Professional Documents
Culture Documents
OF
BACHELOR OF ENGINEERING (COMPUTER ENGINEERING)
SUBMITTED BY
i
CERTIFICATE
This is to certify that the project report entitles
“Decentralised OF ELECTRONIC HEALTH
RECORD USING BLOCKCHAIN TECHNOLOGY”
Submitted by
is a bonafide student of this institute and the work has been carried out by him/her
under the supervision of Dr.Naresh Thoutam and it is approved for the partial
fulfillment of the requirement of Savitribai Phule Pune University, for the award of the
degrees of Bachelor of Engineering (Computer Engineering).
VIVEK PATIL
KARAN MAHAJAN
KIRAN MAHAJAN
TEJASWINI PATIL
iii
ABSTRACT
In this work the functioning of blockchain technology and the possible use or impact it
may have on current SCM Registry systems and the role of legal experts are described.
The spread of blockchains is bad for anyone in the trust business government
authorities that are deemed sufficiently trustworthy to handle transactions. The
proposed system maintains the blockchain base transaction management SCM records
and automatic data recovery from third party attacks, the system also address the issues
of data inconsistency during the transaction. The main objectives were to define how
blockchain can change the supply chain and logistics industry. The typical challenges in
these spheres were considered and the main key features of blockchain that can solve
these difficulties were marked. In survey we were find out possible challenges or
benefits of blockchain based applications. Considering the current situation in the
supply chain and logistics industry, this thesis can empower different businesses to start
working with the companies that are creating blockchain-based applications.
TABLE OF CONTENTS
List of Figures..........................................................................................................viii
List of Tables.............................................................................................................ix
1 INTRODUCTION..................................................................................................... 1
1.1 Overview............................................................................................................... 1
1.2 Motivation.............................................................................................................2
