Research Article
Open access
Published on 23 October 2023
Download pdf
Su,Y. (2023). Design and implementation of secure student score system. Applied and Computational Engineering,16,36-49.
Export citation

Design and implementation of secure student score system

Yiming Su *,1,
  • 1 Shanghai University

* Author to whom correspondence should be addressed.

https://doi.org/10.54254/2755-2721/16/20230856

Abstract

The purpose of designing this system is to provide schools with a new way to make score certifications of a student and a safer way to search for a student’s previous academic scores. When a student is applying for a new school to further his study, the school always uses his previous academic scores to decide whether to enroll him. The current way for a school to mark a student and to search for a new student’s score record is depend on the student himself, which faces the problem of illegal modification and data leakage. The system mentioned in this paper can add a certification that includes the time information and score information. It can also use the digital signatures of teachers and headmasters to ensure that the scores are given by the corresponding teacher. This system does not include the direct Grade Point Average (GPA), but just includes the raw scores of each subject. Because different schools have different ways to turn the raw scores into a GPA and they also have different GPA upper limitations.

Keywords

student score system, blockchain, asymmetric encryption

[1]. Anna M. Biller, Karin Meissner, Eva C. Winnebeck and Giulia Zerbini 2022 Sleep Medicine Reviews School start times and academic achievement - A systematic review on grades and test scores vol 61 p 101582.

[2]. J.D. Allen 2005 The Clearing House Grades as valid measures of academic achievement of classroom learning vol 78 pp 218-223.

[3]. Nagasubramanian, G., Sakthivel, R.K., Patan and R. et al. 2020 Neural Comput & Applic Securing e-health records using keyless signature infrastructure blockchain technology in the cloud vol 32 pp 639–647

[4]. Pranav Ratta, Amanpreet Kaur, Sparsh Sharma, Mohammad Shabaz, and Gaurav Dhiman 2021 Journal of Food Quality Application of Blockchain and Internet of Things in Healthcare and Medical Sector: Applications, Challenges, and Future Perspectives vol 2021

[5]. Jafar A. Alzubi 2021 Computer Communications Blockchain-based Lamport Merkle Digital Signature: Authentication tool in IoT healthcare vol 170 pp 200-208

[6]. Anushree Tandon, Amandeep Dhir, A.K.M. Najmul Islam and Matti Mäntymäki 2020 Computers in Industry Blockchain in healthcare: A systematic literature review, synthesizing framework and future research agenda vol 122 p 103290

[7]. Yuan Xue, Yu-an Tan, Chen Liang, Yuanzhang Li, Jun Zheng, and Quanxin Zhang 2018 Information Sciences RootAgency: A digital signature-based root privilege management agency for cloud terminal devices vol 444 pp 36-50

[8]. U.Somani, K. Lakhani and M. Mundra 2010 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010) Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing pp 211-216

[9]. Edlira Martiri and Artur Baxhaku 2012 Procedia Technology Monotone digital signatures: an application in software copy protection vol 1 pp 275-279

[10]. Alex Marthews, Catherine Tucker 2023 International Journal of Research in Marketing What blockchain can and can’t do: Applications to marketing and privacy vol 40 pp 49-53

[11]. Abhinav Pal, Chandan Kumar Tiwari and Nivedita Haldar 2021 The Journal of High Technology Management Research Blockchain for business management: Applications, challenges and potentials vol 32 p 100414

[12]. A Finandhita and I Afrianto 2018 IOP Conf. Ser.: Mater. Sci. Eng. Vol 407 p 012109

[13]. Shieh, Ming Der, Jun-Hong Chen, Hao-Hsuan Wu, and wen-Ching Lin. 2008 IEEE Transactions on Very Large-Scale Integration (VLSI) Systems A New Modular Exponentiation Architecture for Efficient Design of RSA Cryptosystem vol 16 pp 1151-1161

[14]. Rahman, Mostafizur, Iqbalur Rahman Rokon, and Miftahur Rahman. 2009 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication Efficient hardware implementation of RSA cryptography pp 316-319

[15]. Sheba Diamond Thabah, Mridupawan Sonowal, Rekib Uddin Ahmed and Prabir Saha 2019 Procedia Computer Science Fast and Area Efficient Implementation of RSA Algorithm vol 165 pp 525-531

[16]. Aleksandra V. Tutueva, Artur I. Karimov, Lazaros Moysis, Christos Volos and Denis N. Butusov 2020 Chaos, Solitons & Fractals Construction of one-way hash functions with increased key space using adaptive chaotic maps vol 141 p 110344

[17]. Sheba Diamond Thabah, Mridupawan Sonowal, Rekib Uddin Ahmed and Prabir Saha 2019 Procedia Computer Science Fast and Area Efficient Implementation of RSA Algorithm vol 165 pp 525-531

[18]. Anirban Bose, Santi P. Maity 2022 Journal of Information Security and Applications Secure sparse watermarking on DWT-SVD for digital images vol 68 p103255

[19]. Taybeh Salehnia, Abdolhossein Fathi 2021 Expert Systems with Applications Fault tolerance in LWT-SVD based image watermarking systems using three module redundancy technique vol 179 p 115058

[20]. Willy Susilo, Joseph Tonien 2021 Theoretical Computer Science A Wiener-type attack on an RSA-like cryptosystem constructed from cubic Pell equations vol 885 pp 125-130

[21]. Stephen D. Miller, Bhargav Narayanan and Ramarathnam Venkatesan 2021 Journal of Number Theory Coppersmith's lattices and “focus groups”: An attack on small-exponent RSA vol 222 pp 376-392

[22]. Maria Mushtaq, Muhammad Asim Mukhtar, Vianney Lapotre, Muhammad Khurram Bhatti and Guy Gogniat 2020 Information Systems Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA vol 92 p 101524

[23]. Falowo O. Mojisola, Sanjay Misra, C. Falayi Febisola, Olusola Abayomi-Alli and Gokhan Sengul 2022 Egyptian Informatics Journal An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA) vol 23 pp 291-301

[24]. Wenxue Tan, Xiping Wang, Xiaoping Lou, Meisen Pan 2011 Procedia Engineering Analysis of RSA based on Quantitating Key Security Strength vol 15 pp 1340-1344

[25]. M. Thangavel, P. Varalakshmi, Mukund Murrali and K. Nithya 2015 Journal of Information Security and Applications an Enhanced and Secured RSA Key Generation Scheme (ESRKGS) vol 20 pp 3-10

[26]. Sean McKeown, William J. Buchanan 2023 Forensic Science International: Digital Investigation Hamming distributions of popular perceptual hashing techniques vol 44 p 301509

[27]. Chunhui Wu, Lishan Ke, Yusong Du 2021 Information Sciences Quantum resistant key-exposure free chameleon hash and applications in redactable blockchain, vol 548 pp 438-449

[28]. Ying Hu, Guang Cheng, Yongning Tang, Feng Wang 2020 Computer Communications A practical design of hash functions for IPv6 using multi-objective genetic programming, vol 162 pp 160-168

[29]. Paul W. Poteete, 2023 Array Organically distributed sustainable storage clusters vol 17 p 100275

Cite this article

Su,Y. (2023). Design and implementation of secure student score system. Applied and Computational Engineering,16,36-49.

Data availability

The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.

Disclaimer/Publisher's Note

The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

About volume

Volume title: Proceedings of the 5th International Conference on Computing and Data Science

Conference website: https://2023.confcds.org/
ISBN:978-1-83558-023-3(Print) / 978-1-83558-024-0(Online)
Conference date: 14 July 2023
Editor:Marwan Omar, Roman Bauer, Alan Wang
Series: Applied and Computational Engineering
Volume number: Vol.16
ISSN:2755-2721(Print) / 2755-273X(Online)

© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license. Authors who publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See Open access policy for details).