0% found this document useful (0 votes)
17 views39 pages

Capstone Project

The document presents a thesis on the 'Secure Implementation of Prison Management System' developed by Utkarsh Verma and Ashish Sarda as part of their Bachelor of Technology in Computer Science and Engineering. The project aims to enhance prison management through a secure, efficient, and user-friendly software application utilizing blockchain technology, ensuring tamper-proof inmate records and streamlined operations. It includes a comprehensive analysis of existing systems, the proposed system's architecture, and the benefits of implementing such a system for improved transparency, security, and efficiency in prison operations.

Uploaded by

utkarsh verma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views39 pages

Capstone Project

The document presents a thesis on the 'Secure Implementation of Prison Management System' developed by Utkarsh Verma and Ashish Sarda as part of their Bachelor of Technology in Computer Science and Engineering. The project aims to enhance prison management through a secure, efficient, and user-friendly software application utilizing blockchain technology, ensuring tamper-proof inmate records and streamlined operations. It includes a comprehensive analysis of existing systems, the proposed system's architecture, and the benefits of implementing such a system for improved transparency, security, and efficiency in prison operations.

Uploaded by

utkarsh verma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 39

SECURE IMPLEMENTATION OF PRISON

MANAGEMENT SYSTEM
Submitted in partial fulfillment of the requirements for the degree of

Bachelor of Technology

In

COMPUTER SCIENCE & ENGINEERING

by

UTKARSH VERMA (19BCE0078)

ASHISH SARDA (19BCE0262)

Under the guidance of

Dr. Niha K

SCOPE
VIT, Vellore

May 2023
DECLARATION

I hereby declare that the thesis entitled “Secure Implementation of


Prison Management System” submitted by me, for the award of the degree of
Bachelor of technology in Computer Science and Engineering to VIT is a record of
bonafide work carried out by me under the supervision of Dr. Niha K.
I further declare that the work reported in this thesis has not been submitted and
will not be submitted, either in part or in full, for the award of any other degree or
diploma in this institute or any other institute or university.

Place: Vellore UTKARSH VERMA(19BCE0078)

Date: 20/05/23 ASHISH SARDA(19BCE0262)

Signature of the Candidate


CERTIFICATE

This is to certify that the thesis entitled “Secure Implementation of Prison


Management System” submitted by Utkarsh Verma (19BCE0078), SCOPE, Ashish
Sarda (19BCE0262), SCOPE, VIT, for the award of the degree of Bachelor of
technology in Computer Science and Engineering, is a record of bonafide work carried
out by him / her under my supervision during the period, 01. 07. 2022 to 30.04.2023,
as per the VIT code of academic and research ethics.
The contents of this report have not been submitted and will not be submitted
either in part or in full, for the award of any other degree or diploma in this institute or
any other institute or university. The thesis fulfills the requirements and regulations of
the University and in my opinion meets the necessary standards for submission.

Place: Vellore

Date: 20/05/23

Signature of the guide: DR.NIHA K

Internal Examiner External Examiner

HEAD OF THE DEPARTMENT

B-TECH CSE
ACKNOWLEDGEMENTS

I take immense pleasure in thanking Dr. G. Viswanathan, our beloved Chancellor, VIT
University for having permitted me to carry out the project.

I express gratitude to my guide, Dr.Niha K, for guidance and suggestions that helped me to
complete the project on time. Words are inadequate to express my gratitude to the faculty
and staff members who encouraged and supported me during the project. Finally, I would
like to thank my ever-loving parents for their blessings and my friends for their timely help
and support.

Student Name:

UTKARSH VERMA

(19BCE0078)

ASHISH SARDA

(19BCE0262)
Executive Summary

The "Secure Implementation of Prison Management System" project is a


comprehensive software application designed to manage prisons using various modern
technologies The system aims to provide secure, efficient, and user-friendly management of
inmate records, scheduling, and communication while ensuring that the data is tamper-proof
and secure.

The system's frontend is developed using ReactJS, a popular JavaScript library for
building user interfaces. It provides a clean and modern interface that allows the prison staff
to manage various tasks, including inmate records. The frontend is designed to be intuitive
and user-friendly, ensuring that prison staff can use the system with ease.
The backend of the system is developed using NodeJS, a powerful server-side JavaScript
runtime. It provides a robust and scalable backend infrastructure that handles the processing
of data and communication between the frontend and blockchain. The backend of the system
is responsible for managing the data, processing requests, and communicating with the
blockchain.

Solidity is the programming language used to create smart contracts on the Ethereum
blockchain. It is used to develop a secure and immutable database for inmate records. The
smart contract ensures that only authorized users can access the data, and any changes made
to the data are recorded on the blockchain, making it tamper-proof. This ensures that the
inmate records are secure, and the data cannot be altered or deleted by unauthorized personnel.

Metamask is a browser extension used to interact with the Ethereum blockchain. It


provides a secure login for prison staff, ensuring that only authorized users can access the
system. Metamask is used to enable secure login to the system, which ensures that only
authorized users can access the data.

The system's efficiency is ensured by using modern technologies to optimize the


system's performance. The frontend is designed to be fast and responsive, ensuring that prison
staff can quickly access and manage inmate records. The backend is optimized to handle large
volumes of data and requests, ensuring that the system can scale to meet the needs of any
prison.
Overall, the "Secure Implementation of Prison Management System" project is a
comprehensive software application that provides secure, efficient, and user-friendly
management of inmate records and prison operations. It is designed to be scalable, secure,
and efficient, making it an ideal solution for any prison looking to improve its management
processes.
TABLE OF CONTENTS

CHAPTERS CONTENTS PAGE NO.

