Journal of Information Technology

An Application of Blockchain to Secure the Conventional Product Authentication Management System

Main Article Content

Md. Azizul Hakim Sowrov
Md Asaduzzaman
Ifthekharul Islam
Md Mushfiqur Rahman
Rashed Mazumder

Abstract

 Products counterfeit is a multi-billion dollars market, and the growth of this field is high. There have
been many technological enhancements like Radio Frequency Identification (RFID) and Encrypted Quick
Response (EQR) code. These technologies have been used to track down those products in the supply chain
downstream and identify products for authenticity. Under these circumstances, all existing solutions must rely on
a central database for operating. The matter of this subject points out the drawback of single point of failure. As a
result, these systems are more prone to cyber-attacks. In some cases, supply chain insiders play as a bad actor of
the system too. To prevent this, tracing concrete proof of provenance of transactions is needed. In addition,
business operations require contract and consensus. These can be solved using blockchain technology. As
business requires privacy and cannot rely on public network. Thus, the solution of this need requires to be built
enterprise blockchain environment. 

Article Details

Section
Articles