1.3 Problem Definition and Objectives......................................................................2
1.4 Project Scope and Limitations.............................................................................3
1.5 Methodologies of Problem Solving......................................................................4
2 LITERATURE SURVEY........................................................................................... 5
3 SOFTWARE REQUIREMENTS SPECIFICATION...................................................8
3.1 Assumptions and Dependencies..........................................................................8
3.2 Functional Requirements.....................................................................................8
3.2.1 System Feature 1............................................................................................... 8
3.2.2 System Feature 2............................................................................................. 10
3.3 External Interface Requirements.......................................................................10
3.3.1 User Interfaces.................................................................................................10
3.3.2 Hardware Interfaces........................................................................................11
3.3.3 Software Interfaces..........................................................................................11
3.3.4 Communication Interfaces..............................................................................11
3.4 Non Functional Requirements...........................................................................11
3.4.1 Performance Requirements............................................................................11
3.4.2 Safety Requirements........................................................................................12
3.4.3 Security Requirements....................................................................................12
3.4.4 Software Quality Attributes............................................................................12
3.5 System Requirements.........................................................................................12
3.5.1 Database Requirements..................................................................................12
3.5.2 Software Requirements(Platform Choice).....................................................13
3.5.3 Hardware Requirements.................................................................................13
v
3.6 Analysis Models: SDLC Model to be applied......................................................13
3.7 System Implementation Plan.............................................................................14
4 SYSTEM DESIGN...................................................................................................16
4.1 System Architecture...........................................................................................16
4.2 Data Flow Diagrams............................................................................................17
4.3 UML Diagrams.........................................................Error! Bookmark not defined.
5 PROJECT PLAN..................................................................................................... 24
5.1 Project Estimate..................................................................................................24
5.1.1 Reconciled Estimates.......................................................................................24
5.1.2 Project Resources............................................................................................24
5.2 Risk Management............................................................................................... 24
5.2.1 Risk Identification............................................................................................25
5.2.2 Risk Analysis....................................................................................................25
5.2.3 Overview of Risk Mitigation, Monitoring, Management................................25
5.3 Project Schedule................................................................................................. 26
5.3.1 Project Task Set................................................................................................26
5.3.2 Timeline Chart................................................................................................. 27
5.4 Team Organization.............................................................................................28
5.4.1 Team Structure................................................................................................28
5.4.2 Management Reporting and Communication................................................28
6 PROJECT IMPLEMENTATION.............................................................................29
6.1 Overview of Project Modules.............................................................................29
6.2 Tools and Technologies Used.............................................................................30
6.3 Algorithm Details................................................................................................30
6.3.1 Algorithm 1: Hash Generation........................................................................30
6.3.2 Algorithm 2: Protocol for Peer Verification...................................................30
6.3.3 Algorithms 3: Mining Algorithm for valid hash creation...............................31
7 SOFTWARE TESTING...........................................................................................32
7.1 Principle of Testing:............................................................................................32
7.2 Testing scope:..................................................................................................... 32
7.2.1 Major Functionalities:......................................................................................32
7.3 Basics of Software Testing.................................................................................33
7.3.1 White-box testing:........................................................................................... 33
7.3.2 Black box Testing:............................................................................................33
7.3.3 Unit testing:......................................................................................................34
7.3.4 Integration testing:..........................................................................................34
7.3.5 Validation testing:............................................................................................34
7.3.6 System Testing:................................................................................................35
7.4 Test Strategy....................................................................................................... 35
7.4.1 Testing Process:...............................................................................................36
7.4.2 Functionality testing and non-functional testing:..........................................36
7.5 Test Cases and Results....................................................................................... 37
7.5.1 Test cases of system........................................................................................37
8 RESULTS................................................................................................................39
8.1 Screenshots.........................................................................................................39
8.1.1 Admin Login Page............................................................................................39
8.1.2 Admin Add Medicines Page.............................................................................40
8.1.3 Admin Accepts Order Page..............................................................................41
8.1.4 Distributor Register Page................................................................................42
8.1.5 Distributor Login Page....................................................................................43
8.1.6 Distributor Order Page....................................................................................44
8.1.7 Distributor Order Next Page...........................................................................45
8.1.8 Distributor QR Code Upload Page...................................................................46
8.1.9 Distributor Save Medicine Page......................................................................47
8.1.10 Distributor Accept Request Page..................................................................48
8.1.11 User Register Page.........................................................................................49
8.1.12 User Login Page.............................................................................................50
8.1.13 User Order Page.............................................................................................51
vii
8.1.14 User Order Next Page....................................................................................52
8.1.15 User QR Code Upload Page............................................................................53
8.1.16 User Save Medicine Page...............................................................................54
9 CONCLUSIONS AND FUTURE WORK.................................................................55
9.1 Conclusion...........................................................................................................55
9.2 Future work........................................................................................................ 55
9.3 Applications........................................................................................................ 55
Appendix A...............................................................................................................56
References............................................................................................................... 57