ACKNOWLEDGEMENT i

EXECUTIVE SUMMARY ii

TABLE OF CONTENTS iii

LIST OF FIGURES v

1 INTRODUCTION 1

1.1 THEORETICAL BACKGROUND 1

1.2 MOTIVATION 2

1.3 AIM OF THE PROPOSED WORK 2

1.4 OBJECTIVE OF THE PROPOSED WORK 3

2 LITERATURE SURVEY 4

2.1 SURVEY OF THE EXISTING MODEL 4

2.2 SUMMARY OF THE SURVEY 5

3 OVERVIEW OF THE PROPOSED SYSTEM 8

3.1 INTRODUCTION AND RELATED 8


CONCEPTS

3.2 FRAMEWORK, ARCHITECTURE OF THE 9


PROPOSED SYSTEM

3.3 PROPOSED SYSTEM MODEL 11

4 PROPOSED SYSTEM ANALYSIS AND 12


DESIGN

4.1 INTRODUCTION 12

4.2 REQUIREMENT ANALYSIS 13

4.2.1 FUNCTIONAL REQUIREMENTS 13

4.2.1.1 PRODUCT PERSPECTIVE 13


4.2.1.2 PRODUCT FEATURES 15

4.2.1.3 USER CHARACTERISTICS 15

4.2.1.4 ASSUMPTIONS AND DEPENDENCIES 16

4.2.1.5 DOMAIN REQUIREMENTS 16

4.2.1.6 USER REQUIREMENTS 17

4.2.2 NON FUNCTIONAL REQUIREMENTS 18

4.2.2.1 PRODUCT REQUIREMENTS 18

4.2.2.1.1 EFFICIENCY 18

4.2.2.1.2 RELIABILITY 19

4.2.2.1.3 PORTABILITY 19

4.2.2.1.4 USABILITY 20

4.2.2.2 ORGANIZATIONAL REQUIREMENTS 21

4.2.2.2.1 IMPLEMENTATION REQUIREMENTS 21

4.2.2.2.2 ENGINEERING STANDARD 21


REQUIREMENTS

4.2.2.3 OPERATIONAL REQUIREMENTS 22

4.2.3 SYSTEM REQUIREMENTS 23

4.2.3.1 H/W REQUIREMENTS 23

4.2.3.2 S/W REQUIREMENTS 24

5 RESULTS AND DISCUSSION 26

6 REFERENCES 31
List of Figures

FIGURE NO. TITLE


3.1 List of many Blockchain Consensus Mechanism
3.2 Framework of the system.
3.3 UML Diagram
5.1 Login Page of the System
5.2 Registration Page
5.3 Dashboard Page
5.4 Prisoner Files
5.5 Prisoner Form
5.6 Staff Files
5.7 Staff Form
5.8 Error on registering through credential
1) INTRODUCTION

1.1. THEORETICAL BACKGROUND:

The implementation of a secure prison management system is based on various


theoretical concepts and ideas, including the use of blockchain technology, distributed
systems, cryptography, and smart contracts. The system is built on the foundation of
blockchain technology, which is a secure, transparent, and immutable distributed ledger that
records transactions. This makes it an ideal choice for managing sensitive information while
ensuring the highest level of security and integrity.

The prison management system is designed as a distributed system, which means


that it has many interconnected components that work together to provide a seamless user
experience. This approach ensures that the system is reliable and efficient, and there is no
single point of failure.

Cryptography is also an essential component of the prison management system. It is


used to ensure that all information transmitted and stored in the system is secure and private.
The system uses encryption and digital signatures to protect data from unauthorized access or
modification, ensuring that all information is kept confidential and secure.

Smart contracts are another critical component of the prison management system.
They are self-executing contracts in which the contract terms are written directly into the
code. Smart contracts can be used to implement various management processes, such as
record-keeping, planning, and information management, helping to increase productivity and
reduce the workload of prison staff.

Overall, the secure implementation of a prison management system relies on several


critical concepts such as blockchain technology, distributed systems, cryptography, and smart
contracts. This model provides a safe, transparent, and efficient way to manage prison
information and operations.

1
1.2 MOTIVATION:

The objective behind developing a secure prison management system based on


blockchain technology is to enhance the safety, transparency, and efficiency of managing
prison operations. The existing prison management system often lacks transparency,
consistency in security information, and well-defined procedures. By leveraging blockchain
technology, a secure and immutable record of all transactions and activities within the prison
can be maintained, preventing fraud, corruption, and increasing accountability.
Implementing a blockchain-based prison management system would not only reduce errors
and save staff time and resources but also improve the rehabilitation of prisoners and reduce
the number of victims by enabling better communication and coordination between inmates
and staff.
In summary, a prison management system built on blockchain technology has the
potential to improve the rehabilitation of inmates and decrease the number of inmates while
providing a safer, more transparent, and efficient management system for all aspects of
prisons.

1.3 AIM OF PROPOSED WORK:

The prison system in India lags behind other industries, such as healthcare, in terms
of automation. To address this issue, we are developing a web application to digitize daily
prison operations. The primary objectives of this application are as follows:

1. Enhance the existing manual system by implementing a computerized system.

2. Reduce human errors and dependence.

3. Develop a system for efficient storage, updating, and retrieval of information.

4. Facilitate the preparation of court reports.

5. Highlight the significance of computer technology in prison management.

6. Improve operational speed to enable faster calculation of sentences.

2
Overall, the development of this web application will help modernize the Indian
prison system and bring it up to par with other industries in terms of automation and
efficiency.

1.4 OBJECTIVE OF THE PROPOSED WORK:

The objective of implementing prison management using blockchain technology


can be achieved through the following means:

Security: The system intends to enhance the security of prison information and
operations by leveraging blockchain technology to provide a decentralized, flexible, and
transparent platform.

Transparency: The system aims to increase transparency by making all transactions


and information on the blockchain ledger visible. This will ensure that all prison operations
are conducted in a fair and transparent manner, and any anomalies or irregularities can be
promptly identified and addressed.

Efficiency: The system aims to enhance efficiency in various administrative


processes such as record-keeping and data management in prisons. This will help reduce the
workload of prison staff and enhance overall prison performance.

Accessibility: The system is designed to improve accessibility by providing a user-


friendly and intuitive interface that can be easily accessed by prison staff and management.
This will ensure that all stakeholders involved in prison management can effectively utilize
the system.

Accountability: The system aims to improve accountability by providing transparent


and auditable information on all prison operations. This will ensure that all stakeholders are
accountable for their actions and that the prison operates in line with established rules and
regulations.

In summary, the goal of implementing prison management using blockchain


technology is to create a more secure, transparent, efficient, accessible, and accountable
prison system that benefits both inmates and staff.

3
2) LITERATURE SURVEY

2.1 SURVEY OF THE EXISTING MODELS

Prison management is a crucial aspect of criminal justice systems across the world.
The efficient management of a correctional facility is essential for ensuring the safety of
inmates, staff, and visitors, as well as maintaining order and discipline within the facility. In
the past, prison management was primarily a manual process, with staff members relying on
paper-based systems to manage information and track inmates. However, with the advent of
modern technology, prison management systems have evolved significantly, with a variety of
software applications and systems now available to assist prison authorities in managing their
facilities.

