Capstone Project
Capstone Project
MANAGEMENT SYSTEM
Submitted in partial fulfillment of the requirements for the degree of
Bachelor of Technology
In
by
Dr. Niha K
SCOPE
VIT, Vellore
May 2023
DECLARATION
Place: Vellore
Date: 20/05/23
B-TECH CSE
ACKNOWLEDGEMENTS
I take immense pleasure in thanking Dr. G. Viswanathan, our beloved Chancellor, VIT
University for having permitted me to carry out the project.
I express gratitude to my guide, Dr.Niha K, for guidance and suggestions that helped me to
complete the project on time. Words are inadequate to express my gratitude to the faculty
and staff members who encouraged and supported me during the project. Finally, I would
like to thank my ever-loving parents for their blessings and my friends for their timely help
and support.
Student Name:
UTKARSH VERMA
(19BCE0078)
ASHISH SARDA
(19BCE0262)
Executive Summary
The system's frontend is developed using ReactJS, a popular JavaScript library for
building user interfaces. It provides a clean and modern interface that allows the prison staff
to manage various tasks, including inmate records. The frontend is designed to be intuitive
and user-friendly, ensuring that prison staff can use the system with ease.
The backend of the system is developed using NodeJS, a powerful server-side JavaScript
runtime. It provides a robust and scalable backend infrastructure that handles the processing
of data and communication between the frontend and blockchain. The backend of the system
is responsible for managing the data, processing requests, and communicating with the
blockchain.
Solidity is the programming language used to create smart contracts on the Ethereum
blockchain. It is used to develop a secure and immutable database for inmate records. The
smart contract ensures that only authorized users can access the data, and any changes made
to the data are recorded on the blockchain, making it tamper-proof. This ensures that the
inmate records are secure, and the data cannot be altered or deleted by unauthorized personnel.
ACKNOWLEDGEMENT i
EXECUTIVE SUMMARY ii
LIST OF FIGURES v
1 INTRODUCTION 1
1.2 MOTIVATION 2
2 LITERATURE SURVEY 4
4.1 INTRODUCTION 12
4.2.2.1.1 EFFICIENCY 18
4.2.2.1.2 RELIABILITY 19
4.2.2.1.3 PORTABILITY 19
4.2.2.1.4 USABILITY 20
6 REFERENCES 31
List of Figures
Smart contracts are another critical component of the prison management system.
They are self-executing contracts in which the contract terms are written directly into the
code. Smart contracts can be used to implement various management processes, such as
record-keeping, planning, and information management, helping to increase productivity and
reduce the workload of prison staff.
1
1.2 MOTIVATION:
The prison system in India lags behind other industries, such as healthcare, in terms
of automation. To address this issue, we are developing a web application to digitize daily
prison operations. The primary objectives of this application are as follows:
2
Overall, the development of this web application will help modernize the Indian
prison system and bring it up to par with other industries in terms of automation and
efficiency.
Security: The system intends to enhance the security of prison information and
operations by leveraging blockchain technology to provide a decentralized, flexible, and
transparent platform.
3
2) LITERATURE SURVEY
Prison management is a crucial aspect of criminal justice systems across the world.
The efficient management of a correctional facility is essential for ensuring the safety of
inmates, staff, and visitors, as well as maintaining order and discipline within the facility. In
the past, prison management was primarily a manual process, with staff members relying on
paper-based systems to manage information and track inmates. However, with the advent of
modern technology, prison management systems have evolved significantly, with a variety of
software applications and systems now available to assist prison authorities in managing their
facilities.
One such system is the Integrated Correctional Management System (ICMS), which
is designed to streamline and integrate all aspects of prisoner management, including inmate
records, medical information, visitor information, staff appointments, and care facilities. The
system is designed to increase efficiency and improve communication between prison staff,
with features such as automated scheduling and real-time alerts. By centralizing all aspects of
prisoner management in one system, the ICMS reduces the risk of errors and duplication, and
ensures that information is easily accessible to authorized personnel.
The Prisoner Tracking System (PTS) is a real-time location tracking system that
uses radio frequency identification (RFID) technology to track the movements of inmates in
a correctional facility. The system is designed to increase safety and security by providing
real-time alerts on the movements of inmates and unauthorized persons. With features such
as automated location tracking and real-time alerts, the PTS provides prison authorities with
a powerful tool for managing their facilities and maintaining order and discipline within the
facility.
