Design and Implementation of Blockchain-based Anti-Counterfeit Traceability System for Beef Cattle Products
DOI: 10.23977/acss.2023.070709 | Downloads: 45 | Views: 444
Author(s)
Pingping Xiang 1, Xinrong Liu 1, Yipeng Han 1
Affiliation(s)
1 College of Management Science, Chengdu University of Technology, Chengdu, Sichuan, China
Corresponding Author
Pingping XiangABSTRACT
Aiming at beef cattle product quality safety, the traditional anti-counterfeit traceability methods have serious data centering. To guarantee data security and reliability, this paper adopts blockchain technology with traceability characteristics, takes beef cattle products as the research object, constructs a supply chain traceability model of beef cattle products based on blockchain technology, and builds an anti-counterfeiting traceability system based on Hyperledger Fabric platform. The organizations at the management end of the same supply chain use the snowflake algorithm to generate corresponding IDs, which are interrelated with each otherand then combine the traceability ID, blockchain, and QR code to realize anti-counterfeiting traceability, finally complete data verification between the traceability ID and local information and return relevant information. At the same time, to guarantee the security of the QR code, the improved RSA algorithm is used to generate the key pair, the public key is used for encryption, and the private key is used to generate the encrypted QR code for the traceability ID, and the consumer can obtain the traceability ID by scanning the code and decrypting it. In order to verify the effectiveness of the RSA algorithm and the performance of the anti-counterfeiting traceability system, the system is tested and applied in this paper, and the test results show that the anti-counterfeiting function of the traceability system is realized, and the system performs well without the phenomenon of chain code collapse. Meanwhile, it is found that the efficiency of the consensus algorithm of various organizations needs to be improved, to ensure anti-counterfeiting traceability.
KEYWORDS
RSA algorithm, traceability ID, blockchain, anti-counterfeiting, traceabilityCITE THIS PAPER
Pingping Xiang, Xinrong Liu, Yipeng Han, Design and Implementation of Blockchain-based Anti-Counterfeit Traceability System for Beef Cattle Products. Advances in Computer, Signals and Systems (2023) Vol. 7: 69-80. DOI: http://dx.doi.org/10.23977/acss.2023.070709.
REFERENCES
[1] Zhao, W. (2019) Research on agricultural food safety traceability system based on blockchain technology. Techno-economic and management research, (01): 16-20.
[2] Wang, L., Ren, J., Wang, T., et al. (2023) Design and implementation of grain anti-counterfeiting traceability system based on blockchain. Science and technology and engineering, 23 (04): 1625-1634.
[3] Zhang, Z., Xu, H., He, J., et al. (2021) micro-service two-dimensional code anti-counterfeiting traceability system. computer knowledge and technology, 17 (20): 1-4 + 8.
[4] Huang X. (2022) NFC anti-counterfeiting traceability system design based on blockchain and national secret algorithm. Modern Information Technology, 6 (04): 41-44.
[5] Zheng, Z., Zheng, H., Ju, J., et al. (2021) A system for identifying an anti-counterfeiting pattern based on the statistical difference in key image regions. Expert Systems with Applications, 183: p. 115410.
[6] Lu, Y., Li, P. and Xu H. (2022) A Food anti-counterfeiting traceability system based on Blockchain and Internet of Things. Procedia Computer Science, 199: p. 629-636.
[7] Qiu, Z., and Zhu Y., (2023) Traceability anti-counterfeiting system based on the ownership of edge computing on the blockchain. Journal of Ambient Intelligence and Humanized Computing, 14(1): p. 257-270.
[8] Xie, S., and Tan, H. (2021) An Anti-Counterfeiting Architecture for Traceability System Based on Modified Two-Level Quick Response Codes. Electronics, 10(3): p. 320.
[9] Turki, M., Cheikhrouhou, S., Dammak, B., et al. (2023) NFT-IoT Pharma Chain: IoT Drug traceability system based on Blockchain and Non Fungible Tokens (NFTs). Journal of King Saud University - Computer and Information Sciences, 35(2): p. 527-543.
[10] Sezer, B. B., Topal, S., and Nuriyev, U. (2022) TPPSUPPLY: A traceable and privacy-preserving blockchain system architecture for the supply chain. Journal of Information Security and Applications, 66: p. 103116.
[11] Uddin, M. (2021) Blockchain Medledger: Hyperledger fabric enabled drug traceability system for counterfeit drugs in pharmaceutical industry. International Journal of Pharmaceutics, 597: p. 120235.
[12] Mothukuri, V., Cheerla, S., Parizi, R., et al. (2021) BlockHDFS: Blockchain-integrated Hadoop distributed file system for secure provenance traceability. Blockchain: Research and Applications, 2(4): p. 100032.
[13] Alamsyah, A., Widiyanesti, S., Wulansari, P., et al. (2023) Blockchain traceability model in the coffee industry. Journal of Open Innovation: Technology, Market, and Complexity, 9(1): p. 100008.
[14] Li, X. Q., Jiang, P., and Chen, T. (2020) A survey on the se-curity of blockchain systems. Future Gener Comput Syst 107:841–853
[15] Chen, C., Fang, C., Zhou, M., et al. (2022) A Blockchain-Based Anti-Counterfeit and Traceable NBA Digital Trading Card Management System. Symmetry, 14(9): p. 1827.
[16] Yang, X., Li, M., Yu, H., et al. (2021) A Trusted Blockchain-Based Traceability System for Fruit and Vegetable Agricultural Products. IEEE Access, 9: p. 36282-36293.
[17] Munasinghe, U. J., and Halgamuge M. N., (2023) Supply chain traceability and counterfeit detection of COVID-19 vaccines using novel blockchain-based Vacledger system. Expert Systems with Applications, p. 120293.
[18] Gao, L., Xue, L., Ma, Z., et al. (2023) Big data RSA public key encryption security two-way detection simulation. Computer simulation, 40 (02): 410-414.
[19] Cheng, J., Zhang, Y., Yuan, Y., et al. (2022) PoEC: A Cross-Blockchain Consensus Mechanism for Governing Blockchain by Blockchain. Computers, Materials & Continua, 73 (1): p. 1385-1402.
[20] Ma, C., An, J., Bi, W., et al. (2018) Smart contracts in blockchain. Information network security, (11): 8-17.
[21] Yang, Y., Lin, T., Chen, J., et al. (2022) Design of fully homomorphic encryption smart contract in edge computing mode. Journal of Information Security, 7 (02): 150-162. DOI: 10. 19363 / J. cnki. cn10-1380 / tn. 2022. 03. 10.
Downloads: | 15220 |
---|---|
Visits: | 268252 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Journal of Artificial Intelligence Practice
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks