You are on page 1of 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/342114954

Cloud Based Supply Chain Management System Using Blockchain

Conference Paper · December 2019


DOI: 10.1109/ICEECCOT46775.2019.9114692

CITATIONS READS

2 258

3 authors:

Mani Deep Karumanchi Sheeba Immanuvelrajkumar


Bapatla Engineering College Pondicherry Engineering College
1 PUBLICATION   2 CITATIONS    39 PUBLICATIONS   221 CITATIONS   

SEE PROFILE SEE PROFILE

Pradeep Devaneyan
Sri Venkateshwaraa college of Engineering and Technology Puducherry
32 PUBLICATIONS   101 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Surface coatings and surface engineering View project

Patent View project

All content following this page was uploaded by Sheeba Immanuvelrajkumar on 15 August 2020.

The user has requested enhancement of the downloaded file.


2019 4th International Conference on Electrical, Electronics, Communication, Computer Technologies and Optimization Techniques (ICEECCOT)

Cloud Based Supply Chain Management System


Using Blockchain
Mani Deep Karumanchi J. I. Sheeba S. Pradeep Devaneyan
Department of Computer Science and Department of Computer Science and School of Mechanical and Building Sciences
Engineering Engineering Christ College of Engineering and
Bapatla Engineering College Pondicherry Engineering College Technology
Bapatla-522102, India Puducherry-605014, India Puducherry-605110, India
manideep.karumanchi@becbapatla.ac.in sheeba@pec.edu pr.signs@gmail.com

Abstract— Within a few years, many companies are [4]. However, the use of the cloud-based solution also
adopted by the new Supply Chain Management (SCM) system creates a new type of risk factor for SC [5].
for offering various services for customers. The lack of services
makes a supply chain (SC) to degrade in operational efficiency,
reduction in transaction cost, quality and customer satisfaction.
To take over this aforementioned problems cloud computing
(CC) is one of the best choices in SC by providing a platform,
infrastructure, faster deployment, secure access and software
solution for the entire SC. According to a recent survey, the
storage of data in cloud-based SCM is also a risky due to loss of
stored data, credentials, etc., so we mentioned trust as the main
problem for financial and operational benefits. To provide
trust to the SCM, blockchain is introduced to record
transactions efficiently, providing trust between business
partners, information security, extended visibility, and product
traceability. Furthermore, the determination of this review is,
to improve a deep understanding among the current research
state and on that identifying the future challenges. Thus an
investigation is presented for trust and security approach using
blockchain to develop a new Supply Chain framework in a
cloud environment.

Keywords— Supply chain management, Cloud computing,


Block Chain, Security, and Trust.
Fig. 1. Cloud Computing service models.
I. INTRODUCTION
Due to the disadvantage of the cloud-based SC and its
growth characteristics, lack of trust and security, the
A. Background
researchers continue to research the data transmission
SCM is the art of management consists of a good flow of between companies using cloud services. The most critical
services and provides the right product at an accurate time factor in CSCM is trust because it provides flexibility and
with adequate costs for the customer. It also makes agility to a different organization. By improving trust, the
coordination and association together with channel followers possibility of successful cloud-supply chain relationship, to
namely providers, customers and third-party suppliers reduce the transaction costs with the better performance [5,
[1].The function of SCM model integrates the demand 6]. The trust establishment in SCM is even hard to maintain
management and supply within and between companies [2]. the function of the CSCM, it increases the level of risk. The
But, nowadays the CC occupies an excellent position in the performance of the CSCM also arises security issues [7]. To
IT infrastructure, offers an on-demand computing service overcome these problems, the Block Chain is used with
with high availability, reliability, and scalability [3]. CSCM.
Consequently, many companies are adopting CC technology
for business domains, so supply chain organizations are also Blockchain is a public ledger, programmed to record and
moving towards the CC environment. CC also offers many track everything [8]. It uses cryptography and digital
other services through its service models IaaS, PaaS, and signatures to prove access, authenticity, and identity. It can
SaaS, as shown in Fig. 1. Due to the efficiency of be implemented in many different forms because it is not a
organizations in SC is highly influenced by increased costs. single network. The blockchain with SC leads a tamper
But, the use of CC in SC provides a powerful soul in SCM proof data and increases the end to end visibility to build
that includes a reduction in start-up costs, response times, trust between various parties [9].
integration, delivery times and increased SC visibility. The
growing demand for the cloud-based supply chain is B. Literature of SCM
increasing dramatically. The 2011-2013 research study The function of SCM uses integrated and process-
indicated that the use of SCM in the cloud increases the oriented approach type for managing, controlling, and
cloud sector by 40%. There are some advantages that designing the supply chain [10]. The concurrent area where
facilitate tradeoff, flexibility and onboarding optimization the SCM takes place is transportation, customer service,
forecasting, etc. In the 1980s the SCM was first used as