List of Figures
4.1 System Architecture. . . . . . . . . . . . . . . . . . . . . . . . . . 18
4.2 DFD Level Zero Diagram. . . . . . . . . . . . . . . . . . . . . . . 19
4.3 DFD Multi Level Diagram. . . . . . . . . . . . . . . . . . . . . . 20
4.4 Class Diagram. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
4.5 State Diagram. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
4.6 Activity Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
4.7 Sequence Diagram. . . . . . . . . . . . . . . . . . . . . . . . . . . 24
4.8 Use Case Diagram. . . . . . . . . . . . . . . . . . . . . . . . . . . 25
4.9 Entity Relationship Diagram. . . . . . . . . . . . . . . . . . . . . 26
7.1Testing view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
8.1 Admin Login Page. . . . . . . . . . . . . . . . . . . . . . . . . . . 45
8.2 Admin Add Medicines Page . . . . . . . . . . . . . . . . . . . . . . 46
8.3 Admin Accept Order Page . . . . . . . . . . . . . . . . . . . . . . . 47
8.4 Distributor Register Page. . . . . . . . . . . . . . . . . . . . . . . 48
8.5 Distributor Login Page . . . . . . . . . . . . . . . . . . . . . . . . . 49
8.6 User Distributor Page. . . . . . . . . . . . . . . . . . . . . . . . . 50
8.7 Distributor Order Next Page . . . . . . . . . . . . . . . . . . . . . . 51
8.8 Distributor QR Code Upload Page. . . . . . . . . . . . . . . . . . 52
8.9 Distributor Save Medicine Page . . . . . . . . . . . . . . . . . . . . 53
8.10 Distributor Accept Request Page. . . . . . . . . . . . . . . . . . . 54
8.11 User Register Page . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
8.12 User Login Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
8.13 User Order Page. . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
8.14 User Order Next Page. . . . . . . . . . . . . . . . . . . . . . . . . 58
8.15 User QR Code Upload Page . . . . . . . . . . . . . . . . . . . . . . 59
8.16 User Save Medicine Page . . . . . . . . . . . . . . . . . . . . . . . . 60
List of Tables
3.1 Project Schedule. . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
5.1 Risk Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
5.2 Risk Table1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
5.3 Risk Table2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
5.4 Project Schedule. . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
5.5 Team Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
ix
CHAPTER 1
INTRODUCTION
1.1 Overview
1. The world is changing incredibly fast, and we are not all aware of it.
Problem Definition
To design and developed a system for supply chain management using blockchain
technology, in this work system carried out three different modules like suppler,
vendor and admin as well. Each transaction has stored into the blockchain which
eliminate all network data attacks in P2P environment for health care systems.
Objectives
• To develop system for supply chain management for medicine using custom
blockchain.
• To design new hash generation, smart contract and mining approach for
proposed blockchain.
2
1.4 Project Scope and Limitations
Scope
Blockchain, the digital ledger technology that can securely maintain continuously
growing lists of data records and transactions, has the power to potentially
transform medicine and health care supply chain management, according to
industry experts.By simplifying and expediting the way the transaction industry
processes data in such areas as revenue cycle management, health data
interoperability and supply chain validation, blockchain has the power to
dramatically reduce backoffice data input and maintenance costs and improve
data accuracy and security.
Limitations
If someone has more than 51% computing power, then he/she can find Nonce
value quicker than others, means he/she has authority to decide which block is
permissible. What it can do is:
A majority attack was more feasible in the past when most transactions were
worth significantly more than the block reward and when the network hash rate
was much lower and prone to reorganization with the advent of new mining
technologies
1.5 Methodologies of Problem Solving
A System has represented by a 5-different phases, each phase works with own
dependency System S = (Q,P,δ,q0,F) where
All (n) data nodes will return 1 when each have the same blockchain. Q = initial
transactional data with genesis block
P
= {SHA-256, Consensus-Val, Mining}
δ = Validate all server(S1 ⊆ S2⊆S3⊆S4) all server validation process q0
= Initial transaction T[0]
F = {Commit Trans, Get-History-Record}
State ⇒
1: if all chains are validate or same
0: if any t(n) server consist the invalid chain
4
CHAPTER 2
LITERATURE SURVEY
According to [1] a basic IoT Blockchain fusion model with four layers which
contains different types of IoT devices. Distributed file system is considered in
the model to store huge amount of IoT data. Then, a case study for
blockchainbased IoT application, a Machine-to-Machine(M2M) autonomous
trading system, is proposed on the Ethereum blockchain. We build smart
contracts for device registration, data storage, service provision and fair
payment, and the proof-ofconcept is implemented using two Raspberry Pis to
interact with smart contracts. The proposed system verifies that blockchain
could improve IoT applications in transparency, traceability and security.
According to [5] a gesture-based secure interaction system with smart home IoT
health devices to support elderly people or people with special needs. The
framework uses a decentralized blockchain consensus for storing the smart home
IoT health data and user identities. The framework leverages off-chain solution for
storing raw multimedia IoT sensory payload and gesture data. Using our proposed
health monitoring framework, a smart homeowner or service provider can create a
cyber-physical space with a secure digital wallet for each human resident and
authorized IoT health devices. Multiple authorized home residents can interact
with the IoTbased smart home monitoring sensors, carry out user and IoT health
sensory media registration, and transfer transactional values via secure tokens, as
well as raw IoT health data payload through gesture.
