You are on page 1of 11

A NOVEL DECENTERIZLED PRODUCT VERIFICATION USING

BLOCKCHAIN TECHNOLOGY
SUBIRAMANIYAN S D1, MOHAMED FAYAS M P2, SELVA BHARATHI S M3, SASIKALA K4, R. RESHMA4, S. P.
SASIREKHA5
UG Scholar, Department of Computer Science and Engineering1, 2, 3,
Professor, Department of Computer Science and Engineering4
Assistant Professor, Department of Computer Science and Engineering 5,6
Karpagam Academy of Higher Education, Coimbatore.  1, 2, 3 ,4,5
Corresponding Mailid: emailtosasi@gmail.com

ABSTRACT:

A blockchain is a distributed database that serves as a public ledger of all digital events and transactions executed
and shared among participating parties. The consensus from a majority of system participants verifies each
transaction in the public ledger, and once recorded, the information cannot be erased. The blockchain contains a
verifiable record of every transaction ever made, making it similar to a cookie jar in a crowded marketplace
compared to a secluded location. The product verification system utilizes the Ethereum blockchain to deploy smart
contracts in blocks. There are two users: manufacturers and customers. Manufacturers can save the product
information, including product price, name, manufacturing date, location, and expiry date, in the blockchain as a
smart contract. This information can be saved in QR codes and NFC tags that act as digital invoices for the
product. Customers can confirm product details by scanning the QR code or NFC tag. Smart contracts are built
using Solidity, and the deployment is completed using the Truffle blockchain deployment tool. Firebase handles
authentication capabilities, allowing analytics on the number of authenticated customers.

Keywords-Supplychain; Blockchain; Hyperledger Fabric; Hyperledger Composer; Hyperledger Playground;

1
I. INTRODUCTION: to track spamming behavior indications of
reviewers.
This is a key component in the next generation
of information technology. A product may be II. EXISTING SYSTEM:
anything from a mobile device, movie, or
restaurant to an internet service, and product The current structure encourages certain
reviews include the product's attributes as well merchants to post review spam in order to
as its star rating.Deep learning requires an deceive customers. It has been stated that 80%
industrial mobile network for industrial of buyers change their minds after reading bad
manufacturing. It ensures the regular operation evaluations. Given the presence of spam
of machinery and the standardization of indicators, machine learning algorithms have
industrial output. But spammers can use this been used for spam detection via a stream of
feature to harm others and influence industrial messages in various formats. When spam terms
production. Spammers are users who solely are not identified more properly, they are
spread spam, such as links to viruses and classified as ham words, and certain ham words
adverts. Spammers have formed organizations in contribute to spam. To eliminate unsolicited
order to maximize their benefits as mobile comments, the present system employs the Spam
network membership has grown. This has technique. Spam comment, also known as
created confusion and significant losses in unsolicited bulk communication, is the practice
industrial productivity. It is different. To solve of sending unwanted comments, typically with
this issue, this study presents a Spammer commercial content, to an indiscriminate group
Identification method for industrial mobile of receivers in high quantities. Therefore, there
networks based on NLP and MICHINE is no way to prevent the undesirable in the Spam
LEARING. It identifies spammers intelligently approach.
without depending on flexible and untrustworthy III. PROPOSED SYSTEM:
connections. It mixes data presentation, where
NLP is used to identify spam and gammon in
each user node is classified into one class
comments and postings. To process the term,
throughout the model's creation phase. Social
tokenization and stemming are employed. Stop
spam is increasingly impacting personal words and punctuation are also employed in the
communication networks such as Facebook, suggested approach to get more accurate results.
Pinterest, and Twitter. According to a study This will aid in the detection of spam comments
conducted by the Web-based life security and posts. We utilise three separate machine
organization, online networking stages learning algorithms to detect spam users. Which
experienced a significant increase in social spam has the most accuracy: logistic regression,
during the first half of 2013. Internet social random forest, and nave bayes. We employ a
platforms, such as Twitter, empower individuals classification (spammer detection) model based
to independently produce tweets and consume on NLP and MICHINE LEARING.
large amounts of material, regardless of their
BLOCK DIAGRAM:
characteristics. According to a report, while the
amount of data created is used by individuals
and companies to achieve a competitive edge, a
significant portion of the data is generated by
spam or fraudulent users. To educate the user on
the difference between phony and relevant
comments and to recognize them. To categories
that remark, If it's link spam or not. To make
purchasing decisions for products. Earlier
research relied on review text information to
determine if a review was false or not, but in
order to detect opinion spammers, it is required