978-1-7281-3261-7/19/$31.00 ©2019 IEEE 390


logistics management for different business function such as II. PRELIMINARY OF THE SURVEY
manufacturing, sales, distributing, and for purchasing. Later Some of the contribution and the scope of the survey on
an integrated approach is combined to form a firm boundary Cloud-based Supply Chain using Blockchain are listed
between suppliers and customers. On account of seeing the below:
supply chain in the global formulation, it shows that SCM is
the integration of key business process between the end user A. Contribution
and supplier. SCM provide service, information, and product
• Understanding blockchain functionality to meet the
based on adding value for the stakeholder and customers
key challenges of Cloud-based SCM objectives.
[11].
• Emphasize the growing interest of CSCM and
C. Literature growth of SCM in Cloud Computing identify the key research flow across the trust and
In today's environment, companies and industries have security.
started to flexibly outsource their production product. This • Provide a road map of hopeful research
makes the development in supply chain operation and possibilities, opportunities and challenges for
which future research on CSCM trust and security
interaction processes with many parties. But, in today’s
is needed.
environment, SCM makes more difficulties in business areas
for reducing cost, product quality, and accurate real-time
B. Motivation
visibility, therefore a cloud is offered for SCM development.
Cloud computing (CC) is one of the new services adapted by The motivation for this work brings the following
many companies for good services by providing outsourcing question, (i) what measures need to be taken to increase the
software. By adopting cloud-based supply chain trust, availability and integrity strength of the CC in the
management, it offers better alternative support for IT [12]. SCM? (ii) In what way is security guaranteed for different
users in cloud computing using various requirements? (iii) If
This service helps provide integrated interactive processes to
the damage occurs in the security of the CSCM system, what
reduce information inconsistency by neglecting unwanted are the possible solutions to manage? (iv) Did the cloud-
problems. Furthermore, it develops and manages the based SCM detect the integrity, the vulnerability of the
database that contains data relating to different users by system? (v) How can data be secured in the cloud system?
developing an organization to regularly treat hundreds of
thousands of suppliers. But during that cybercrime, According to the Certified Security System Professional
regulation, and fraud have increased because inhabitation and the Common Body of Knowledge, the above questions
expansion problems occur in this CSCM model. To provide are responded by the security architecture based on
a problem less service there needs a lot of trusts using the application security and data security, then an analyzing is
CSCM and security [13]. carried over ten domains to make threats and control
measures over the above questions. Some of the domains
D. Literature growth of Block Chain in Cloud-Based Supply used to measure security and trust are: Network security
Chain Management (CSCM) includes telecommunications, Information security such as
To provide trust and security to users in CSCM, the legal regulations, Physical security includes disaster
blockchain (BC) is introduced in the SC model [14]. By planning and business continuity and finally, Application
combining SC with blockchain provides expected trust in security such as access control and risk management. The
data transparency and accounting in SC networks, by results of this research provide a simple and robust solution
allowing a more flexible value chain. The CSCM can for the security of various CC data and applications in a
provide data protection and reliable management over third supply chain environment.
or fourth logistical parties. It also offers a lower exchange
cost with a trusted contractor to monitor without any third C. Scope of the Survey
party interference. In CSCM, blockchain accurately The Scope of the survey is listed below:
measures the quality of the product during transport and
guarantees a high level of security for storing all the data in • The main scope of this review carries trust in CSCM
the central database. The blockchain terminates a transaction by using the block chain for the transition security
record through the job authentication process when an and data privacy in the cloud.
electronic money lender forms a block by combining • Various activities and techniques conducted in CSCM
transactions on the network [15]. The advantage is, offer a are discussed to address the issues for the future
well organization among the entire SC, a better service to research direction.
the consumer, product address, etc. Finally, it offers a new
decentralized architecture from the intelligent transport III. TAXONOMY OF SCM IN CLOUD COMPUTING
system This section, we discussed the taxonomy of SCM type
The remaining segments are structured as follows: used in a cloud environment. Here the SCM cloud is
Section 2 contains the preliminary of the survey. Section 3 classified based on two dimensions, such as SC
describes the taxonomy of SCM in Cloud Computing. configuration and SC coordination [13]. This survey model
Section 4 analyses the role of the blockchain and the trust has been designed as the cloud-based SCM model, which is
and security issues in cloud-based SCM. Section 5 presents based on to solve the trust and security problem in data
the proposed framework. Finally, Section 6 concludes the transaction recording in the cloud.
overall survey. The CSCM that combines three or more users by
providing cloud services [16]. When the traditional supply
chain is shifted to cloud service, it first identifies the
technical requirements of the companies. Because the

