Professional Documents
Culture Documents
Article
Hyperledger Fabric-Based Tea Supply Chain Production Data
Traceable Scheme
Chin-Ling Chen 1,2 , Wan-Bing Zhan 3, *, Der-Chen Huang 4 , Ling-Chun Liu 4 , Yong-Yuan Deng 2, *
and Chin-Guo Kuo 5
Abstract: With the advent of Industry 4.0, blockchain is one of the emerging technologies that can be
used in multiple fields, especially in supply chain networks, where it is considered a sustainable con-
cept technology. Because of its decentralization, reliability, transparency, consistency, and traceability,
blockchain can challenge existing conventional models in supply chain scenarios. Therefore, this
study proposes a framework that integrates the technology of Blockchain 3.0 (Hyperledger Fabric)
into the tea supply chain. The concept of data traceability driven by blockchain technology consists
of documenting the tea supply chain system, in which the cultivation, processing, and retailing
of tea leaves are documented, and optimizing the existing anti-counterfeiting mechanisms. The
ECDSA algorithm is used to confirm the identity among the entities located in the Hyperledger Fabric
channel, and IPFS technology is introduced to store tea traceability data to solve the problem of data
increment in the tea production process. Only the hash value and traceability code of the traceability
data are stored in the block. We analyze the relationship between the number of transactions and
Citation: Chen, C.-L.; Zhan, W.-B.; latency, and we can see the latency time of both write and read transactions. The system tested write
Huang, D.-C.; Liu, L.-C.; Deng, Y.-Y.; transactions and read transactions with a minimum write speed of 0.97 s and a maximum of 6.26 s
Kuo, C.-G. Hyperledger Fabric-Based and a minimum read speed of 0.1 s and a maximum of 4.62 s via Caliper analysis. The experimental
Tea Supply Chain Production Data
results show that the performance analysis sounds good. This study uses distributed theory and
Traceable Scheme. Sustainability 2023,
service-oriented thinking in its specific application to the tea supply chain system model and takes
15, 13738. https://doi.org/10.3390/
each entity through a B2B connection to achieve anti-counterfeit traceability in the tea supply chain
su151813738
of a regulatory nature.
Academic Editor: Andrea Appolloni
Keywords: blockchain (BC); anti-counterfeit traceability; tea supply chain; ECDSA; hyperledger fabric
Received: 16 July 2023
Revised: 17 August 2023
Accepted: 30 August 2023
Published: 14 September 2023
1. Introduction
1.1. Background
During periods of economic development, many supply chain industries adopt a linear
Copyright: © 2023 by the authors.
economic model in which a large number of raw materials are extracted and turned into
Licensee MDPI, Basel, Switzerland.
products that are not reused or recycled. This economic model can lead to the destruction
This article is an open access article
of our environmental resources such as air, water, and land [1]. As a result, many supply
distributed under the terms and
chain industries are gradually moving towards a circular economy, where product design
conditions of the Creative Commons
Attribution (CC BY) license (https://
and manufacturing take into account sustainability and the longest possible period of high-
creativecommons.org/licenses/by/
value utilization. However, due to the involvement of multiple stakeholders in the supply
4.0/).
chain, it is easy to encounter difficulties in information tracing, information falsification,
and trust crises during the various lifecycle stages of production [2]. Therefore, this study
aims to use blockchain technology to address issues of product information authenticity
and stakeholder trust in the tea supply chain and establish a recyclable model of the tea
supply chain.
Blockchain technology is a decentralized ledger. Firstly, the ledger is transparent,
and multiple users can verify the information recorded in the ledger, achieving data
transparency within the blockchain [3]. Secondly, the blockchain is a distributed database
maintained by multiple nodes and not owned by any individual, which makes the data in
the blockchain immutable [4]. Thirdly, the data in the blockchain are stored in a Merkle
tree structure and combined with cryptography to achieve accurate data verification and
encryption of data information [5]. Finally, blockchain does not rely on a central authority
for management, which can effectively avoid issues such as information leakage or data
tampering caused by hacker attacks through its decentralized mechanism [6].
There are two reasons for studying the tea supply chain in this paper. Firstly, tea is
popular worldwide, with a global tea market value of about USD 209.3 billion in 2022,
expected to rise to USD 266.7 billion by 2025 [7]. Tea has a long history of popularity
globally, originating in China, where approximately 3.12 million tons of tea were produced
in 2021, up from about 2.74 million tons in 2020 [8]. India, China, Sri Lanka, and Kenya
are the world’s largest tea exporting countries, with China exporting USD 1.6 billion, Sri
Lanka exporting USD 1.5 billion, and Kenya exporting USD 1.4 billion in 2017 [9]. Secondly,
there are many problems in the current tea supply chain network, such as poor information
utilization, chaotic regulatory systems, and a lack of traceable monitoring systems [10].
Table 1. Comparison of business data-sharing options that have been proposed and those that
now exist.
Based on reading the literature combined with the research in this paper, it is concluded
that the specific problems are:
(1) Redundancy of information and information asymmetry in the process of tea farming
until tea selling;
(2) Because tea is a non-standardized product and the tea supply chain network’s stan-
dardization is low, it can only be identified by tea tasters and tea artists (experienced
people), so there is personal subjectivity;
(3) Complex distribution channels for tea, where the source is difficult to determine and
the quality cannot be ascertained, can easily give rise to the problem of substandard
or counterfeit products.
(4) The traditional tea supply chain lacks digital management due to the low adoption
of information technology across all stages. There is poor information exchange and
interaction, making it difficult for consumers to access comprehensive information.
Given the above problems, this study will create a secure channel using Hyperledger
Fabric, a blockchain 3.0 federation chain technology, to pull the stakeholders in the tea
Sustainability 2023, 15, 13738 4 of 25
supply chain into the channel. Due to the native nature of the Hyperledger Fabric channel,
the various entities in the channel can share data securely, encrypt the required data using
the private key generated by ECDSA, then use the algorithm known as Elliptic Curve Digital
Signature Algorithm (ECDSA) to digitally sign the data at different stages of transmission.
