Enabling Trust and Privacy Preserving E-KYC System Using Blockchain

Authors

  • Prof. Nalawade V.S.  Department of Computer Engineering, S. B. Patil College of Engineering, Indapur, Pune, Maharashtra, India
  • Ahire Kunal  Department of Computer Engineering, S. B. Patil College of Engineering, Indapur, Pune, Maharashtra, India
  • Divate Devendra  Department of Computer Engineering, S. B. Patil College of Engineering, Indapur, Pune, Maharashtra, India
  • Pawar Saurabh  Department of Computer Engineering, S. B. Patil College of Engineering, Indapur, Pune, Maharashtra, India

Keywords:

E-KYC, Authentication, CP-ABE, Identity Verification, Authorization System, blockchain,.

Abstract

Banks and identity providers use the electronic Know Your client (e-KYC) system to set up client identity verification procedures with reliant parties. Because cloud-based e-KYC systems are more accessible and efficient with resources, many banks choose them. But e-KYC data security in the cloud is a serious issue. Strong authentication and conventional encryption are generally used in existing e-KYC platforms, which results in encryption dependencies and administration overheads when files are uploaded to the cloud. In this work, we introduce the “e-KYC Trust Block,” a revolutionary blockchain-based e-KYC solution that improves trust, security, and privacy compliance through the use of ciphertext policy attribute-based encryption (CP-ABE) and client consent enforcement. Furthermore, we present attribute-based encryption to support privacy protection and granular access control for delicate transactions recorded in the blockchain.