One such system is the Integrated Correctional Management System (ICMS), which
is designed to streamline and integrate all aspects of prisoner management, including inmate
records, medical information, visitor information, staff appointments, and care facilities. The
system is designed to increase efficiency and improve communication between prison staff,
with features such as automated scheduling and real-time alerts. By centralizing all aspects of
prisoner management in one system, the ICMS reduces the risk of errors and duplication, and
ensures that information is easily accessible to authorized personnel.

Another popular prison management system is the Offender Management System


(OMS), a web-based application that provides a comprehensive database of criminal
information. The OMS is designed to improve the accuracy and completeness of recorded
data, facilitate the storage process, and facilitate data sharing between different agencies. With
features such as automated data entry and real-time data analysis, the OMS provides prison
authorities with a powerful tool for managing their facilities and monitoring inmate behavior.

The Prison Information Management System (PIMS) is another software application


that provides a central database for prison information and facility management. The aim of
PIMS is to increase the efficiency of prison management by providing real-time information
about the movement of prisoners, cleaning schedules, and staff schedules. The system allows
prison authorities to easily monitor inmate behavior and identify potential security threats, as
well as providing detailed information about the facility for use in planning and budgeting.

The Jail Management System (JMS) is a software application that provides


important inmate information, registration information, and court information. The system is
4
designed to improve the accuracy of inmate records, automate the registration process, and
facilitate information sharing between different agencies. With features such as automated
data entry and real-time data analysis, the JMS provides prison authorities with a powerful
tool for managing their facilities and monitoring inmate behavior.

The Prisoner Tracking System (PTS) is a real-time location tracking system that
uses radio frequency identification (RFID) technology to track the movements of inmates in
a correctional facility. The system is designed to increase safety and security by providing
real-time alerts on the movements of inmates and unauthorized persons. With features such
as automated location tracking and real-time alerts, the PTS provides prison authorities with
a powerful tool for managing their facilities and maintaining order and discipline within the
facility.

Overall, these prison management systems are designed to improve the efficiency
and effectiveness of prison management by providing prison authorities with powerful tools
for managing their facilities and monitoring inmate behavior. By centralizing and
streamlining all aspects of prisoner management, these systems reduce the risk of errors and
duplication, and ensure that information is easily accessible to authorized personnel. With the
continued development of technology and the increasing importance of prison management,
it is likely that these systems will continue to evolve and become even more powerful tools
for prison authorities in the future.

2.2 SUMMARY OF THE SURVEY

Prison management is a critical component of the criminal justice system. The goal
of prison management is to ensure the safety and security of the facility, as well as the well-
being and rehabilitation of the inmates. To achieve these goals, prison administrators rely on
a variety of management systems, including Integrated Correctional Management System
(ICMS), Offender Management System (OMS), Prison Information Management System
(PIMS), Jail Management System (JMS), and Prisoner Tracking System (PTS). While these
systems have been developed to address the challenges of managing correctional facilities,
there are still some gaps that need to be addressed. This paper will discuss some of the gaps
in the existing models of prison management and propose solutions to address them.

Limited Integration: One of the gaps in the existing models of prison management
is limited integration. Many existing prison management systems operate in silos, which

5
limits the ability of different systems to integrate and share information. This can result in
data duplication, inefficiencies, and errors. For example, an inmate’s medical records may be
stored in a separate system from their behavioral records, which can make it difficult for
prison administrators to get a complete picture of an inmate’s needs and risks. In addition,
limited integration can make it difficult for prison administrators to coordinate with other
stakeholders, such as probation officers, social workers, or healthcare providers.

To address this gap, prison administrators can implement integrated prison


management systems that are designed to work together seamlessly. Integrated prison
management systems combine all the different components of prison management, such as
inmate records, medical information, visitor information, staff appointments, and care
facilities, into a single system. This can improve the efficiency of prison management by
reducing duplication and errors, and by facilitating communication and coordination between
different systems.

Incomplete Data: Another gap in the existing models of prison management is


incomplete data. Some prison management systems may not capture all the relevant
information needed for effective decision-making. This can lead to incomplete or inaccurate
data that can affect the quality of decision-making. For example, if a prison management
system does not capture information about an inmate’s mental health or drug abuse history,
prison administrators may not be able to provide appropriate treatment or supervision. To
address this gap, prison administrators can implement comprehensive data collection systems
that capture all the relevant information needed for effective decision-making.
Comprehensive data collection systems can include regular assessments of inmates’ mental
health, substance abuse, educational and vocational needs, and risk factors for reoffending.
By collecting comprehensive data, prison administrators can make more informed decisions
about inmate placement, treatment, and supervision.

Limited Accessibility: A third gap in the existing models of prison management is


limited accessibility. Some prison management systems may be inaccessible to certain
stakeholders, such as inmates, families, or legal representatives. This can limit the ability of
these stakeholders to access important information about their cases or to provide feedback
on the management of the facility. In addition, limited accessibility can limit the transparency
of prison management and make it difficult for external stakeholders, such as lawmakers or
oversight committees, to monitor the performance of the facility. To address this gap, prison
administrators can implement accessible prison management systems that allow stakeholders
6
to access relevant information and provide feedback. Accessible prison management systems
can include online portals that allow inmates and families to access information about their
cases, request services, or communicate with staff. They can also include regular meetings or
surveys with stakeholders to gather feedback and suggestions for improvement. By increasing
accessibility, prison administrators can improve transparency and accountability, as well as
the quality of services provided to inmates and their families.

Lack of Customization: A fourth gap in the existing models of prison management


is the lack of customization. Some prison management systems may not be customizable to
meet the unique needs of different facilities or jurisdictions.This can limit the effectiveness
of the system in addressing the specific challenges faced by a particular facility. For example,
a system that works well in a medium-security prison may not be effective in a maximum-
security prison, where the security needs are much more complex. To address this gap, prison
administrators need to ensure that the systems they adopt can be customized to meet the
specific needs of their facilities.

Limited analytics capabilities: Many prison management systems may not provide
sufficient data analytics capabilities to enable predictive analytics or data-driven decision-
making. This can limit the ability of prison administrators to identify and address emerging
issues before they become critical. For example, a system that cannot predict the likelihood
of a particular inmate becoming violent may not be effective in preventing violent incidents
in the facility. To address this gap, prison administrators need to ensure that the systems they
adopt provide robust analytics capabilities that enable data-driven decision-making.
Addressing these gaps in the existing models of prison management is essential to improving
the efficiency, effectiveness, and transparency of correctional facility management. By
customizing prison management systems to meet the unique needs of different facilities and
providing robust analytics capabilities, prison administrators can better understand the
challenges they face and develop effective strategies to address them. Additionally,
customizing prison management systems and improving analytics capabilities can lead to
increased efficiency, as prison administrators are better equipped to allocate resources and
manage their facilities more effectively.