To solve the blockchain block capacity problem, an IPFS file storage system is introduced to
store all the data recorded during the tea production process to ensure the quality of the
tea and solve the tea anti-counterfeiting problem. Finally, all data will be hashed, the hash
value will be uploaded to the chain, and the data will be made into a unique traceability
code to follow the outer packaging of tea for identification between entities.
The research objectives of this study that can be achieved under the traditional tea
supply chain model are as follows:
(1) Solve the credit problem: There is more than one institution involved, and each
institution supervises the other, thus ensuring the accuracy of the information and
ensuring that the information on the chain cannot be tampered with, which greatly
reduces the chance of cheating.
(2) The whole record tracking: Relative to keeping the express logistics tracking open,
transparent, and able to track the production, processing, testing, transportation, and
warehousing of goods for sale, each link of time after the point is recorded in full.
(3) Clear responsibilities and traceability of problems: The characteristics of blockchain,
namely, openness and transparency, cannot be tampered with. Once a problem occurs
at a certain link, it is timely and effective to find out where the problem link occurs.
(4) Prevent commodity counterfeiting: After the information about the goods is put on
the chain, the whole process is open and transparent, and the products from the
source down to the hands of customers can be checked so that there is no problem of
counterfeiting.
The format of this essay is as follows. The major technologies employed in this paper’s
system are introduced in Section 2 of the text; Section 3 describes the main processes of
the system operation as well as the architecture; Section 4 performs the security analysis;
Section 5 discusses the performance analysis and comparison; finally, in Section 6, we
conclude our scheme.
2. Preliminary
2.1. Blockchain
Blockchain is a decentralized, distributed ledger technology for recording and verify-
ing transactions. It ensures the security and integrity of transaction data through cryptog-
raphy and distributed consensus algorithms, making it impossible for transactions to be
tampered with or forged. Due to its decentralized nature, blockchain technology is widely
used in digital currency, smart contracts, supply chain management, asset management,
and other fields [16].
Blockchain technology is a very promising technology when it comes to the tea indus-
try since it can offer answers for transparency, safety, and traceability in the tea supply chain.
Blockchain is a decentralized digital ledger that can keep track of transactions without
requiring centralization [17]. The technology is unique in that it ensures transparency and
security of transactions, as the record of transactions cannot be tampered with or deleted.
In the tea supply chain, blockchain technology can be used to track the entire process of tea
production, processing, packaging, and transportation and to ensure its authenticity and
integrity [18]. Because the tea supply chain usually involves multiple participants, such as
farmers, processors, retailers, and consumers, all of these participants can use blockchain to
record and track the transaction records of tea. Through blockchain technology, participants
in the tea supply chain can share the same transaction information, thus enabling real-time
information sharing and collaboration and reducing un-necessary human intervention
and errors.
Sustainability 2023, 15, 13738 5 of 25
In addition, blockchain technology can also ensure the quality and security of the tea
supply chain. Through blockchain technology, the production and processing of tea can
be traced, thus determining the quality and security of the beverage [19]. For example, if
there is a problem with a batch of tea, the participants can use blockchain technology to
determine where and when the problem occurred and find the source of the tea so that
appropriate measures can be taken to prevent the problem from expanding.
3. System Overview
3.1. System Architecture
As illustrated in Figure 1, we propose an architecture for a consortium blockchain
network in this study. The system design consists of three key components that make
up the architecture of the consortium’s distributed ledger service center: the blockchain
network component, the application development and service component, and the data
storage module. User entities joining the federation chain store data in the Data Storage
Component via a client in the Application Component and subsequently interact with
the Hyperledger Fabric Network with the address information it returns along with other
transaction-required information.
Sustainability 2023, 15, x FOR PEER REVIEW 7 of 26
Component via a client in the Application Component and subsequently interact with the
Sustainability 2023, 15, 13738
Hyperledger Fabric Network with the address information it returns along with other
7 of 25
transaction-required information.
Processing
Application Planting
Machine Retailers Consumer Market Supervis ion
Component Enterprise
Transport Transport Purchase
Client
Channel
Data Storage
Component
Material flow
Certificate Authority
Blockchain ledger Blockchain ledger Blockchain ledger
Information flow
Hyperledger Fabric Network
Operation
Figure 1. The
Figure 1. Theconsortium
consortiumblockchain
blockchain service
service architecture.
architecture.
(1)
(1) Tea Planting Enterprise
Tea Planting Enterprise(PE)
(PE)
The whole tea supply chain
The whole tea supply chain starts starts
withwith
tea tea farmers
farmers planting
planting tea leaves,
tea leaves, and
and the the pro-
profes-
fessional inspectors monitor their air temperature and humidity, light level,
sional inspectors monitor their air temperature and humidity, light level, soil temperature, soil tempera-
ture, humidity,
humidity, pH planting
pH value, value, planting
location,location,
and other and other environmental
environmental data during data
theduring
plant- the
planting
ing cycle.cycle.
At theAtsame
the same
time,time, we collect
we collect records
records of agricultural
of agricultural operations
operations suchsuch as plot
as plot
sowing, fertilization,and
sowing, fertilization, andirrigation
irrigationand
and take
take high-definition
high-definition pictures
pictures of the
of the whole
whole growth
growth
cycle. After ensuring
cycle. After ensuringthe thequality
qualityofofthe
thepicked
picked teatea leaves,
leaves, they
they areare transported
transported to tea
to the the tea
processing facility.
processing facility.
(2)
(2) Processing Mechanism(PM)
Processing Mechanism (PM)
The tea
The teaprocessing
processingprocess
process broadly
broadly consists
consists of various
of various stepssteps such
such as as killing,
killing, wither-
withering,
ing, kneading, fermentation, drying, etc. Different processing steps are carried
kneading, fermentation, drying, etc. Different processing steps are carried out by out by dif-
different
ferent types
types of of tea leaves.
tea leaves. In the overall
In the overall processing
processing chain, professionals
chain, professionals monitor monitor the oper-
the operation
ation process to control the details of each operation, record all the operation data,
process to control the details of each operation, record all the operation data, and write the and
operation data and all the planting data of the planting enterprise into the tea traceability
write the operation data and all the planting data of the planting enterprise into the tea
code. Finally, the processed tea leaves are transported to the distributors along with the
traceability code. Finally, the processed tea leaves are transported to the distributors along
traceability code.
with the traceability code.
