International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 1

Research Paper | Computer Science & Engineering | India | Volume 10 Issue 6, June 2021

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

The expatiation of increase in demand variations in today?s globalized supply chain economy is disruptive, costly which is every supply chain management wants to reduce. The traditional supply chain management system?s attribute to high complex centralized organizational structures, increased costs throughout Supply Chain, Poor system design; need for improved speed, quality and service. The speed, expenditure and levels of security employed in traditional supply chain management model depends on few hands in the organizational committee. Hence, this dynamic behaviour of customers indicates the need for a secure, decentralized and a trusted environment to function with. Decentralization improves the performance of Supply Chain in its way of distributing its decisions on financial aspects. The most erupting technology - Blockchain provides an efficient and viable solutions to the aforementioned hurdles that are restricting today?s supply chain. Through blockchain, massive networks of decentralized autonomous individuals and organizations can grow and operate seamlessly within a decentralized, distributed operating platform. The problems that arise in blockchain can be like ? changing fair data to malicious data that is collected from web pages, Synchronization of information and data in the network, disruption to services etc. In this paper an efficient top-down method is employed for testing various participating entities and modules in this Supply Chain Model. An in-depth analysis for the root-cause of different kinds of threats, vulnerabilities and risks is conducted on the supply chain management system as simulated in various environments.

Keywords: Supply chain management, Blockchain, Attacks, Secure methods, JVM environment

Edition: Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Share this Article

How to Cite this Article?

B. Ratnakanth, K. Venkata Ramana, "Secure Methods for Supplychain Management to Protect from Attacks in Blockchain", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SR21601194731, Volume 10 Issue 6, June 2021, 1240 - 1249

Enter Your Email Address


Similar Articles with Keyword 'Supply chain management'

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 959 - 963

An Analysis of Business Framework in identifying Customer Driven Demand Discovery

Are Karunakar Reddy, Gunna Kishore

Share this Article

Downloads: 125

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 8, August 2020

Pages: 600 - 606

Efficient Methods to Avoid Smart Contract Vulnerabilities Using Block Chain

B. Ratnakanth, M. Sahiti, Dr. K. Venkata Ramana

Share this Article

Similar Articles with Keyword 'Blockchain'

Downloads: 3

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 1292 - 1297

Supply Chain Using Blockchain (Healthcare Industry)

Prof. Mangesh G. Ingale, Shyam Jamman Parmeshwar, Yash G. Purohit, Divyani Sable, Vishaksha Kachane

Share this Article

Downloads: 73

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Similar Articles with Keyword 'Attacks'

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'Supply'

Downloads: 156

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 7, July 2021

Pages: 662 - 665

Optimal Inventory Allocation in Supply Chain Using Decision Optimization

S Suraj, Dr. K Badari Nath

Share this Article

Similar Articles with Keyword 'chain'

Downloads: 156

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 7, July 2021

Pages: 662 - 665

Optimal Inventory Allocation in Supply Chain Using Decision Optimization

S Suraj, Dr. K Badari Nath

Share this Article

Similar Articles with Keyword 'management'

Downloads: 105 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 155 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article
Top