1. Introduction
Since 2019, significant changes have unfolded in university admissions processes, pivoting from a predominant focus on entrance exam scores to a heightened consideration of a student’s enduring academic performance. This shift has highlighted the limitations of conventional paper documents in the eyes of university reviewers. In response, the proposal of an e-portfolio system [
1] has emerged as a solution, offering reviewers a more comprehensive understanding of a student’s academic and extracurricular achievements.
By embracing the e-portfolio system, reviewers gain access to a detailed breakdown of a student’s final scores across various academic subjects, coupled with insights into their engagement in extracurricular activities. This comprehensive approach provides deeper insights into a student’s passions and achievements, aiding reviewers in making informed decisions. Significantly, the e-portfolio system has taken the place of conventional paper records, leading to a more streamlined admissions process, greatly enhancing overall efficiency.
The traditional e-portfolio system encounters several challenges. First, students find it cumbersome to manage multiple text-based password authentication systems, as high schools and activity organizations are often reluctant to adopt social logins like Google or Facebook. This reliance on text-based passwords hinders the creation of a unified digital identity. Additionally, the lack of a trusted connection between institutions and reviewers disrupts direct data sharing, leading to admissions delays that can negatively affect acceptance rates. The absence of a robust authentication method also raises concerns about the reliability of submitted data, making it difficult for reviewers to quickly verify the accuracy and authenticity of information due to limited review time. This can result in inaccuracies in admissions decisions, disadvantaging deserving students.
Moreover, students may require greater control over who can access their data. By implementing a decentralized identity management system, students can selectively share their learning history, allowing them to avoid disclosing unfavorable academic records or incomplete assessments. Consequently, there is a pressing need for a system that ensures the credibility and authenticity of student data. Such a system would streamline authentication, facilitate direct data sharing, and provide reviewers with accurate information, ultimately enhancing the admissions process for all stakeholders.
To address the issues discussed earlier, we propose a solution based on a self-sovereign identity-based personal information security control infrastructure for the e-portfolio ecosystem, using blockchain technology. This infrastructure consists of two parts:
Decentralized identity blockchain: The decentralized identity blockchain enables users to have a self-sovereign identity, allowing them to fully control their own identity without relying on centralized services.
Application blockchain: A blockchain specifically designed for the e-portfolio scenario enables students to share their documents, allows institutions to authorize awards, helps teachers upload student e-portfolio documents, and provides university reviewers with access to review students’ documents.
Using blockchain and smart contracts, users can log in with a digital signature, eliminating the need for passwords, which are often vulnerable to hacking or lost. The e-portfolio application blockchain allows individuals to grant their consent and provide their information to reviewers, while also enabling trusted educational bodies to audit the information provided by activity groups. Access to any student data is permitted only with the student’s explicit authorization, ensuring that the data’s credibility and authenticity are maintained. This provides reviewers with reliable information to make informed decisions. Overall, this self-sovereign identity-based data protection framework for the e-portfolio ecosystem offers a secure and efficient solution to challenges faced by both reviewers and students, safeguarding the integrity of the admissions process and enhancing opportunities for deserving candidates.
The upcoming sections are structured as follows:
Section 2 offers an in-depth review of blockchain’s background, alongside an exploration of related work on e-portfolio ecosystem and self-sovereign identity. In
Section 3, the operational model, smart contract design, and the key software components are introduced, offering insights into the foundational elements of our system.
Section 4 outlines the proposed workflow within our system, elucidating the sequential steps and interactions that define its functionality. A demonstration of the proposed system is detailed in
Section 5, showcasing its practical application and functionality. In
Section 6, we delve into the evaluation of our system’s performance, providing an in-depth analysis of its effectiveness and efficiency. The final section wraps up the paper by summarizing the key findings and insights derived from the study. To facilitate readability, some abbreviations used in this study are defined in
Appendix A.
2. Background and Related Work
2.1. Blockchain
Blockchain serves as an unalterable distributed ledger, enabling the exchange of information within a network of participating nodes. Its applications extend across diverse domains, notably in the realm of cryptocurrencies like Bitcoin [
2]. The architecture of blockchain involves organizing transaction records into blocks, linked by a cryptographic mechanism. This not only ensures data confidentiality but also establishes a decentralized trust foundation, eliminating the reliance on centralized authorities. Blockchain’s decentralized structure ensures that all involved nodes uphold a consistent ledger, thereby providing a dependable method for sharing information.