(3) Retailers (R)
(3) Retailers (R)
After
After receiving
receivingthe
theprocessed
processedtea leaves,
tea dealers
leaves, dealersverify thethe
verify quality of the
quality tea leaves
of the tea leaves
through the traceability code to ensure the standardized production process of tea instal-
through the traceability code to ensure the standardized production process of tea instal-
lation, and after confirmation, they can distribute the tea leaves to multiple platforms for
lation, and after confirmation, they can distribute the tea leaves to multiple platforms for
retailing. A record of the sale is made and uploaded to the Hyperledger Fabric Network
retailing. A record of the sale is made and uploaded to the Hyperledger Fabric Network
for subsequent review by consumers and market regulators for complaints.
for subsequent review by consumers and market regulators for complaints.
(4) Consumers (C)
Consumers can view the entire production process and detailed data of tea through
the traceability code when purchasing tea and provide feedback to market supervision if
Sustainability 2023, 15, 13738 8 of 25
1,2 1
Planting
Market Supervis ion
Enterprise
1,3 Transaction 6
Processing 5
Mechanie
3
Address
Retailers Consumer
1,4 1,5
Figure 2. A
Figure 2. flowchart ofofthe
A flowchart thetransactions
transactionsin
inthe
thetea
tea supply chain.
supply chain.
Step
Step 1: 1: Each
Each entityininthe
entity thesystem
systemmust
must register
register atat this
this level.
level. To
Tojoin
jointhe
theblockchain
blockchain
network as a node, all entities—including producers, processors, distributors, market
network as a node, all entities—including producers, processors, distributors, market su-
supervisors, and consumers—need to be certified by CA. After the authentication, the CA
pervisors, and consumers—need to be certified by CA. After the authentication, the CA
node will issue digital certificates, and all entities can share data through the blockchain
node will issue digital certificates, and all entities can share data through the blockchain
network.
network. Step 2: All production-related data are recorded by the PE, who then uploads the
Step 2:product
finished All production-related
to the blockchain hub datawith
areanrecorded
electronicbysignature
the PE, and
whoa then
hashing uploads the
method.
finished product to the blockchain hub with an electronic signature and
There, it is added to the ledger by the sorted nodes and updated on the local ledger. The a hashing method.
There, it is added
raw materials andtotransaction
the ledgerinformation
by the sorted willnodes and updated
be delivered on after
to the PM the local ledger. The
the production
rawis materials
finished. and transaction information will be delivered to the PM after the production
is finished.
Step 3: When the PM receives the transaction request, it verifies the legitimacy of
theStep 3: When
signature the PM
through thereceives
ECDSAthe transaction
algorithm request,
to confirm theitorigin
verifies
of the legitimacy of
the transaction the
and
signature
verifies through
the hash the ECDSA
value algorithm
to ensure that theto transaction
confirm theinformation
origin of the transaction
and production and ver-
data
ifies
arethe
nothash value to
tampered ensure
with that the
to ensure the transaction
quality of the information
raw materials.and After
production data are is
the production not
tampered with to ensure the quality of the raw materials. After the production
completed, it generates product information and order information, as well as its is com-
processing
process,
pleted, and uploads
it generates it to the
product blockchainand
information center, which
order is converted
information, as into
welltraceability code
as its processing
through coding and transported to the R with the product.
process, and uploads it to the blockchain center, which is converted into traceability code
Step 4: After the R receives the products, they verify the data in the chain by scanning
through coding and transported to the R with the product.
the traceability code and comparing the product information and order information, and
Step 4: After the R receives the products, they verify the data in the chain by scanning
can start selling after confirming all data sources and data integrity.
the traceability code and comparing the product information and order information, and
can start selling after confirming all data sources and data integrity.
Step 5: C can access the data in the chain by scanning the traceability code on the
products through the client and obtaining all the production data of the intended prod-
ucts. If they find any problems with the data after verification, they can report them to the
MS and send the reporting information to the blockchain center.
Step 6: The MS can access two parts of the data in the chain through the client: one is
all the product information and order information of the products to supervise whether
Sustainability 2023, 15, 13738 9 of 25
EPuk X ( M X ) / DPRK X ( C X ) Use the party X’s public key or private key to encrypt or decode
CX Information encrypted by user X
EPuk X ( MX )/DPRKX (CX ) the message M.
Use the party X’s public key or private key to encrypt or decode
the message M.
Ti
Ti
The ith timestamp
The ith timestamp
∆T ∆T The standard for determining
The standard for determining whether
whetheraatimestamp is correct
timestamp is correct
3.4.
3.4.Transaction
Transaction Information
Information Flow
Flow
Figure
Figure 33 depicts the transaction
depicts the transactionformat
formatused
usedbybythe
the Hyperledger
Hyperledger Fabric-based
Fabric-based block-
blockchain
chain system.
system.
Tr ansaction
Figure
Figure3.3.Transaction
Transaction information
information format.
format.
IfIf Entity
EntityA Aandand Entity
Entity BB need
need toto communicate
communicate and and exchange
exchange information
information within
within the
the
supply
supply chain,
chain, they will each
they will each establish
establishan anorganization
organization(Organization
(Organization AA and
and Organization
Organization B),
register with a Certificate Authority (CA), and obtain their corresponding
B), register with a Certificate Authority (CA), and obtain their corresponding public–pri- public–private
key pairs
vate key pairsand digital certificates.
and digital Peer nodes
certificates. are theare
Peer nodes components that comprise
the components an organi-
that comprise an
zation, including endorser nodes, orderer nodes, anchor nodes, and
organization, including endorser nodes, orderer nodes, anchor nodes, and leader nodes.leader nodes. When
Organization
When A interacts
Organization with with
A interacts Organization B, it B,
Organization encrypts the the
it encrypts transaction data
transaction with
data withits
public key and then submits the transactions to the blockchain through
its public key and then submits the transactions to the blockchain through its orderer its orderer node.