391
activities of the supply chain are migrated with cloud operation. The use of the BC in the supply chain provides a
services. Here the transformation process is accessed by the possible solution to consider the time and location where the
cloud lifecycle that can transform the data and improve actions take place. The role of the CSCM using blockchain
recurrently [17, 18]. It has some process for computing is given in Fig. 3.
technology such as planning/forecasting,
procurement/sourcing, logistics/spare part management are
the most common activities in the CSCM model. The
structure of the CSCM is shown in Fig. 2. Retailer

Manufacture
Distributer

BC

Raw
materials

End user

Wholesalers

Fig. 3. Interaction of Blockchain Distributed Record and Transaction


Fig. 2. Structure of the CSCM model. Technology role in CSCM.

Forecasting and planning: Transactions together with the blockchain are safer,
more efficient, transparent and traceable provided increased
This cloud-based SC system is used to assign the expenses among SC members. Trust is one of the main
transaction data’s, and analyse the basic performance of the things that allows customers to safely use cloud-based
companies. Then schedule the run manufactures and execute supply chain management. The BC function offers great
the statistical forecasts. These are used to improve the customer confidence, allowing you to verify the full path of
organization service level with the supplier network (retailer, the asset through the supply chain. BC system supports the
distributor, and suppliers). identification of fraud prevention across the product and
Sourcing and procurement: fake transaction over the supply chain by using a traceability
mechanism. As a result, the supply chain has increased in
In cloud computing the most commonly cited success cost reduction and efficiency.
metric is sourcing and procurement, used to reduce the
property costs. In CSCM, the tools used in clouds are The key characteristics of the blockchain include:
inherently accessible and collaborative. For these reasons, Digital: All the information of the BC is changed into digital
these keys are used to deal regularly with thousands of form, to eliminate the manual document.
suppliers in the organization.
Distributed: The transaction of the blocks is carried out in
Logistics: distributed form for multi-organization business such as
This cloud-based service provides logistics tracking supply chain.
operations among multiple SC partners, so it is also useful in Decentralized: No need for a central authority, because all
transportation management and warehouse management the nodes carry their own data in the system. Use consensus
system. The main process of this service is order processing, algorithm to maintain data both in a distributed and
route planning, and trade-off between global compliance for decentralized network.
cloud migration.
Immutability: Once the data transaction is entered into the
IV. ROLE OF BLOCK CHAIN IN SCM BC, it is impossible to delete or rollback transaction. If
someone tries to record the transaction it makes provenance
The main objective function that has been taken into assets.
consideration in SCM is cost reduction, good quality
service, high-speed data transfer, flexibility for all services, Consensus: It keeps the fraud transaction out of the BC.
elimination of the risk factor and reliability [19]. But, the Here agreement during a transaction is used to check whether
growing demands of the Internet of Things (IoT) will affect the transaction is valid or not and ensure the integrity of the
SCM's performance. For this reason, the only possible system.
solution is the adaptation of the BC in SCM for their

