Design and implementation of blockchain-based supply chain framework with improved traceability, privacy, and ownership

被引:7
作者
Mohit [1 ]
Kaur, Sanmeet [2 ]
Singh, Maninder [1 ]
机构
[1] Thapar Inst Engn & Technol, CSED, POB 32,Bhadson Rd, Patiala 147004, Punjab, India
[2] Eastern Washington Univ, Cheney, WA USA
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2024年 / 27卷 / 03期
关键词
Blockchain; Supply chain; Counterfeits; Privacy; Logistics;
D O I
10.1007/s10586-023-04091-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchain is a modern-age technology which records digital transactions in a consistent, safe, and verifiable form to solve the problems from different sectors. In the supply chain, this technology is applied to improve traceability, ownership, and trust. Moreover, it can solve the issue pertaining to counterfeits in the supply chain. However, blockchain-based supply chains have certain disadvantages, such as privacy of the information shared between the members of the supply chain. In this paper, a new mechanism has been proposed to ensure the privacy of such information by taking traceability and ownership into account. The novelty of the proposed system is its ability to achieve privacy with the inclusion of traceability and ownership. To implement privacy, we employed a combination of symmetric and asymmetric key encryption. With the proposed system, owner of the product can trace said product and the one who owns the product can transfer the ownership. The proposed system restricts the entry of counterfeit products in the supply chain. The Hyperledger Sawtooth blockchain has been used for the experimental purpose. The subsequent analysis show that the proposed system can provide privacy without disturbing factors concerning traceability and ownership. The results show that the inclusion of privacy does not impact performance significantly.
引用
收藏
页码:2345 / 2363
页数:19
相关论文
共 31 条
[1]   Blockchain-based secure information sharing for supply chain management: Optimization assisted data sanitization process [J].
Abidi, Mustufa Haider ;
Alkhalefah, Hisham ;
Umer, Usama ;
Mohammed, Muneer Khan .
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2021, 36 (01) :260-290
[2]   A Survey of Anonymity of Cryptocurrencies [J].
Amarasinghe, Niluka ;
Boyen, Xavier ;
McKague, Matthew .
PROCEEDINGS OF THE AUSTRALASIAN COMPUTER SCIENCE WEEK MULTICONFERENCE (ACSW 2019), 2019,
[3]  
Ampel B, 2019, 2019 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), P59, DOI [10.1109/isi.2019.8823238, 10.1109/ISI.2019.8823238]
[4]  
[Anonymous], 2018, Substandard and falsified medical products
[5]  
Arora M., 2012, SECURE IS AES BRUTE
[6]  
Averin A, 2020, 2020 INT MULT IND EN, P1
[7]  
Biswas K., 2017, FUTURE TECHNOLOGIES, V2017, P56, DOI DOI 10.1007/978-3-319-54460-1_1
[8]  
Bocek Thomas, 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), P772, DOI 10.23919/INM.2017.7987376
[9]  
Caro Miguel Pincheira, 2018, 2018 IoT Vertical and Topical Summit on Agriculture - Tuscany (IOT Tuscany), DOI 10.1109/IOT-TUSCANY.2018.8373021
[10]   On Security Analysis of Proof-of-Elapsed-Time (PoET) [J].
Chen, Lin ;
Xu, Lei ;
Shah, Nolan ;
Gao, Zhimin ;
Lu, Yang ;
Shi, Weidong .
STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, SSS 2017, 2018, 10616 :282-297