Organization
node. OrganizationB receives the transaction
B receives data data
the transaction fromfrom
Organization A over
Organization the channel
A over and
the channel
updates
and updates its local copy
its local copyof of
thethe
blockchain
blockchain ledger
ledgertotostore
storethe
thedata
data by invoking chaincode
by invoking chaincode
functions. Each peer node in the network can deploy one or more chaincodes and maintain
functions. Each peer node in the network can deploy one or more chaincodes and main-
tain a copy of the ledger for the channel. The ordering node collects and packages the
Sustainability 2023, 15, 13738 10 of 25
a copy of the ledger for the channel. The ordering node collects and packages the trans-
actions and information exchange generated within the channel, before submitting to the
Hyperledger Fabric network.
Step 2. The PE chooses a random number k1 at random and calculates the hash value
of Data PE , and generates a message containing h DataPE and the timestamp T1.
MPE = IDPE || IDPM || h DataPE ads Data T1 (4)
PE
The PE encrypts the data and generates an encrypted message using a public key issued by
the PM at the center of the blockchain:
PE encapsulates the encrypted data into transaction information and then uploads the
transaction information to the Hyperledger Fabric network center by invoking Algorithm 3.
PE sends the successful upload message to PM via the client and finally transports the tea
to the processing machinery via logistics.
}
func Verify(H string, r string, s string)(res string){
u1 = ( H mod n)/s
u2 = (r mod n)/s
Q ← cert.PublicKey
( x, y) = u1 ∗ G + u2 ∗ Q
i f ( x == r )
return true
else
return f alse
}
Sustainability 2023, 15, 13738 12 of 25
PM verifies the validity of the signature by using the verification function in Algorithm 2.
Veri f y h‘ DataPE , r PE , s PE (10)
If the signature is legitimate, the PM obtains the production data MPE through the IPFS
address Data PE .
Step 2. The PM compares the quality of tea raw materials with the obtained Data PE .
After ensuring the quality, the data Data PE as part of the traceability code will be encap-
sulated into retrospective source code (RSC) by using Algorithm 4. At the same time,
the processing mechanism will process and package the raw material and encapsulate
the relevant proof of technological operation (Data TO ) into the RSC together. During the
processing and packaging process, PM chooses the number k2 at random and calculates
the hash value
h DataTO = hash( Data TO ) (11)
Sustainability 2023, 15, 13738 13 of 25
of Data TO , and generates a message containing h DataTO and the timestamp T3.
MPM = IDPM || IDR || h DataTO T3 (12)
Veri f y h‘ DataTO , r PM , s PM (18)
R will then scan the RSC to verify all the production and processing processes of the tea,
and if there is no problem, R will put it on the shelves for sale.
Step 2. C can scan the RSC of the tea to identify the authenticity of the tea before
purchase, and after the purchase is complete, the system will generate the order. All the
R will then scan the RSC to verify all the production and processing processes of the tea,
and if there is no problem, R will put it on the shelves for sale.
Step 2. C can scan the RSC of the tea to identify the authenticity of the tea before
purchase, and after the purchase is complete, the system will generate the order. All the
Sustainability 2023, 15, 13738 order information is available ( DataOrder ); R will randomly select a random number14 kof325
and calculate the hash value
R encapsulates all the data into a transaction message and uploads them to the Hy-
R encapsulates all the data into a transaction message and uploads them to the Hyperledger
perledger Fabric hub, where the transaction ends.
Fabric hub, where the transaction ends.
3.9.
3.9.Supervision
SupervisionPhase
Phase
After
Afterthe
thegeneration
generationofoftea
teatransaction
transactionrecords,
records,customers
customerswill
willenter
enterthis
thisstage
stageonlyonlyifif
they
theyneed
needtotodefend
defendtheir
theirrights
rightsand
andinterests,
interests,and
andthe
themain
maininteraction
interactionobjects
objectsofofthis
thisstage
stage
are C and MS. The supervision flow chart is shown in
are C and MS. The supervision flow chart is shown in Figure 4. Figure 4.
1 2
3 Hyperledger Fabric
Consumer Market Supervis ion
Network
Figure
Figure4.4.Supervision
Supervisionflow
flowchart.
chart.
Step1.1.The
Step Thecustomer
customercan
canfile
filea acomplaint
complaintaboutabouthis
hisorder
orderwith
withthe themarket
marketsupervisor
supervisor
through the client. C edits the complaint and the evidence of the complaint D Data Appeal ,
ata Appeal
through the client.
then chooses C edits
a random the complaint
number k4 at random and and
the calculates
evidence of thethe
hash complaint
value ,
then chooses a random number k 4 at random and calculates the hash value
h Data Appeal = hash Data Appeal (23)
(
hDataAppeal = hash Data Appeal ) (23)
of Data Appeal , and generates a transaction message containing h Data Appeal and the times-
oftamp Appeal , and generates a transaction
DataT5:
message containing hData Appeal and the timestamp
T5 : MC = IDC || ID MS || h Data Appeal T5 (24)
= invoking
C generates a signature (rC , sCM)Cby (
IDC IDMSthehsignature
Data Appeal || Talgorithm.
5 ) (24)
C generates a signature
( rC , sC ) (rby
C , sC ) = Sign ( MC , k4, dC )
invoking the signature algorithm.
(25)
( rC , sC ) = Sign ( M C , k 4, dC )
C’s public key encrypts the message
(25)
Veri f y h‘ Data Appeal , rC , sC (30)
After confirming the authenticity of the complaint information, MS will intervene in the
market to regulate fake and inferior tea.
Step 3. MS will first collect the signature information of each stage, such as the
signature information of PE, PM, and R. If one or more of the signatures is faulty, it means
there is counterfeiting at that stage. MS will regulate the entities involved in counterfeiting.
4. Security Analysis
4.1. Data Integrity
The suggested study subject employs the ECDSA method to sign the data used in
the supply chain process for tea to ensure the integrity and tamper resistance of the
information in the transmission process. We take the example of the production stage
added to the blockchain tea supply chain and verify the signature process of its production
data as follows:
(r PE , s PE )
=Sign( MPE , k1, d PE ) (31)
= (rG, r + hash( MPE = IDPE || IDPM || h DataPE ads Data T1 ))
PE
u1 = s − 1 0
PE h Data PE modn (33)
u2 = s − 1
PE r PE modn (34)
Scenario: False data will be signed and posted to the blockchain center if an un-
ethical merchant attempts to tamper with the production data to use it as a stand-in for
actual goods.