In conclusion, prison management is a complex and challenging task that requires


careful planning, implementation, and monitoring. While existing models of prison
management have been effective in many respects, there are still some gaps that need to be
addressed to improve the efficiency, effectiveness, and transparency of correctional facility
7
management. By addressing the gaps in customization and analytics capabilities, prison
administrators can better understand the challenges they face and develop effective strategies
to address them. Ultimately, this can lead to safer and more effective correctional facilities
that better serve the needs of inmates, staff, and society as a whole.

3) Overview of the Proposed System

3.1 Introduction and Related Concepts:

The prison management project based on blockchain technology offers a new


solution to the problems faced by prisons in managing prison information and operations in
the prison. The campaign uses the power of blockchain technology to create a safe, transparent
and efficient way to manage prison information and prison operations.

Blockchain technology is a distributed ledger that provides a tamper-proof,


decentralized and transparent platform for recording and tracking transactions. It has gained
popularity in recent years for its ability to increase security, transparency and efficiency in
various industries, including finance, healthcare, and the management chain. Project
The Prison Management System aims to apply the benefits of blockchain technology to
prisons by providing a secure, transparent and efficient platform for managing prisoner
information and prison labor. The system will use a permissioned blockchain and allow users
to access and modify blockchain data.

Fig: 3.1- List of many Blockchain Consensus Mechanism

8
The system will use various blockchain algorithms such as Proof of Work, Proof of
Stake, Proof of Authority or Proof of Value etc to verify transactions and ensure the integrity
of the blockchain ledger. This will help prevent unauthorized access to information and ensure
that all changes and activities in the prison are recorded and monitored in a timely manner.
Prison Management System also plans to have more transparency by making all information
and transactions visible on the blockchain ledger. This will help ensure that all prison
operations are conducted fairly and transparently and that any irregularities or irregularities
can be detected and resolved quickly.

Overall, the blockchain-based prison management plans to create a safer, more


transparent, efficient and effective prison system that benefits inmates and workers.
Leveraging the power of blockchain technology, the project has the potential to revolutionize
the way prisons manage inmate information and prison operations.

3.2 Framework and its Modules of the Proposed System

The framework or architecture of prison security management based on blockchain


technology may include several models, each with a specific purpose. Some of these modules
may include:
1. User Management Module: This module is responsible for managing the different
users who will interact with the system. These may include administrators and external
shareholders. This model will manage user authentication and authorization, as well
as user-specific capabilities and access levels.
2. Prisoner Data Management Module: This module is responsible for the management
of prison information, including personal and disciplinary information. This model
allows authorized users to view and modify stored data securely and transparently.
3. Employee Data Management Module: This module will be responsible for managing
employee information, including personal information and disciplinary information,
if any. This model allows authorized users to view and modify stored data securely
and transparently.
The architecture of the Prison Management System project is based on blockchain permission,
which will provide a secure, transparent and proof-free platform for recording and monitoring
all transactions and activities in the prison. The system will also use several validation
algorithms such as Proof-of-Work, Proof-of-Stake, Proof-of-Privilege or Proof-of-Principle.
Report transactions and ensure the integrity of the blockchain ledger.
9
Prison authorities upload inmate and staff information by creating smart contracts. Contracts
are kept in the public records. After creating the smart contract, affiliates must implement the
smart contract. The distributed information is sent back to the application, metamask, sensor,
node etc. connected with. It acts as a home screen; all information is displayed here.
The information shown here is stored in an immutable directory. Authorities/employees can
request information from the platform.

Fig: 3.2 - Framework followed by the system.

Overall, the framework or design of the Prison System project aims to provide security,
transparency and efficiency to manage prison information and prison operations using the
power of blockchain technology.

3.3 Proposed System Model:

A proposed system model for a prison management system project based on blockchain
technology could include the following components:
1. User Interface: This component would provide an easy-to-use interface for different
types of users to interact with the system. The interface could be designed as a web or
mobile application that would enable users to perform tasks such as viewing inmate
data, scheduling visits, managing assets, and generating reports.
2. Smart Contracts: Smart contracts would be used to automate various processes within
the prison system, such as meal scheduling, cell assignments, and visitation
scheduling. The smart contracts would execute automatically based on predefined
conditions and rules, and their execution would be recorded on the blockchain ledger.
3. Blockchain Ledger: The blockchain ledger would be a distributed, secure, and tamper-
proof platform that would record and track all transactions and activities within the

10
prison system. The ledger would provide transparency and accountability by allowing
authorized users to view and audit all transactions and activities on the blockchain.
4. Consensus Algorithm: The consensus algorithm would be used to validate
transactions and ensure the integrity of the blockchain ledger. The system could use a
proof-of-work, proof-of-stake, proof-of-authority, or proof-of-importance consensus
algorithm to achieve consensus among network participants.
5. Encryption and Security: The system would use encryption and other security
measures to protect user data and ensure the privacy and confidentiality of inmate
information. The system would also implement access controls and permissions to
ensure that only authorized users have access to sensitive data and system
functionality.

Overall, the proposed system model for a prison management system based
on blockchain technology would provide a secure, transparent, and efficient platform for
managing inmate data and prison operations. The use of blockchain technology would
enable the system to operate in a decentralized and trustless manner, thereby reducing the
risk of fraud, corruption, and errors.

Fig: 3.3 - UML Diagram

11
4) Proposed System Analysis and Design

4.1 Introduction:

A prison management based on blockchain technology is a new project that aims to


change the entire way prisons are managed and operated. The system leverages the unique
features of blockchain technology to create a secure and transparent platform for managing
prison operations, prison records and administrative processes.
Prison management is always a complex and difficult task involving many people,
including administrators, supervisors, committees and legal representatives. This can have a
serious impact on prisoners and staff, often leading to inefficiency, errors and even corruption.
Prison management has adopted blockchain technology to create a secure and transparent
platform to ensure information is accurately recorded and not tampered with.
Overall, prison management based on blockchain technology has the potential to greatly
improve prison security while increasing the efficiency and transparency of administrative
procedures. This project represents an exciting opportunity to use the latest technology to
solve some of the most pressing problems facing prisons today.