Blockchain systems can be classified according to node type: public, consortium, or private. In a private blockchain, one entity retains control, and transaction visibility is limited to its members. Public blockchains, in contrast, are accessible to everyone, allowing users to read the ledger, conduct transactions, and participate as nodes in maintaining the network. Consortium blockchains involve multiple entities collaborating within a semi-centralized ecosystem. These frameworks facilitate cooperative transactions through smart contracts, fostering trust among the participating parties.
Ethereum [
3] was proposed in 2014 by V. Buterin. Programmable code on the blockchain, known as a smart contract, initiates actions automatically when specific conditions are satisfied. By combining with blockchain, smart contracts establish a trusted program execution environment that does not rely on any centralized server. Programmers can develop their own decentralized applications (dapps) by creating smart contracts and implementing them on the blockchain, which has been applied to several field, such as healthcare [
4,
5,
6,
7], the Internet of Things (IoT) [
5,
8,
9], contract production [
10], product traceability [
11], supply chains [
12,
13], and open banking [
14].
Consensus mechanisms [
15] in blockchain are methods to achieve agreement among participants, ensuring that all have a consistent view of the data’s state. These mechanisms resolve how nodes in a decentralized network can trust each other and maintain the integrity and consistency of the blockchain data. Here are some commonly used consensus mechanisms:
Proof of Work (PoW): PoW is the earliest and one of the most widely used consensus mechanisms, central to the Bitcoin blockchain. In PoW, miners must solve a complex mathematical puzzle to add a new block to the blockchain. This process requires substantial computational power and energy but is effective in preventing tampering, ensuring security.
Proof of Authority (PoA): PoA is a reputation-based consensus mechanism, primarily used in private or consortium blockchains. Unlike PoW, PoA does not rely on high levels of computational resources or token holdings. Instead, it depends on verified authority nodes to generate and validate blocks. Only authorized nodes are able to add new blocks, making PoA highly efficient and well suited for scenarios requiring fast validation and stability, such as supply chain management or enterprise consortium blockchains.
Practical Byzantine Fault Tolerance (PBFT): PBFT is a consensus mechanism specifically designed for fault tolerance, often used in private or consortium blockchains. PBFT can achieve a consensus even when some nodes display inconsistent behavior, ensuring data consistency. It is commonly applied in blockchain applications requiring rapid validation.
These consensus mechanisms aim to enhance blockchain security, efficiency, and decentralization. Blockchains choose mechanisms based on specific application requirements to achieve optimal performance for their use cases.
2.2. Hyperledger Fabric (HLF)
Hyperledger Fabric [
16] is a blockchain framework tailored for enterprise applications. It operates as a permissioned blockchain, restricting access to authorized participants—a departure from public blockchains like Bitcoin [
2], in which anyone can participate.
Hyperledger Fabric boasts a modular architecture as one of its key features. This allows enterprises to customize the framework to fit their specific needs, making it more flexible to use. For example, Hyperledger Fabric provides functional components like Fabric CA (Certificate Authority), which is used for identity management, and channel and offline sign, which provides privacy and security features.
2.2.1. Fabric CA
Fabric CA serves as a public key infrastructure (PKI) system for managing identities within HLF, a permissioned blockchain network. Unlike public blockchains that are accessible to all, participation in HLF requires users to register with Fabric CA and acquire an X.509 certificate signed by Fabric CA. Obtaining a certificate from Fabric CA involves two steps: registration and enrollment. During the registration step, a Fabric CA administrator adds a new user and assigns attributes based on their role and permissions within the network.
In the enrollment step, the user submits a certificate signing request (CSR) to Fabric CA using their private key (Prk). Fabric CA uses the CSR to generate an X.509 certificate containing the assigned attributes, which is then signed by Fabric CA. The certificate is returned to the user, who can then use it to prove their identity and access the network based on their assigned attributes and permissions. Fabric CA enables organizations to assign details and permissions to users, linking them to their public key (Puk). This provides more granular control over network access and permissions. Users use their Prk to verify ownership of their Puk, ensuring a secure method for managing their identity within the network.
2.2.2. Channel
Supporting multiple ledgers, HLF utilizes channels—private blockchains shared exclusively among participating organizations. These channels ensure transaction privacy, enable the separation of business logic, and empower organizations to define their governance rules and policies. Outside parties cannot access information about transactions on channels, ensuring transaction confidentiality.