According to [6] a scheme to generate seed needed for key generation and a
scheme to manage the public key using blockchain. First is a random seed
generation scheme needed for key generation? In order to prevent the risk of a
manin-the-middle attack and reverse engineering, seeds are generated by using
out-ofband communication and hardware variation. Second is a key management
system for the IoT using blockchain? The scheme we propose is to distribute the
public key on the blockchain network. The public key is used to encrypt a session
key that will be used for communication between devices.
According to [7] initially reviewed and identified the security and privacy issue
exists in IoT system. Secondly, as per Blockchain technology provides some
security solutions. The details analysis, including enabling technology and
integration of IoT technologies, are explained. Lastly, a case study is
implemented using the Ethererum based Blockchain system in a smart IoT
system and the results are discussed.
6
possible solution by leveraging negotiations, decision making, distributed
learning capabilities at the devices level using AI-enabled Multi- Agent Systems
and the real-time smart contracts between the Cars and Tolls using Blockchain.
This solution also showcases the monetization of real time data coming from
various IoT devices which are part of vehicles and infrastructure. While
blockchain secures the privacy of the participants it also acts as an economic
transactional layer and governance layer between the devices in the network.
We assume that there are several servers and clients attached to it. User system
supports TCP/IP protocols.
The key considerations of Java are
1. Admin
2. Make transaction
5. Results Generation
8
This system highlights the implementation of e-transaction system using
blockchain for such a proposal from a practical point view in both
development/deployment and usage contexts. Concluding this work is a potential
roadmap for blockchain technology to be able to support complex applications. In
the system carried out transaction system for online user, where end user easily
access the system and make the transaction without using any third party
validation . The system can’t be generating any high level hardware configuration
requirement, it possible to make vote using traditional configuration. The able to
perform the transaction without any hardware device with drastic security
manner. In this data is processed in multiple servers so the transactions are
processed in sequencing P2P distributed network. This illuminates the quality of
service issue and time limits. This is a middleware system in which the
processing environment in which the load will be balanced using threads. The
request generated will be parallels saved on all nodes in a Blockchain manner. We
use the Hash generation algorithm and the Hash will be generated for the given
string. Before executing any transaction, we use peer to peer verification to
validate the data. If any chain is invalid then it will recover or update the current
server blockchain. This will validate till the all nodes are verified and commit the
query. Mining algorithm is used for checking the hash generated for the query till
the valid hash is generated.
Implementation Procedure
• Each node will holds the specific block for each transaction.
• Same block has replace for all nodes, and generates a valid block chain.
• System will retrieve data from all data nodes and commit the transaction, it
should be any kind of DDL, DML as well as DCL transactional query.
• If any block chain invalid during the validation of data servers, then system
will automatically recover whole blockchain using majority of servers.
• We will address and eliminate the runtime server attacks and recover it
using own blockchain.
9
3.2.2 System Feature 2
10
Web app will be used to setup the page layout and add minimal styling to make
the interface user friendly.
It will also have a MySQL relational database. The main backend processing will
be done using swing framework including connecting to and accessing the
database and processing requests.
The main communication protocol will be Hyper Text Transfer Protocol (HTTP).
This will be used to transfer information back and forth from the client to the
server. HTTP GET and POST will be used to send the information.
The only way in which systems will meet their performance targets is for them to
be specified clearly and unambiguously. It is a simple fact that if performance is
not a stated criterion of the system requirements then the system designers will
generally not consider performance issues. While loose or incorrectly defined
performance specifications can lead to disputes between clients and suppliers. In
many cases performance requirements are never ridged as system that does not
11
fully meet its defined performance requirements may still be released as other
consideration such as time to market. In order to assess the performance of a
system the following must be clearly specified:
• Response Time
• Workload
• Scalability
• Platform
3.4.2 Safety Requirements
This Specification shall be sufficient detailed to allow the design and implement
to achieve the required safety integrity and allow an assessment of functional
safety.
Product is portable; it can run between only two connected systems or a large
Network of computers. Product is maintainable; i.e. in future the properties of the
product can be changed to meet the requirements.