References

  1. Swapnali, Londhe, et al. "A Cryptographic Key Generation on a 2D Graphics Using RGB Pixel Shuffling and Transposition." Proceedings of the International Conference on Data Engineering and Communication Technology: ICDECT 2016, Volume 2. Springer Singapore, 2017.
  2. Ajinath, B. S., Sunil, H. S., Digambar, K. S., Anandkumar, B. P., Nalawade, V. S., & Sayyad, G. G. (2018). Optimizing Information Leakage and Improve Security over Public Multi-Cloud Environment. Journal of emerging technologies and innovative research.
  3. K. S. Gaikwad and S. B. Waykar, "Detection and Removal Of Node Isolation Attack In OLSR Protocol Using Imaginary Nodes with Neighbour Response in MANET," 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA), Pune, India, 2017, pp. 1-5, doi: 10.1109/ICCUBEA.2017.8463762.
  4. Mr. Y. Rajasekhar, K.ChandraSekhar,G.Ranil, L.V.N. Maneesh, K.Venu 2023Enabling Trust and Privacy preserving e-KYChttps://www.indusedu.org/pdfs/IJREISS/IJREISS_4120_14404.pdf
  5. Viraj Ashok Patil, Akshay Kumar Mishra, KetanKishorShinde, Prof A. A. Patil 2023Enabling Trust and Privacy Preserving e-KYC System Using Blockchain https://ijsrem.com/download/enabling-trust-and-privacy-preserving-e-kyc-system-using-blockchain-2/
  6. Manas Patil, Sakshi Patil, Aaditya Patil, Amir Ahmad, Prof.D.B.Mane 2023E-KYC System using Blockchain Technology: A Review https://ijcrt.org/papers/IJCRT2304818.pdf
  7. Sairise, Raju M., Limkar, Suresh, Deokate, Sarika T., Shirkande, Shrinivas T. , Mahajan, RupaliAtul& Kumar, Anil(2023) Secure group key agreement protocol with elliptic curve secret sharing for authentication in distributed environments, Journal of Discrete Mathematical Sciences and Cryptography, 26:5, 1569–1583, DOI: 10.47974/JDMSC-1825
  8. E-KYC using Blockchain Technology 2023GangurdePriyankaSahebrao, Kasture Nikita Rajendra, Shaikh Saniya Asif, NemadeGunjali Anil, 5V.A. Khairnar https://www.ijirmps.org/papers/2023/3/230138.pdf
  9. SOMCHART FUGKEAW , (Member, IEEE) 2022Enabling Trust and Privacy-Preserving e-KYC System Using Block chain https://ieeexplore.ieee.org/iel7/6287639/9668973/09770032.pdf
  10. Viraj Ashok Patil, Akshay Kumar Mishra, KetanKishorShinde,Prof. A.A. Patil 2022
  11. Secured and Privacy preserving e-KYC system using Blockchain https://www.irjmets.com/uploadedfiles/paper//issue_2_february_2023/33872/final/fin_irjmets1677561174.pdf
  12. Gaikwad, Yogesh J. "A Review on Self Learning based Methods for Real World Single Image Super Resolution." (2021).
  13. V. Khetani, Y. Gandhi and R. R. Patil, "A Study on Different Sign Language Recognition Techniques," 2021 International Conference on Computing, Communication and Green Engineering (CCGE), Pune, India, 2021, pp. 1-4, doi: 10.1109/CCGE50943.2021.9776399.
  14. Vaddadi, S., Arnepalli, P. R., Thatikonda, R., &Padthe, A. (2022). Effective malware detection approach based on deep learning in Cyber-Physical Systems. International Journal of Computer Science and Information Technology, 14(6), 01-12.
  15. Thatikonda, R., Vaddadi, S.A., Arnepalli, P.R.R. et al. Securing biomedical databases based on fuzzy method through blockchain technology. Soft Comput (2023). https://doi.org/10.1007/s00500-023-08355-x
  16. Rashmi, R. Patil, et al. "Rdpc: Secure cloud storage with deduplication technique." 2020 fourth international conference on I-SMAC (IoT in social, mobile, analytics and cloud)(I-SMAC). IEEE, 2020.
  17. Khetani, V., Gandhi, Y., Bhattacharya, S., Ajani, S. N., &Limkar, S. (2023). Cross-Domain Analysis of ML and DL: Evaluating their Impact in Diverse Domains. International Journal of Intelligent Systems and Applications in Engineering, 11(7s), 253-262.
  18. Khetani, V., Nicholas, J., Bongirwar, A., &Yeole, A. (2014). Securing web accounts using graphical password authentication through watermarking. International Journal of Computer Trends and Technology, 9(6), 269-274.
  19. Nigang Sun, Yuanyi Zhang and Yining Liu 2022Privacy-Preserving KYC-Compliant Identity Scheme for Accounts on All Public Blockchains https://mdpi-res.com/d_attachment/sustainability/sustainability-14-14584/article_deploy/sustainability-14-14584-v2.pdf?version=1667898781
  20. Kale, R., Shirkande, S. T., Pawar, R., Chitre, A., Deokate, S. T., Rajput, S. D., & Kumar, J. R. R. (2023). CR System with Efficient Spectrum Sensing and Optimized Handoff Latency to Get Best Quality of Service. International Journal of Intelligent Systems and Applications in Engineering, 11(10s), 829-839.
  21. Nagtilak, S., Rai, S., & Kale, R. (2020). Internet of things: A survey on distributed attack detection using deep learning approach. In Proceeding of International Conference on Computational Science and Applications: ICCSA 2019 (pp. 157-165). Springer Singapore.
  22. Mane, Deepak, and AniketHirve. "Study of various approaches in machine translation for Sanskrit language." International Journal of Advancements in Research & Technology 2.4 (2013): 383.
  23. Shivadekar, S., Kataria, B., Limkar, S. et al. Design of an efficient multimodal engine for preemption and post-treatment recommendations for skin diseases via a deep learning-based hybrid bioinspired process. Soft Comput (2023). https://doi.org/10.1007/s00500-023-08709-5
  24. Shivadekar, Samit, et al. "Deep Learning Based Image Classification of Lungs Radiography for Detecting COVID-19 using a Deep CNN and ResNet 50." International Journal of Intelligent Systems and Applications in Engineering 11.1s (2023): 241-250.
  25. Vincent Schlatt, Johannes Sedlmeir, Simon Feulner, Nils Urbach 2021Designing a Framework for Digital KYC Processes Built on Blockchain-Based Self-Sovereign Identity https://arxiv.org/pdf/2112.01237

Downloads

Published

2023-10-30

Issue

Section

Research Articles

How to Cite

[1]
Prof. Nalawade V.S., Ahire Kunal, Divate Devendra, Pawar Saurabh, " Enabling Trust and Privacy Preserving E-KYC System Using Blockchain" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 9, Issue 10, pp.01-09, September-October-2023.