2.2.3. Offline Signing
HLF facilitates the development of services through software development kits (SDKs) tailored for various programming languages. These SDKs empower service providers in constructing their offerings. While web services provide convenience with their user-friendly interface and minimal need for additional installations, the present SDK faces constraints when utilized in browsers due to compatibility challenges.
Typically, service providers furnish an SDK environment for users to execute transactions and serve as identity managers. This involves storing the user’s X.509 certificate and
Prk, as depicted in
Figure 1. In this situation, as a user triggers a request, the service provider employs the stored
Prk to sign transactions. While this method is convenient, it may fall short of meeting stringent privacy requirements. The storage of
Prks in services introduces vulnerabilities, potentially leading to identity fraud and unauthorized transactions.
Offline signing emerges as a solution to address user concerns about
Prk security. Illustrated in
Figure 2, this approach keeps the
Prk securely with the user. When a user wants to create a transaction, the service provider generates a transaction draft based on the user’s certificate and returns it. The user then signs the draft with their
Prk and submits the signed transaction to the blockchain network through the service provider.
By adopting offline signing, Prks are not stored with external organizations, granting users a self-sovereign identity. This approach enhances security by preventing unauthorized access to Prks, giving users full authority over their transactions. In summary, offline signing is an effective solution for safeguarding the security and privacy of user transactions on the HLF.
2.3. E-Portfolio
The e-portfolio system was established in Taiwan in 2019, coinciding with a shift in focus for college admissions from entrance exam results to a greater emphasis on long-term learning performance. The e-portfolio records students’ academic performance in high school and enables students to regularly record and edit their files to more accurately and realistically present their characteristics, professional interests, and learning records. Through these files, university reviewers can understand a student’s learning performance, which cannot be ascertained through the entrance examination.
Figure 3 depicts the procedure for uploading e-portfolio files. Currently, the Ministry of Education of Taiwan has created an e-portfolio central database to integrate high school students’ e-portfolio files, school grades, and activity records. Students’ data are uploaded layer by layer and centralized in a specific organization, which also makes it an attractive target for attackers. Additionally, students are not free to use uploaded files, which can only be used for university admissions reviews.
In [
18], the author delineated three types of traditional e-portfolio systems: The Developmental Portfolio highlights a student’s growing skills over time, serving as a developmental tool that incorporates self-assessment and reflection and promotes communication with academic staff. The Assessment Portfolio, on the other hand, demonstrates a student’s proficiency in specific areas, employed for continuous or summative evaluations, and assesses their performance based on program standards. The Showcase Portfolio highlights a student’s skills and work examples, typically created at the end of a program for potential employers to assess the quality of their work. However, these traditional e-portfolio systems come with challenges, such as the need for constant system activity to prevent student uploads or the necessity for teachers to provide timely feedback to students.
Some research suggests that the decentralized and immutable features of blockchain are helpful in building a more open and trustworthy educational field [
19]. Chuyang Li et al. [
20] proposed a blockchain system that combines public and private blockchains for online learning evaluation and certification. This architecture not only reduces the complexity of the public blockchain but also maintains the flexibility of the application. Junho Jeong et al. [
21] proposed a blockchain-based personal portfolio authentication system to improve the centralized storage of student and teacher portfolios in Korean educational institutions (NEIS).
There are several commercial applications. Turing Certs [
22] established a third-party authentication authority, which creates an anti-counterfeiting e-wallet for students to store their certificates. Netizen [
23] proposed an electronic certificate infrastructure based on a private blockchain, which stores the hash of the certificate in the blockchain to ensure the integrity of the certificate. These applications [
22,
23] use blockchain technology as their solution, but the services are managed by a single entity, which still has a single point of failure and raises concerns about companies going out of service.
2.4. Identity Management
Text passwords are commonly used for authentication, but they rely on the trustworthiness of service providers. Users may reuse the same password for multiple services for convenience [
24], but if a malicious provider gains access to the password, they can use the user’s identity to log in to other services. Additionally, managing too many passwords can be difficult. To address these issues, some providers offer social login through tech giants like Google and Facebook. Social login allows users to use their digital identity to log in to multiple services without additional registration, but it still relies on centralized platforms, which raises concerns about the fraudulent use of user identities.
