Skip to main content
Top

2018 | OriginalPaper | Chapter

A Blockchain-Based Traceable Certification System

Authors : Po-Yeuan Chang, Min-Shiang Hwang, Chao-Chen Yang

Published in: Security with Intelligent Computing and Big-data Services

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In recent years, product records become more common to merchandize sold in retail stores, but the current product record system used today can’t assure product’s quality after products were transported through the whole supply chain. During transportation, merchandise may be damaged accidentally or condition changed. Those events do not get recorded because records are predominantly focused by manufacturers. Also in second hand market, product record may be tampered or verification is weak. Nonexperiences buyers can’t distinguish counterfeit because records are not trustworthy and outdated. By using the concept borrowed from Bitcon, the advantage of the blockchain can be applied to the product record system. Because of the characteristics of the blockchain such as: decentralization, openness, and immutability, which can improve the system. To achieve the goal, ownership of products is introduced and smart contract is also embedded to further enhance the product record system.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Qin, J., Sun, R., Xiang, X., Li, H., Huang, H.: Anti-fake digital watermarking algorithm based on QR codes and DWT. Int. J. Netw. Secur. 18(6), 1102–1108 (2016) Qin, J., Sun, R., Xiang, X., Li, H., Huang, H.: Anti-fake digital watermarking algorithm based on QR codes and DWT. Int. J. Netw. Secur. 18(6), 1102–1108 (2016)
3.
go back to reference Narasimhan, H., Padmanabhan, T.R.: 3CAuth - a novel multi-factor authentication scheme using QR-code. Int. J. Netw. Secur. 18(1), 143–150 (2016) Narasimhan, H., Padmanabhan, T.R.: 3CAuth - a novel multi-factor authentication scheme using QR-code. Int. J. Netw. Secur. 18(1), 143–150 (2016)
5.
go back to reference Ibrahim, M.H.: SecureCoin: a robust secure and efficient protocol for anonymous bitcoin ecosystem. Int. J. Netw. Secur. 19(2), 295–312 (2017) Ibrahim, M.H.: SecureCoin: a robust secure and efficient protocol for anonymous bitcoin ecosystem. Int. J. Netw. Secur. 19(2), 295–312 (2017)
6.
go back to reference Lin, I.C., Liao, T.C.: A survey of blockchain security issues and challenges. Int. J. Netw. Secur. 19(5), 653–659 (2017) Lin, I.C., Liao, T.C.: A survey of blockchain security issues and challenges. Int. J. Netw. Secur. 19(5), 653–659 (2017)
7.
go back to reference Zyskind, G., Nathan, O., Pentland, A.: Decentralizing privacy: using blockchain to protect personal data. In: Security and Privacy Workshops, pp. 180–184. IEEE (2015) Zyskind, G., Nathan, O., Pentland, A.: Decentralizing privacy: using blockchain to protect personal data. In: Security and Privacy Workshops, pp. 180–184. IEEE (2015)
8.
go back to reference Liu, Y., Chang, C.C., Chang, S.C.: An efficient and secure smart card based password authentication scheme. Int. J. Netw. Secur. 19(1), 1–10 (2017) Liu, Y., Chang, C.C., Chang, S.C.: An efficient and secure smart card based password authentication scheme. Int. J. Netw. Secur. 19(1), 1–10 (2017)
9.
go back to reference Moon, J., Lee, D., Jung, J., Won, D.: Improvement of efficient and secure smart card based password authentication scheme. Int. J. Netw. Secur. 19(6), 1053–1061 (2017) Moon, J., Lee, D., Jung, J., Won, D.: Improvement of efficient and secure smart card based password authentication scheme. Int. J. Netw. Secur. 19(6), 1053–1061 (2017)
12.
go back to reference Christidis, K., Devetsikiotis, M.: Blockchains and smartcontracts for the Internet of Things. IEEE Access 4, 2292–2303 (2016)CrossRef Christidis, K., Devetsikiotis, M.: Blockchains and smartcontracts for the Internet of Things. IEEE Access 4, 2292–2303 (2016)CrossRef
13.
go back to reference Wood, G.: Ethereum: A secure decentralised generalised transaction ledger, Ethereum Project Yellow Paper (2014) Wood, G.: Ethereum: A secure decentralised generalised transaction ledger, Ethereum Project Yellow Paper (2014)
14.
go back to reference Loibl, A., Naab, J.: Namecoin. Netw. Archit. Serv. 107–113 (2014) Loibl, A., Naab, J.: Namecoin. Netw. Archit. Serv. 107–113 (2014)
15.
go back to reference Delmolino, K., Arnett, M., Kosba, A.E., Miller, A., Shi, E.: Step by step towards creating a safe smart contract: lessons and insights from a cryptocurrency lab. IACR Cryptol. ePrint Arch. 2015(460), 1–15 (2015) Delmolino, K., Arnett, M., Kosba, A.E., Miller, A., Shi, E.: Step by step towards creating a safe smart contract: lessons and insights from a cryptocurrency lab. IACR Cryptol. ePrint Arch. 2015(460), 1–15 (2015)
16.
go back to reference Miers, I., Garman, C., Green, M., Rubin, A.D.: Zerocoin: anonymous distributed E-Cash from Bitcoin. In: IEEE Symposium on Security and Privacy (2013) Miers, I., Garman, C., Green, M., Rubin, A.D.: Zerocoin: anonymous distributed E-Cash from Bitcoin. In: IEEE Symposium on Security and Privacy (2013)
17.
go back to reference Sasson, E.B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., Virza, M.: Zerocash: decentralized anonymous payments from Bitcoin. In: IEEE Symposium on Security and Privacy (SP), pp. 459–474 (2014) Sasson, E.B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., Virza, M.: Zerocash: decentralized anonymous payments from Bitcoin. In: IEEE Symposium on Security and Privacy (SP), pp. 459–474 (2014)
19.
go back to reference Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. SIGCOMM Comput. Commun. Rev. 34(2), 39–53 (2004)CrossRef Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. SIGCOMM Comput. Commun. Rev. 34(2), 39–53 (2004)CrossRef
20.
go back to reference Baishya, R.C., Hoque, N., Bhattacharyya, D.K.: DDoS attack detection using unique source IP deviation. Int. J. Netw. Secur. 19(6), 29–939 (2017) Baishya, R.C., Hoque, N., Bhattacharyya, D.K.: DDoS attack detection using unique source IP deviation. Int. J. Netw. Secur. 19(6), 29–939 (2017)
21.
go back to reference Behal, S., Kumar, K.: Characterization and comparison of DDoS attack tools and traffic generators: a review. Int. J. Netw. Secur. 19(3), 383–393 (2017) Behal, S., Kumar, K.: Characterization and comparison of DDoS attack tools and traffic generators: a review. Int. J. Netw. Secur. 19(3), 383–393 (2017)
22.
go back to reference Behal, S., Kumar, K., Sachdeva, M.: Discriminating flash events from DDoS attacks: a comprehensive review. Int. J. Netw. Secur. 19(5), 734–741 (2017)MATH Behal, S., Kumar, K., Sachdeva, M.: Discriminating flash events from DDoS attacks: a comprehensive review. Int. J. Netw. Secur. 19(5), 734–741 (2017)MATH
Metadata
Title
A Blockchain-Based Traceable Certification System
Authors
Po-Yeuan Chang
Min-Shiang Hwang
Chao-Chen Yang
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-76451-1_34

Premium Partner