Analysis: After receiving the tea raw materials, the entity at the center of the blockchain
network, such as the processing company, employs the verification function in Algorithm 2
to confirm their authenticity. If the verification is successful, the processing organization
chain network, such as the processing company, employs the verification function in Al-
gorithm 2 to confirm their authenticity. If the verification is successful, the processing or-
ganization parses the data, obtains the detailed IPFS address, and submits a request to
view the data. The hash value of the data is then calculated, and if it differs from the hash
Sustainability 2023, 15, 13738 value recorded in the blockchain ledger, either the batch of tea has poor quality, 16 orofthe
25
businessman has lied about his identity.
4.2. Tamper-Resistant
parses the data, obtains the detailed IPFS address, and submits a request to view the data.
The value
The hash security of the
of the on-chain
data data is guaranteed
is then calculated, by federated
and if it differs blockchain
from the technology.
hash value recorded
A the
in binary tree integrated
blockchain with athe
ledger, either Merkle
batch tree
of teastructure
has poorwill be constructed
quality, using all has
or the businessman the
chain
lied datahis
about stored in a block. As illustrated in Figure 5, the hash value between every two
identity.
data records in the Merkle tree will be concatenated as the input to the next binary tree
node.
4.2. If an attacker attempts to tamper with any data record, the root node of the Merkle
Tamper-Resistant
tree The
will security
change dramatically
of the on-chain duedatato the property ofby
is guaranteed thefederated
SHA-256blockchain
cryptographic hash. If
technology.
Ayou arbitrarily
binary change thewith
tree integrated left side of thetree
a Merkle data,structure
the corresponding right hashusing
will be constructed value all
willthe
be
completely
chain different.
data stored Just like
in a block. As in SHA-256inencryption,
illustrated Figure 5, theashash
longvalue
as the input every
between is slightly
two
changed,
data recordsthein
output hash value
the Merkle will be
tree will be concatenated
substantially different.
as the input to the next binary tree
node.So, if an
If an attacker
attacker tries totomodify
attempts tamperthe blockchain
with any datadata, thethe
record, hash
rootofnode
the corresponding
of the Merkle
Merkel tree leaf nodes will change. The root hash is calculated recursively based
tree will change dramatically due to the property of the SHA-256 cryptographic on all
hash. If
leaf nodes; any leaf node changes will lead to a completely different root hash. As a result,
you arbitrarily change the left side of the data, the corresponding right hash value will
when
be others who
completely participated
different. Just likecheck the blockencryption,
in SHA-256 information, asthey
longwill seeinput
as the that the content
is slightly
has been the
changed, altered [27].hash value will be substantially different.
output
Block
Top has h
header
Block
body Hash 0 Hash 1
Figure5.
Figure 5. Merkle
Merkle tree
tree structure.
structure.
4.3. Traceability
So, if an attacker tries to modify the blockchain data, the hash of the corresponding
Merkel tree leaf nodes will change. The root hash is calculated recursively based on all
leaf nodes; any leaf node changes will lead to a completely different root hash. As a result,
when others who participated check the block information, they will see that the content
has been altered [27].
4.3. Traceability
Since blockchain is employed as the fundamental technology, all transactions con-
ducted by members of the federated blockchain will be acknowledged as valid transactions
recorded on-chain, safeguarding them from malicious tampering [28]. Owing to the im-
mutability of data, the system can enable reliable traceability and prevent fraud at the
source. For instance, in the stage of producing tea, the information about tea in the ledger
will be permanently maintained in the blockchain after uploading the information relevant
to the production of tea to the blockchain.
Situation: PE discovers a flaw in the tea’s quality but is unable to identify which link
in the production process is at fault.
Analysis: To compare and verify the data in the blockchain and assure their traceability
by signature, utilize the blockchain’s immutability and traceability. If we wish to verify and
track how PM interacts with PE, we can assess whether the data between PE and PM are
accurate using the following formula:
4.4. Non-Repudiation
ECDSA signature verification is necessary at every level; therefore, data non-repudiation
can be achieved by checking it. The recipient needs the public key for verification since
every data transmission requires the participant’s secret key signature. After verifying that
the sender’s message content is correct and authentic, the receiver will not reject it. The
non-repudiation of each level is displayed in Table 3.
Item
Signature Value Sender Receiver Signature Verification
Phase
Production ?
phase
(r PE , s PE ) PE PM x0PE = r PE modn
?
Process phase (r PM , s PM ) PM R x0PM = r PM modn
Sale and ?
Purchase phase
(r R , s R ) R C x0R = r R modn
?
0 = r modn
(r C , s C ) C MS xC C
Supervision
phase Hyperledger ?
(r MS , s MS ) MS
Fabric x0MS = r MS modn
5. Performance Evaluation
5.1. Performance Analysis
This section assesses the chain code contract calls’ performance for the scenarios put
forth in this study. The testing tool uses Hyperledger Caliper version 0.42, whereas the
blockchain platform utilizes Hyperledger Fabric version 2.3. A benchmarking tool called
Hyperledger Caliper was created to evaluate the blockchain platform’s scalability and
performance. Caliper can be used to create and run a range of benchmark tests, including
ones for transaction speed, latency, resource usage, and other metrics. It was developed by
30 founding corporate members, including IBM, and is headed by the Linux Foundation.
We tested transaction throughput (number of transactions per second: the performance
bottleneck of the system in processing transactions), latency (average response time: the
response time and performance bottleneck of the system), and resource utilization (the
resource utilization and performance bottleneck of the system in processing transactions)
on our Intel Core i9-11900K, RAM: 32GB DDR4 configuration. The results are displayed in
Figures 6–9.
ones for transaction speed, latency, resource usage, and other metrics. It was developed
by 30 founding corporate members, including IBM, and is headed by the Linux Founda-
tion. We tested transaction throughput (number of transactions per second: the perfor-
mance bottleneck of the system in processing transactions), latency (average response
time: the response time and performance bottleneck of the system), and resource utiliza-
Sustainability 2023, 15, 13738 19 of 25
tion (the resource utilization and performance bottleneck of the system in processing
transactions) on our Intel Core i9-11900K, RAM: 32GB DDR4 configuration. The results
are displayed in Figures 6–9.