Web-based digital identities (DIs) have gone through four stages of evolution [
25]: centralized identity, federated identity [
26], user-centric identity [
27], and self-sovereign identity (SSI) [
28,
29]. The traditional centralized approach to digital identity has been gradually losing its dominance as users demand greater control and autonomy over their identities.
SSI [
29] offers an innovative method for digital identity, enabling users to take full control of their identity management. SSI allows users to have distributed identities across multiple locations that are interoperable and portable, which means that they are not limited to specific websites or services.
In [
29], the Self-Sovereign Identity (SSI) framework is defined according to ten features: control, existence, transparency, access, persistence, consent, interoperability, portability, protection, and minimalization. The government utilizes a Decentralized Identifier (DID) chain to create user identities in the e-portfolio application chain, ensuring alignment with these SSI features. Notably, within the ten aspects, our identity in the e-portfolio application chain adheres to nine, excluding “control”. The exclusion of the “control” attribute is justified as it is considered unnecessary for our system. It is noteworthy that a parallel research approach, as documented in [
30], also omits this attribute.
By adhering to these principles, agencies can help ensure that SSI is secure, transparent, and protects users’ privacy. SSI has the capacity to revolutionize digital identity systems by giving users enhanced control and autonomy over their identities.
Recently, blockchain technology has enabled the concept of SSI [
28], according to which users have complete control of their own identities anchored in blockchain. Several studies have proposed self-sovereign identity-based digital identity platforms, such as “Casper” by Eranga Bandara et al. [
31], which provides users with one identification stored in a mobile identity wallet to log in to different organizations. Nitin Naik et al. [
32] proposed the open-source “uport” identity management system to realize SSI and offer application developers a general authentication option. With blockchain technology, users’ identities cannot be used fraudulently, providing users with more control and security.
In [
7], the authors propose a physiological data sharing platform via blockchain technology, incorporating both a decentralized identity chain (DID-chain) and a physiological data sharing chain. Their DID-chain meets nine out of the ten requirements of SSI [
29], including existence, transparency, access, persistence, consent, interoperability, portability, protection, and minimalization.
This consortium blockchain, developed in collaboration with government and regulatory authorities, aims to unify user identities across various ecosystems. Users and organizations must register using their real names through official government channels and undergo a verification process. Upon successful verification, they receive a personal identity contract (
PIcon) that is exclusively controlled by the individual or organization. This contract is secured by a primary identity represented by a private key, which serves as a verification method for the authentic entity. Once users acquire their identity, they can enroll with App-chains and access services offered by those registered App-chains. This system establishes a secure and verified identity framework, promoting trust and reliability within the ecosystem, as illustrated in
Figure 4.
Organizations can use the primary identity to verify a user’s existence and create an App-chain identity for them. Users can add registration materials, such as encrypted Certificate Signing Requests (CSRs) and encrypted App-chain private keys, to the event logs of their personal identity. These event logs record identity-related information and can be used as evidence in the event of a dispute to prove the user’s identity.
2.5. Access Control
In the development of applications, the choice of an access control model is crucial and should align with the specific requirements of the scenario. Two common models are Role-Based Access Control (RBAC) [
33] and Attribute-Based Access Control (ABAC) [
29,
30]. RBAC simplifies permission assignment by predefined roles, facilitating swift access control for new users. However, its effectiveness diminishes when dealing with dynamic attributes such as temporal and spatial parameters. Conversely, ABAC offers increased adaptability in administering access control, accommodating various organizational roles and job responsibilities, and can include dynamic attributes in access control policies.
Existing access control management systems, such as PKI [
34], face scalability and granularity issues and are susceptible to attacks targeting certificate authorities. Blockchain-based solutions, with their transparency, nonrepudiation, and security features, emerge as attractive alternatives for access control. Many decentralized access control methods use blockchain to share access control policies or employ a multilayer blockchain structure to ensure reliability and efficient operations.
For example, in [
35], they suggested using blockchain to manage access control policies. Ref. [
36] employed AuthPrivacyChain to secure cloud services against unauthorized access. The author of [
37] proposed a user rights management system using blockchain and smart contracts to facilitate relationships between users, data providers, and regulatory bodies. Ref. [
38] introduced a distributed ABAC system that employs blockchain to audit access attempts in digital libraries. Lastly, Ref. [
39] discussed a multi-stakeholder ABAC system in which blockchain smart contracts support relationships between users, data providers, and regulatory bodies. These various approaches highlight the versatility of blockchain technology in improving access control in different applications.