392
Anonymity: An interaction can be easily generated between Ahram et al. [24] have considered the cybercrime,
the block chains to the user with a generated address. There increase regulation and fraud are inhibiting expansion
is also some alternative blockchain protocol used for problems, and to overcome these issues the BC is used. It
providing highest privacy because the bitcoin cannot provide can enable more agile value chains, Quick integrate with the
good privacy preservation. IoT, and cloud technology. Also, it provides low exchange
costs with reliable monitors without the intervention of third
Traceable: Each of the private and public transaction is parties. The BC consider data protection, professional
digitally signed and time stamped. Therefore it is easy to responsibility. Here the BC is used for Health Chain (HC),
trace and verify the transaction. in this field it offers the optimal solution and update an agree
records of Protect Health Information (PHI). In industries
A. Providing Trust and Security using Block Chain field, it creates a better innovation product and makes the
1) Trust in SCM using the blockchain: In this section, global relationship between the customer and social media,
we analyze what are the current methods used to build mobile, IoT, and cloud technology.
customer trust in CC, also its reason in cloud services. Daniel E. O'Leary [25] have investigated the
To transfer the confidential data to the cloud-based SCM configuration of various BC that is used for the transaction
they need a lot of trusts to store their sensitive information. of information in different range, auditing, and supply chain.
Due to the new ingredient in operational models, complexity This paper argues about the private BC, it will dominate
has increased. This makes trust between supply chain corporate BC uses. This BC analysis information contains
members, accountability and transparency through sentiment analysis and natural language to facilitate the
networking and collaboration [20, 21]. additional use of content.
Trust is one of the basic entity in online selection and Lee JH, Pilkington [26] have analyzed the winds of
transaction together with confidence [22]. The distrust in the currently changing blowing on the global consumer
cloud includes a lack of security, control, reputation, and electronics industries. Here, the revolutionary of BC on
transparency. The various types of models used to handle SCM is also discussed for the potential use of Consumer
trust in cloud-based SCM are Electronic (CE). Normally the CE industries consider multi-
a) Reputation-based trust approach: It is the first trust user buildings, vehicles, etc under this combined impulse of
method, based on the history of interaction, to pick out the cost-cutting strategies of CE and technological innovation
correct services from the cloud. After the selection, it is less the demand and competitions are increased. To solve this
relevant to the user, so there needs solid assurance. problem the BC technology is used because it can ensure the
b) Transparency based trust approach: It is the next traceability of supply chain and transparency.
step performed after performing the first approach. This 2) Security in SCM using the blockchain
approach typically used to gain the information, so that the CSCM security forms the subdomain of network
users can make an idea over cloud service function which is security, information security, computer security, etc. The
suit for their business application and can provide more trust CSCM security is used to control and to protect data and
to cloud. applications of the cloud system [27]. Some of the CC
c) Security based trust approach: This security risks are the loss of intellectual property, loss of
securityapproach makes trust over the assurance of data control of end user, malware infections, etc. CSCM security
would be safe in the hand of cloud services. is not the same as the security software in the cloud system.
The main focus of cloud security is to arrange these three
d) Agreement based trust approach: This approach service delivery models to any of the four deployment cloud
provides added guarantees for users that the cloud services models such as public, private, community and hybrid cloud
would act according to the specified terms. with five important characteristics of the cloud. It aims to
A single solution is not well suitable to address all the achieve a secure cloud system and the same way it’s
trust issue. By integrating BC together with supply chain complicated in today’s environment. Therefore the security
provide a good potential to transform the relationship has many features such as authentication, networks, data
between the network member, increase efficiency and storage, virtualization, data transmissions, and physical
transaction cost [23]. The relationship between the hardware, etc. The cloud computing security can be used in
stakeholders is highly affected by the supply chain. Some of software, hardware, human resources, patch management,
the related work is: filtering, and virtual machines instances provide the security
for cloud environments found in the internal data centers
Kshetri et al. [19] `BC technique is a digitalized, that will be matched. It is essential for helping modern
decentralized and large financial ledger of all cryptocurrency organizations compete and for allowing service providers to
transaction. The function of BC includes supply chain, food, meet the needs of the customer.
and power. These areas are probably valid for BC. It is used
to estimate the accurate quality of each product during the Multiple locations: Cloud Computing provides multiple
data transaction. This decentralized approach is also used for economic resources such as redundancy, disaster recovery,
multi-case studies. The performance of the process is based and independence from failure.
on two-step of function selection of cases and source and Edge networks: CC provides the reliability, quality increase,
characteristics of the data. Initially, the cases are classified in less local network problem for storage, delivery, and
terms of IoT and BC development. The degree of each case is processing.
validated by a high and low degree of various attributes of
interest. This source selection makes the BC deployment in Improved timeliness of response: Cloud providers larger to
financial activities and supply chain. incidents or larger scale networks, which is effective in
malware implementation.