Weexamine
We examinethe theconnection
connectionbetween
betweentransaction
transactionvolume
volumeandandCPU
CPUandand memory
memory con-
con-
sumptionin
sumption inFigures
Figures66and
and7.7.The
Theprogressive
progressiveincrease
increasein inCPU
CPUand
andmemory
memoryusage
usageas
asthe
the
number of transactions rises suggests that the system’s processing power may be con-
number of transactions rises suggests that the system’s processing power may be con-
strainedas
strained asthe
theworkload
workloadrises.
rises.Figures
Figures88and
and99illustrate
illustratehow
howthe
thesystem’s
system’sperformance
performance
degrades as the number of transactions rises, resulting in increased latencyand
degrades as the number of transactions rises, resulting in increased latency anddecreased
decreased
throughput. When
throughput. When there
thereare
are3500
3500transactions,
transactions, the
the CPU
CPU and
andmemory
memory use
use spike
spike dramati-
dramati-
callybecause
cally becausethethesystem
systemhas
hashit
hitits
itsprocessing
processingcapacity
capacityandandcannot
cannoteffectively
effectivelyhandle
handleany
any
more requests.
more requests.
120.00%
100.00%
80.00%
CPU usage
60.00%
40.00%
20.00%
0.00%
0 1000 2000 3000 4000 5000 6000
Number of transactions
100%
80%
Memory usage
60%
40%
20%
0%
0 1000 2000 3000 4000 5000 6000
Number of transactions
Figure7.7.Memory
Figure Memoryoccupancy
occupancyvariation
variationgraph.
graph.
InFigure
In Figure8,8,we
weanalyze
analyzethetherelationship
relationshipbetween
betweenthethenumber
numberofoftransactions
transactionsandandthe
the
throughput,and
throughput, andwe wecan
cansee
seethat
thatthe
thenumber
numberofofwrite
writetransactions
transactionsandandread
readtransactions
transactions
showaagradual
show gradualincrease
increaseasasthe
thenumber
numberofoftransactions
transactionsincreases.
increases.AtAtaatransaction
transactioncount
countofof
500,the
500, thenumber
numberof ofwrite
writetransactions
transactionsisis456
456TPS
TPSandandthe
thenumber
numberofofreadreadtransactions
transactionsisis
1042TPS,
1042 TPS,while
whileatataatransaction
transactioncount
countofof5000,
5000,the
thenumber
numberofofwrite
writetransactions
transactionsincreases
increases
toto3713
3713TPS
TPSand
andthe thenumber
numberofofread
readtransactions
transactionsincreases
increasestoto3930
3930TPS.
TPS.
5000
Throughput(TPS)
4000
3000
2000
1000
0
500 1000 1500 2000 2500 3000 3500 4000 4500 5000
In Figure 8, we analyze the relationship between the number of transactions and the
throughput, and we can see that the number of write transactions and read transactions
show a gradual increase as the number of transactions increases. At a transaction count of
500, the number of write transactions is 456 TPS and the number of read transactions is
Sustainability 2023, 15, 13738 20 of 25
1042 TPS, while at a transaction count of 5000, the number of write transactions increases
to 3713 TPS and the number of read transactions increases to 3930 TPS.
5000
Throughput(TPS)
4000
3000
2000
1000
0
500 1000 1500 2000 2500 3000 3500 4000 4500 5000
Number of transactions
Write transaction Read transaction
Figure8.8.Fabric’s
Figure Fabric’sthroughput
throughputunder
undervarious
variousloads.
loads.
InFigure
In Figure 9,9, we
we analyze
analyze the
the relationship
relationshipbetween
betweenthe thenumber
numberofof transactions
transactions andand la-
tency, and
latency, andwewe can
can see
see that
that the
the latency
latency time
time ofof both
both write
write and
and read
readtransactions
transactionsincreases
increases
asthe
as the number
number of of transactions
transactionsincreases,
increases,with
witha minimum
a minimum write
writespeed
speedof 0.97 s and
of 0.97 s aand
max- a
imum of 6.26
maximum s, and
of 6.26 a minimum
s, and a minimumread read
speedspeed
of 0.1ofs and
0.1 saand
maximum
a maximumof 4.62ofs.4.62
Thiss.perfor-
This
mance system’s
performance processing
system’s capacity
processing may be
capacity may limited as theasload
be limited increases.
the load For the
increases. Forsamethe
number
same of transactions,
number the latency
of transactions, of write
the latency of transactions is usually
write transactions longerlonger
is usually than that
thanof that
read
transactions
of becausebecause
read transactions write transactions require more
write transactions computation
require and storage
more computation andoperations.
storage
As the number
operations. As theof transactions increases, the
number of transactions gap between
increases, the gapthebetween
latency times of write
the latency and
times
Sustainability 2023, 15, x FOR PEER REVIEW
read transactions gradually shrinks, which may indicate that the processing capacity 26
of write and read transactions gradually shrinks, which may indicate that the 21 of
processing of
the system
capacity hassystem
of the reached hasa reached
bottleneck and cannot
a bottleneck andefficiently handle more
cannot efficiently handle requests.
more requests.
7
6
5
Latency (s)
4
3
2
1
0
0 1000 2000 3000 4000 5000 6000
Number of transactions
WriteLatency QueryLatency
Figure9.9. Fabric
Figure Fabriclatency
latencywith
withchanging
changingworkload.
workload.
Whencombined,
When combined,these
thesestatistics
statisticsoffer
offer helpful
helpful details
details onon load
load management
management andand sys-
system
tem performance
performance thatbecan
that can be to
used used to improve
improve the system’s
the system’s performance.
performance. We areWe are effective
effective when
when compared
compared to the functionality
to the functionality of current
of current Hyperledger
Hyperledger FabricFabric application
application solutions
solutions [31].
[31]. Decisions
Decisions must bemust bebased
taken takenon based on the system
the unique uniquearchitecture
system architecture and application
and application scenarios
ifscenarios if particular
particular optimizationoptimization
tactics are tactics are still required.
still required. System performance
System performance enhancementenhance-
will
ment will probably be required, including expanding hardware resources, streamlining
probably be required, including expanding hardware resources, streamlining the code, and
the code, load-balancing
changing and changing load-balancing
tactics. tactics.
