Font Size: a A A

Research On Key Technologies Of Supply Chain Traceability Management Based On Blockchain

Posted on:2022-11-16Degree:MasterType:Thesis
Country:ChinaCandidate:H W YeFull Text:PDF
GTID:2518306611494784Subject:Enterprise Economy
Abstract/Summary:PDF Full Text Request
At present,supply chain traceability systems are usually deployed by core enterprises,and most of them adopt centralized design.In this mode,there are some problems,such as regulatory censure,opaque data,information blocking,single traceability information and so on.Under the premise of not introducing third-party intermediaries,blockchain can provide decentralized,untampered,safe and reliable characteristics,which is very consistent with the business characteristics of the supply chain.However,in the supply chain traceability management scheme based on block chain,blockchain will disclose the information of corporate privacy data to promote the consensus among nodes in the chain,resulting in insufficient security of corporate privacy data.Most of the block chain consensus algorithms in the scheme directly use the practical Byzantine fault-tolerant algorithm,which has the problems of high communication overhead and poor scalability.In the current scheme,the relationship between the view conversion protocol and the node rotation mechanism is weak,which leads to the instability of block chain consensus.In order to solve the above problems,this paper designs a supply chain traceability-oriented blockchain model from the perspectives of supply chain data encryption mode,block chain consensus algorithm optimization and node rotation system with security standards.The specific work is as follows:1.In order to solve the problem of insufficient security of enterprise privacy data on block chain,a block chain privacy protection scheme based on hybrid encryption is proposed.Choose elliptic curve cryptography algorithm and advanced encryption standard as algorithm combination,design ECC-AES hybrid encryption algorithm,protect enterprise privacy data on the chain under the premise of preventing attackers from intercepting and tampering,have excellent encryption strength,and ensure the security and reliability of enterprise privacy data.The results of numerical examples show that the ECC-AES algorithm has high encryption intensity,short encryption time and good "avalanche effect".The proposed scheme can ensure the security and reliability of enterprise privacy data.2.In view of the single loophole in the practical Byzantine fault-tolerant algorithm and the high communication overhead caused by pairwise interaction in the consensus confirmation phase,a practical Byzantine fault-tolerant algorithm based on secret sharing is proposed.This new algorithm uses the secret sharing scheme to enable each node participating in the consensus to jointly keep the data information without knowing the complete information,so as to prevent the information from being lost,destroyed and tampered with.Meanwhile,the threshold setting in the scheme can also eliminate the single point of loophole,optimize the consistency protocol,and no longer need the client to participate in the reply,which simplifies the consensus confirmation phase,so as to reduce the communication overhead to O(Nlog2N).3.In this paper,a view conversion protocol based on node rotation is proposed.In view of the weak relationship between the block chain view conversion protocol and the node rotation mechanism in the current research,a node rotation mechanism based on integral is designed to quantify the trust relationship between nodes and promote the healthy competition between different nodes.The corresponding view conversion protocol is designed on the basis of node rotation,and the node list and view are updated dynamically and periodically,which ensures the safety and reliability of the nodes participating in the block chain consensus process,and enhances the success rate and stability of the block chain consensus.Finally,improve the performance of the whole block chain.4.A supply chain-oriented block chain traceability model is established,which is composed of bottom identity module,strategy module,block chain module,intelligent contract module and upper application.In this paper,the running process of the model is described in detail,and the performance of the model is analyzed from three aspects:robustness,security and consistency.through a simulation example,the throughput and network bandwidth of the model under different algorithms are compared,which proves the advantage and feasibility of the model.
Keywords/Search Tags:Supply chain, Blockchain, Consensus protocol, Encryption algorithm, View transformation agreement
PDF Full Text Request
Related items