393
Threat management: Small enterprises do not provide developed and owned by its entities to frequently validate
resources to the specialist for security purposes but cloud the updates through a commonly owned ledger. Individual
computing provides better threat management. transaction through the supply chain are noted through a
digital register and numerous dealings are undergone
CC communication is an important technique used for through the formation of a block. Once the predetermined
many network applications. It has many advantages amount of each block is documented and added to the
according to their applications. But it has major security general register. Grouping of numerous blocks in the supply
issues as given below: chain forms a blockchain.
a) Data Security: The proposed system block diagram is presented in
Data is an important input system for wireless Fig. 4.
communication purpose. Data should be secure for
communications. So the data security is an important Data Analysis
process in the encryption standards. Puthal et al. [28] Input BAT
Analysis on
presented a new key exchange method, named as the Data Module
Process Findings
dynamic prime number based security verification
(DPBSV). The main aim of DPBSV is to provide secure,
Fig. 4. Block diagram of proposed system.
efficient, authenticate and fast verification of data streams.
They focused on the basic design based on cryptography and The process for the proposed work flow system is as
similarly consider the prime number generation. Moreover, follows,
it reduces the computation overhead and achieves the
confidentiality, availability, and integrity of the system. • Input Data: In this research, the data comprising
the details regarding case studies of the particular
b) Network Security: organization is obtained from either one of the
A large number of users’ data’s are flow through the sources namely literature search, research
network, so the network should be secure for approach, and the qualitative approach.
communication and prevent leakage of data for encryption. Furthermore, the additional data required for the
Wang et al. [29] have proposed the Random Infection Based analysis is obtained through the participation at
on Modified Benes Network (RIMBEN), an infective blockchain seminars and certain webinars of the
control measures that prevent fault attack in the high company.
performance of the cryptographic security process. The
random function can be provided with the Benes network for • Data Analysis Process: Where five logical steps,
changing the topology. RIMBEN mainly based on the block namely reassembly, compilation, dissociation,
cyphers. Consequently, it does not represent mathematical deduction and conclusion, are analysed in collected
representations, so a loose coupling was formed between data and opinions in the data entry process.
control measures and algorithm. This method cause Compilation of the collected data into one bank
randomization problem based on infective methods. from all sources and that was recognized by
assembling the data. Each bank will be defined in
c) Web Application Security: terms of individual block followed by the formation
Web security is based on network management in cloud of numerous blocks to form a blockchain. In this
computing. SaaS application manages web application research, the smart contract technique is deployed
as a protocol to create a contract amongst the
security for browsing. Because the software service model
individual parties. Furthermore, the trustworthy
provides the software for each users demand. Therefore, the
parameters are also introduced in the research
web browser should be secure for further process. Pokharel process namely integrity, transferability,
et al. [30] proposed the adversary model, which is used for conformability and reliability to evaluate the
the study of security lightweight browsers, which was an trustworthiness in the system.
easy way for accessing a cloud computing system. For this • Block chain Authentication and Trust Module
model, a prototype application model was introduced. (BATM): The use of the blockchain in BATM [31]
Therefore, they used four lightweight browsers for the suggests a new way to authenticate on the network
studies and determined the Dolphin UC browser and CM to store the public keys, peer information and
browser for the storage of encrypted data in the cloud digital signatures in the database. By allowing each
system. component, the network validates the information
about another node. The initial requirement to
V. PROPOSED FRAMEWORK develop a trust model is achieved from social
This proposed work developing an effective model of studies to distinguish relations amongst the people
supply chain technology by integrating the blockchain and society. BATM module comprises with a
technology process along with the strategy of enhancing the human-like knowledge-based trust to develop trust
performance through the collaboration of SC partners. The amongst individual node. This is followed by the
SC defines the conceptual map of the process involved in development of a network node trust evaluation
selling the product manufactured to the end user. The model.
difficulties observed will be in terms of payments between
• Analysis: The performance of the system in this
the vendors, suppliers, and customers which take lots of time
research work is evaluated in terms of the
to process and transfer of product with several geographical
parameter of trust and reputation.
locations. This limitation can be overcome through the
integration of blockchain with supply chain technology.
Blockchain technology comprises the individual protocol

