=Paper= {{Paper |id=Vol-3676/BISEC_paper_4 |storemode=property |title=Secure Course Completion Credentialing Using Hyperledger Fabric |pdfUrl=https://ceur-ws.org/Vol-3676/short_04.pdf |volume=Vol-3676 |authors=Stefan Gogić,Nemanja Zdravković,Emilija Kisić,Ponnusamy Vijayakumar |dblpUrl=https://dblp.org/rec/conf/bisec/GogicZKV23 }} ==Secure Course Completion Credentialing Using Hyperledger Fabric== https://ceur-ws.org/Vol-3676/short_04.pdf
                                Secure Course Completion Credentialing Using
                                Hyperledger Fabric
                                Stefan Gogić1 , Nemanja Zdravković1,* , Emilija Kisić1 and Ponnusamy Vijayakumar2
                                1
                                    Faculty of Information Technology, Belgrade Metropolitan University, Tadeuša Košćuška 63, 11000 Belgrade, Serbia
                                2
                                    SRM IST, ECE Department, Kattankulathur, Chennai, India


                                                                          Abstract
                                                                          In this paper, we present a blokchain solution, based on Hyperledger Fabric, for issuing and validating documents from
                                                                          Higher Education Institutions (HEIs), such as diplomas and diploma supplements. By utilizing Hyperledger Fabric, the most
                                                                          popular distributed ledger technology for private blockchains, we propose a lightweight and secure credentialing three layer
                                                                          blockchain system – the smart contract layer, the blockchain layer itself, and the network layer. With a minimal needed
                                                                          number of functionalities such as issuance and verification, our lightweight system can be deployed on a trustful environment,
                                                                          e. g. faculties from the same university, or a consortium of universities. With such an environment, we eliminate the need for
                                                                          a computationally complex consensus mechanism for adding blocks to the ledger, while retaining easy implementation with
                                                                          the HEIs information system and/or learning management system. Based on previous research and prototyping, our model
                                                                          acts as an additional security layer on top of and HEI’s information system and utilizes blockchain’s immutable property to
                                                                          keep student’s records secure.

                                                                          Keywords
                                                                          blockchain, credentialing, distributed ledger, Hyperledger



                                1. Introduction                                                                                         ify the validity of certificates in a direct manner, without
                                                                                                                                        contacting the HEI that originally issued the documents
                                Blockchain technologies (BCTs) and distributed ledger [7]. Indeed, the authors of [8] state that BCT/DLT-based
                                technologies (DLTs) have surpassed their initial use systems promise a permanent authentication and stor-
                                in cryprocurrencies, and are already being used in a age solution for the alternative credentials market. This
                                plethora of fields – from supply chain managements and continuously growing market consists of various kinds
                                healthcare, to predictive maintenance systems and pub- of microcredentials, nanodegrees, MOOCs/SPOCs, cer-
                                lic sector [1, 2, 3, 4, 5]. With the rise of Ethereum and tificates and/or badges from various types of training
                                its smart contracts written in Solidity, presenting code and pre-qualification programs. The authors also empha-
                                which can be directly run on the chain itself, paired with size scalability issues, most noticeably if the BCT/DLT
                                a robust consensus mechanism, a secure and immutable use the computationally complex Proof-of-Work (PoW)
                                record keeping solution in a trustless environment with- consensus mechanism, as does Bitcoin and many other
                                out the need of third-party stakeholder has risen, identi- cryptocurrency networks. The PoW approach will likely
                                fying BCTs/DLTs as disruptive technologies [6].                                                         remove the need for educational organizations to vali-
                                   Credentialing solutions for Higher Education Institu- date credentials, and other lightweight approaches are
                                tions (HEIs) based on blockchain and similar technologies needed.
                                are still few. As of writing this paper, only a small number                                               Since the initial hype of using BCT/DLT for various
                                of papers have been published [7, 8, 9] compared to other use cases including ones in education, the authors of [9]
                                blockchain-based use cases. For instance, one of the main conducted a literature review of solutions based on public
                                conclusions found in one of the earliest studies on the blockchains, highlighting the need for a standardized
                                topic of blockchain in education state that BCTs (and later approach built on a public blockchain to promote faster
                                DLTs) should allow users to be able to automatically ver- adoption and acceptance. This recent study states that
                                                                                                                                        full functioning and active prototypes are still low in
                                BISEC’23: 14th International Conference on Business Information                                         numbers; however, one of the conclusions was that the
                                Security, November 24, 2023, Niš, Serbia                                                                blockchain application should run on a stable, secure,
                                *
                                  Corresponding author.                                                                                 and trustworthy network.
                                $ stefan.gogic.6354@metropolitan.ac.rs (S. Gogić);
                                                                                                                                           Indeed, in a trustless environment where actors are not
                                nemanja.zdravkovic@metropolitan.ac.rs (N. Zdravković);
                                emilija.kisic@metropolitan.ac.rs (E. Kisić); vijayakp@srmist.edu.in                                     known,   public BCTs with robust consensus mechanisms
                                (P. Vijayakumar)                                                                                        such as Biction are imperative [10, 11, 12]. However,
                                 0000-0002-2631-6308 (N. Zdravković); 0000-0003-3059-2353                                              mechanisms such as PoW or various variations of Proof
                                (E. Kisić); 0000-0002-3929-8495 (P. Vijayakumar)                                                        of Stake (PoS) are computationally complex and require
                                           © 2024 Copyright for this paper by its authors. Use permitted under Creative Commons License
                                           Attribution 4.0 International (CC BY 4.0).                                                   powerful, often dedicated computers equipped with a
                                    CEUR
                                    Workshop
                                    Proceedings
                                                  http://ceur-ws.org
                                                  ISSN 1613-0073
                                                                       CEUR Workshop Proceedings (CEUR-WS.org)