2.6. Related Work
Stuchain [
40] employs ABAC and RBAC on Hyperledger Fabric (HLF) to enable teachers to manage academic records and students to control access. However, its reliance on traditional databases limits its ability to fully represent student interests. In a similar vein, an HLF-based e-portfolio system [
41] effectively manages evaluations and course data but lacks the capability to track extracurricular activities, hindering a complete view of student progress.
Merlec et al. [
42] introduce a four-layer e-portfolio system on Ethereum that facilitates secure data sharing, though high smart contract fees pose scalability issues. PETS [
43] improves governance in higher education by connecting on-chain and off-chain data through standardized APIs. EduRSS [
44] and MOOCsChain [
45] emphasize data privacy, with EduRSS balancing costs through off-chain storage, while MOOCsChain secures MOOC data using Hyperledger Fabric and IPFS. While these systems enhance educational data security, they still grapple with challenges related to scalability, cost-effectiveness, and comprehensive data representation.
This paper proposes an advanced blockchain-based educational data system that addresses the limitations of previous models. By integrating ABAC and RBAC, our system facilitates detailed access control and combines on-chain and off-chain storage for enhanced scalability and cost efficiency. Notably, it incorporates extracurricular activity tracking and supports parallel execution to efficiently manage multiple user requests, presenting a more comprehensive and effective approach to educational data management.
2.7. Preliminary Work
Comparing this study to the preliminary work in [
46], a distinct framework for an e-portfolio ecosystem has been proposed. While the previous work focused on a single blockchain utilizing Hyperledger Fabric for the application chain, several notable differences characterize our approach. Firstly, our system architecture diverges significantly. To facilitate the exchange of learning history information, we adopted a dual-blockchain setup utilizing both Ethereum and Hyperledger Fabric frameworks. This novel configuration contributes to enhanced system functionality. Secondly, the system features themselves are markedly dissimilar. Unlike [
46], in which user accounts are stored within registered institutions, introducing the risk of potential loss due to hacking or human error, our paper empowers users to manage their private keys. With this user-centric approach, individuals retain control over their private keys, which serves as their means of accessing the ecosystem. This effectively minimizes vulnerabilities associated with centralized storage. Thirdly, our system boasts broader applicability and user convenience compared to that in [
46]. Our system not only builds upon the advantages of the preliminary work, but also offers the streamlined capability for users to log in using a single account. Lastly, the performance of our proposed system has been exhaustively analyzed, and these findings are extensively detailed in
Section 6, providing valuable insights into its operational efficiency and effectiveness.
7. Conclusions and Future Avenues for Exploration
7.1. Conclusions
This research introduces a groundbreaking self-sovereign identity-based infrastructure tailored to enhance personal information security control within the dynamic e-portfolio ecosystem. Addressing three pivotal requirements, the system aims to revolutionize the landscape of user identity, data source credibility, and user-controlled data authorization. Firstly, users are endowed with self-sovereign identities, fostering seamless login experiences and identity management across diverse ecosystems. Anchored in a decentralized identity chain, these identities are resilient against tampering or denial. Secondly, a collective audit by educational institutions ensures the credibility of data sources, granting issuance rights to only those activity organizations that successfully pass the stringent evaluation. Thirdly, users wield absolute control over data authorization, with their dynamic access rights recorded securely in the blockchain ledger. This privacy-centric approach, utilizing multiple blockchains and channels, shields user-owned data attributes from prying eyes. The system’s ability to process transactions concurrently is heightened through the parallel execution of transactions on different blockchains, with the App-chain handling more frequent transactions efficiently.
7.2. Future Avenues for Exploration
Looking ahead, the research identifies a lacuna in the realm of identity management—specifically, the absence of a wallet accommodating multiple blockchain frameworks. Future endeavors will be directed towards crafting a cross-blockchain wallet, a versatile solution enabling users to manage Prks seamlessly across different blockchains, ensuring a convenient and comprehensive self-sovereign identity management experience.
Expanding the ecosystem’s versatility is another key focus area, with plans to integrate additional organizations such as universities and LinkedIn. This expansion will empower users to present credible data on their education and experience to prospective employers. Tailoring users’ profile presentation page for college reviewers or interviewers will offer customization options, facilitating a rapid assessment of applicants’ strengths. Through continuous refinement and expansion, the overarching goal is to establish a robust, trustworthy, and user-friendly platform for personal information management.