区块链在传统产品认证管理系统中的应用

IF 5.8 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS
Md. Azizul Hakim Sowrov, Md Asaduzzaman, Ifthekharul Islam, Md Mushfiqur Rahman, Rashed Mazumder
{"title":"区块链在传统产品认证管理系统中的应用","authors":"Md. Azizul Hakim Sowrov, Md Asaduzzaman, Ifthekharul Islam, Md Mushfiqur Rahman, Rashed Mazumder","doi":"10.59185/y2je8k61","DOIUrl":null,"url":null,"abstract":"Products counterfeit is a multi-billion dollars market, and the growth of this field is high. There havebeen many technological enhancements like Radio Frequency Identification (RFID) and Encrypted QuickResponse (EQR) code. These technologies have been used to track down those products in the supply chaindownstream and identify products for authenticity. Under these circumstances, all existing solutions must rely ona central database for operating. The matter of this subject points out the drawback of single point of failure. As aresult, these systems are more prone to cyber-attacks. In some cases, supply chain insiders play as a bad actor ofthe system too. To prevent this, tracing concrete proof of provenance of transactions is needed. In addition,business operations require contract and consensus. These can be solved using blockchain technology. Asbusiness requires privacy and cannot rely on public network. Thus, the solution of this need requires to be builtenterprise blockchain environment.","PeriodicalId":50178,"journal":{"name":"Journal of Information Technology","volume":null,"pages":null},"PeriodicalIF":5.8000,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Application of Blockchain to Secure the Conventional Product Authentication Management System\",\"authors\":\"Md. Azizul Hakim Sowrov, Md Asaduzzaman, Ifthekharul Islam, Md Mushfiqur Rahman, Rashed Mazumder\",\"doi\":\"10.59185/y2je8k61\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Products counterfeit is a multi-billion dollars market, and the growth of this field is high. There havebeen many technological enhancements like Radio Frequency Identification (RFID) and Encrypted QuickResponse (EQR) code. These technologies have been used to track down those products in the supply chaindownstream and identify products for authenticity. Under these circumstances, all existing solutions must rely ona central database for operating. The matter of this subject points out the drawback of single point of failure. As aresult, these systems are more prone to cyber-attacks. In some cases, supply chain insiders play as a bad actor ofthe system too. To prevent this, tracing concrete proof of provenance of transactions is needed. In addition,business operations require contract and consensus. These can be solved using blockchain technology. Asbusiness requires privacy and cannot rely on public network. Thus, the solution of this need requires to be builtenterprise blockchain environment.\",\"PeriodicalId\":50178,\"journal\":{\"name\":\"Journal of Information Technology\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":5.8000,\"publicationDate\":\"2023-07-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Information Technology\",\"FirstCategoryId\":\"91\",\"ListUrlMain\":\"https://doi.org/10.59185/y2je8k61\",\"RegionNum\":3,\"RegionCategory\":\"管理学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Technology","FirstCategoryId":"91","ListUrlMain":"https://doi.org/10.59185/y2je8k61","RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

产品仿冒是一个价值数十亿美元的市场,而且该领域的增长速度很快。射频识别(RFID)和加密快速响应(EQR)代码等技术已经有了许多改进。这些技术已被用于追踪供应链下游的产品,并识别产品的真伪。在这种情况下,所有现有的解决方案都必须依靠中央数据库来运行。这个问题指出了单点故障的缺点。因此,这些系统更容易受到网络攻击。在某些情况下,供应链内部人员也会成为系统的坏人。为了防止这种情况,需要对交易的来源进行具体的追踪证明。此外,业务运营需要契约和共识。区块链技术可以解决这些问题。企业需要隐私,不能依赖公共网络。因此,解决这一需求需要构建企业区块链环境。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An Application of Blockchain to Secure the Conventional Product Authentication Management System
Products counterfeit is a multi-billion dollars market, and the growth of this field is high. There havebeen many technological enhancements like Radio Frequency Identification (RFID) and Encrypted QuickResponse (EQR) code. These technologies have been used to track down those products in the supply chaindownstream and identify products for authenticity. Under these circumstances, all existing solutions must rely ona central database for operating. The matter of this subject points out the drawback of single point of failure. As aresult, these systems are more prone to cyber-attacks. In some cases, supply chain insiders play as a bad actor ofthe system too. To prevent this, tracing concrete proof of provenance of transactions is needed. In addition,business operations require contract and consensus. These can be solved using blockchain technology. Asbusiness requires privacy and cannot rely on public network. Thus, the solution of this need requires to be builtenterprise blockchain environment.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Information Technology
Journal of Information Technology 工程技术-计算机:信息系统
CiteScore
10.00
自引率
1.80%
发文量
19
审稿时长
>12 weeks
期刊介绍: The aim of the Journal of Information Technology (JIT) is to provide academically robust papers, research, critical reviews and opinions on the organisational, social and management issues associated with significant information-based technologies. It is designed to be read by academics, scholars, advanced students, reflective practitioners, and those seeking an update on current experience and future prospects in relation to contemporary information and communications technology themes. JIT focuses on new research addressing technology and the management of IT, including strategy, change, infrastructure, human resources, sourcing, system development and implementation, communications, technology developments, technology futures, national policies and standards. It also publishes articles that advance our understanding and application of research approaches and methods.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信