2
Figure 1: Data Flow Diagram of the Proposed deployment. We will also implement the
System modules required for product registration, QR
This proposed system incorporates both system code and NFC tag generation, product
design and system study with UML diagrams verification, analytics, user management, and
including use case, class, data flow diagram, and push notifications.
input and 15 output designs of the work
Testing:
MODULES: In this phase, we will test the product
verification system to ensure that it meets the
1. Dataset Loading functional and non-functional requirements. We
2. Preprocessing will perform unit testing, integration testing, and
system testing to identify and fix any bugs or
3. Feature Selection issues.
4. Feature extraction and Feature engineering
Deployment:
5. N Grams
6. Analyzer In this phase, we will deploy the product
verification system on the Google Play Store and
7. Vocabulary Apple App Store. We will also provide
8. Binary documentation and user manuals to guide users
on how to use the system.
9. Machine Learning
Maintenance:
METHODOLOGY
In this phase, we will provide maintenance and
Requirement Analysis: support for the product verification system. This
includes bug fixes, feature enhancements, and
In this phase, we will identify the requirements system updates.
and functionalities of the product verification
system. This will include the features needed for Input attributes
product registration, verification, authentication, 1. Product name:
smart contract deployment, and analytics. We This attribute will be used to identify the product
will also gather feedback from potential users to being registered and verified in the system.
ensure that the system meets their needs.
2. Manufacturer: This attribute will contain the
System Design: name of the manufacturer who produced the
product.
In this phase, we will design the system
architecture and user interface for the product 3. Manufacturing date: This attribute will
verification system. We will create mockups and contain the date on which the product was
prototypes to visualize the system and gather manufactured.
feedback from stakeholders.
4. Expiry date: This attribute will contain the
Development: date on which the product will expire.

In this phase, we will develop the product 5. Price: This attribute will contain the price of
verification system using Flutter, a cross- the product.
platform mobile application development
framework. We will use Firebase for user
authentication and Truffle for smart contract

3
5. Manufacturing location: This attribute will The following requirements are needed to carry
contain the location where the product was out this development:
manufactured.
SOFTWARE HARDWARE REQUIREMENTS:
6. QR code/NFC tag: This attribute will be used
to store the unique code that will be generated Software:
for each product. The code will be used for
product verification and authentication. Language Used: Dart, Solidity

7. User ID: This attribute will be used to Libraries Used: Dart Material Library
identify the user who is registering or verifying
the product. Frameworks Used: Flutter

8. User authentication: This attribute will be Database Used: Firebase


used to authenticate the user who is registering
or verifying the product. User authentication will Blockchain deployment: Truffle, Ganache
be done using Firebase authentication.
Hardware Requirements: NFC Tag
9. Smart contract: This attribute will be used to
store the smart contract that will be deployed for
each product. The smart contract will be used for
product verification and authentication.

DESIGNING A DYNAMIC USER


INTERFACE
In our Decentralized product verification
application development, the modeling and the
standardized notations allow to express complex
ideas in a precise way, facilitating the
communication among the project participants
that generally have different technical and
cultural knowledge
.
MVC architecture has had wide acceptance for Figure 2: Authentication Module
corporation software development. It plans to Figure 2illustrates the use case diagram of our
divide the system in three different layers that are product verification application which shows the
in charge of interface control logic and data relationship between the manufacturer and the
access, this facilitates the maintenance and client .
evolution of systems according to the
independence of the present classes in each layer.
With the purpose of illustrating a Successful
application built under MVC, in this work we
introduce different phases of analysis, design and
implementation of a database and mobile
application.

