2019
DOI: 10.3390/app9224966
|View full text |Cite
|
Sign up to set email alerts
|

UniChain: A Design of Blockchain-Based System for Electronic Academic Records Access and Permissions Management

Abstract: Although blockchain technology was first introduced through Bitcoin, extending its usage to non-financial applications, such as managing academic records, is a new mission for recent research to balance the needs for increasing data privacy and the regular interaction among students and universities. In this paper, a design for a blockchain-based system, namely UniChain, for managing Electronic Academic Records (EARs) is proposed. UniChain is designed to improve the current management systems as it provides in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 45 publications
(31 citation statements)
references
References 8 publications
(1 reference statement)
0
30
0
1
Order By: Relevance
“…Uni-Chain was designed by Daraghmi et al (2019) to be compatible with existing EAR databases and provide interoperable, secure, and efficient access to EAR by universities, students, and third parties while protecting student privacy. According to their findings, universities are responsible for blockchain maintenance, including creation, verification, and addition of new blocks, while allowing students to control access to their EARs securely.…”
Section: Blockchain Educationmentioning
confidence: 99%
“…Uni-Chain was designed by Daraghmi et al (2019) to be compatible with existing EAR databases and provide interoperable, secure, and efficient access to EAR by universities, students, and third parties while protecting student privacy. According to their findings, universities are responsible for blockchain maintenance, including creation, verification, and addition of new blocks, while allowing students to control access to their EARs securely.…”
Section: Blockchain Educationmentioning
confidence: 99%
“…Finally, some systems utilize a PoA [17] consensus mechanism. With this approach, a small number of active network members are authorized to verify a new block, synchronizing blocks of the chain with the rest of the network peers.…”
Section: Preliminariesmentioning
confidence: 99%
“…is not fully addressed by any of the initiatives investigated, except for the design presented in this research. Only Daraghmi et al [17] and Lam and Dongol [34] take partially into account some related aspects, but none addresses them specifically.…”
Section: Preliminariesmentioning
confidence: 99%
“…To identify the blockchain's participants, public-private key cryptography is utilized [14,15]. For public identification, a public key is employed, whereas for authorizing transactions, the private key is employed.…”
Section: Background and Related Workmentioning
confidence: 99%