12
3.5.2 Software Requirements(Platform Choice)
Technologies and tools used in Policy system project are as follows Technology
used:
Front End
Back-End
• Mysql
• Planning
• Requirements Analysis
• Design
• Coding
13
• Unit Testing and
• Acceptance Testing.
14
CHAPTER 4
SYSTEM DESIGN
4.1 System Architecture
Process Module
• Admin
• Make transaction
• Block Generation and blockchain validation
• Consensus Algorithm validation and block chain recovery
• Results Generation
• The central outline of the proposed algorithm is the implementation of
supply chain management distribution data storage using block chain.
15
• System creates the trustworthy communication between multiple parties
without using any third party interface.
• We use the Hash generation algorithm and the Hash will be generated for
the given string.
• If any chain is invalid then it will recover or update the current server
blockchain.
• This will validate till the all nodes are verified and commit the query.
• Mining algorithm is used for checking the hash generated for the query till
the valid hash is generated.
1. DFD Level 0
Class Diagram
State Diagram
Activity Diagram
Figure 4.6: Activity Diagram
Sequence Diagram
PROJECT PLAN
5.1 Project Estimate
Waterfall model is being used for the project estimation. It depicts the step wise
execution of the entire project.
Cost Estimate :
Not Applicable.
Time Estimate:
Project resources includes People,Software like JSP,HTML, CSS, Servlet and Tools
like Eclipse
23
5.2.1 Risk Identification
The risks for the Project can be analyzed within the constraints of time and
quality.
Financial
2 Requirement Med Med High High
Table 5.1: Risk Table
Risk ID 1
Risk Discription Errors Aries due to dublicate data
Category System Gatway Enviornment
Source Dublicate Data Enter by User
Probability Medium
Impact Medium
Response Mitigate
Strategy Data verification will resove the
issue
Risk Status Identified
Table 5.2: Risk Table1
Risk ID 2
Risk Discription Database Maintenance
Category Development
Environment
Source Registration of users
Probability Medium
Impact High
Response Serious
Strategy Access Control Methods
Risk Status Identified
Table 5.3: Risk Table2
Team consists of four members. Proper planning mechanism is used and roles
are analyzed and defined.
Well organized plans were been made and completed accordingly within time.
Progress reporting was been updated and completed. Communication as per
requirements were being done effectively.
CHAPTER 6
PROJECT IMPLEMENTATION
6.1 Overview of Project Modules
• Admin
• Make transaction
• Results Generation
• We use the Hash generation algorithm and the Hash will be generated for
the given string.
• If any chain is invalid then it will recover or update the current server
blockchain.
• This will validate till the all nodes are verified and commit the query.
• Mining algorithm is used for checking the hash generated for the query till
the valid hash is generated.
28
6.2 Tools and Technologies Used
Front End
• Operating System:-Windows XP/7/8
Back-End
• Mysql
6.3 Algorithm Details
Input: data d,
Output: Generated hash H according to given data
Step 1: Input data as d
Step 2: Apply SHA 256 from SHA family
Step 3: CurrentHash= SHA256 (d)
Step 4: Return CurrentHash
) (6.2)
End for
Step 4: Foreach (read I into NodeChain)
If (!.Equals NodeChain[i] with (Cchain))
Flag 1
Else Continue Commit query
Step 5: if (Flag == 1)
Count = SimilaryNodesBlockchian ()
Step 6: Calculate the majority of server
Recover invalid blockchain from specific node
Step 7: End if
End for
End for
30
CHAPTER 7
SOFTWARE TESTING
Software Testing is the process of executing every functionality and procedure of
the program or application with the intent to find the errors or bugs. Testing is
performed to investigate the entire project from every aspect. It deals with the
motto to make the model more robust and accurate. The results make the
developer aware of the issues that the program might go through in the future.
Software testing is important to understand the future risks.
• User registration
• Data uploading
• Data store in DB
• Access by GUI
• Implementation various machine learning algorithm
• Classification results
31
7.3 Basics of Software Testing
The White box testing is done by the tester who has knowledge o f the
programming language. White box testing done on algorithm or source code of
the project.