CEUR
                  ceur-ws.org
Workshop      ISSN 1613-0073
Proceedings
powerful central processing unit (CPU) and/or graphic          copy of the ledger, all network nodes are updated in real
processing unit (GPU). Conversely, in a more specific          time, simultaneously. Furher, a block can be viewed as a
environment, i. e. where the nodes in the blockchain           data structure consisting of the follwing:
network are known (and trusted) parties, a blockchain-
                                                                   1. a header which connects the new block to the
based solution with less complex consensus mechanism
                                                                      previous one.
can be implemented, retaining security with the added
benefit of not needing a powerful CPU/GPU to handle                2. a list of transactions;
blockchain transactions. Usually, this approach is called      Each transaction, besides the data, contains a header
a distributed ledger technology (DLT).                         with a timestamp, paired with an unique cryptographic
   The authors’ main motivation is to utilize a trustful en-   signature, thus enablig the ledger to be resistant to mod-
vironment and propose a lightweight framework for doc-         ifications. This chain of blocks that is formed and con-
ument credentialing, tailored specifically to HEIs and the     tinuously updated can be traced back all the way to the
issuance and validation of student diplomas and diploma        first block, named the genesis block.
supplements.                                                      The combination of peer-to-peer networking, public-
   Based on literature, commercially (un)available solu-       key cryptography, and distributed consensus is what
tions and our own previous attempts, we have identified        secures blockchain transactions. Conversely to a central-
the following research questions:                              ized system, no single entity i.e. node should be able to
                                                               control the process of adding a block to the chain. As
     • RQ1: Is it possible to design a lightweight frame-
                                                               the blockchain is a distributed system, each new block
       work for the specific needs of HEIs to incorpo-
                                                               addition is managed by all nodes who share equal rights.
       rate document issuance and validation in a secure
                                                               This mechanism is utilized in order to overcome secu-
       manner, without relying on complex solutions?
                                                               rity issues, and is achieved through the process known
     • RQ2: Can the flexibility of Hyperledger Fabric          as distributed consensus. This process can be viewed
       be used as a basis for incorporating a BCT/DLT-         as an agreement among the nodes in the network how
       based addition to an existing HEI information           to validate each block yet to be added to the chain. De-
       system (IS)?                                            pending on the consensus mechanism, nodes can either
   The rest of the paper is organized as follows. Section      compete for correct transaction validation (PoW), be cho-
2 gives a brief introduction on blockchain technolgies,        sen randomly (PoS and its variations), or apply a different
focusing on Hyperledger Fabric. Afterwards, Section            algorithm altogether. The algorithms used can vary in
3 gives presented the proposed system, developed at            computational complexity.
Belgrade Metropolitan University’s (BMU’s) Blockchain             Finally, it is important to note that blockahins are a
Technology Laboratory. Finally, Section 4 gives a con-         class of technology; the term refers to different forms of
clusion, with current limitations and further research         distributed databases with variations in their technical
ideas.                                                         and governance arrangements and complexity.