4.2 Requirement Analysis:

Requirement analysis is a crucial step in the development of a prison management system


based on blockchain technology. It involves identifying and analyzing the needs and constraints
of the system stakeholders to determine the functional and non-functional requirements of the
system. Here are the key steps involved in requirement analysis:
● Identifying stakeholders: The first step is to identify the stakeholders involved in the
system, including prison authorities, prison staff, inmates, families of inmates, and
external organizations such as courts and law enforcement agencies.
● Gathering requirements: This involves eliciting requirements from the stakeholders
through various techniques such as interviews, surveys, workshops, and observations.
● Analyzing requirements: This involves analyzing the requirements to identify their
dependencies, conflicts, and priorities. The requirements can be categorized into
functional and non-functional requirements.

12
● Prioritizing requirements: The requirements should be prioritized based on their
importance and feasibility. The most critical requirements should be given the highest
priority.
● Validating requirements: This involves validating the requirements to ensure that they
meet the needs of the stakeholders and are feasible to implement within the available
resources.
● Documenting requirements: The final step is to document the requirements in a clear and
concise manner that can be easily understood by the development team.

4.2.1 Functional requirements:

Some of the key functional requirements of the prison system based on blockchain
technology may include:
● Inmate management: This includes inmate identification, admission, release, and transfer.
● Staff management: This includes staff identification, recruitment, training, and
scheduling.
● Record keeping: This includes maintaining accurate records of inmate and staff activities,
health records, and legal records.
● Communication: This includes providing secure communication channels for staff,
inmates, and external organizations such as courts and law enforcement agencies.
In summary, requirement analysis is a critical step in the development of a prison management
system based on blockchain technology, and it involves identifying and analyzing the needs and
constraints of the stakeholders to determine the functional requirements of the system.

4.2.1.1 Product Perspective:

The visual product of prison management based on blockchain technology includes


describing the limits, effects and functions of the system. It also includes specifying the system's
input, output, and data storage. Here are some important things to see:

System Boundary: The system boundary defines what happens inside and outside the
system. In the case of the prison management system, the system will include all the software,
hardware and related equipment needed to control the movement of prisoners, prison staff
and visitors.
13
Interface: A system interface defines how a system interacts with its users and other
systems.
When it comes to prison management, the system will provide interaction between
staff, inmates and external stakeholders. These interfaces will provide access to operational
functions such as inmates identification and storage.
Function: A system function describes what the system does and how it does it. In the
prison management system, functions include prison management, personnel management,
visitor management and communication. The system will use blockchain technology to ensure
the safety and security of data and communication.
Inputs and Outputs: System inputs and outputs describe the information necessary for
the operation of the system and the information produced by the system. In the case of prison
management, inputs may include inmates and staff, while outputs may include notices,
warnings and alerts.
Data Storage: System data storage means what data is stored and how it is stored.
When it comes to prison management, the system will store information about inmates and
staff. The system will use a blockchain-based distributed ledger to provide secure and
verifiable data storage.

In summary, the concept of prison control system based on blockchain technology


includes defining boundaries, interventions, transactions, feedback, exit and information stored
in the system.This is an important step for the system to meet the needs of its users and
stakeholders.

4.2.1.2 Product Features:

The entire web application has been built on the basis of a permission blockchain
meaning, it follows all the rule of a blockchain, like it has an immutable ledger, etc. Since the
data stored is small, no separate database was used and the entire data was stored on blockchain.
The website also boasts of user based authentication system i.e, we can know when a certain user
has logged in or if any user has unauthorized access to their role. The website uses the wallet
address of the user to log them in and make changes to the files if their roles allow. There are two
ways to login into the system, first one being through credentials, which is mainly for the external
stakeholders to view the prison files. Second option is through a wallet, where you can use your
username and the wallet address to log in which of course costs some gas.
14
External stakeholders logged in through credentials cannot add/delete the prison files.
This can only be allowed for the users logged in via the wallet.

4.2.1.3 User characteristics:

Users of the prison management system based on blockchain technology can be divided
into three groups: employees, inmates and external stakeholders. Each type of user has unique
needs and requirements that the system must meet. Below is a brief introduction of user features:
Staff: Includes prison administration staff, guards, male policemen, administrators and
other staff involved in the daily operations of the prison. Employees need access to the system to
manage recorded data and communicate with external stakeholders. Procedures should be
established to provide access control to employees so that they can only access information and
activities relevant to their role.
Prisoners: Prisoners in prisons are people who are incarcerated in prisons. Prisoners
need access to the system to manage their personal information and communicate with staff.
The system should be designed to ensure that prison security is not compromised while
providing secure access to inmate information and communications.
External Stakeholders: Stakeholders outside the prison system include law enforcement
and other organizations associated with prisons. External stakeholders need access to the system
to view records, request information, and communicate with staff.
Procedures should be designed to provide a secure interface to external stakeholders while
ensuring data privacy and security are maintained.

In summary, users of prison management features based on blockchain technology include


staff, inmates, and external stakeholders. The system should be designed to provide role-based
security and management to ensure that each user can only access information and activities
relevant to their role.

4.2.1.4 Assumptions & Dependencies:

15
Assumptions and dependencies are important in any project because they help identify
risks and limitations that may affect the success of the project.
Assumptions:
● Blockchain technology is used in a secure system and safe.
● The hardware and software used in the system are compatible.
● Staff and prisoners are willing and able to comply with the new law.
● The system complies with all applicable laws and regulations.

Dependencies:
● Have the budget and time to support development and maintenance.
● Skilled manufacturers and workers who design, manufacture and operate machinery.
● Integration of the system with existing prison management and systems.
● Crucial data access and APIs for data integration and sharing.

It is important to identify and manage assumptions and dependencies throughout the life of
the project to minimize risk and ensure successful delivery.