394
VI. CONCLUSION and e-supply chain management: applications for evolving business
2013 (pp. 218-231). IGI Global.
The biggest challenges in Supply Chain Management are [14] Grzybowska K., (2010), creating trust in the supply chain,
providing trust between the trade partners, enormous Grzybowska K., (Ed.), New insights into supply chain, Publishing
involvement of intermediaries, and dynamically changing House of Poznan University of Technology, Poznan.
requirements for the changing demands of the system. The [15] Madhwal Y, Panfilov PB. BLOCKCHAIN AND SUPPLY CHAIN
proposed system eliminates the security-related concerns MANAGEMENT: AIRCRAFTS'PARTS'BUSINESS CASE. Annals
and intermediary’s involvement by integrating Supply Chain of DAAAM & Proceedings. 2017 Jan 1;28.
Management with Blockchain and it deals with changing [16] Xing K, Qian W, Zaman AU. Development of a cloud-based platform
for footprint assessment in green supply chain management. Journal
requirements by using Cloud Computing where one can of cleaner production. 2016 Dec 15;139:191-203.
easily scale up or scale down the resources as per their [17] Lin IC, Hsu HH, Cheng CY. A cloud-based authentication protocol
requirements. As the survey work of this article, we consider for RFID supply chain systems. Journal of Network and Systems
many CSCM solutions and their classifications, and the Management. 2015 Oct 1;23(4):978-97.
trend solution of BC is discussed. Furthermore, it is able to [18] Kasemsap K. The role of cloud computing in global supply chain.
measure the current CSCM techniques and Block Chain is InEnterprise management strategies in the era of cloud computing
considering more metrics for their assessments. 2015 (pp. 192-219). IGI Global.
[19] Kshetri, N., “Blockchain’s roles in meeting key supply chain
REFERENCES management objectives”, International Journal of Information
Management, elsvier, vol. 39, 2018, pp. 80–89.
[1] Stadtler H. Supply chain management: An overview. In Supply chain
management and advanced planning 2015 (pp. 3-28). Springer, Berlin, [20] Pearson S, Benameur A. Privacy, security and trust issues arising
Heidelberg. from cloud computing. In2010 IEEE Second International Conference
on Cloud Computing Technology and Science 2010 Nov 30 (pp. 693-
[2] Wang G, Gunasekaran A, Ngai EW, Papadopoulos T. Big data 702). IEEE.
analytics in logistics and supply chain management: Certain
investigations for research and applications. International Journal of [21] Ko RK, Lee BS, Pearson S. Towards achieving accountability,
Production Economics. 2016 Jun 1;176:98-110. auditability and trust in cloud computing. InInternational Conference
on Advances in Computing and Communications 2011 Jul 22 (pp.
[3] Chen J., & W. Ma Yan, (2011), The Research of Supply Chain 432-444). Springer, Berlin, Heidelberg.
Information Collaboration Based on Cloud Computing, Procedia
Environmental Sciences, 10, pp. 875-880. [22] Shaikh R, Sasikumar M. Trust model for measuring security strength
of cloud computing service. Procedia Computer Science. 2015 Jan
[4] Kozlenkova IV, Hult GT, Lund DJ, Mena JA, Kekec P. The role of 1;45:380-9.
marketing channels in supply chain management. Journal of Retailing.
2015 Dec 1;91(4):586-609. [23] Brinkhoff A, Özer Ö, Sargut G. All you need is trust? An examination
of inter‐organizational supply chain projects. Production and