It is the procedure of giving the input to the project and verifying that how
system process input to produce result. In white box testing all, the interior
details are required to known to tester. White box testing is also called as
transparent testing. This test needs code to check so it is essential for tester to
have the knowledge coding. Following are the techniques of White Box testing:
• Programming style
• Control method
• Source language
• Database design
This type of a test is useful to beat defects at structural level. This test goes lower
the top or functional layer to expose defects.
Test case designing methods:
• Statement coverage
• Decision coverage
• Condition coverage
• Multiple Condition coverage
• Path coverage
This type of testing takes place by actual validating of requirement with actual
result. In the black box testing tester does not require knowing the internal logic
of the project. He concern with the actual result generated by the system.
Functional testing is performed in black box testing. Here, the knowledge about
how the program internally executes or the programming language does not
required. According test plan, Following are the functionality which cover under
the black box testing.
• Server connection
• Data upload
• features extraction
• Machine learning algorithm process
• classification
• Results
In the Integration testing, different modules has combine together and tested. To
exchange information easily between distinct modules of the system, test that it
performance as per the given requirement. When all testing allied work is
completed, the software is deployed to the customer. Stress and load testing is
conducted in the integration testing. Here, how professionally and how many
reviews have been processed is been tested.
In this testing, tester will verify the software that it covers all the requirements
as per the system requirement specification. It makes sure that the requirement
of software was at correct place. It also verifies whether we have built right
system or not. It checks the following: It justifies the execution and behavior of
the system. All probable input data given as input and capture projected output.
Test log is used for deployment
7.3.6 System Testing:
After performing the integration testing, the next step is output testing of the
proposed system. No system could be useful if it does not produce the required
output in a specified format. The outputs generated are displayed by the user.
Here the output format is considered in PPT format document.
This diagram is articulate trying out go with the flow. In step c it remember
design of machine and in keeping with that test Cycles, take a look at instances,
entrance and go out standards, predicted results, and so on is been
accomplished. We need to recognize test instances and the desired records. The
check steps received from the business layout and the files related to transaction.
The test methods require layout of techniques together with status reporting,
and making plans statistics tables. Step d. includes soliciting for/building takes a
look at database surroundings. Execute venture Integration check Run take a
look at cases from integration of the utility. Test all check cases after deployed on
the system. Signoff – this is ultimate stage whilst all end completed.
7.4.1 Testing Process:
There are extraordinary procedures for trying out the software. The diverse
steps been described underneath:
Functionality Testing:
Capability checking out is accomplished to test the functionality of software
program as in keeping with layout specification of that software and is it
operating as per requirement or no longer. In functionality testing center
capability of the utility tested with the aid of tester. Middle level functionalities
like input given, methods and setup on machine. It promotes test and affirm a
specific approach or characteristic of the program. Useful trying out may be very
clean i.e. consumer can do it easily.
Project Aspect:
In the proposed system, all the function was tested by tester as well as developer.
The EBD has major functionality like user registration, file uploading and
downloading, selecting expiry date of file. All these are main functionality of the
EBD are implemented successfully and working as per the user expectation.
Non-Functional Testing:
Non-useful trying out is been related to the best and functions of the module of
software program. Non-useful not concerning to a specific feature or person
movement along with load control but it related to software program features.
Non-practical testing may be Reliability checking out, Usability trying out etc.
7.5 Test Cases and Results
After implementation section while tester assessments code it detects the a few
fault or disorder inside the code. The faults corrected through a few method in
short time. While testing the performed by means of creating the test instances.
There are person test cases performed for every state of affairs, and it tested
with the anticipated output by way of system or software. The following table
indicates that everyone the check cases which might be vital for project. Below
Table shows the suite of test cases which are executed and passed.
During this project the system solution are investigating and presenting the new
framework for addressing the problem of finding relevant result. The aim of this
project was to improve the performance of algorithm presented in base system.
