Blockchain-Based Sensitive Document Storage to Mitigate Corruptions

James Mahlaba, Amit Kumar Mishra, Deepak Puthal* (Corresponding Author), Pradip Kumar Sharma

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

3 Citations (Scopus)


Currently, all document processes in developing countries require third-party (human) verification; this makes said documents susceptible to human error. Blockchain technology makes the need for a central authority redundant as the devices needing to download digital assets are connected to one another via a peer-to-peer network. It allows for the exchange and storage of digital assets without the need for third-party oversight. The main objective of this article is to develop a blockchain solution in an attempt to mitigate corruption. The contribution details a document verification process as a solution to lessen third-party access to sensitive information and ensure that it is safe and untampered with. The solution proposed to this issue was the introduction of blockchain technology to aid in document verification. This makes the entire system decentralized and reduces the amount of third-party access to sensitive information. Using blockchain makes documents immutable thus reducing corrupt activity such as identity theft and ghost accounts. A blockchain implementation in the field of document verification also dissolves the need for certified copies, which then allows for better use of state funds and public service workers. This work can prove to be a major enabler to achieve sustainable development goal-16 (Peace, Justice, and Strong Institutions).

Original languageEnglish
Number of pages13
JournalIEEE Transactions on Engineering Management
Early online date30 Jun 2022
Publication statusE-pub ahead of print - 30 Jun 2022


  • Access control
  • blockchain
  • corruption
  • decentralized storage
  • decision support systems
  • e-governance
  • smart services
  • sustainable development


Dive into the research topics of 'Blockchain-Based Sensitive Document Storage to Mitigate Corruptions'. Together they form a unique fingerprint.

Cite this