Open Access Open Access  Restricted Access Subscription Access

Product Anti-Counterfeiting System based on Block Chain Technology

Rakesh S., Chahath Fathima A

Abstract


Numerous applications have been developed using block chain in recent years as its popularity has grown. Bit coin is a well-known Block chain application that not only successfully solves the double-spending issue but also independently verifies the veracity of transactional data without the need for a centralized system. As a result, any application that uses block chain technology as its fundamental architecture guarantees the integrity of its data. In order to ensure that customers do not just rely on the merchants to evaluate whether things are authentic, this initiative employs the decentralized Block chain technology method. In this article, we provide a decentralized Block chain system with anti-counterfeiting items. By using this system, manufacturers can offer authentic products without having to oversee directly owned storefronts, which can drastically lower the cost of product quality assurance.


Full Text:

PDF

References


Leng, J., Jiang, P., Xu, K., Liu, Q., Zhao, J. L., Bian, Y., & Shi, R. (2019). Makerchain: A blockchain with chemical signature for self-organizing process in social manufacturing. Journal of Cleaner Production, 234, 767-778.

Alzahrani, N., & Bulusu, N. (2018, June). Block-supply chain: A new anti-counterfeiting supply chain using NFC and blockchain. In Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems (pp. 30-35).

Suhas, G. K., Devananda, S. N., Jagadeesh, R., Pareek, P. K., & Dixit, S. (2021). Recommendation-Based Interactivity Through Cross Platform Using Big Data. In Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2020, Volume 3 (pp. 651-659). Springer Singapore.

NR, D., GK, D. S., & Kumar Pareek, D. P. (2022). A Framework for Food recognition and predicting its Nutritional value through Convolution neural network.

Yuen, T. H., Zhang, Y., Yiu, S. M., & Liu, J. K. (2014). Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications and sensor networks. In Computer Security-ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I 19 (pp. 130-147). Springer International Publishing.

Liang, K., Au, M. H., Liu, J. K., Susilo, W., Wong, D. S., Yang, G., ... & Xie, Q. (2014). A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing. IEEE Transactions on Information Forensics and Security, 9(10), 1667-1680.

Kubo, T., Yanasan, A., Herbosa, T., Buddh, N., Fernando, F., & Kayano, R. (2019). Health data collection before, during and after emergencies and disasters—the result of the Kobe expert meeting. International journal of environmental research and public health, 16(5), 893.

Antonopoulos, A. M. (2014). Mastering Bitcoin: unlocking digital cryptocurrencies. " O'Reilly Media, Inc.".

GK, M. S., Verma, V. K., Devananda, S. N., BR, C. R., Manchale, P., & Pareek, P. K. An Exploration on Recommendation Based Interactivity through Multiple Platforms in Big Data.


Refbacks

  • There are currently no refbacks.