                                                               2.2. Hyperledger and its use cases
2. Blockchain and Hyperledger
                                                           Hyperledger is the leading open source community fo-
   overview                                                cused on developing various stable frameworks, tools and
In this Section, we firstly provide a briew overview of libraries for enterprise-grade distributed ledger deploy-
the building blocks of a general blockchain system. Af- ments [14]. This community aims to advance BCT/DLT
terwards, we focus on the Hyperledger DLT solution, of technologies by identifying and more importantly real-
which Hyperledger Fabric is used to develop the creden- izing a cross-industry open standard platform for DLTs.
tialing system.                                            The aim of the open standard is to transform the approach
                                                           to business transactions on a global level [14]. Hyper-
                                                           ledger has a modular approach to hosting projects similar
2.1. Brief blockchain overview                             to the approach of the Linux Foundation, as shown in Fig.
In general, BCTs impose a fundamental change to manner 1. All Hyperledger projects are open source, they are easy
various types of data are processed, and can improve ex- to obtain [15]. All Hyperledger projects, with the excep-
isting data security solutions. A blockchain can be viewed tion of Hyperledger Indy, are used for general purpose
as a shared, append-only distributed ledger, in which all blockchain-based applications and solutions, whereas
events are stored in linked blocks [13]. These events are Hyperledger Indy focuses on decentralized identity [16].
often referred as transactions. A copy of the ledger is       One of the key differences between the various BCT-
therefore kept by all nodes which form the blockchain s/DLTs systems is the utilized consensus mechanism. Due
network. Due to the fact that all member nodes have a
Figure 1: The Hyperledger Project umbrella [15].



to the variety of blockchain usage requirements, Hyper-       Table 1
ledger provides several different consensus mechanisms        Hyperledger Fabric features
[17]. For instance, Fabric uses the Apache Kafka platform
                                                                Advantages                  Enterprise backing
[18] as the main Crash Fault Tolerance (CFT) protocol
                                                                                            Relative maturity
on the network which is permissioned i.e. private, and it                                   Private channels
is voting-based. Hyperledger Indy utilized a consensus                                      Modular architecture
based on Redundant Byzantine Fault Tolerance (RBFT), a                                      Smart contracts
protocol inspired by Plenum Byzantine Fault Tolerance
                                                                Consensus mechanism         Kafka
(Plenum). Hyperledger Iroha used a variant of the BFT al-
                                                                                            RAFT
gorithm called Sumeragi, which tolerates more than one                                      Solo
Byzantine faulty network nodes. Hyperledger Sawtooth
facilitates the so-called pluggable consensus for both lot-     Smart contract technology   Chaincode
tery and voting algorithms. By default, Hyperledger Saw-        Smart contract type         Installed
tooth uses a lottery-based, Nakamoto consensus algo-            Smart contract language     Go
rithm called Proof of elapsed time (PoET). Hyperledger                                      Java
Burrow comes with Byzantine Fault-Tolerant Tendermint                                       Javascript
protocol with a greater transaction rate, whereas Buru                                      Solidity
implements various consensus algorithms that are in-
                                                                State storage               CoudhBD
volved in transaction validation, block validation, and                                     leveldb
block production, i.e. mining in the PoW mechanism,
while Hyperledger Sawtooth has the most support for
smart contract languages [16].
   The core Hyperledger-based use cases include banking,
                                                              3. System model
healthcare, supply chain management, financial services,      BMU’s ongoing internal R&D includes implement-
information technology, government, and media and en-         ing blockchain in education and e-learning. BMU’s
tertainment. Indeed, the Hyperledger Foundation pro-          Blockchain Technology Laboratory (BCT Lab) is investi-
motes a range of business DLTs, including many libraries      gating which blockchain technology is most suitable for
and tools that provide support for the creation, mainte-      applying in education, with emphasis on data protection.
nance, deployment, providing cryptographic work, etc          BMU’s BCT Lab is collaborating with ISUM (Informa-
[15].                                                         tion System of University Metropolitan) and BMU’s e-
   For the proposed system, the authors have opted to         Learning center. During a four month testing developing
use Hyperledger Fabric, as it is the Hyperledger project      and period, a working prototype for credentialing was
with most testing, working real-world applications com-       developed. The proposed model is comprised of three
munity, and documentation. The details of Hyperledger         layers, stacked on top of the zeroth layer, which is the
Fabric are listed in Table 1.                                 HEI’s IS:
     Data entry                                                                                                 Test network
                                                                                                                    Orderer




                                                                                                                    orderer
                                                                                                  org1                                  org2
                                      Server
                                                                                        peer0.org1                            Peer0.org2




                            DBMS               Relational Database                        chaincode        Local                chaincode       Local
                                                                         Client app                       CouchDB                              CouchDB

                                                                                       CA for peer0                           CA for peer1


                            API


                                                                                      CA for peer0.org1                   CA for peer0.org2




Figure 2: Proposed system consisting of a data entry system and the test blockchain network, communicating over an API.



    1. the smart contract layer;
    2. the blockchain layer itself;
    3. the network layer.
   The smart contract layer runs the chaincode to add
the data to a block. It is present on every node, denoted
as a peer. The blockchain layer consists of the peer itself,
a Certification Authority (CA) for that peer, and a local            Figure 3: Asynchronous promise function.
NoSQL database - CouchDB. The network layer consists
of the test network with two peers, denoted with org1
and org2.                                                            const diplomas =
   The system was developed in two stages – Stage 1                  [
consists of using an isolated GIT branch of the HEIs to add               {
a functionality to export diploma supplemental materials                    "name": "Firstname",
as an API to the blockchain network. Stage 2 comprised                      "surname": "Surname",
of developing a lightweight blockchain application, based                   "studygroup": "StudyGroup",
on Hyperledger Fabric, to connect the the API and add                       "grades":
the data to a block. The architecture of the two-stage                          [
system is shown in Fig. 2.                                                          {
   The main parameter which Hyperledger Fabric uses                                     "grade": "GradeValue",
is the transaction context ctx. It holds the needed in-                                 "course": "CourseCode",
formation for transaction logic "per transaction" or "per                           },
contract". IT enables to access the stub which allows var-                          ...
ious blockchain operations such as state returns, adding                        ]
a new item to the block, or getting all blocks (in our case               }
diploma supplements).                                                  ...
   To add a diploma supplement, it is needed to connect              ]
toe the peer node using a gateway, and to get the chain-
code from the network.                                                 When data is added, a message can be viewed in the
   To write the transaction i.e. diploma object, an asyn-            console terminal to confirm a successful transaction, as
chronous promise function will get all the necessary                 shown in Fig. 4. In our testbed, and endpoint was not
parameters for add a new diploma supplement, as shown                deployed from the IS’s side; therefore we have manually
in Fig. 3. It will create a new object with those param-             added the data in the same format as the HEI’s IS would
eters which will be later added to teh blockchain using              provide.
stub API operations.
   The data which is added to the blockchain has the
following structure:
Figure 4: Transaction successfully added.



