Abstract
Currently, the integration of the supply chain and blockchain is promising, as blockchain successfully eliminates the bullwhip effect in the supply chain. Generally, concurrent Practical Byzantine Fault Tolerance (PBFT) consensus method, named C-PBFT, is powerful to deal with the consensus inefficiencies, caused by the fast node expansion in the supply chain. However, due to the tremendous complicated transactions in the supply chain, it remains challenging to select the credible primary peers in the concurrent clusters. To address this challenge, the peers in the supply chain are classified into several clusters by analyzing the historic transactions in the ledger. Then, the primary peer for each cluster is identified by reputation assessment. Finally, the performance of C-PBFT is evaluated by conducting experiments in Fabric.
- Naif Alzahrani and Nirupama Bulusu. 2018. Block-supply chain: A new anti-counterfeiting supply chain using NFC and blockchain. In Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems. ACM, 30--35.Google Scholar
Digital Library
- H. Baghban, M. Moradi, C. Hsu, J. Chou, and Y. Chung. 2016. Byzantine fault tolerant optimization in federated cloud computing. In Proceedings of the IEEE International Conference on Computer and Information Technology (CIT’16). 658--661. DOI:https://doi.org/10.1109/CIT.2016.114Google Scholar
- Miguel Castro and Barbara Liskov. 2002. Practical Byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. 20, 4 (2002), 398--461.Google Scholar
Digital Library
- Mu-Chen Chen, Yu-Hsiang Hsiao, and Hsi-Yuan Huang. 2016. Semiconductor supply chain planning with decisions of decoupling point and VMI scenario. IEEE Trans. Syst. Man Cybernet.: Syst. 47, 5 (2016), 856--868.Google Scholar
Cross Ref
- Nicolas T. Courtois, Marek Grajek, and Rahul Naik. 2014. Optimizing sha256 in bitcoin mining. In Proceedings of the International Conference on Cryptography and Security Systems. Springer, 131--144.Google Scholar
Cross Ref
- Yi Cui, Jian Mou, Jason Cohen, and Yanping Liu. 2019. Understanding information system success model and valence framework in sellers’ acceptance of cross-border e-commerce: A sequential multi-method approach. Electron. Comm. Res. 19, 4 (2019), 885--914.Google Scholar
Cross Ref
- Stefano De Angelis, Leonardo Aniello, Roberto Baldoni, Federico Lombardi, Andrea Margheri, and Vladimiro Sassone. 2018. Pbft vs proof-of-authority: Applying the cap theorem to permissioned blockchain. In Italian Conference on Cyber Security, Milan, Italy. 11.Google Scholar
- Roshan S. Gaonkar and Nukala Viswanadham. 2007. Analytical framework for the management of risk in supply chains. IEEE Trans. Autom. Sci. Eng. 4, 2 (2007), 265--273.Google Scholar
Cross Ref
- G. Golan Gueta, I. Abraham, S. Grossman, D. Malkhi, B. Pinkas, M. Reiter, D. Seredinschi, O. Tamir, and A. Tomescu. 2019. SBFT: A scalable and decentralized trust infrastructure. In Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’19). 568--580. DOI:https://doi.org/10.1109/DSN.2019.00063Google Scholar
- Weijie Guo, Huan Qi, and Qiujun Guo. 2009. An E-commerce-based supply chain model of chain catering enterprises. In Proceedings of the International Conference on Management of e-Commerce and e-Government. IEEE, 322--325.Google Scholar
Digital Library
- Lili He, Hongtao Bai, Dantong Ouyang, Changshuai Wang, Chong Wang, and Yu Jiang. 2019. Satellite cloud-derived wind inversion algorithm using GPU. Comput. Mater. Contin. 60, 2 (2019), 599--613.Google Scholar
Cross Ref
- Junqin Huang, Linghe Kong, Guihai Chen, Min-You Wu, Xue Liu, and Peng Zeng. 2019. Towards secure industrial IoT: Blockchain system with credit-based consensus mechanism. IEEE Trans. Industr. Info. 15, 6 (2019), 3680--3689.Google Scholar
Cross Ref
- Ke Huang, Xiaosong Zhang, Yi Mu, Xiaofen Wang, Guomin Yang, Xiaojiang Du, Fatemeh Rezaeibagha, Qi Xia, and Mohsen Guizani. 2019. Building redactable consortium blockchain for industrial Internet-of-Things. IEEE Trans. Industr. Info. 15, 6 (2019), 3670--3679.Google Scholar
Cross Ref
- Randhir Kumar and Rakesh Tripathi. 2019. Traceability of counterfeit medicine supply chain through Blockchain. In Proceedings of the 11th International Conference on Communication Systems and Networks (COMSNETS’19). IEEE, 568--570.Google Scholar
Cross Ref
- Wei Liang, Mingdong Tang, Jing Long, Xin Peng, Jianlong Xu, and Kuan-Ching Li. 2019. A secure fabric blockchain-based data transmission technique for industrial Internet-of-Things. IEEE Trans. Industr. Info. 15, 6 (2019), 3582--3592.Google Scholar
Cross Ref
- Dongxiao Liu, Amal Alahmadi, Jianbing Ni, Xiaodong Lin, and Xuemin Shen. 2019. Anonymous reputation system for iiot-enabled retail marketing atop pos blockchain. IEEE Trans. Industr. Info. 15, 6 (2019), 3527--3537.Google Scholar
