International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 4 | Views: 99 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Computer Science & Engineering | India | Volume 10 Issue 6, June 2021


Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth [2] | K. Venkata Ramana [2]


Abstract: The expatiation of increase in demand variations in today?s globalized supply chain economy is disruptive, costly which is every supply chain management wants to reduce. The traditional supply chain management system?s attribute to high complex centralized organizational structures, increased costs throughout Supply Chain, Poor system design; need for improved speed, quality and service. The speed, expenditure and levels of security employed in traditional supply chain management model depends on few hands in the organizational committee. Hence, this dynamic behaviour of customers indicates the need for a secure, decentralized and a trusted environment to function with. Decentralization improves the performance of Supply Chain in its way of distributing its decisions on financial aspects. The most erupting technology - Blockchain provides an efficient and viable solutions to the aforementioned hurdles that are restricting today?s supply chain. Through blockchain, massive networks of decentralized autonomous individuals and organizations can grow and operate seamlessly within a decentralized, distributed operating platform. The problems that arise in blockchain can be like ? changing fair data to malicious data that is collected from web pages, Synchronization of information and data in the network, disruption to services etc. In this paper an efficient top-down method is employed for testing various participating entities and modules in this Supply Chain Model. An in-depth analysis for the root-cause of different kinds of threats, vulnerabilities and risks is conducted on the supply chain management system as simulated in various environments.


Keywords: Supply chain management, Blockchain, Attacks, Secure methods, JVM environment


Edition: Volume 10 Issue 6, June 2021,


Pages: 1240 - 1249


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top