4.2.1.5 Domain Requirements:

Domain requirements of a secure prison management system based on blockchain technology


are the requirements that are specific to the domain of the system, which in this case is the
management of the inmates and staff. Here are some domain requirements that would need to be
considered for such a system:
● Security: The system must be designed with a focus on security to ensure that sensitive
information such as inmate records, staff data, and financial transactions are protected
from unauthorized access or tampering.
● Data Privacy: The system must comply with all relevant data privacy regulations to
protect the personal information of inmates and staff members.
● Access Control: The system must have robust access control mechanisms to restrict access
to sensitive data and ensure that only authorized personnel can access it.
● Transparency: The system should be transparent and provide visibility to all stakeholders
such as prison staff, inmates, and their families.
● Efficiency: The system must be efficient and able to handle large amounts of data to
ensure that prison operations can run smoothly.
16
● Record Keeping: The system should maintain accurate records of all transactions and
activities related to inmate management to ensure accountability and transparency.
● Collaboration: The system should facilitate collaboration between different departments
and agencies involved in the management of prisons.
● Integration: The system should integrate with other prison management systems to ensure
seamless data exchange and to avoid duplication of efforts.

These are just a few examples of domain requirements that would need to be considered for
a prison system based on blockchain technology.

4.2.1.6 User Requirements:

User requirements for prison management based on blockchain technology will define
what users need from the system, how they will interact, and the features and functions they
need to do their jobs well. Here are some things users should consider for such systems:

User Interface: The system should be intuitive and easy to use, easy to navigate, clear
instructions and clear and buttons.
Access Levels: The system should allow users to have different levels of access
depending on their roles and responsibilities, with appropriate permissions to access different
types of information.
Desktop Access: In order for users to access information whenever and wherever they
want, the system should be accessible from mobile devices such as desktop, smart phone,
tablet.
Behavior Management: The system should provide tools to manage personal data and
recorded data such as behavioral data.

4.2.2 Nonfunctional Requirements:

17
4.2.2.1 Product Requirements:

Non-functional product requirements for a secure prison management system would focus
on the system's performance, reliability, security, and usability. Here are some examples of
non-functional requirements that would need to be considered:
● Functionality: The system must be able to handle multiple concurrent users and
business processes faster with less latency.
● Scalability: A system must be able to scale up or down as needed to meet changes in
customer or physical requirements.
● Reliability: To ensure the security of inmates and personnel data, the system must be
versatile with failover and data loss.
● Security: Systems should be designed with effective security measures such as
logging, multi-factor authentication and access control to prevent unauthorized access
and cyber-attacks.
● Usability: The system should be easy to use, contain clear and concise instructions,
and users should be able to navigate the system with minimal training.
● Compatibility: To ensure seamless integration with existing systems, the system must
be compatible with a variety of hardware and software.
● Maintainability: The system should be easy to maintain and update with minimal
disruption to operations.
● Compliance: The system must comply with laws and regulations, such as data
protection and privacy rights, and employee paper to ensure the safety of inmates.
● Data Integrity: The system must ensure data integrity through various checks and
balances such as audit trails and procedural information.
● Disaster Recovery: The system must have a disaster recovery mechanism to ensure
uninterrupted operation in the event of a disaster or failure.

4.2.2.1.1 Efficiency (in terms of Time and Space):

Time Efficiency: Since blockchain technology requires a lot of energy to verify


transactions and create blocks, it is important to design the process so that the time required
for this transaction is less. We achieve this by optimizing the consensus algorithms used in
the blockchain, reducing sizes and using good data to store and store data.

18
Space Efficiency: Since blockchain technology requires storage space for every block
and transaction, it is important that the system is designed to minimize the required space.
This is done by compressing the data stored in each block, removing redundant data and using
good data for storage and retrieval of data. If the data is too big for the blockchain, we also
have the option of having separate files to make the system faster.

4.2.2.1.2 Reliability

The system must be designed to ensure that it operates reliably and consistently over
time, and that it can recover from any failures or errors that occur.

To achieve reliability, the system can implement the following techniques:


1. Backups: The system can periodically upload blockchain data to ensure that
the system can recover from any loss.
2. Fault-tolerance: The system is designed to detect any faults that occur in the
system, such as network failures or hardware failures. It should also be able to
detect if the syste, has all the required hardware and software needed to run
the system.
3. Error handling: The system is designed to handle errors that occur during
normal operation, such as invalid transactions or network errors or insufficient
funds in wallet for transaction.
4. Testing and monitoring: The system can be thoroughly tested before
deployment to identify any potential reliability issues, and it can be monitored
continuously to detect and address any issues that arise during operation.
Using these techniques, we can ensure that the system can be reliable and consistent.

4.2.2.1.3 Portability:

The system is designed to be portable across different hardware and software


platforms. This means that the system should be able to run on different operating systems,
databases, and hardware architectures without significant modifications.
To achieve portability, the system can implement the following techniques:
● Platform independence: The system can be designed to be platform independent, using
programming languages, frameworks, and libraries that can run on different platforms.
19
● Modular design: The system is divided into smaller modules that are developed and
tested independently, making it easier to port to different platforms.
● Standardization: The system uses industry-standard protocols and data formats,
making it easier to integrate with other systems.
● Virtualization: The system can be virtualized, running in a container or virtual
machine, which abstracts the hardware and operating system, making it easier to port
to different platforms.
● Documentation: The system should be well-documented, including installation and
configuration instructions, making it easier for users to deploy the system on different
platforms.

4.2.2.1.4 Usability:

Usability means how easy and intuitive it is for users to interact with prison
management. The usability of the system can be increased with the following requirements:
● User-friendly interface: The system has a simple and user-friendly interface that
enables users to follow and operate easily.
● Intuitive Design: The system should have an intuitive design that guides the user
through the various functions and features of the system.
● Consistency: The system is consistent in design, configuration, and operation so that
users can easily learn and understand how to use the system.
● Help and Support: The system provides help and support to users to help users use the
system.
Overall, the effectiveness of the prison is critical to its success in supporting effective
prison management and rehabilitation.

4.2.2.2 Organizational Requirements:

20
The organizational requirements for a prison management system based on blockchain
technology may include:
● Organizational support: The organization must provide the necessary support and
resources for the development, deployment, and maintenance of the secure prison
management system.
● Staff training: The staff responsible for operating and maintaining the prison
management system should be trained on how to use it effectively and efficiently.
● Legal and regulatory compliance: The prison management system must comply with
all legal and regulatory requirements related to the operation and management of
prisons.
● Security: The prison management system must be designed to ensure the security of
the data and the privacy of the prisoners. Access to the system must be restricted to
authorized personnel only.
● Maintenance and support: The organization must ensure that the prison management
system is maintained and supported by trained personnel to ensure its continuous
operation.
● Scalability: The prison management system has been designed to be scalable to
accommodate future growth and expansion of the prison.

