Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Manav Aggarwal, Harsh Ranjan, Gautam Gupta, Sanat Walia, Deepika Tyagi
DOI Link: https://doi.org/10.22214/ijraset.2022.43738
Certificate: View Certificate
In recent years, counterfeit products have played an important role in the manufacturing industry. This affects company name, sales, and corporate profits. Blockchain technology is used to identify real products and to detect counterfeit products. Blockchain technology is a distributed, customized, and digital book that stores information in the form of blocks in multiple archives linked to chains. Blockchain technology is a secure technology so any block cannot be changed or hacked. By using Blockchain technology, customers or users do not have to rely on third-party users to ensure product security. The concept of Product Copy Management System against counterfeit products that can be used in a series of postal merchant supply chain using QR code. By using a blockchain-based application platform that will help overcome the problems associated with an effective supply chain management system and provide a way to prove product ownership.
I. INTRODUCTION
The existing procurement management system did not work well in tracking product ownership. There are many products available in the supply chain that need to be verified to ensure that the product is genuine or counterfeit. Due to counterfeit or counterfeit products manufacturers face many problems that lead to huge losses. To find the real product we can use blockchain technology.
Blockchain is an appointment for old recording information that is troubling or difficult to break, rob, or cheat technology. Blockchain is actually a digital record of duplicate deals and distributed across a network of PC programs on the blockchain. Each block in the middle of a series contains multiple transactions, and each time a blockchain transaction occurs, a record of that activity id is added to each group's record. The site allocated to a number of resources is known as Distributed Ledger Technology (DLT). Blockchain is a type of DLT in which transactions are encrypted with a fixed cryptographic code called a hash.
Blockchain is proven to be consistent, which helps with integrity and commitment and, to a certain extent, privacy through the use of public and personal keys. Blockchain technology is a secure technology and therefore any block cannot be modified or controlled. Blockchain Technology is not just a cryptocurrency, and it can have several functions in government, finance and banking, accounting, and Business Processing. By using Blockchain technology, users or customers do not have a third party functionality to provide proof of product security.
The blockchain is used to store data collected by WSN monitoring the power distribution grid. It uses data stored in a blockchain, created by a directed acyclic graph (DAG). With non-technical losses also a merging algorithm was created to critique fraud.
Blockchain technology helps eliminate the problem of counterfeiting. Blockchain technology is much safer. Once the data is stored in the network hash code is generated in that product and you are likely to take care of all the sales records of the current owner and its owner as the sequence will be created for those product agreements. All sales records will be stored within the block type within the blockchain. Within the proposed system we assign the QR code generated to a particular product and thus the end client ignores that QR code in order to disclose all the information for that product. After checking the QR code we will identify whether the product is genuine or counterfeit.
II. LITERATURE REVIEW
Counterfeit products are growing rapidly with a large number of internet and black markets. Therefore, there is a strong need to address the challenges of finding counterfeit products and to design appropriate technologies to improve acquisition accuracy. This is one of the most important research areas to explore in today's world. This paper discusses various ways to identify counterfeit products.
It discusses how to improve supply chain management by adopting blockchain technology and proposing a blockchain supply chain management framework. It will provide a basic structure and ideas to develop technologies related to information resource management in distributed, visible organizations, especially distributed management theory, corporate and spatial management.
This paper highlights some shortcomings and presents two possible ways to improve the basic platform (blockchain technology) to support e-voting and other similar applications. Blockchain technology has many promises; however, in its present state, it may not reach its full potential. Based on CMCR, Protocol and Verification with Block-chain algorithm to protect user's confidential information from public access. Considering a user with high proximity, they use a block-chain-based authentication method, and establish relationships with the Hash function for better protection. Then, they use the encryption protocol in the text recommendation process to ensure the security of the information. Tests have proven that improvements have achieved better results.
This paper highlights some shortcomings and presents two possible ways to improve the basic platform (blockchain technology) to support e-voting and other similar applications. Blockchain technology has many promises; however, in its present state, it may not reach its full potential.