The results demonstrated in this project are showing the current state of work
done over practical implementation of this algorithm
RESULTS
8.1 Screenshots
8.1.1Admin Login Page
38
8.1.2 Admin Add Medicines Page
40
8.1.4 Distributor Register Page
42
8.1.6 Distributor Order Page
44
8.1.8 Distributor QR Code Upload Page
46
8.1.10 Distributor Accept Request Page
48
8.1.12 User Login Page
50
8.1.14 User Order Next Page
52
8.1.16 User Save Medicine Page
Because of the complexities of this area and the need for more stable and
efficient information management frameworks, there are several research
directions to apply Blockchain technology to the transaction industry. In several
cases of transaction usage that face similar data exchange and communication
problems, an interoperable architecture will certainly play a significant role.
Further research on safe and efficient software practise for the use of Blockchain
technology in transactions is also required to educate software engineers and
domain experts on the potential and also limitations of this new technology,
whether to build a decentralised application using an established Blockchain.
The algorithm has chosen the acceptable complexity, efficiency and complexity of
implementation to operate the system. Through empirical studies, we have a
better understanding of the pace of knowledge creation in the supply chain.
There are several important hurdles to getting on the blockchain reaching its full
potential and applying it to health is the most important issue technology
scalability and data controls.
To implement the proposed system on multiple peer to peer network, with fog
computing which reduce the transactional data processing time.
9.3 Applications
4. Bittrex app
5. Polonix
54
APPENDIX A
NP-hard
A problem is NP-hard if solving it in polynomial time would make it possible to
solve all problems in class NP in polynomial time. Some NP-hard problems are
also in NP (these are called ”NP-complete”), some are not. If you could reduce an
NP problem to an NP-hard problem and then solve it in polynomial time, you
could solve all NP problems. Also, there are decision problems in NP-hard but are
not NP- complete, such as the infamous halting problem.
NP-complete
A decision problem L is NP-complete if it is in the set of NP problems so that any
given solution to the decision problem can be verified in polynomial time, and
also in the set of NP-hard problems so that any NP problem can be converted
into L by a transformation of the inputs in polynomial time. The complexity class
NP-complete is the set of problems that are the hardest problems in NP, in the
sense that they are the ones most likely not to be in P. If you can find a way to
solve an NP-complete problem quickly, then you can use that algorithm to solve
all NP problems quickly.
63
References
[1] Gong, Xinglin, Erwu Liu, and Rui Wang. &Blockchain-Based IoT Application
Using Smart Contracts: Case Study of M2M Autonomous Trading.& 2020
5th International Conference on Computer and Communication Systems
(ICCCS). IEEE, 2020.
[3] Huang, Zheng, Zeyu Mi, and Zhichao Hua. &HCloud: A trusted JointCloud
serverless platform for IoT systems with blockchain.& China
Communications 17.9 (2020): 1-10.
[5] Rahman, Md Abdur, et al. &A Natural User Interface and Blockchain-Based
In-Home Smart Health Monitoring System.& 2020 IEEE International
Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE,
2020.
[6] Choi, Jungyong, et al. &Random Seed Generation For IoT Key Generation
and Key Management System Using Blockchain.& 2020 International
Conference on Information Networking (ICOIN). IEEE, 2020.
[7] Mohanta, Bhabendu Kumar, et al. &Addressing security and privacy issues
of IoT using blockchain technology.& IEEE Internet of Things Journal
(2020).
[8] Abraham, Misha, Himajit Aithal, and Krishnan Mohan. &Blockchain and
Collaborative Intelligence based next generation Smart Toll Application.&
2020 2nd Conference on Blockchain Research & Applications for
Innovative Networks and Services (BRAINS). IEEE, 2020.
[9] Wang, Hongman, et al. &An algorithm based on markov chain to improve
edge cache hit ratio for blockchain-enabled IoT.& China Communications
17.9 (2020): 66-76.
64
[10] Brousmiche, Kei, et al. &Peer-to-Peer Energy Market Place Powered by
Blockchain and Vehicle-to-Grid Technology.&2020 2nd Conference on
Blockchain Research & Applications for Innovative Networks and Services
(BRAINS). IEEE, 2020.
65
AISSMS IOIT, Department of Computer Engineering 2020-2021