4.2.2.2.1 Implementation Requirements (in terms of deployment):

For deployment of the system, the user must have a desktop and steady access to
internet. The user must have a sound knowledge of nodejs and npm package manager to be
able to run the system. It needs to have the appropriate packages installed for testing and
development used in the system. The most important requirement for a user is to have access
to a crypto wallet and an account with valid gas for transactions. All the transactions require
gas to be completed since the system has been built on blockchain technology.

4.2.2.2.2 Engineering Standard Requirements:

Some of the engineering standard requirements for a prison management system based on
blockchain technology could include:

21
● Security: The system adheres to industry-standard security practices to ensure the
privacy and confidentiality of sensitive data. This may involve encryption, access
control, and other security measures.
● Scalability: The system is designed to handle large amounts of data, users, and
transactions over time, as the prison population grows.
● Availability: The system is available to authorize users at all times, with minimal
downtime for maintenance or upgrades.
● Performance: The system is designed to perform quickly and efficiently, with minimal
delays or lag times in processing transactions.
● Maintainability: The system is easy to maintain and upgrade, and support resources
available to administrators and users.
● Compliance: The system complies with all relevant regulations and laws, including
those related to data privacy, security, and accessibility.
● Portability: The system is designed to be portable across different hardware and
software platforms.

4.2.2.3 Operational Requirements

1) Economic: The project is implemented in a cost-effective manner, taking into account the
budget and financial resources available. This includes minimizing any unnecessary expenses
while ensuring that the project delivers the required functionality and meets the needs of
stakeholders.

2) Environmental: Although the project does not have a direct impact on the environment,
efforts are made to minimize the environmental impact of the project, such as reducing the
use of non-renewable resources and minimizing waste.

3) Social: The project must consider the impact on the community and stakeholders, such as
ensuring that the prison management system provides a safe and secure environment for both
inmates and staff.

4) Political: The project must comply all relevant laws, regulations, and policies. The
implementation of the prison management system must be aligned with the government's
policies and goals for the criminal justice system.

22
5) Ethical: The project must be implemented in an ethical manner, ensuring that the rights of
inmates and staff are respected. This includes ensuring that the system is not used for
discriminatory purposes and that the privacy and confidentiality of all individuals are
protected.

6) Health and Safety: The project must prioritize the safety and health of staff and inmates.
This includes ensuring that the prison management system is designed to minimize the risk
of physical harm and making sure all safety protocols are followed.

7) Sustainability: The project must be implemented in a sustainable manner, ensuring that the
system can be maintained and updated over time. This includes ensuring that the system is
designed with scalability and flexibility in mind to accommodate future changes.

8) Legality: The project must comply with all applicable laws and regulations. This includes
ensuring that the system is designed to meet legal and regulatory requirements, such as data
privacy laws.

9) Inspectability: The project must be designed with inspectability in mind, ensuring that the
system can be audited and reviewed by relevant authorities. This includes ensuring that the
system is transparent and that relevant data is readily accessible for inspection and analysis.

4.2.3 SYSTEM REQUIREMENTS

4.2.3.1 HARDWARE REQUIREMENTS:

Hardware used for the project:


●8GB RAM
●I5 Processor

4.2.3.2 SOFTWARE REQUIREMENTS:

Software’s used are:

Solidity: Solidity is a programming language that is specifically designed for creating


smart contracts on the Ethereum blockchain. It is a high-level language that is similar in
syntax to JavaScript, and its primary purpose is to enable developers to create secure and
23
complex smart contracts that can be executed on the blockchain. One of the key features of
Solidity is its ability to enforce rules and logic within smart contracts. For example, a Solidity
smart contract can be programmed to automatically execute a certain action when certain
conditions are met, such as the transfer of a certain amount of cryptocurrency between two
parties. This makes Solidity an ideal language for creating decentralized applications (dApps)
that can run autonomously and securely on the Ethereum blockchain.

ReactJS: ReactJS is a popular JavaScript library that is used for building user
interfaces. It was created by Facebook and is open-source, meaning that anyone can use it and
contribute to its development.
ReactJS uses a component-based approach to building user
interfaces, which means that developers can create modular components that can
be reused throughout their application. Each component encapsulates its own
logic and user interface elements, making it easier to manage and maintain large applications.
ReactJS has a large and active community of developers,
which has led to the creation of many third-party libraries and tools that can
be used with the library. These include tools for testing, debugging, and optimizing ReactJS
applications.
Overall, ReactJS is a powerful and flexible library for building user interfaces that has
become an essential tool for many web developers. Its component-based approach, virtual
DOM, and use of JSX make it easy to create and manage complex user interfaces, while its
large community of developers ensures that it will continue to evolve and improve over time

NodeJS: Node.js is a popular open-source server-side runtime environment that


allows developers to use JavaScript on the server-side. Node.js was initially created by Ryan
Dahl in 2009 and has since grown to become one of the most widely used tools for building
web applications. Node.js uses an event-driven, non-blocking I/O model, which makes it
efficient and scalable for building network applications. This means that Node.js can handle
multiple client requests simultaneously without blocking other operations, resulting in faster
and more responsive applications. One of the key benefits of Node.js is its ability to work
with packages and modules. Node.js has a built-in package manager called npm (Node
Package Manager) which allows developers to easily download and install third-party
packages, modules, and libraries, making it easier to build complex applications. Node.js is
also known for its compatibility with a wide range of platforms and operating systems,

24
including Linux, macOS, and Windows. This makes it easy to develop and deploy Node.js
applications on a variety of different systems and environments.

Overall, Node.js is a powerful and versatile tool for building web applications and
command-line tools. Its event-driven, non-blocking I/O model, package manager, and cross-
platform compatibility have made it a popular choice for developers looking to build scalable
and efficient applications.

Metamask: Metamask is a popular browser extension that allows users to interact


with decentralized applications (DApps) on the Ethereum blockchain. It acts as a digital wallet
and provides a secure and convenient way to manage cryptocurrencies and tokens. Metamask
is available as a browser extension for Google Chrome, Firefox, Brave, and other web
browsers. Once installed, it allows users to easily create and manage Ethereum wallets, and
to interact with DApps that are built on the Ethereum blockchain. One of the key benefits of
Metamask is its ease of use. Users can easily connect their Metamask wallet to their favorite
DApps with just a few clicks, without needing to enter any complicated login credentials or
private keys. This makes it easier for non-technical users to participate in the decentralized
ecosystem. Metamask also provides a high level of security by using advanced
encryption techniques to protect user funds and private keys. Users can set up multiple
accounts within Metamask and easily switch between them, and they can also set up password
protection and two-factor authentication for additional security.