Overall, these prison management systems are designed to improve the efficiency
and effectiveness of prison management by providing prison authorities with powerful tools
for managing their facilities and monitoring inmate behavior. By centralizing and
streamlining all aspects of prisoner management, these systems reduce the risk of errors and
duplication, and ensure that information is easily accessible to authorized personnel. With the
continued development of technology and the increasing importance of prison management,
it is likely that these systems will continue to evolve and become even more powerful tools
for prison authorities in the future.
Prison management is a critical component of the criminal justice system. The goal
of prison management is to ensure the safety and security of the facility, as well as the well-
being and rehabilitation of the inmates. To achieve these goals, prison administrators rely on
a variety of management systems, including Integrated Correctional Management System
(ICMS), Offender Management System (OMS), Prison Information Management System
(PIMS), Jail Management System (JMS), and Prisoner Tracking System (PTS). While these
systems have been developed to address the challenges of managing correctional facilities,
there are still some gaps that need to be addressed. This paper will discuss some of the gaps
in the existing models of prison management and propose solutions to address them.
Limited Integration: One of the gaps in the existing models of prison management
is limited integration. Many existing prison management systems operate in silos, which
5
limits the ability of different systems to integrate and share information. This can result in
data duplication, inefficiencies, and errors. For example, an inmate’s medical records may be
stored in a separate system from their behavioral records, which can make it difficult for
prison administrators to get a complete picture of an inmate’s needs and risks. In addition,
limited integration can make it difficult for prison administrators to coordinate with other
stakeholders, such as probation officers, social workers, or healthcare providers.
Limited analytics capabilities: Many prison management systems may not provide
sufficient data analytics capabilities to enable predictive analytics or data-driven decision-
making. This can limit the ability of prison administrators to identify and address emerging
issues before they become critical. For example, a system that cannot predict the likelihood
of a particular inmate becoming violent may not be effective in preventing violent incidents
in the facility. To address this gap, prison administrators need to ensure that the systems they
adopt provide robust analytics capabilities that enable data-driven decision-making.
Addressing these gaps in the existing models of prison management is essential to improving
the efficiency, effectiveness, and transparency of correctional facility management. By
customizing prison management systems to meet the unique needs of different facilities and
providing robust analytics capabilities, prison administrators can better understand the
challenges they face and develop effective strategies to address them. Additionally,
customizing prison management systems and improving analytics capabilities can lead to
increased efficiency, as prison administrators are better equipped to allocate resources and
manage their facilities more effectively.
8
The system will use various blockchain algorithms such as Proof of Work, Proof of
Stake, Proof of Authority or Proof of Value etc to verify transactions and ensure the integrity
of the blockchain ledger. This will help prevent unauthorized access to information and ensure
that all changes and activities in the prison are recorded and monitored in a timely manner.
Prison Management System also plans to have more transparency by making all information
and transactions visible on the blockchain ledger. This will help ensure that all prison
operations are conducted fairly and transparently and that any irregularities or irregularities
can be detected and resolved quickly.
Overall, the framework or design of the Prison System project aims to provide security,
transparency and efficiency to manage prison information and prison operations using the
power of blockchain technology.
A proposed system model for a prison management system project based on blockchain
technology could include the following components:
1. User Interface: This component would provide an easy-to-use interface for different
types of users to interact with the system. The interface could be designed as a web or
mobile application that would enable users to perform tasks such as viewing inmate
data, scheduling visits, managing assets, and generating reports.
2. Smart Contracts: Smart contracts would be used to automate various processes within
the prison system, such as meal scheduling, cell assignments, and visitation
scheduling. The smart contracts would execute automatically based on predefined
conditions and rules, and their execution would be recorded on the blockchain ledger.
3. Blockchain Ledger: The blockchain ledger would be a distributed, secure, and tamper-
proof platform that would record and track all transactions and activities within the
10
prison system. The ledger would provide transparency and accountability by allowing
authorized users to view and audit all transactions and activities on the blockchain.
4. Consensus Algorithm: The consensus algorithm would be used to validate
transactions and ensure the integrity of the blockchain ledger. The system could use a
proof-of-work, proof-of-stake, proof-of-authority, or proof-of-importance consensus
algorithm to achieve consensus among network participants.
5. Encryption and Security: The system would use encryption and other security
measures to protect user data and ensure the privacy and confidentiality of inmate
information. The system would also implement access controls and permissions to
ensure that only authorized users have access to sensitive data and system
functionality.
