International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 4 | Views: 189 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Computer Science & Engineering | India | Volume 10 Issue 6, June 2021 | Popularity: 5.2 / 10


     

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana


Abstract: The expatiation of increase in demand variations in today?s globalized supply chain economy is disruptive, costly which is every supply chain management wants to reduce. The traditional supply chain management system?s attribute to high complex centralized organizational structures, increased costs throughout Supply Chain, Poor system design; need for improved speed, quality and service. The speed, expenditure and levels of security employed in traditional supply chain management model depends on few hands in the organizational committee. Hence, this dynamic behaviour of customers indicates the need for a secure, decentralized and a trusted environment to function with. Decentralization improves the performance of Supply Chain in its way of distributing its decisions on financial aspects. The most erupting technology - Blockchain provides an efficient and viable solutions to the aforementioned hurdles that are restricting today?s supply chain. Through blockchain, massive networks of decentralized autonomous individuals and organizations can grow and operate seamlessly within a decentralized, distributed operating platform. The problems that arise in blockchain can be like ? changing fair data to malicious data that is collected from web pages, Synchronization of information and data in the network, disruption to services etc. In this paper an efficient top-down method is employed for testing various participating entities and modules in this Supply Chain Model. An in-depth analysis for the root-cause of different kinds of threats, vulnerabilities and risks is conducted on the supply chain management system as simulated in various environments.


Keywords: Supply chain management, Blockchain, Attacks, Secure methods, JVM environment


Edition: Volume 10 Issue 6, June 2021


Pages: 1240 - 1249



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
B. Ratnakanth, K. Venkata Ramana, "Secure Methods for Supplychain Management to Protect from Attacks in Blockchain", International Journal of Science and Research (IJSR), Volume 10 Issue 6, June 2021, pp. 1240-1249, https://www.ijsr.net/getabstract.php?paperid=SR21601194731, DOI: https://www.doi.org/10.21275/SR21601194731



Similar Articles

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022

Pages: 629 - 634

A Face Spoof Detection using Feature Extraction and SVM

Lovely Pal, Renuka Singh

Share this Article

Downloads: 0

Review Papers, Computer Science & Engineering, India, Volume 12 Issue 6, June 2023

Pages: 899 - 902

Pharmaceutical Supply Chain Using Blockchain Technology

Shivangi Sharma, Meenu

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya, R. Sathya

Share this Article



Top