III. RESULTS

4
Figure 5: Ganache Blockchain Deployment
User Interface
The above figure describes the level 0 data flow
diagram also known as a context diagram, shows
how product data is stored.
Figure 3: Manufacturer Result Module
Figure 3 illustrates the use case diagram of our
product verification application which shows the
relationship between the manufacturer and the
client and their relationship with the product
data.

mentioned in this
paper. It is clear
that the results
from Table (3),
provided high
Figure 4: Firebase Authentication Screen
Backend side
Figure 4 comprises of the User interface and
results due to the
how a block initiate a transaction, in the
blockchain, how the blockchain verifies the classification
accuracy
transaction and creates a block and how the
block is appended to the blockchain through our
application.
classifiers with the
important features
selected by the

5
feature selection accurate and
algorithms effective detection
(Correlation to provide
coefficient) appropriate health
improved result care. The
compared to the traditional
model with methods which
related works and have been
converting proposed and
categorical data to performed
numerical data previously in
using label identifying the
encoding affected person
technology. spend a long time
7. Conclusion and costly, so data
ASD is a mining techniques
neurological were used as an
disorder and long- alternative to the
term. ASD needs traditional
early, rapid, methods which are
6
working on a short Vector Machine
time and lower SVM) were
cost applied to
patient diagnosis. perform early
Several studies in predicting ASD
this field has been among toddlers
performed and children using
successfully to AQ-10 datasets
predict ASD, but for toddlers and
these children. The
studies still did not results show high
reach a high performance in
performance in term of accuracy
less costly time. In compared with
this paper, data other related works
mining techniques
(Random Forest,
Naïve Bayes,
Decision tree J48, mentioned in this
and Support paper. It is clear
7
that the results using label
from Table (3), encoding
provided high technology.
results due to the 7. Conclusion
classification ASD is a
accuracy neurological
classifiers with the disorder and long-
important features term. ASD needs
selected by the early, rapid,
feature selection accurate and
algorithms effective detection
(Correlation to provide
coefficient) appropriate health
improved result care. The
compared to the traditional
model with methods which
related works and have been
converting proposed and
categorical data to performed
numerical data
8
previously in studies still did not
identifying the reach a high
affected person performance in
spend a long time less costly time. In
and costly, so data this paper, data
mining techniques mining techniques
were used as an (Random Forest,
alternative to the Naïve Bayes,
traditional Decision tree J48,
methods which are and Support
working on a short Vector Machine
time and lower SVM) were
cost applied to
patient diagnosis. perform early
Several studies in predicting ASD
this field has been among toddlers
performed and children using
successfully to AQ-10 datasets
predict ASD, but for toddlers and
these
9
children. The
REFERNCES

1. G. Baralla, A. Pinna, and G. Corrias, ‘‘Ensure


results show high traceability in European food supply chain by
using a blockchain system,’’ in Proc. IEEE/ACM

performance in
2nd Int. Workshop Emerg. Trends Softw. Eng.
Blockchain (WETSEB), May 2019, pp. 40–47.

term of accuracy 2. Marimuthu, Mohanapriya & Rajendran,


Santhosh & Radhakrishnan, Reshma &
Rengarajan, Kalpana & Khurram, Shahzada &
compared with Sayed, Abdelaty & Shafiq, Muhammad. (2023).
Implementation of VLSI on Signal Processing-

