International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 2

Research Paper | Computer Science & Engineering | India | Volume 10 Issue 6, June 2021


Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana


Abstract: The expatiation of increase in demand variations in today?s globalized supply chain economy is disruptive, costly which is every supply chain management wants to reduce. The traditional supply chain management system?s attribute to high complex centralized organizational structures, increased costs throughout Supply Chain, Poor system design; need for improved speed, quality and service. The speed, expenditure and levels of security employed in traditional supply chain management model depends on few hands in the organizational committee. Hence, this dynamic behaviour of customers indicates the need for a secure, decentralized and a trusted environment to function with. Decentralization improves the performance of Supply Chain in its way of distributing its decisions on financial aspects. The most erupting technology - Blockchain provides an efficient and viable solutions to the aforementioned hurdles that are restricting today?s supply chain. Through blockchain, massive networks of decentralized autonomous individuals and organizations can grow and operate seamlessly within a decentralized, distributed operating platform. The problems that arise in blockchain can be like ? changing fair data to malicious data that is collected from web pages, Synchronization of information and data in the network, disruption to services etc. In this paper an efficient top-down method is employed for testing various participating entities and modules in this Supply Chain Model. An in-depth analysis for the root-cause of different kinds of threats, vulnerabilities and risks is conducted on the supply chain management system as simulated in various environments.


Keywords: Supply chain management, Blockchain, Attacks, Secure methods, JVM environment


Edition: Volume 10 Issue 6, June 2021,


Pages: 1240 - 1249


How to Cite this Article?

B. Ratnakanth, K. Venkata Ramana, "Secure Methods for Supplychain Management to Protect from Attacks in Blockchain", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SR21601194731, Volume 10 Issue 6, June 2021, 1240 - 1249

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Supply chain management'

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 959 - 963

An Analysis of Business Framework in identifying Customer Driven Demand Discovery

Are Karunakar Reddy, Gunna Kishore

Share this Article

Downloads: 126

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 8, August 2020

Pages: 600 - 606

Efficient Methods to Avoid Smart Contract Vulnerabilities Using Block Chain

B. Ratnakanth, M. Sahiti, Dr. K. Venkata Ramana

Share this Article

Similar Articles with Keyword 'Blockchain'

Downloads: 0

Research Paper, Computer Science & Engineering, China, Volume 10 Issue 12, December 2021

Pages: 820 - 822

Research on Public Opinion Security under Blockchain Architecture

Wang Hong-Mei

Share this Article

Downloads: 3

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 1292 - 1297

Supply Chain Using Blockchain (Healthcare Industry)

Prof. Mangesh G. Ingale, Shyam Jamman Parmeshwar, Yash G. Purohit, Divyani Sable, Vishaksha Kachane

Share this Article

Similar Articles with Keyword 'Attacks'

Downloads: 134

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 12, December 2021

Pages: 1257 - 1264

Digital Image Watermarking Technique Using Discrete Wavelet Transform and Discrete Cosine Transform

Bhupendra Ram

Share this Article

Similar Articles with Keyword 'Supply'

Downloads: 156

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 7, July 2021

Pages: 662 - 665

Optimal Inventory Allocation in Supply Chain Using Decision Optimization

S Suraj, Dr. K Badari Nath

Share this Article

Similar Articles with Keyword 'chain'

Downloads: 156

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, China, Volume 10 Issue 12, December 2021

Pages: 820 - 822

Research on Public Opinion Security under Blockchain Architecture

Wang Hong-Mei

Share this Article

Similar Articles with Keyword 'management'

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 156 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article
Top