Based on CMCR, Protocol and Verification with Block-chain algorithm to protect user's confidential information from public access. Considering a user with high proximity, they use a block-chain-based authentication method, and establish relationships with the Hash function for better protection.Then, they use the encryption protocol in the text recommendation process to ensure the security of the information. Tests have proven that improvements have achieved better results. [7] This paper focuses on various blockchain opportunities for use in the healthcare sector, e.g. In public health management, consumer-centered medical research based on patient personal data and drug fraud.
This paper proposed Ethereum blockchain technology at a designated healthcare website. With this shared network infrastructure, different health care professionals can access the same information. [8] The current paper explains how the blockchain is important in storing health care data in the cloud.It also enhances data security and privacy while storing data. When new patient health care data is created (e.g. from consultation, with medical practice such as surgery), a new block is consolidated and distributed to all peers in the patient network.
After most of your peers approve the new block, the system will put it in a chain. With the rapid growth of the internet of things, many researchers are looking at the use of appropriate technology for tracking systems in food supply chains. Folinas et al. (2006) [9] have shown that the efficiency of a tracking system depends on the ability to track and trace each product and transportation units, in a way that enables continuous monitoring from basic production to final disposal by the consumer. .
Shanahan et al. (2009) [10] proposed a RFID-based framework for tracking beef from farm to slaughter. Busing RFID for individual cattle identification, the program has proposed as a solution for access to tracking records and fraudulent activities.
To create an automated system that combines online tracking data and chill chain status monitoring information, Abad et al. (2010) [11] attempted to validate an intelligent RFID tag designed for real-time tracking and monitoring of cold food chains under the chain study of intercontinental fresh fish logistics. Matholi et al. (2010) [12] developed a Flexible Tag Data- logger (FTD) attached to bottles to collect environmental data, (such as light, humidity, and temperature) to track wine bottles in a supermarket.
Historical data stored in FTD can be read to mobile phones or a Personal Digital Assistant (PDA) with an integrated infrared port to check the safety status of wine bottles.
To create an automated system that combines online tracking data and chill chain status monitoring information, Abad et al. (2010) have attempted to validate an intelligent RFID tag designed for real-time tracking and monitoring of cold food chains under chain research of fresh fish species. Matholi et al. (2010) [12] developed a Flexible Tag Data- logger (FTD) attached to bottles to collect environmental data, (such as light, humidity, and temperature) to track wine bottles in a supermarket.
III. BLOCKCHAIN
Blockchain is a distributed site that participates between network nodes. As a database, blockchain stores information electronically in a digital format. Blockchain is best known for its important role in cryptocurrency systems, such as Bitcoin, for maintaining a secure and segregated record of transactions. The establishment of the blockchain ensures the security of the information record and creates trust without the need for a trusted third party.
One important difference between a standard database and a blockchain is the way information is structured. Blockchain collects information together in groups, known as blocks, that store data sets. Blocks have a certain storage capacity and, when filled, are closed and connected to a pre-filled block, which creates a sequence of information known as a blockchain. All new information following the newly installed block is collected into a newly constructed block that will be added to the series when completed.
A database usually organizes its data into tables, while a blockchain, as its name implies, organizes its data into pieces or blocks connected together. This natural setting creates an irreversible timeline of information when used during ecological separation. When a block is completed, a timestamp is set and becomes the location of this point line. Each block inside the chain is given a time stamp when added to the chain. Blockchain can provide increasing visibility of the supply chain, as well as reduced costs and risks throughout the supply chain. In particular, the implementation of the blockchain supply chain can bring the following important benefits:
Blockchain can enable more explicit and more accurate tracking in supply chain: Organizations can digitalize digital assets and create a seamless record that separates everything that is made, making it possible to track assets from production to delivery or use by the end user. This increased supply of light supply gives more visibility to businesses and consumers. Blockchain can drive the supply chain transparency to help reduce the fraudulent assets of high value assets such as diamonds and pharmaceutical drugs. Blockchain can help companies understand how ingredients and finished goods are transferred through each subcontractor and reduce profit losses from fraudulent and gray market trading, as well as increase confidence in end-users by reducing or eliminating the impact of counterfeit products. In addition, entities may maintain additional control over the execution of an external contract. Blockchain provides all organizations within the network to provide appropriate access to the same information, which may reduce communication or data transmission errors. Less time can be spent verifying data and more can be spent on delivering goods and services — either to improve quality, reduce costs, or both. Finally, the blockchain can streamline management processes and reduce costs by enabling effective testing of supply chain data. Procedures that include self-assessment for compliance or credit purposes that may take weeks can now be accelerated using a spreadsheet of all relevant information.