Overall, the proposed system model for a prison management system based
on blockchain technology would provide a secure, transparent, and efficient platform for
managing inmate data and prison operations. The use of blockchain technology would
enable the system to operate in a decentralized and trustless manner, thereby reducing the
risk of fraud, corruption, and errors.
11
4) Proposed System Analysis and Design
4.1 Introduction:
12
● Prioritizing requirements: The requirements should be prioritized based on their
importance and feasibility. The most critical requirements should be given the highest
priority.
● Validating requirements: This involves validating the requirements to ensure that they
meet the needs of the stakeholders and are feasible to implement within the available
resources.
● Documenting requirements: The final step is to document the requirements in a clear and
concise manner that can be easily understood by the development team.
Some of the key functional requirements of the prison system based on blockchain
technology may include:
● Inmate management: This includes inmate identification, admission, release, and transfer.
● Staff management: This includes staff identification, recruitment, training, and
scheduling.
● Record keeping: This includes maintaining accurate records of inmate and staff activities,
health records, and legal records.
● Communication: This includes providing secure communication channels for staff,
inmates, and external organizations such as courts and law enforcement agencies.
In summary, requirement analysis is a critical step in the development of a prison management
system based on blockchain technology, and it involves identifying and analyzing the needs and
constraints of the stakeholders to determine the functional requirements of the system.
System Boundary: The system boundary defines what happens inside and outside the
system. In the case of the prison management system, the system will include all the software,
hardware and related equipment needed to control the movement of prisoners, prison staff
and visitors.
13
Interface: A system interface defines how a system interacts with its users and other
systems.
When it comes to prison management, the system will provide interaction between
staff, inmates and external stakeholders. These interfaces will provide access to operational
functions such as inmates identification and storage.
Function: A system function describes what the system does and how it does it. In the
prison management system, functions include prison management, personnel management,
visitor management and communication. The system will use blockchain technology to ensure
the safety and security of data and communication.
Inputs and Outputs: System inputs and outputs describe the information necessary for
the operation of the system and the information produced by the system. In the case of prison
management, inputs may include inmates and staff, while outputs may include notices,
warnings and alerts.
Data Storage: System data storage means what data is stored and how it is stored.
When it comes to prison management, the system will store information about inmates and
staff. The system will use a blockchain-based distributed ledger to provide secure and
verifiable data storage.
The entire web application has been built on the basis of a permission blockchain
meaning, it follows all the rule of a blockchain, like it has an immutable ledger, etc. Since the
data stored is small, no separate database was used and the entire data was stored on blockchain.
The website also boasts of user based authentication system i.e, we can know when a certain user
has logged in or if any user has unauthorized access to their role. The website uses the wallet
address of the user to log them in and make changes to the files if their roles allow. There are two
ways to login into the system, first one being through credentials, which is mainly for the external
stakeholders to view the prison files. Second option is through a wallet, where you can use your
username and the wallet address to log in which of course costs some gas.
14
External stakeholders logged in through credentials cannot add/delete the prison files.
This can only be allowed for the users logged in via the wallet.
Users of the prison management system based on blockchain technology can be divided
into three groups: employees, inmates and external stakeholders. Each type of user has unique
needs and requirements that the system must meet. Below is a brief introduction of user features:
Staff: Includes prison administration staff, guards, male policemen, administrators and
other staff involved in the daily operations of the prison. Employees need access to the system to
manage recorded data and communicate with external stakeholders. Procedures should be
established to provide access control to employees so that they can only access information and
activities relevant to their role.
Prisoners: Prisoners in prisons are people who are incarcerated in prisons. Prisoners
need access to the system to manage their personal information and communicate with staff.
The system should be designed to ensure that prison security is not compromised while
providing secure access to inmate information and communications.
External Stakeholders: Stakeholders outside the prison system include law enforcement
and other organizations associated with prisons. External stakeholders need access to the system
to view records, request information, and communicate with staff.
Procedures should be designed to provide a secure interface to external stakeholders while
ensuring data privacy and security are maintained.
15
Assumptions and dependencies are important in any project because they help identify
risks and limitations that may affect the success of the project.
Assumptions:
● Blockchain technology is used in a secure system and safe.
● The hardware and software used in the system are compatible.
● Staff and prisoners are willing and able to comply with the new law.
● The system complies with all applicable laws and regulations.
Dependencies:
● Have the budget and time to support development and maintenance.
● Skilled manufacturers and workers who design, manufacture and operate machinery.
● Integration of the system with existing prison management and systems.
● Crucial data access and APIs for data integration and sharing.