Overall, Metamask is a user-friendly and secure browser extension that makes it easier
for users to manage cryptocurrencies and interact with DApps on the Ethereum blockchain.
Its ease of use, security features, and support for multiple cryptocurrencies have made it a
popular choice among users and developers in the decentralized ecosystem.

IDE-Visual Studio Code: Visual Studio Code (VS Code) is a popular free and open-
source integrated development environment (IDE) that is widely used by developers to build
applications. It was created by Microsoft and is available on Windows, macOS, and Linux.
One of the key features of VS Code is its extensibility. It comes with a wide range of built-in
features and supports a large number of extensions, allowing developers to customize their
workflow and tailor the IDE to their specific needs. VS Code extensions can add features such
as language support, debugging tools, and code analysis, making it a powerful and flexible
tool for building applications.

25
5) Results and Discussion

Prison management is a complex and sensitive task that requires a high level of efficiency
and security. The use of technology in prison management has gained significant attention in
recent years due to the potential benefits it offers. A prison management system (PMS) is a
software application that automates several manual processes involved in the management of
prisons. This project aimed to develop a secure implementation of a prison management
system using ReactJS, NodeJS, Metamask, and Solidity. The implementation of this system
has several advantages, including increased efficiency and security.

The results were in according to the need. Every discussed aspect has been implemented.
The landing page is the login page where they ask you for your wallet implications.

Fig 5.1 login page of the system

If you don’t want to login using wallet, additionally you can use credentials. From
this page you can access the register page.

26
Fig 5.2 registration page

Similarly, you have the option to register in two ways, using credentials/wallet.

Fig 5.3 dashboard page

This is the page you will login into after logging in. At the right top corner, you can
see the walletId which means we are logged in via a wallet. At the top center you can see
the username.

27
Fig 5.4 prisoner files

This is the prisoner files. Only a user/admin logged in through the wallet can be able
to edit or add a new prisoner.

Fig 5.5 prisoner form

Form for adding a prisoner asking all their details.

28
Fig 5.6 Staff files

This is the dashboard for the staff files. This contains all the details for all the staff
working there.

Fig 5.7 Staff Form

Not being logged in through the wallet gives this error while trying to perform
unauthorized action using user based authentication.

Fig 5.8 Error on registering through credentials

29
Conclusion:

The implementation of a prison management system has several advantages, including


increased efficiency and security. The use of Metamask and Solidity ensured that only
authorized users could access the system, and all interactions were transparent and tamper-
proof. Encryption was used to protect sensitive information, and smart contracts were used to
govern the interactions between the various entities in the system. Overall, this project
demonstrated the potential of technology to improve the management of prisons while
ensuring the security and privacy of sensitive information.

Future Scope:

The project "Secure Implementation of Prison Management System" has several potential
future scopes. Some of these scopes are:

● Integrating with other technologies: The system can be integrated with other
technologies to improve its functionality, such as integrating with facial recognition
software to improve prisoner identification.
● Adding more features: The system can be expanded by adding more features, such as
automated scheduling of prisoner activities, visitor management, and staff
management.
● Further Blockchain integration: The use of Solidity and MetaMask indicates that
blockchain technology has been implemented in the project. This opens up several
possibilities for future blockchain-based enhancements, such as creating a
decentralized database for managing prisoner records and transactions.
● Mobile application development: The development of a mobile application can be
considered, allowing prison staff to manage and monitor the prison system from their
mobile devices.

Overall, the future scope of the project is vast, and there are several ways it can be
expanded and improved upon to enhance its functionality and security.

30
6) References

[1] Dini, A. T., Abete, E. G., Colombo, M., Guevara, J., Hoffmann, B. S. M., & Abeledo,
M. C. (2018, November). Analysis of implementing blockchain technology to the
argentinian criminal records information system. In 2018 Congreso Argentino de Ciencias
de la Informática y Desarrollos de Investigación (CACIDI) (pp. 1-3). IEEE.

[2] Khan, N. D., Chrysostomou, C., & Nazir, B. (2020, May). Smart fir: securing e-fir data
through blockchain within smart cities. In 2020 IEEE 91st vehicular technology conference
(VTC2020-Spring) (pp. 1-5). IEEE.

[3] Kim, D., Ihm, S. Y., & Son, Y. (2021). Two-level blockchain system for digital crime
evidence management. Sensors, 21(9), 3051.

[4] Tasnim, M. A., Omar, A. A., Rahman, M. S., & Bhuiyan, M. Z. A. (2018). Crab:
Blockchain based criminal record management system. In Security, Privacy, and Anonymity
in Computation, Communication, and Storage: 11th International Conference and Satellite
Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018,
Proceedings 11 (pp. 294-303). Springer International Publishing.

[5] Hingorani, I., Khara, R., Pomendkar, D., & Raul, N. (2020, December). Police
complaint management system using blockchain technology. In 2020 3rd International
Conference on Intelligent Sustainable Systems (ICISS) (pp. 1214-1219). IEEE.

[6] Gali Pujitha , Saumya Shekhar, Samyuktha Murali, Sahana M.(2018) Criminal Report
Management System. In 2018, Journal of Network Communications and Emerging
Technologies (JNCET) www.jncet.org Volume 8, Issue 10

[7] Shukla, P., Tyagi, R., & Tyagi, A. (2020). Implementation of blockchain on criminality
record checker. Int. J. Engineering Research & Technology (IJERT), 9(04), 682-686.

[8] Sourav Bhowmick, “Criminal Report Management System”, Department of Computer


Science and Engineering, ADMAS Institute of Technology, 2013

[9] Sangeetha, R., Harshini, B., Shanmugapriya, A., & Rajagopal, T. (2019). Electronic
health record system using blockchain. Int Res J Multidiscip Technovation, 1(2), 57-61.

[10] Liu, X. (2019, July). A smart book management system based on Blockchain platform.
In 2019 International Conference on Communications, Information System and Computer
Engineering (CISCE) (pp. 120-123). IEEE.

[11] Khanna, A., Sah, A., Choudhury, T., & Maheshwari, P. (2020). Blockchain technology
for hospitality industry. In Information Systems: 17th European, Mediterranean, and Middle
Eastern Conference, EMCIS 2020, Dubai, United Arab Emirates, November 25–26, 2020,
Proceedings 17 (pp. 99-112). Springer International Publishing.

31

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy