An Application of Blockchain to Secure the Conventional Product Authentication Management System

IF 5.8 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Journal of Information Technology Pub Date : 2023-07-31 DOI:10.59185/y2je8k61
Md. Azizul Hakim Sowrov, Md Asaduzzaman, Ifthekharul Islam, Md Mushfiqur Rahman, Rashed Mazumder
{"title":"An Application of Blockchain to Secure the Conventional Product Authentication Management System","authors":"Md. Azizul Hakim Sowrov, Md Asaduzzaman, Ifthekharul Islam, Md Mushfiqur Rahman, Rashed Mazumder","doi":"10.59185/y2je8k61","DOIUrl":null,"url":null,"abstract":"Products counterfeit is a multi-billion dollars market, and the growth of this field is high. There havebeen many technological enhancements like Radio Frequency Identification (RFID) and Encrypted QuickResponse (EQR) code. These technologies have been used to track down those products in the supply chaindownstream and identify products for authenticity. Under these circumstances, all existing solutions must rely ona central database for operating. The matter of this subject points out the drawback of single point of failure. As aresult, these systems are more prone to cyber-attacks. In some cases, supply chain insiders play as a bad actor ofthe system too. To prevent this, tracing concrete proof of provenance of transactions is needed. In addition,business operations require contract and consensus. These can be solved using blockchain technology. Asbusiness requires privacy and cannot rely on public network. Thus, the solution of this need requires to be builtenterprise blockchain environment.","PeriodicalId":50178,"journal":{"name":"Journal of Information Technology","volume":null,"pages":null},"PeriodicalIF":5.8000,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Technology","FirstCategoryId":"91","ListUrlMain":"https://doi.org/10.59185/y2je8k61","RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Products counterfeit is a multi-billion dollars market, and the growth of this field is high. There havebeen many technological enhancements like Radio Frequency Identification (RFID) and Encrypted QuickResponse (EQR) code. These technologies have been used to track down those products in the supply chaindownstream and identify products for authenticity. Under these circumstances, all existing solutions must rely ona central database for operating. The matter of this subject points out the drawback of single point of failure. As aresult, these systems are more prone to cyber-attacks. In some cases, supply chain insiders play as a bad actor ofthe system too. To prevent this, tracing concrete proof of provenance of transactions is needed. In addition,business operations require contract and consensus. These can be solved using blockchain technology. Asbusiness requires privacy and cannot rely on public network. Thus, the solution of this need requires to be builtenterprise blockchain environment.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
区块链在传统产品认证管理系统中的应用
产品仿冒是一个价值数十亿美元的市场,而且该领域的增长速度很快。射频识别(RFID)和加密快速响应(EQR)代码等技术已经有了许多改进。这些技术已被用于追踪供应链下游的产品,并识别产品的真伪。在这种情况下,所有现有的解决方案都必须依靠中央数据库来运行。这个问题指出了单点故障的缺点。因此,这些系统更容易受到网络攻击。在某些情况下,供应链内部人员也会成为系统的坏人。为了防止这种情况,需要对交易的来源进行具体的追踪证明。此外,业务运营需要契约和共识。区块链技术可以解决这些问题。企业需要隐私,不能依赖公共网络。因此,解决这一需求需要构建企业区块链环境。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Journal of Information Technology
Journal of Information Technology 工程技术-计算机:信息系统
CiteScore
10.00
自引率
1.80%
发文量
19
审稿时长
>12 weeks
期刊介绍: The aim of the Journal of Information Technology (JIT) is to provide academically robust papers, research, critical reviews and opinions on the organisational, social and management issues associated with significant information-based technologies. It is designed to be read by academics, scholars, advanced students, reflective practitioners, and those seeking an update on current experience and future prospects in relation to contemporary information and communications technology themes. JIT focuses on new research addressing technology and the management of IT, including strategy, change, infrastructure, human resources, sourcing, system development and implementation, communications, technology developments, technology futures, national policies and standards. It also publishes articles that advance our understanding and application of research approaches and methods.
期刊最新文献
A critical realist approach to agent-based modeling: Unlocking prediction in non-positivist paradigms A Temporal Dynamics Framework and Methodology for Computationally Intensive Social Media Research Digital sourcing: A discussion of agential, semiotic, infrastructural, combinatorial, and economic shifts Shaping Innovation Outcomes: The Role of CIOs for Firms’ Digital Exploration A Qualitative Systematic Review of Trust in Technology
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1