4. Conclusion                                                Acknowledgment
In this paper, we have used Hyperledger Fabric to de- This paper was supported by the Blockchain Technol-
velop a lightweight blockchain network for credentialing ogy Laboratory at Belgrade Metropolitan University, Bel-
HEI’s diplomas and diploma supplements. Currently, grade, Serbia.
our system only addresses the issuance use-case, while
validation use-case remains open. As prototyping was
conducted in an isolated environment, several open is- References
sues still remain. Firstly, should the blockchain remain
                                                             [1] B. K. Mohanta, S. S. Panda, D. Jena, An overview
private, or be public (where anyone can be a part of the
                                                                 of smart contract and use cases in blockchain tech-
network)? As the target group of the system are first and
                                                                 nology, in: 2018 9th international conference on
foremost HEIs, the authors, as was discussed in other
                                                                 computing, communication and networking tech-
literature as well, opt for a private blockchain solution,
                                                                 nologies (ICCCNT), IEEE, 2018, pp. 1–4.
where the HEIs comprise the network. Still, there exists
                                                             [2] K. Zı̄le, R. Strazdin, a, Blockchain use cases and their
a possibility to add the learners as nodes as well.
                                                                 feasibility, Applied Computer Systems 23 (2018)
   Using Hyperledger Fabric, data such as diplomas
                                                                 12–20.
and supplements can be issued and verified reliably.
                                                             [3] P. Zhang, D. C. Schmidt, J. White, G. Lenz,
Blockchain can help learning platforms to add an ad-
                                                                 Blockchain technology use cases in healthcare, in:
ditional layer to their credentialing process. We have
                                                                 Advances in computers, volume 111, Elsevier, 2018,
presented a blockchain-based credentialing system can
                                                                 pp. 1–41.
be easily deployable and connected to a learning plat-
                                                             [4] M. Alabadi, A. Habbal, Next-generation predic-
form. Within our proposed system, upon generating the
                                                                 tive maintenance: leveraging blockchain and dy-
certificate file for the diploma and/or supplement, the
                                                                 namic deep learning in a domain-independent sys-
HEI’s IS will make a transaction to the blockchain. This
                                                                 tem, PeerJ Computer Science 9 (2023) e1712.
entry will also have the certificate information, along-
                                                             [5] V. Milicevic, N. Zdravkovic, J. Jovic, On the selec-
side metadata required for the transaction header. This
                                                                 tion of suitable blockchain technologies for supply
information will be encrypted, and can be accessed only
                                                                 chain management, International Journal for Qual-
by the IS, the student, and an authorized third party.
                                                                 ity Research (2023).
   This new issuance transaction is sent to the blockchain,
                                                             [6] N. Zdravković, J. Jović, M. Damnjanović, Secure
where the other nodes in the network will verify it and
                                                                 credentialing in e-learning using blockchain, in:
add it to the blockchain using a simpler consensus mech-
                                                                 Proceedings of the 11th Conference on eLearning
anism. Each node will have a local copy of the blockchain
                                                                 (eLearning-2020), 2020, pp. 39–42.
on a NoSQL database like CouchDB. For certificate vali-
                                                             [7] A. Grech, A. F. Camilleri, Blockchain in education,
dation, upon receiving the access link, the student or an
                                                                 Luxembourg: Publications Office of the European
authorized third party can verify the digital credential by
                                                                 Union, 2017.
accessing the blockchain through a query. If a match is
                                                             [8] M. Jirgensons, J. Kapenieks, Blockchain and the
found on the blockchain, the certificate file is validated
                                                                 future of digital learning credential assessment and
and a corresponding message appears.
                                                                 management, Journal of teacher education for sus-
   The innate immutability property of BCT/DLT does
                                                                 tainability 20 (2018) 145–156.
not allow fraudulent or modified certificate files to be
                                                             [9] G. Caldarelli, J. Ellul, Trusted academic transcripts
deemed as verified. Any tampering to the certificate file
                                                                 on the blockchain: A systematic literature review,
will result in a vastly different hashed value of the file,
                                                                 Applied Sciences 11 (2021) 1842.
ensuring impossible verification.
                                                            [10] P. Ocheja, B. Flanagan, H. Ueda, H. Ogata, Manag-
                                                                 ing lifelong learning records through blockchain,
                                                                 Research and Practice in Technology Enhanced
                                                                 Learning 14 (2019) 1–19.
[11] F. R. Vidal, F. Gouveia, C. Soares, Revocation
     mechanisms for academic certificates stored on a
     blockchain, in: 2020 15th Iberian Conference on In-
     formation Systems and Technologies (CISTI), IEEE,
     2020, pp. 1–6.
[12] F. Vidal, F. Gouveia, C. Soares, Analysis of
     blockchain technology for higher education, in:
     2019 International Conference on Cyber-Enabled
     Distributed Computing and Knowledge Discovery
     (CyberC), IEEE, 2019, pp. 28–33.
[13] Z. Zheng, S. Xie, H. Dai, X. Chen, H. Wang, An
     overview of blockchain technology: Architecture,
     consensus, and future trends, in: 2017 IEEE inter-
     national congress on big data (BigData congress),
     IEEE, 2017, pp. 557–564.
[14] C. Cachin, et al., Architecture of the hyperledger
     blockchain fabric, in: Workshop on distributed
     cryptocurrencies and consensus ledgers, volume
     310, Chicago, IL, 2016.
[15] The      Hyperledger         Foundation,     https:
     //www.hyperledger.org, 2023.
[16] V. Milićević, J. Jović, N. Zdravković, An overview
     of hyperledger blockchain technologies and their
     uses, in: Proceedings of the 11th International
     Conference on Information Society and Technology
     (ICIST 2021), 2021, pp. 62–65.
[17] J. Moubarak, E. Filiol, M. Chamoun, Comparative
     analysis of blockchain technologies and tor net-
     work: Two faces of the same reality?, in: 2017 1st
     Cyber Security in Networking Conference (CSNet),
     IEEE, 2017, pp. 1–9.
[18] B. R. Hiraman, et al., A study of apache kafka in
     big data stream processing, in: 2018 International
     Conference on Information, Communication, Engi-
     neering and Technology (ICICET), IEEE, 2018, pp.
     1–3.