It is important to identify and manage assumptions and dependencies throughout the life of
the project to minimize risk and ensure successful delivery.
User requirements for prison management based on blockchain technology will define
what users need from the system, how they will interact, and the features and functions they
need to do their jobs well. Here are some things users should consider for such systems:
User Interface: The system should be intuitive and easy to use, easy to navigate, clear
instructions and clear and buttons.
Access Levels: The system should allow users to have different levels of access
depending on their roles and responsibilities, with appropriate permissions to access different
types of information.
Desktop Access: In order for users to access information whenever and wherever they
want, the system should be accessible from mobile devices such as desktop, smart phone,
tablet.
Behavior Management: The system should provide tools to manage personal data and
recorded data such as behavioral data.
17
4.2.2.1 Product Requirements:
Non-functional product requirements for a secure prison management system would focus
on the system's performance, reliability, security, and usability. Here are some examples of
non-functional requirements that would need to be considered:
● Functionality: The system must be able to handle multiple concurrent users and
business processes faster with less latency.
● Scalability: A system must be able to scale up or down as needed to meet changes in
customer or physical requirements.
● Reliability: To ensure the security of inmates and personnel data, the system must be
versatile with failover and data loss.
● Security: Systems should be designed with effective security measures such as
logging, multi-factor authentication and access control to prevent unauthorized access
and cyber-attacks.
● Usability: The system should be easy to use, contain clear and concise instructions,
and users should be able to navigate the system with minimal training.
● Compatibility: To ensure seamless integration with existing systems, the system must
be compatible with a variety of hardware and software.
● Maintainability: The system should be easy to maintain and update with minimal
disruption to operations.
● Compliance: The system must comply with laws and regulations, such as data
protection and privacy rights, and employee paper to ensure the safety of inmates.
● Data Integrity: The system must ensure data integrity through various checks and
balances such as audit trails and procedural information.
● Disaster Recovery: The system must have a disaster recovery mechanism to ensure
uninterrupted operation in the event of a disaster or failure.
18
Space Efficiency: Since blockchain technology requires storage space for every block
and transaction, it is important that the system is designed to minimize the required space.
This is done by compressing the data stored in each block, removing redundant data and using
good data for storage and retrieval of data. If the data is too big for the blockchain, we also
have the option of having separate files to make the system faster.
4.2.2.1.2 Reliability
The system must be designed to ensure that it operates reliably and consistently over
time, and that it can recover from any failures or errors that occur.
4.2.2.1.3 Portability:
4.2.2.1.4 Usability:
Usability means how easy and intuitive it is for users to interact with prison
management. The usability of the system can be increased with the following requirements:
● User-friendly interface: The system has a simple and user-friendly interface that
enables users to follow and operate easily.
● Intuitive Design: The system should have an intuitive design that guides the user
through the various functions and features of the system.
● Consistency: The system is consistent in design, configuration, and operation so that
users can easily learn and understand how to use the system.
● Help and Support: The system provides help and support to users to help users use the
system.
Overall, the effectiveness of the prison is critical to its success in supporting effective
prison management and rehabilitation.
20
The organizational requirements for a prison management system based on blockchain
technology may include:
● Organizational support: The organization must provide the necessary support and
resources for the development, deployment, and maintenance of the secure prison
management system.
● Staff training: The staff responsible for operating and maintaining the prison
management system should be trained on how to use it effectively and efficiently.
● Legal and regulatory compliance: The prison management system must comply with
all legal and regulatory requirements related to the operation and management of
prisons.
● Security: The prison management system must be designed to ensure the security of
the data and the privacy of the prisoners. Access to the system must be restricted to
authorized personnel only.
● Maintenance and support: The organization must ensure that the prison management
system is maintained and supported by trained personnel to ensure its continuous
operation.
● Scalability: The prison management system has been designed to be scalable to
accommodate future growth and expansion of the prison.
For deployment of the system, the user must have a desktop and steady access to
internet. The user must have a sound knowledge of nodejs and npm package manager to be
able to run the system. It needs to have the appropriate packages installed for testing and
development used in the system. The most important requirement for a user is to have access
to a crypto wallet and an account with valid gas for transactions. All the transactions require
gas to be completed since the system has been built on blockchain technology.
Some of the engineering standard requirements for a prison management system based on
blockchain technology could include:
21
● Security: The system adheres to industry-standard security practices to ensure the
privacy and confidentiality of sensitive data. This may involve encryption, access
control, and other security measures.
