Certificate digitalization for information security in verification

Authors

  • Eko Abdul Goffar ASTRA Polytechnic
  • Rieta Pinky Nurul Arifah ASTRA Polytechnic

DOI:

https://doi.org/10.52453/aic.v1iOctober.460

Keywords:

extreme programming, e-certificate, qr code, system development life cycle

Abstract

The rapid advancement of technology has made information access more convenient, but this ease is often misused for fraudulent purposes, such as manipulating TOEFL certificates, graduation certificates, and other important documents. These forgeries are challenging to detect, raising doubts about the validity and authenticity of such documents. To address this issue, this paper aims to ensure the authenticity and validity of certificates by developing an e-certificate system integrated with a QR Code-based verification mechanism. This approach minimizes the risk of forgery and strengthens trust in document verification processes. The system is built using the System Development Life Cycle (SDLC) approach with the Extreme Programming methodology. This includes stages of planning, where a detailed activity plan is created; design, where the Physical Data Model (PDM) and user interfaces are developed; and implementation, where the designs are transformed into a functional program. These stages are iterated continuously to ensure the system meets user needs. The proposed system features an admin module for managing activities, creating certificates, and handling user data. Participants, on the other hand, can validate certificates by scanning QR Codes and downloading their verified certificates. By integrating these functionalities, the e-certificate system offers a reliable solution to verify document authenticity and protect the integrity of the information contained within. This innovation is expected to significantly reduce forgery incidents and enhance the security of important documents in various applications.

Author Biographies

Eko Abdul Goffar, ASTRA Polytechnic

Informatic Management Department

Rieta Pinky Nurul Arifah, ASTRA Polytechnic

Informatic Management Department

References

Artha, K. A. R., Zain, S. N., Alkautsar, A. A., & Widianto, M. H. (2022). Implementation of Smart Contracts for E-Certificate as Non-Fungible Token using Solana Network. 2022 IEEE 7th International Conference on Information Technology and Digital Applications (ICITDA), 1–6. https://doi.org/10.1109/ICITDA55840.2022.9971423

Dennis, A., Wixom, B., & Roth, R. (2012). System Analysis and Design, Fifth Edition. John Wiley & Sons. https://books.google.co.id/books?id=zCRQzQEACAAJ

Imbar, R. V, Sutedja, B. R., & Christianti, M. (2021). Smart Attendance Recording System using RFID and e-Certificate using QR Code-based Digital Signature. 2021 International Conference on ICT for Smart Society (ICISS), 1–5. https://doi.org/10.1109/ICISS53185.2021.9533199

Indah, F., Sidabutar, A., & Annisa, N. (2022). Jurnal Bidang Penelitian Informatika Peran Cyber Security Terhadap Keamanan Data Penduduk Negara Indonesia (Studi Kasus: Hacker Bjorka). Jurnal Bidang Penelitian Informatika, 1(1), 1–8. https://ejournal.kreatifcemerlang.id/index.php/jbpi

Kesuma, A. A. N. D. H., Budiartha, I. N. P., & Wesna, P. A. S. (2021). Perlindungan Hukum Terhadap Keamanan Data Pribadi Konsumen Teknologi Finansial dalam Transaksi Elektronik. Jurnal Preferensi Hukum, 2(2), 411–416. https://doi.org/10.22225/jph.2.2.3350.411-416

MONDAL, S., PANJA, A., & KARFORMA, S. (2023). An Efficient E-Certificate Management System in E-Learning Using Blockchain. Science and Culture, 89(March-April), 120–124. https://doi.org/10.36094/sc.v89.2023.an_efficient_e-certificate_management_system.mondal.120

Nguyen, V.-L., Lin, P.-C., Cheng, B.-C., Hwang, R.-H., & Lin, Y.-D. (2021). Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges. IEEE Communications Surveys & Tutorials, 23(4), 2384–2428. https://doi.org/10.1109/COMST.2021.3108618

Pawar, M. K., Patil, P., Sawhney, R., Gumathanavar, P., Hegde, S., & Maremmagol, K. (2022). Performance Analysis of E-Certificate Generation and Verification using Blockchain and IPFS. 2022 International Conference on Inventive Computation Technologies (ICICT), 345–350. https://doi.org/10.1109/ICICT54344.2022.9850830

Quach, S., Thaichon, P., Martin, K. D., Weaven, S., & Palmatier, R. W. (2022). Digital technologies: tensions in privacy and data. Journal of the Academy of Marketing Science, 50(6), 1299–1323. https://doi.org/10.1007/s11747-022-00845-y

Verma, A., & Sharma, B. (2022). Dynamic E-Certificate Designing with Automatic Mailing System using Python and SQLite3. Journal of Applied Information Science, 10(2), 26–30. https://ssrn.com/abstract=4249245

Downloads

Published

2024-12-31

How to Cite

Abdul Goffar, E., & Rieta Pinky Nurul Arifah. (2024). Certificate digitalization for information security in verification. Proceedings ASTRAtech International Conference, 1(October), 75–82. https://doi.org/10.52453/aic.v1iOctober.460