IV. ETHEREUM AND SMART CONTRACTS
Ethereum is an open- source public service that uses blockchain technology that allows smart contracts and cryptocurrency trading securely without a third party. There are two accounts available through Ethereum externally possessed accounts ( controlled by private keys made by human users) and contract accounts. Ethereum allows developers to deploy all kinds of decentralised apps.
A. Etherium
Ethereum’s mission is to create another shared work protocol, to provide a unique set of trades that we believe will be truly useful in the external division of segregation operations, with special emphasis on conditions where time for rapid development, security of small and unusual jobs; Ethereum does this by establishing what is the last non-authoritative base name for unauthorized power, marketing formats and country conversion activities. A blank definition of a word coin is usually written in two lines of code, and some principles such as currencies and currency systems are usually made up of less than twenty. Smart contracts, cryptographic "boxes" contain value and are only open if certain conditions are met, can also be built on stage, with greater force than those given Bitcoin scripting due to increased Turing-absoluteness, value- mindfulness, value blockchain - mindfulness and -state blockchain in the programming language embedded in Turing-complete, which allows anyone to write smart contracts and assigned tasks in an environment where they will produce their own authorized laws, marketing formats and land reform activities.
???????B. Ethereum Accounts
"Ether" is the internal crypto-fuel component of Ethereum, which is used to pay transaction fees. Generally, there are two types of accounts, the first being foreign accounts, which are governed by secret keys, and the second are contractual accounts, which are governed by their own contract code.
An external account does not have a code, and a person can send messages from an external account by creating and registering work during the contract account, whenever the code account code is valid after receiving the message, allowing it to be read and write to the internal store and send further messages or make contracts respectively.
???????C. Messages and Transactions
The term" transaction" is used in Ethereum to relate to the data package that stores a message or data to be transferred from an externally possessed account. Transactions contain:
D. Messages
Contracts have the capability to send " messages" to other contracts. Messages are virtual objects which exists only in the Ethereum execution environment and are never serialized. A message contains:
Basically, a message is like a transaction, except it's produced by a contract and not an external actor. A message is produced when a contract presently executing code executes the CALL opcode, which produces and executes a message. Like a transaction, a message leads to the receiving account running its code. Therefore, contracts can have connections with other contracts in exactly the same way that external actors can.
Note that the gas allowance assigned by a transaction or contract applies to the total gas consumed by that transaction and all sub-executions. For illustration, if an external actor A sends a sale to B with 1000 gas, and B consumes 600 gas before transferring a communication to C, and the internal prosecution of C consumes 300 gas before returning, also B can spend another 100 gas before running out of gas.
Ethereum State Transition Function
???????E. Code Execution
The code for Ethereum contracts is written during standard, stack-based bytecode language, defined as "Ethereum virtual machine code" or "EVM code". The code contains a series of bytes, where each byte represents a function. Generally , code execution is an infinite loop that consists of repeatedly completing the operation at the present program counter (which begins at zero) then incrementing the program counter by one, until the top of the code is reached or a mistake or STOP or RETURN instruction is detected. The operations have access to 3 sorts of space during which to store data:
The code can also access value, sender and incoming message data, as well as block header data, so the code can return more information as output.
The official version of EVM coding is incredibly simple. While the Ethereum virtual machine works, its full computational status is usually defined by a tuple (block status, transaction, message, code, memory, stack, pc, gas), where block status is a universal status -Account and includes balance and storage. At the beginning of each kill cycle, the current command is obtained by taking a pcth byte of code (or 0 if pc> = len (code)), and every command has its own meaning of how it affects the tuple. for example, ADD removes two objects from the stack and pushes their value, lowers gas by 1 and raises the computer by 1, and SSTORE pushes two of the highest objects into the stack and places the second item in the final position of the contract in the indicated location. with the first thing. While there are some ways to improve Ethereum machine integration with timely integration, Ethereum's basic implementation often clears a few hundred lines of code.