● Scalability: The system is designed to handle large amounts of data, users, and
transactions over time, as the prison population grows.
● Availability: The system is available to authorize users at all times, with minimal
downtime for maintenance or upgrades.
● Performance: The system is designed to perform quickly and efficiently, with minimal
delays or lag times in processing transactions.
● Maintainability: The system is easy to maintain and upgrade, and support resources
available to administrators and users.
● Compliance: The system complies with all relevant regulations and laws, including
those related to data privacy, security, and accessibility.
● Portability: The system is designed to be portable across different hardware and
software platforms.
1) Economic: The project is implemented in a cost-effective manner, taking into account the
budget and financial resources available. This includes minimizing any unnecessary expenses
while ensuring that the project delivers the required functionality and meets the needs of
stakeholders.
2) Environmental: Although the project does not have a direct impact on the environment,
efforts are made to minimize the environmental impact of the project, such as reducing the
use of non-renewable resources and minimizing waste.
3) Social: The project must consider the impact on the community and stakeholders, such as
ensuring that the prison management system provides a safe and secure environment for both
inmates and staff.
4) Political: The project must comply all relevant laws, regulations, and policies. The
implementation of the prison management system must be aligned with the government's
policies and goals for the criminal justice system.
22
5) Ethical: The project must be implemented in an ethical manner, ensuring that the rights of
inmates and staff are respected. This includes ensuring that the system is not used for
discriminatory purposes and that the privacy and confidentiality of all individuals are
protected.
6) Health and Safety: The project must prioritize the safety and health of staff and inmates.
This includes ensuring that the prison management system is designed to minimize the risk
of physical harm and making sure all safety protocols are followed.
7) Sustainability: The project must be implemented in a sustainable manner, ensuring that the
system can be maintained and updated over time. This includes ensuring that the system is
designed with scalability and flexibility in mind to accommodate future changes.
8) Legality: The project must comply with all applicable laws and regulations. This includes
ensuring that the system is designed to meet legal and regulatory requirements, such as data
privacy laws.
9) Inspectability: The project must be designed with inspectability in mind, ensuring that the
system can be audited and reviewed by relevant authorities. This includes ensuring that the
system is transparent and that relevant data is readily accessible for inspection and analysis.
ReactJS: ReactJS is a popular JavaScript library that is used for building user
interfaces. It was created by Facebook and is open-source, meaning that anyone can use it and
contribute to its development.
ReactJS uses a component-based approach to building user
interfaces, which means that developers can create modular components that can
be reused throughout their application. Each component encapsulates its own
logic and user interface elements, making it easier to manage and maintain large applications.
ReactJS has a large and active community of developers,
which has led to the creation of many third-party libraries and tools that can
be used with the library. These include tools for testing, debugging, and optimizing ReactJS
applications.
Overall, ReactJS is a powerful and flexible library for building user interfaces that has
become an essential tool for many web developers. Its component-based approach, virtual
DOM, and use of JSX make it easy to create and manage complex user interfaces, while its
large community of developers ensures that it will continue to evolve and improve over time
24
including Linux, macOS, and Windows. This makes it easy to develop and deploy Node.js
applications on a variety of different systems and environments.
Overall, Node.js is a powerful and versatile tool for building web applications and
command-line tools. Its event-driven, non-blocking I/O model, package manager, and cross-
platform compatibility have made it a popular choice for developers looking to build scalable
and efficient applications.
Overall, Metamask is a user-friendly and secure browser extension that makes it easier
for users to manage cryptocurrencies and interact with DApps on the Ethereum blockchain.
Its ease of use, security features, and support for multiple cryptocurrencies have made it a
popular choice among users and developers in the decentralized ecosystem.
IDE-Visual Studio Code: Visual Studio Code (VS Code) is a popular free and open-
source integrated development environment (IDE) that is widely used by developers to build
applications. It was created by Microsoft and is available on Windows, macOS, and Linux.
One of the key features of VS Code is its extensibility. It comes with a wide range of built-in
features and supports a large number of extensions, allowing developers to customize their
workflow and tailor the IDE to their specific needs. VS Code extensions can add features such
as language support, debugging tools, and code analysis, making it a powerful and flexible
tool for building applications.
25
5) Results and Discussion
Prison management is a complex and sensitive task that requires a high level of efficiency
and security. The use of technology in prison management has gained significant attention in
recent years due to the potential benefits it offers. A prison management system (PMS) is a
software application that automates several manual processes involved in the management of
prisons. This project aimed to develop a secure implementation of a prison management
system using ReactJS, NodeJS, Metamask, and Solidity. The implementation of this system
has several advantages, including increased efficiency and security.
