2020
DOI: 10.1109/access.2019.2962274
|View full text |Cite
|
Sign up to set email alerts
|

Permissioned Blockchain-Based Double-Layer Framework for Product Traceability System

Abstract: Blockchain-based product traceability systems are receiving increasing attention from both industry and academia. Existing systems make full use of the traceability and non-modification characteristics of blockchain technology and realize the openness and transparency of product traceability information in the entire supply chain. However, existing systems do not consider government regulation, cannot protect enterprise sensitive private data effectively, and have performance bottlenecks. To address these prob… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 54 publications
(26 citation statements)
references
References 36 publications
(29 reference statements)
0
26
0
Order By: Relevance
“…Stevens et al 2016 [16] Conti et al 2018 [32] Salman et al 2019 [35] Barron et al 2016 [53] Fu et al 2019 [21] Lu et al 2017 [54] Cyber Resilience Acharjamayum et al 2018 [30] Divey et al 2019 [99] Wang et al 2019 [47] Fraga-Lamas et 2019 [9] Shahaab et al 2019 [3] Ben?i? et al 2018 [10] Maple et al 2019 [29] Alotaibi 2019 [37] Hou et al 2019 [36] He et al 2018 [42] Onwubiko 2020 [41] Sharma et al 2019 [43] Saini et at 2019 [44] Security Frameworks & Solutions Hasan et al 2020 [100] Jaiswal et al 2019 [75] Lallas et al 2019 [79] Madhumida et al 2019 [55] Bose et al 2018 [85] Shwetha et al 2019 [102] Ramalingaiah et al 2018 [103] Omar et al 2019 [104] Li et al 2019 [86] Ding et al 2020 [90] Li et 2018 [105] Xie et al 2018 [91] Bodkhe et al 2019 [94] Epiphaniou et al 2020 [5] Ledwaba et al 2019 [106] Seitz et al 2018 [107] Abdellatif et 2018 [108] Stodt et al 2018 [109] Devi et al 2019 [110] Wang et al 2019 [98] Matzutt et al 2018 [111 ] Sidorov et al 2018 [96] Dinh et al 2018 [48] Demir et al 2018…”
Section: Security Compliancementioning
confidence: 99%
See 2 more Smart Citations
“…Stevens et al 2016 [16] Conti et al 2018 [32] Salman et al 2019 [35] Barron et al 2016 [53] Fu et al 2019 [21] Lu et al 2017 [54] Cyber Resilience Acharjamayum et al 2018 [30] Divey et al 2019 [99] Wang et al 2019 [47] Fraga-Lamas et 2019 [9] Shahaab et al 2019 [3] Ben?i? et al 2018 [10] Maple et al 2019 [29] Alotaibi 2019 [37] Hou et al 2019 [36] He et al 2018 [42] Onwubiko 2020 [41] Sharma et al 2019 [43] Saini et at 2019 [44] Security Frameworks & Solutions Hasan et al 2020 [100] Jaiswal et al 2019 [75] Lallas et al 2019 [79] Madhumida et al 2019 [55] Bose et al 2018 [85] Shwetha et al 2019 [102] Ramalingaiah et al 2018 [103] Omar et al 2019 [104] Li et al 2019 [86] Ding et al 2020 [90] Li et 2018 [105] Xie et al 2018 [91] Bodkhe et al 2019 [94] Epiphaniou et al 2020 [5] Ledwaba et al 2019 [106] Seitz et al 2018 [107] Abdellatif et 2018 [108] Stodt et al 2018 [109] Devi et al 2019 [110] Wang et al 2019 [98] Matzutt et al 2018 [111 ] Sidorov et al 2018 [96] Dinh et al 2018 [48] Demir et al 2018…”
Section: Security Compliancementioning
confidence: 99%
“…Sudhan et al [83] state that "the unique nature of BC ensures the CIA of data stored and accessed in a decentralized manner". DLT has special properties which enable DLT integrated systems to have inbuilt data security and assurance, rendering the CIA of systems [84], [14], [85], [86], [28], [87], [8]. As a result, current research work in the area of DLT in SCSM was The authors clustered these properties of DLT based on their security aspects as illustrated in Fig.…”
Section: Evaluation Metrics and Critical Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Table 3 details a summary of the total 317 unique features within the articles included in the SLR, which have been grouped into five subcategories (fault detection, predictive maintenance, communication, virtualization, human machine interference (HMI)). Various Industry 4.0 IT solutions are used in fault detection [45][46][47], predictive maintenance [48][49][50], communication [51][52][53], virtualization [42,54,55], and human-machine interference (HMI) [56][57][58].…”
Section: Featuresmentioning
confidence: 99%
“…The consensus mechanism enables multi-party participation by the nodes on the network of blockchain, allowing them to jointly maintain the same medication's information set. The more parties participating in the medication flow in the supply chain, the larger the data size jointly maintained, thus the more trustworthiness could be brought to the consumers [31]. The blockchain-based endorsement can become the effective trustworthiness mechanism, reducing the likelihood of a counterfeit.…”
Section: B Anti-counterfeiting and Traceabilitymentioning
confidence: 99%