{"title":"An Application of Blockchain to Secure the Conventional Product Authentication Management System","authors":"Md. Azizul Hakim Sowrov, Md Asaduzzaman, Ifthekharul Islam, Md Mushfiqur Rahman, Rashed Mazumder","doi":"10.59185/y2je8k61","DOIUrl":null,"url":null,"abstract":"Products counterfeit is a multi-billion dollars market, and the growth of this field is high. There havebeen many technological enhancements like Radio Frequency Identification (RFID) and Encrypted QuickResponse (EQR) code. These technologies have been used to track down those products in the supply chaindownstream and identify products for authenticity. Under these circumstances, all existing solutions must rely ona central database for operating. The matter of this subject points out the drawback of single point of failure. As aresult, these systems are more prone to cyber-attacks. In some cases, supply chain insiders play as a bad actor ofthe system too. To prevent this, tracing concrete proof of provenance of transactions is needed. In addition,business operations require contract and consensus. These can be solved using blockchain technology. Asbusiness requires privacy and cannot rely on public network. Thus, the solution of this need requires to be builtenterprise blockchain environment.","PeriodicalId":50178,"journal":{"name":"Journal of Information Technology","volume":null,"pages":null},"PeriodicalIF":5.8000,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Technology","FirstCategoryId":"91","ListUrlMain":"https://doi.org/10.59185/y2je8k61","RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Products counterfeit is a multi-billion dollars market, and the growth of this field is high. There havebeen many technological enhancements like Radio Frequency Identification (RFID) and Encrypted QuickResponse (EQR) code. These technologies have been used to track down those products in the supply chaindownstream and identify products for authenticity. Under these circumstances, all existing solutions must rely ona central database for operating. The matter of this subject points out the drawback of single point of failure. As aresult, these systems are more prone to cyber-attacks. In some cases, supply chain insiders play as a bad actor ofthe system too. To prevent this, tracing concrete proof of provenance of transactions is needed. In addition,business operations require contract and consensus. These can be solved using blockchain technology. Asbusiness requires privacy and cannot rely on public network. Thus, the solution of this need requires to be builtenterprise blockchain environment.
期刊介绍:
The aim of the Journal of Information Technology (JIT) is to provide academically robust papers, research, critical reviews and opinions on the organisational, social and management issues associated with significant information-based technologies. It is designed to be read by academics, scholars, advanced students, reflective practitioners, and those seeking an update on current experience and future prospects in relation to contemporary information and communications technology themes.
JIT focuses on new research addressing technology and the management of IT, including strategy, change, infrastructure, human resources, sourcing, system development and implementation, communications, technology developments, technology futures, national policies and standards. It also publishes articles that advance our understanding and application of research approaches and methods.