>
          ,
          <string-name>
            <surname>Elsevier</surname>
          </string-name>
          ,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>41</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Alabadi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Habbal</surname>
          </string-name>
          ,
          <article-title>Next-generation predictive maintenance: leveraging blockchain and dynamic deep learning in a domain-independent system</article-title>
          ,
          <source>PeerJ Computer Science</source>
          <volume>9</volume>
          (
          <year>2023</year>
          )
          <article-title>e1712</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>V.</given-names>
            <surname>Milicevic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Zdravkovic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Jovic</surname>
          </string-name>
          ,
          <article-title>On the selection of suitable blockchain technologies for supply chain management</article-title>
          ,
          <source>International Journal for Quality Research</source>
          (
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>N.</given-names>
            <surname>Zdravković</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Jović</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Damnjanović</surname>
          </string-name>
          ,
          <article-title>Secure credentialing in e-learning using blockchain</article-title>
          ,
          <source>in: Proceedings of the 11th Conference on eLearning (eLearning-2020)</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>39</fpage>
          -
          <lpage>42</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.</given-names>
            <surname>Grech</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. F.</given-names>
            <surname>Camilleri</surname>
          </string-name>
          , Blockchain in education,
          <source>Luxembourg: Publications Ofice of the European Union</source>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Jirgensons</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Kapenieks</surname>
          </string-name>
          ,
          <article-title>Blockchain and the future of digital learning credential assessment and management</article-title>
          ,
          <source>Journal of teacher education for sustainability 20</source>
          (
          <year>2018</year>
          )
          <fpage>145</fpage>
          -
          <lpage>156</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>G.</given-names>
            <surname>Caldarelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ellul</surname>
          </string-name>
          ,
          <article-title>Trusted academic transcripts on the blockchain: A systematic literature review</article-title>
          ,
          <source>Applied Sciences</source>
          <volume>11</volume>
          (
          <year>2021</year>
          )
          <year>1842</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>P.</given-names>
            <surname>Ocheja</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Flanagan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Ueda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Ogata</surname>
          </string-name>
          ,
          <article-title>Managing lifelong learning records through blockchain</article-title>
          ,
          <source>Research and Practice in Technology Enhanced Learning</source>
          <volume>14</volume>
          (
          <year>2019</year>
          )
          <fpage>1</fpage>
          -
          <lpage>19</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>F. R.</given-names>
            <surname>Vidal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Gouveia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Soares</surname>
          </string-name>
          ,
          <article-title>Revocation mechanisms for academic certificates stored on a blockchain</article-title>
          ,
          <source>in: 2020 15th Iberian Conference on Information Systems and Technologies (CISTI)</source>
          , IEEE,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>F.</given-names>
            <surname>Vidal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Gouveia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Soares</surname>
          </string-name>
          ,
          <article-title>Analysis of blockchain technology for higher education</article-title>
          , in: 2019 International Conference on
          <article-title>Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)</article-title>
          , IEEE,
          <year>2019</year>
          , pp.
          <fpage>28</fpage>
          -
          <lpage>33</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Xie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Dai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>An overview of blockchain technology: Architecture, consensus, and future trends, in: 2017 IEEE international congress on big data (BigData congress)</article-title>
          , IEEE,
          <year>2017</year>
          , pp.
          <fpage>557</fpage>
          -
          <lpage>564</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>C.</given-names>
            <surname>Cachin</surname>
          </string-name>
          , et al.,
          <article-title>Architecture of the hyperledger blockchain fabric</article-title>
          ,
          <source>in: Workshop on distributed cryptocurrencies and consensus ledgers</source>
          , volume
          <volume>310</volume>
          , Chicago, IL,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <article-title>The Hyperledger Foundation</article-title>
          , https: //www.hyperledger.org,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>V.</given-names>
            <surname>Milićević</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Jović</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Zdravković</surname>
          </string-name>
          ,
          <article-title>An overview of hyperledger blockchain technologies and their uses</article-title>
          ,
          <source>in: Proceedings of the 11th International Conference on Information Society and Technology (ICIST</source>
          <year>2021</year>
          ),
          <year>2021</year>
          , pp.
          <fpage>62</fpage>
          -
          <lpage>65</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>J.</given-names>
            <surname>Moubarak</surname>
          </string-name>
          , E. Filiol,
          <string-name>
            <given-names>M.</given-names>
            <surname>Chamoun</surname>
          </string-name>
          ,
          <article-title>Comparative analysis of blockchain technologies and tor network: Two faces of the same reality?</article-title>
          ,
          <source>in: 2017 1st Cyber Security in Networking Conference (CSNet)</source>
          , IEEE,
          <year>2017</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>B. R.</given-names>
            <surname>Hiraman</surname>
          </string-name>
          , et al.,
          <article-title>A study of apache kafka in big data stream processing</article-title>
          , in: 2018 International Conference on Information, Communication, Engineering and Technology (ICICET), IEEE,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>3</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>