[5] Pearson S. Privacy, security and trust in cloud computing. InPrivacy operations management. 2015 Feb;24(2):181-200.
and security for cloud computing 2013 (pp. 3-42). Springer, London.
[24] Ahram, T., Sargolzaei, A., Sargolzaei, S., Daniels, J., Amaba, B.,
[6] Martucci LA, Zuccato A, Smeets B, Habib SM, Johansson T, 2017, “Blockchain technology innovations”, In: 2017 IEEE
Shahmehri N. Privacy, security and trust in cloud computing: The Technology and Engineering Management Society Conference,
perspective of the telecommunication industry. In2012 9th TEMSCON 2017, pp. 137–141.
International Conference on Ubiquitous Intelligence and Computing
and 9th International Conference on Autonomic and Trusted [25] O’Leary, D.E., 2017, “Configuring blockchain architectures for
Computing 2012 Sep 4 (pp. 627-632). IEEE. transaction information in blockchain consortiums: the case of
accounting and supply chain systems”, Intelligent Syst. Acc. Finance
[7] Catteddu D. Cloud Computing: benefits, risks and recommendations Manage. 24 (4), 138–147.
for information security. InIberic Web Application Security
Conference 2009 Dec 10 (pp. 17-17). Springer, Berlin, Heidelberg. [26] Lee, J.H., Pilkington, M., 2017, “How the blockchain revolution will
reshape the consumer electronics industry”. IEEE Consumer Electr.
[8] Kosba A, Miller A, Shi E, Wen Z, Papamanthou C. Hawk: The Mag. 6 (3), 19–23.
blockchain model of cryptography and privacy-preserving smart
contracts. In2016 IEEE symposium on security and privacy (SP) 2016 [27] Ramgovind S, Eloff MM, Smith E. 2010, "The management of
May 22 (pp. 839-858). IEEE. security in cloud computing". In Information Security for South
Africa (ISSA), IEEE pp. 1-7.
[9] Kim HM, Laskowski M. Toward an ontology‐driven blockchain
design for supply‐chain provenance. Intelligent Systems in [28] Puthal D, Nepal S, Ranjan R, Chen J. 2017, "A dynamic prime
Accounting, Finance and Management. 2018 Jan;25(1):18-27. number based efficient security mechanism for big sensing data
streams". Journal of Computer and System Sciences. vol.83, no.1,
[10] Aslam T, Amos HN. Multi-objective optimization for supply chain pp.22-42.
management: A literature review and new development. In2010 8th
International Conference on Supply Chain Management and [29] Wang B, Liu L, Deng C, Zhu M, Yin S, Zhou Z, Wei S. 2017 ,
Information 2010 Oct 6 (pp. 1-8). IEEE. "Exploration of Benes Network in Cryptographic Processors: A
Random Infection Countermeasure for Block Ciphers Against Fault
[11] Manuj I, Mentzer JT. Global supply chain risk management. Journal Attacks". IEEE Transactions on Information Forensics and Security.
of business logistics. 2008 Mar;29(1):133-55. vol.12, no.2, pp.309-22.
[12] Lindner M, Galán F, Chapman C, Clayman S, Henriksson D, Elmroth [30] Pokharel S, Choo KK, Liu J. 2017, "Mobile cloud security: An
E. The cloud supply chain: A framework for information, monitoring, adversary model for lightweight browser security". Computer
accounting and billing. In2nd International ICST Conference on Standards & Interfaces. vol.49, pp.71-8.
Cloud Computing (CloudComp 2010) 2010 Oct.
[31] Moinet, A., Darties, B., & Baril, J. (2017). "Blockchain based trust &
[13] Toka A, Aivazidou E, Antoniou A, Arvanitopoulos-Darginis K. Cloud authentication for decentralized sensor networks". ArXiv,
computing in supply chain management: an overview. InE-logistics abs/1706.01730.

395

View publication stats

You might also like