Item
Message Length 4G (100 Mbps) 5G (20 Gbps)
Phase
Registration phase (X-HFN) 736 bits 7.4 µs 0.037 µs
Production phase (PE-PM) 1760 bits 17.6 µs 0.088 µs
Process phase (PM-R) 2016 bits 20.2 µs 0.101 µs
Sale and Purchase phase (R-C) 4032 bits 40.3 µs 0.202 µs
Supervision Phase (R-C-MS) 3232 bits 32.32 µs 0.162 µs
Notes: Any user in the alliance chain (X); planting enterprise (PE); processing mechanism (PM); retailers (R);
consumers (C); market supervision (MS); hyperledger fabric network (HFN).
Phase\Party
Production phase\(PM) TEnc + 2TSig + TH
Process phase\(PE) 2TH + TEnc + TSig + TDec + TVer
Sale and Purchase phase\(R and C) 4TH + 2TEnc + 2TSig + 2TDec + 2TVer
Supervision Phase\(MS) 3TH + TEnc + 2TSig + 3TDec + 3TVer
Notes: TEnc : encryption operation, TDec : decryption operation, TSig : signature operation, TH : hash function
operation, and TVer : verify operation.
5.4. Comparison
Treiblmaier et al. [11] suggested applying blockchain technology to the food supply
chain to address the problem of multiple instances of information asymmetry by using it as
a label to identify blockchain-based traceability systems as a primary driver of perceived
product quality and purchase intentions. Paul et al. [12] proposed a workable architecture
to support a circular supply chain for the tea industry network that uses blockchain
technology as a substrate to drive RFID technology to complete the circular supply chain
operation, despite the fact that they did not specify the precise integrated procedure. The
circular blockchain platform developed by Centobelli et al. includes manufacturers, reverse
Sustainability 2023, 15, 13738 22 of 25
logistics service providers, selection centers, recycling facilities, and landfill applications
in a supply chain scenario (ref. [13]). However, the security of the proposed blockchain
platform was not investigated. Helo et al. [14] developed a cloud-based portal pilot system
for real-time logistics and supply chain tracking and tracing. Chang et al. [15] proposed that
blockchain and smart contract technology can support cross-enterprise business process
re-engineering and ensure the intelligent advancement of business processes through smart
contract technology within the framework of their proposed system in order to benefit
from the advantages of the blockchain platform. However, there is no logical justification
for the creation of smart contracts. A comparison of the proposed scheme’s functionality to
earlier designs is shown in Table 6.
6. Conclusions
In this paper, we provide a Hyperledger Fabric-based method for tracking manufactur-
ing data along the tea supply chain. We employ ECDSA and IPFS storage as well as smart
contracts to guarantee data confidentiality, integrity, non-repudiation, storage performance,
and automatic transaction triggering throughout the system to increase system efficiency.
The contributions that can be achieved are as follows:
(1) The addressing of the credit issue. The involvement of multiple institutions, each
of which oversees the others, ensures the accuracy of the information. Additionally,
the chain of information cannot be altered, considerably reducing the possibility
of cheating.
(2) The tracking of all records. Regarding the open, transparent, and capable express
logistics tracking of the manufacturing, processing, testing, transportation, and ware-
housing to the shelves of items for sale, each link in time following the point is
fully recorded.
(3) The definition of roles and the ability to track down issues. The open and transparent
features of blockchain cannot be altered. Finding the problematic link as soon as it
manifests itself in one link is both timely and efficient.
(4) The stopping of product counterfeiting. Since the products can be checked from the
source all the way to the customer’s hands when the information about the goods is
posted on the supply chain, there will not be a problem with counterfeiting.
In the future, we will focus on practical system application landing research. Blockchain
technology can help enterprises in the tea supply chain to achieve more accurate inventory
management and logistics distribution, thus improving their operational efficiency and
reducing costs. At the same time, blockchain technology can also help tea enterprises
to achieve reductions in carbon emissions and increased energy savings, so as to better
fulfill their social responsibility and environmental protection obligations. In summary, the
application of blockchain technology in the tea supply chain has a very broad prospect.
In the future, with the continuous development of technology and the continuous expan-
sion of the tea market, we believe that blockchain technology will play an increasingly
important role in the tea supply chain and contribute to the sustainable development of the
tea industry.
Sustainability 2023, 15, 13738 24 of 25
References
1. Hall, J. Environmental Supply Chain Innovation. In Greening the Supply Chain; Taylor & Francis, Ltd.: Milton Park, UK, 2001;
pp. 233–249.
2. Fawcett, S.E.; Jones, S.L.; Fawcett, A.M. Supply Chain Trust: The Catalyst for Collaborative Innovation. Bus. Horiz. 2012, 55,
163–178. [CrossRef]
3. Golosova, J.; Romanovs, A. The advantages and disadvantages of the blockchain technology. In Proceedings of the 2018 IEEE 6th
Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE), Vilnius, Lithuania, 8–10 November 2018.
[CrossRef]
4. Kuo, T.-T.; Kim, H.-E.; Ohno-Machado, L. Blockchain distributed Ledger Technologies for Biomedical and Health Care Applica-
tions. J. Am. Med. Inform. Assoc. 2017, 24, 1211–1220. [CrossRef] [PubMed]
5. Kim, S.; Kwon, Y.; Cho, S. A survey of scalability solutions on Blockchain. In Proceedings of the 2018 International Conference on
Information and Communication Technology Convergence (ICTC), Jeju, Republic of Korea, 17–19 October 2018. [CrossRef]
6. Zhang, R.; Xue, R.; Liu, L. Security and privacy on Blockchain. ACM Comput. Surv. 2019, 52, 1–34. [CrossRef]
7. Tea Market Revenue 2012–2025. Available online: https://www.statista.com/statistics/326384/global-tea-beverage-market-size/
(accessed on 13 February 2023).
8. Tea Production by Leading Producing Countries Worldwide 2021. Available online: https://www.statista.com/statistics/264188
/production-of-tea-by-main-producing-countries-since-2006/ (accessed on 12 December 2022).