The results were in according to the need. Every discussed aspect has been implemented.
The landing page is the login page where they ask you for your wallet implications.
If you don’t want to login using wallet, additionally you can use credentials. From
this page you can access the register page.
26
Fig 5.2 registration page
Similarly, you have the option to register in two ways, using credentials/wallet.
This is the page you will login into after logging in. At the right top corner, you can
see the walletId which means we are logged in via a wallet. At the top center you can see
the username.
27
Fig 5.4 prisoner files
This is the prisoner files. Only a user/admin logged in through the wallet can be able
to edit or add a new prisoner.
28
Fig 5.6 Staff files
This is the dashboard for the staff files. This contains all the details for all the staff
working there.
Not being logged in through the wallet gives this error while trying to perform
unauthorized action using user based authentication.
29
Conclusion:
Future Scope:
The project "Secure Implementation of Prison Management System" has several potential
future scopes. Some of these scopes are:
● Integrating with other technologies: The system can be integrated with other
technologies to improve its functionality, such as integrating with facial recognition
software to improve prisoner identification.
● Adding more features: The system can be expanded by adding more features, such as
automated scheduling of prisoner activities, visitor management, and staff
management.
● Further Blockchain integration: The use of Solidity and MetaMask indicates that
blockchain technology has been implemented in the project. This opens up several
possibilities for future blockchain-based enhancements, such as creating a
decentralized database for managing prisoner records and transactions.
● Mobile application development: The development of a mobile application can be
considered, allowing prison staff to manage and monitor the prison system from their
mobile devices.
Overall, the future scope of the project is vast, and there are several ways it can be
expanded and improved upon to enhance its functionality and security.
30
6) References
[1] Dini, A. T., Abete, E. G., Colombo, M., Guevara, J., Hoffmann, B. S. M., & Abeledo,
M. C. (2018, November). Analysis of implementing blockchain technology to the
argentinian criminal records information system. In 2018 Congreso Argentino de Ciencias
de la Informática y Desarrollos de Investigación (CACIDI) (pp. 1-3). IEEE.
[2] Khan, N. D., Chrysostomou, C., & Nazir, B. (2020, May). Smart fir: securing e-fir data
through blockchain within smart cities. In 2020 IEEE 91st vehicular technology conference
(VTC2020-Spring) (pp. 1-5). IEEE.
[3] Kim, D., Ihm, S. Y., & Son, Y. (2021). Two-level blockchain system for digital crime
evidence management. Sensors, 21(9), 3051.
[4] Tasnim, M. A., Omar, A. A., Rahman, M. S., & Bhuiyan, M. Z. A. (2018). Crab:
Blockchain based criminal record management system. In Security, Privacy, and Anonymity
in Computation, Communication, and Storage: 11th International Conference and Satellite
Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018,
Proceedings 11 (pp. 294-303). Springer International Publishing.
[5] Hingorani, I., Khara, R., Pomendkar, D., & Raul, N. (2020, December). Police
complaint management system using blockchain technology. In 2020 3rd International
Conference on Intelligent Sustainable Systems (ICISS) (pp. 1214-1219). IEEE.
[6] Gali Pujitha , Saumya Shekhar, Samyuktha Murali, Sahana M.(2018) Criminal Report
Management System. In 2018, Journal of Network Communications and Emerging
Technologies (JNCET) www.jncet.org Volume 8, Issue 10
[7] Shukla, P., Tyagi, R., & Tyagi, A. (2020). Implementation of blockchain on criminality
record checker. Int. J. Engineering Research & Technology (IJERT), 9(04), 682-686.
[9] Sangeetha, R., Harshini, B., Shanmugapriya, A., & Rajagopal, T. (2019). Electronic
health record system using blockchain. Int Res J Multidiscip Technovation, 1(2), 57-61.
[10] Liu, X. (2019, July). A smart book management system based on Blockchain platform.
In 2019 International Conference on Communications, Information System and Computer
Engineering (CISCE) (pp. 120-123). IEEE.
[11] Khanna, A., Sah, A., Choudhury, T., & Maheshwari, P. (2020). Blockchain technology
for hospitality industry. In Information Systems: 17th European, Mediterranean, and Middle
Eastern Conference, EMCIS 2020, Dubai, United Arab Emirates, November 25–26, 2020,
Proceedings 17 (pp. 99-112). Springer International Publishing.
31