V. SOLIDITY
Solidity is a mathematical programming language designed to develop intelligent contracts that run on Ethereum Virtual Machine. Smart contracts are programs that are used within a peer-to-peer network where no one has special authority over the transaction, and thus allow for the use of value tokens, ownership, voting, and other sensible forms. Solidity is a contract-based programming language, which is advanced to implement smart contracts. Strength is strongly influenced by C ++, Python and JavaScript and is designed to target Ethereum Virtual Machine (EVM). Solidity is written mathematically, supporting legacy, libraries and complex forms of user-defined programming language. You can use Solidity to create consumer contracts such as voting, large-scale funding, blind auctions, and multi-signed wallets.
Strength may be a mathematical programming language designed to develop intelligent contracts operating on Ethereum Virtual Machine, also known as EVM.
As specified Wood is designed around the user-defined description of the telephone system results also included within the proposal, called "Natural Language Definition" ECMAScript syntax to be familiar to existing web developers unlike ECMAScript does not change. typing and different return types.
Compared to other EVM targeted languages ??of the time such as Snake and Mutan, Solidity contained a number of significant differences.
Complex changes of contract members including map layout and position layout have been supported. Contracts support the asset, which includes multiple assets with a C3 line. A virtual binary interface (ABI) that performs many secure functions within a single contract was introduced with it (and later supported by Snake). A standard user-defined writing system for pronunciation results is included during the proposal, called "Definition of Indigenous Languages"
VI. RESULTS
In the developed system the manufacturer will enroll him with valid information on the blockchain with company name and other details and assigns a unique ID to each product with QR code. The manufacturer ships the products to the Distributor where a distributor can check the manufacturer details and ownership of the products, etc. Distributor verifies the genuineness of the EPC using assigned QR code and issues a transaction.
After the creation of QR Code Scanner application and integrating it with our blockchain database, we were able to scan for an authentic product and also distinguish between fake products. We used transaction hashes as a means to test the authenticity of the product and also converted them to QR Code so that the hashes could be scanned easily and the authenticity of the product can be checked.
VII. PROJECT SCREENSHOTS
Blockchain is based on open source. The system developed will facilitate easier and faster interoperability between systems. It can efficiently scale to handle larger volumes of data and more blockchain users. Thus, proposed system is useful for end user to detect fake products in supply chain. End user can scan QR code assigned to a product and can get all the information like transaction history, current owner based on which end user can check whether the product is genuine or not.
[1] Neo C. K. Yiu, IEEE Department of Computer Science, University of Oxford “Toward Blockchain-Enabled Supply Chain Anti-Counterfeiting and Traceability” fi13040086 (2021 , March 29) [2] Neo C.K. Yiu, Member, IEEE Department of Computer Science, University of Oxford “Toward Blockchain-Enabled Supply Chain Anti-Counterfeiting and Traceability” 2102.00459 (2021 , January 31) [3] Dr. Thomas Bocek, Andri Lareida, “Reducing Counterfeit Products with Blockchains.” (2017 , January 15) [4] Prabhu Shankar, R. Jayavadivel , IJSTR “A Survey of Counterfeit Product Detection.” (2019 , December 12) [5] Freya Sheer Hardwick, Apostolos Gioulis, Raja Naeem Akram, Konstantinos Markantonakis, “E-Voting with Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy”, 2018. [6] Abad, E., et al., RFID smart tag for traceability and cold chainmonitoring of food: demonstration in an intercontinental fresh fishlogistic chain. Journal of Food Engineering. 2009, 93(4), 394-399. ss
Copyright © 2022 Manav Aggarwal, Harsh Ranjan, Gautam Gupta, Sanat Walia, Deepika Tyagi. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET43738
Publish Date : 2022-06-02
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here