| Literature DB >> 34744494 |
Mohit Mohit1, Sanmeet Kaur1, Maninder Singh1.
Abstract
Blockchain was at the top of the 2016 Gartner hype cycle and has been integrated into business profiles by numerous start-ups. Since the emergence of blockchain through Bitcoin, studies have been conducted to increase blockchain applications for nonfinancial uses. A supply chain is a sector where blockchain is anticipated to have crucial applications. In a traditional supply chain, maintaining traceability and ownership remains a serious issue. In the supply chain, blockchain can increase trust, improve traceability, and eliminate the middle man. It makes the supply chain more transparent though, raising the privacy issue. In this paper, a new approach for transaction privacy is proposed by considering ownership and traceability. The proposed system retains the advantages of blockchain and centralised database server. Its novelty lies in achieving privacy by generating symmetric keys, employing product codes and current timestamps, and it uses asymmetric key elliptic curve cryptography for transaction validation and user identification. The proposed system allows product owners to trace the product and enables its transfer. It protects the supply chain from counterfeit products. The Hyperledger Sawtooth blockchain was used for experiments. Security and privacy analysis show that the proposed system can afford privacy without impinging on traceability and ownership. The results estimate that privacy incorporation introduces an overhead of 4.4%. In the experiment, the performance of the proposed system bettered the results of the existing techniques such as POMS and b_verify.Entities:
Keywords: Blockchain; Counterfeits; Logistics; Privacy; Supply chain
Year: 2021 PMID: 34744494 PMCID: PMC8561353 DOI: 10.1007/s10586-021-03425-x
Source DB: PubMed Journal: Cluster Comput ISSN: 1386-7857 Impact factor: 2.303
Fig. 1Blockchain with hash values
Fig. 2Working of blockchain
Fig. 3Hyperledger Sawtooth architecture [40]
Fig. 8Process of product transfer
Fig. 4Supply chain
Fig. 5Proposed system architecture
Fig. 6Transaction data
Fig. 7Process flow of product creation
Fig. 9Process of accessing the symmetric key of product Pi.
Parameters used in the evaluation
| Parameters | Value |
|---|---|
| Machine specification | Dell 7th generation, CPU : Intel Core i3, RAM: 8 GB |
| Switch | 8 Ports 1 Gb unmanageable switch |
| Hyperledger Sawtooth client | Python Client |
| Centralised database | MySQL, Memcache |
| Operating system | Ubuntu 16.0 |
| REST API | Flask web application framework |
Fig. 10Transaction without privacy
Fig. 11Transaction of the proposed system
Fig. 12Basline and proposed design
Time required for encryption and decryption process
| Operations | ||||
|---|---|---|---|---|
| 1000 | 0.599176598 | 0.283522129 | 0.017428637 | 0.017507553 |
| 5000 | 3.11029911 | 1.489209414 | 0.077558517 | 0.0757792 |
| 10,000 | 6.225434303 | 3.001870155 | 0.158222437 | 0.160424948 |
| 15,000 | 9.281481028 | 4.501509666 | 0.225598097 | 0.25079751 |
| 20,000 | 12.3824501 | 6.126716375 | 0.311615705 | 0.37565136 |
Fig. 13Time complexity of encryption–decryption processes
Current platform comparison
| POMS [ | B_verify [ | Smart supply [ | SCF [ | Modum [ | Our platform | |
|---|---|---|---|---|---|---|
| Blockchain choice | Ethereum | Bitcoin | Ethereum | Hyperledger Fabric | Ethereum | Hyperledger Sawtooth |
| Transaction privacy | No | No | No | Yes | No | Yes |
| Consensus | PoW | PoW | PoW/BFT | BFT | PoW | PoET |
| System cost | High | High | Low | Low | High | Very low |
| Delay of transactions confirming on the blockchain | 15 s | 1 h | 15 s | 5 s | 15 s | 1 s |
| Tamper-resistant | Yes | Yes | Yes | Yes | Yes | Yes |