Downloads: 4 | Views: 188 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Computer Science & Engineering | India | Volume 10 Issue 6, June 2021 | Popularity: 5.2 / 10
Secure Methods for Supplychain Management to Protect from Attacks in Blockchain
B. Ratnakanth, K. Venkata Ramana
Abstract: The expatiation of increase in demand variations in today?s globalized supply chain economy is disruptive, costly which is every supply chain management wants to reduce. The traditional supply chain management system?s attribute to high complex centralized organizational structures, increased costs throughout Supply Chain, Poor system design; need for improved speed, quality and service. The speed, expenditure and levels of security employed in traditional supply chain management model depends on few hands in the organizational committee. Hence, this dynamic behaviour of customers indicates the need for a secure, decentralized and a trusted environment to function with. Decentralization improves the performance of Supply Chain in its way of distributing its decisions on financial aspects. The most erupting technology - Blockchain provides an efficient and viable solutions to the aforementioned hurdles that are restricting today?s supply chain. Through blockchain, massive networks of decentralized autonomous individuals and organizations can grow and operate seamlessly within a decentralized, distributed operating platform. The problems that arise in blockchain can be like ? changing fair data to malicious data that is collected from web pages, Synchronization of information and data in the network, disruption to services etc. In this paper an efficient top-down method is employed for testing various participating entities and modules in this Supply Chain Model. An in-depth analysis for the root-cause of different kinds of threats, vulnerabilities and risks is conducted on the supply chain management system as simulated in various environments.
Keywords: Supply chain management, Blockchain, Attacks, Secure methods, JVM environment
Edition: Volume 10 Issue 6, June 2021
Pages: 1240 - 1249
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 516 - 519I-Vote Android Application for Internet-Voting
Rahul Kumar, Hima Saxena, Dr. Suman Sharma
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022
Pages: 629 - 634A Face Spoof Detection using Feature Extraction and SVM
Lovely Pal, Renuka Singh
Downloads: 0
Review Papers, Computer Science & Engineering, India, Volume 12 Issue 6, June 2023
Pages: 899 - 902Pharmaceutical Supply Chain Using Blockchain Technology
Shivangi Sharma, Meenu
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 581 - 585Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya, R. Sathya