9. Mangla, S.K.; Kazançoğlu, Y.; Yıldızbaşı, A.; Öztürk, C.; Çalık, A. A conceptual framework for blockchain-based Sustainable
Supply Chain and evaluating implementation barriers: A case of the Tea Supply Chain. Bus. Strategy Environ. 2022, 31, 3693–3716.
[CrossRef]
10. Bai, Y.; Fan, K.; Zhang, K.; Cheng, X.; Li, H.; Yang, Y. Blockchain-based trust management for Agricultural Green Supply: A game
theoretic approach. J. Clean. Prod. 2021, 310, 127407. [CrossRef]
11. Treiblmaier, H.; Garaus, M. Using blockchain to signal quality in the food supply chain: The impact on consumer purchase
intentions and the moderating effect of brand familiarity. Int. J. Inf. Manag. 2023, 68, 102514. [CrossRef]
12. Paul, T.; Islam, N.; Mondal, S.; Rakshit, S. RFID-integrated blockchain-driven circular supply chain management: A system
architecture for B2B tea industry. Ind. Mark. Manag. 2022, 101, 238–257. [CrossRef]
13. Centobelli, P.; Cerchione, R.; Vecchio, P.D.; Oropallo, E.; Secundo, G. Blockchain technology for Bridging Trust, traceability and
transparency in Circular Supply Chain. Inf. Manag. 2022, 59, 103508. [CrossRef]
14. Helo, P.; Shamsuzzoha, A.H.M. Real-time supply chain—A blockchain architecture for project deliveries. Robot. Comput.-Integr.
Manuf. 2020, 63, 101909. [CrossRef]
15. Chang, S.E.; Chen, Y.-C.; Lu, M.-F. Supply chain re-engineering using blockchain technology: A case of smart contract based
tracking process. Technol. Forecast. Soc. Chang. 2019, 144, 1–11. [CrossRef]
16. Li, X.; Jiang, P.; Chen, T.; Luo, X.; Wen, Q. A survey on the security of Blockchain Systems. Future Gener. Comput. Syst. 2020, 107,
841–853. [CrossRef]
17. Demestichas, K.; Peppes, N.; Alexakis, T.; Adamopoulou, E. Blockchain in agriculture traceability systems: A Review. Appl. Sci.
2020, 10, 4113. [CrossRef]
18. Basnayake, B.M.; Rajapakse, C. A blockchain-based decentralized system to ensure the transparency of Organic Food Supply
Chain. In Proceedings of the 2019 International Research Conference on Smart Computing and Systems Engineering (SCSE),
Colombo, Sri Lanka, 28 March 2019. [CrossRef]
Sustainability 2023, 15, 13738 25 of 25
19. Menon, S.; Jain, K. Blockchain technology for transparency in Agri-Food Supply Chain: Use cases, limitations, and Future
Directions. IEEE Trans. Eng. Manag. 2022, 1–15. [CrossRef]
20. Mirabelli, G.; Solina, V. Blockchain and agricultural supply chains traceability: Research trends and future challenges. Procedia
Manuf. 2020, 42, 414–421. [CrossRef]
21. Androulaki, E.; Barger, A.; Bortnikov, V.; Cachin, C.; Christidis, K.; De Caro, A.; Enyeart, D.; Ferris, C.; Laventman, G.; Manevich,
Y.; et al. Hyperledger fabric: A distributed operating system for permissioned blockchains. In Proceedings of the Thirteenth
EuroSys Conference, Porto, Portugal, 23–26 April 2018. [CrossRef]
22. Naveen, P.; Manikandan, P.; Maragatharajan, M.; Ashok Kumar, S.R.; Saravanan, M.; Puviarasu, A. Traceability of tea powder
supply chain based on Hyperledger Fabric. In Proceedings of the 3rd International Conference on Smart Electronics and
Communication (ICOSEC), Trichy, India, 20–22 October 2022. [CrossRef]
23. Hasan, I.; Habib, M.M. Blockchain technology: Revolutionizing Supply Chain Management. Int. Supply Chain Technol. J. 2022, 8.
[CrossRef]
24. Benet, J. Ipfs-content addressed, versioned, p2p file system. arXiv 2014, arXiv:1407.3561. [CrossRef]
25. Chen, Y.; Li, H.; Li, K.; Zhang, J. An improved P2P file system scheme based on ipfs and Blockchain. In Proceedings of the IEEE
International Conference on Big Data (Big Data), Boston, MA, USA, 11–14 December 2017. [CrossRef]
26. Johnson, D.; Menezes, A.; Vanstone, S. The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 2001, 1, 36–63.
[CrossRef]
27. Szydlo, M. Merkle tree traversal in log space and Time. Adv. Cryptol. EUROCRYPT 2004, 3027, 541–554. [CrossRef]
28. Tian, F. A supply chain traceability system for food safety based on HACCP, Blockchain Internet of Things. In Proceedings of the
International Conference on Service Systems and Service Management, Dalian, China, 16–18 June 2017. [CrossRef]
29. Callegati, F.; Cerroni, W.; Ramilli, M. Man-in-the-middle attack to the HTTPS protocol. IEEE Secur. Priv. Mag. 2009, 7, 78–81.
[CrossRef]
30. Mo, Y.; Sinopoli, B. Secure control against replay attacks. In Proceedings of the 47th Annual Allerton Conference on Communica-
tion, Control, and Computing (Allerton), Monticello, IL, USA, 30 September–2 October 2009. [CrossRef]
31. Wang, R.; Ye, K.; Meng, T.; Xu, C.-Z. Performance evaluation on Blockchain Systems: A case study on Ethereum, fabric, sawtooth
and Fisco-Bcos. Serv. Comput. SCC 2020, 12409, 120–134. [CrossRef]
32. A Peer-To-Peer Electronic Cash System. Available online: https://bitcoin.org/en/bitcoin-paper (accessed on 1 May 2023).
33. Ethereum.org. Available online: https://ethereum.org/en/ (accessed on 1 May 2023).
34. Hyperledger—Open Source Blockchain Technologies. Available online: https://www.hyperledger.org/ (accessed on 1 May 2023).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.