other related works Based Digital Architecture Using AES


Algorithm. Computers, Materials & Continua.
74. 4729-4745. 10.32604/cmc.2023.033020.
IV. CONCLUSION
3. E. Oh and S.-Y. Son, ‘‘Peer-to-peer energy
In conclusion, the development of a mobile transaction mechanisms considering fairness in
application for product verification using QR smart energy communities,’’ IEEE Access, vol.
code and NFC tags in supply chain management 8, pp. 216055–216068, 2020, Doi:
has the potential to significantly reduce fraud 10.1109/ACCESS.2020.3041838.
and product tampering in the supply chain. The
proposed system is designed to allow 4. C. Santiago, S. Ren, C. Lee, and M. Ryu,
manufacturers to register and store product ‘‘Concordia: A streamlined consensus protocol
information such as product name, price, for blockchain networks,’’ IEEE Access, vol. 9,
manufacturing date, expiry date, and pp. 13173–13185, 2021, Doi:
manufacturing location in a secure and tamper- 10.1109/ACCESS.2021.3051796.
proof blockchain system. Customers will be able
to verify the authenticity of the product by 5. Senthamil, M., Mohideen, K. S., Saran, S., &
scanning the QR code or NFC tag on the product Reshma, R. (2022, December). A State-of-the-
and accessing the information stored in the Art Approach for Securing Online Auction
blockchain. The proposed system has several System. In 2022 6th International Conference
advantages over existing systems, including on Electronics, Communication and Aerospace
increased security, reduced risk of fraud and Technology (pp. 658-663). IEEE.
tampering, and improved transparency in the
supply chain. The use of smart contracts in the 6. S. Leonardos, D. Reijsbergen, and G.
system ensures that transactions are transparent, Piliouras, ‘‘PREStO: A systematic framework
secure, and tamper-proof, which is crucial in a for blockchain consensus protocols,’’ IEEE
supply chain where trust is often lacking. In Trans. Eng. Manag., vol. 67, no. 4, pp. 1028–
addition, the proposed system has several 1044, Nov. 2020, doi:
potential use cases beyond product verification 10.1109/TEM.2020.2981286
in supply chain management. For example, it
could be used in the healthcare industry to verify 7. A. Ometov, Y. Bardinova, A. Afanasyeva, P.
the authenticity of pharmaceuticals or medical Masek, K. Zhidanov, S. Vanurin, M. Sayfullin,
devices, or in the art industry to verify the V. Shubina, M. Komarov, and S. Bezzateev,
authenticity of artwork. Overall, the proposed ‘‘An overview on blockchain for smartphones:
system has the potential to revolutionize supply State-of-the-art, consensus, implementation,
chain management and improve trust and challenges and future trends,’’ IEEE Access,
transparency in a wide range of industries. vol. 8, pp. 103994–104015, 2020

10
8. I. A. Omar, R. Jayaraman, M. S. Debe, K. defensive overview for double-spend and selfish
Salah, I. Yaqoob, and M. Omar, ‘‘Automating mining attacks: A systematic approach,’’ IEEE
procurement contracts in the healthcare supply Access, vol. 9, pp. 3838–3857, 2021, doi:
chain using blockchain smart contracts,’’ IEEE 10.1109/ACCESS.2020.3047365.
Access, vol. 9, pp. 37397–37409, 2021, doi:
10.1109/ACCESS.2021.3062471.

9.W. Xiong and L. Xiong, ‘‘Smart contract-


based data trading mode using blockchain and
machine learning,’’ IEEE Access, vol. 7, pp.
102331–102344, 2019, doi:
10.1109/ACCESS.2019.2928325.

10. F. A. Aponte-Novoa, A. L. S. Orozco, R.


Villanueva-Polanco, and P. Wightman, ‘‘The
51% attack on blockchains: A mining behavior
study,’’ IEEE Access, vol. 9, pp. 140549–
140564, 2021, doi:
10.1109/ACCESS.2021.3119291.

11. T. Ahmad, D. Zhang, C. Huang, H. Zhang,


N. Dai, Y. Song, and H. Chen, ‘‘Artificial
intelligence in sustainable energy industry:
Status quo, challenges and opportunities,’’ J.
Cleaner Prod., vol. 289, Mar. 2021, Art. no.
125834, doi: 10.1016/j.jclepro.2021.125834.

12. J. Yang, A. Paudel, H. B. Gooi, and H. D.


Nguyen, ‘‘A proof-ofstake public blockchain
based pricing scheme for peer-to-peer energy
trading,’’ Appl. Energy, vol. 298, Sep. 2021,
Art. no. 117154, doi:
10.1016/j.apenergy.2021.117154.

13. Sasirekha, S. P., Reshma, R., Lallithamani,


P., Sundareswari, K., & Dhanapal, R. (2022).
Improving Object Detection Performance
Invanet Using Deep Learning. Mathematical
Statistician and Engineering
Applications, 71(3s2), 99-110.

14. J. Xie, H. Tang, T. Huang, F. R. Yu, R. Xie,


J. Liu, and Y. Liu, ‘‘A survey of blockchain
technology applied to smart cities: Research
issues and challenges,’’ IEEE Commun. Surveys
Tuts., vol. 21, no. 3, pp. 2794–2830, Jul. 2019,
doi: 10.1109/COMST.2019.2899617.

15. K. Nicolas, S. Member, Y. Wang, G. C.


Giakos, and B. Wei, ‘‘Blockchain system

11

You might also like