Cross Ref
- Wenjian Luo, Hao Jiang, and Dongdong Zhao. 2017. Rating credits of online merchants using negative ranks. IEEE Trans. Emerg. Topics Comput. Intell. 1, 5 (2017), 354--365.Google Scholar
Cross Ref
- Daniel Miehle, Dominic Henze, Andreas Seitz, Andre Luckow, and Bernd Bruegge. 2019. PartChain: A decentralized traceability application for multi-tier supply chain networks in the automotive industry. In Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON’19). IEEE, 140--145.Google Scholar
Cross Ref
- Janet E. Milne. 2019. Environmental taxation in the digital world. In Environmental Fiscal Challenges for Cities and Transport. Edward Elgar Publishing.Google Scholar
- Saikat Mondal, Kanishka Wijewardena, Saranraj Karuppuswami, Nitya Kriti, Deepak Kumar, and Premjeet Chahal. 2019. Blockchain inspired RFID-based information architecture for food supply chain. IEEE Internet Things J. 6, 3 (2019), 5803--5813.Google Scholar
- Domantas Pelaitis and Georgios Spathoulas. 2018. Developing a universal, decentralized and immutable Erasmus credit transfer system on blockchain. In Proceedings of the Innovations in Intelligent Systems and Applications (INISTA’18). IEEE, 1--6.Google Scholar
Cross Ref
- Daniel Prajogo, Carlos Mena, and Anand Nair. 2017. The fit between supply chain strategies and practices: A contingency approach and comparative analysis. IEEE Trans. Eng. Manage. 65, 1 (2017), 168--180.Google Scholar
Cross Ref
- Lianyong Qi, Yi Chen, Yuan Yuan, Shucun Fu, Xuyun Zhang, and Xiaolong Xu. 2019. A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems. World Wide Web 23, 2 (2019), 1275--1297.Google Scholar
Cross Ref
- Pradip Kumar Sharma, Neeraj Kumar, and Jong Hyuk Park. 2018. Blockchain-based distributed framework for automotive industry in a smart city. IEEE Trans. Industr. Info. 15, 7 (2018), 4197--4205.Google Scholar
Cross Ref
- Harish Sukhwani, José M. Martínez, Xiaolin Chang, Kishor S. Trivedi, and Andy Rindos. 2017. Performance modeling of pbft consensus process for permissioned blockchain network (hyperledger fabric). In Proceedings of the IEEE 36th Symposium on Reliable Distributed Systems (SRDS’17). IEEE, 253--255.Google Scholar
Cross Ref
- Pang Sulin, Liu Yongqing, Wang Yanming, and Yao Hongzhu. 2001. The credit-risk decision mechanism on fixed loan interest rate with imperfect information. J. Syst. Eng. Electron. 12, 3 (2001), 20--24.Google Scholar
- Yingjie Wang, Zhipeng Cai, Guisheng Yin, Yang Gao, Xiangrong Tong, and Guanying Wu. 2016. An incentive mechanism with privacy protection in mobile crowdsourcing systems. Comput. Netw. 102 (2016), 157--171.Google Scholar
Digital Library
- Yingjie Wang, Zhipeng Cai, Zhi-Hui Zhan, Yue-Jiao Gong, and Xiangrong Tong. 2019. An optimization and auction-based incentive mechanism to maximize social welfare for mobile crowdsourcing. IEEE Trans. Comput. Soc. Syst. 6, 3 (2019), 414--429.Google Scholar
Cross Ref
- Yuntao Wang, Zhou Su, and Ning Zhang. 2019. BSIS: Blockchain-based secure incentive scheme for energy delivery in vehicular energy network. IEEE Trans. Industr. Info. 15, 6 (2019), 3620--3631.Google Scholar
Cross Ref
- Yao-Yu Wang, Zhongsheng Hua, Jian-Cai Wang, and Fujun Lai. 2017. Equilibrium analysis of markup pricing strategies under power imbalance and supply chain competition. IEEE Trans. Eng. Manage. 64, 4 (2017), 464--475.Google Scholar
Cross Ref
- Yifei Wei, Zhaoying Wang, Da Guo, and F. Richard Yu. 2019. Deep q-learning-based computation offloading strategy for mobile edge computing. Comput. Mater. Contin. 59, 1 (2019), 89--104.Google Scholar
Cross Ref
- Zhe Yang, Kan Yang, Lei Lei, Kan Zheng, and Victor C. M. Leung. 2018. Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J. 6, 2 (2018), 1495--1505.Google Scholar
Cross Ref
- Xu Zhang, Wenpeng Lu, Fangfang Li, Xueping Peng, and Ruoyu Zhang. 2019. Deep feature fusion model for sentence semantic matching. Comput. Mater. Contin. 61, 2 (2019), 601--616.Google Scholar
Cross Ref
- Kai Zheng, Ying Liu, Chuanyu Dai, Yanli Duan, and Xin Huang. 2018. Model checking PBFT consensus mechanism in healthcare blockchain network. In Proceedings of the 9th International Conference on Information Technology in Medicine and Education (ITME’18). IEEE, 877--881.Google Scholar
Cross Ref
Index Terms
Concurrent Practical Byzantine Fault Tolerance for Integration of Blockchain and Supply Chain
Recommendations
Blockchain-enabled supply chain: An experimental study
Highlights- There is a lack of studies in the field of blockchain applied to supply chains.
AbstractDespite Information and Communication Technologies (ICT) have reduced the information asymmetry and increased the degree of interorganizational collaboration, the companies participating a supply chain are less inclined to share data ...
Context-Aware Blockchain-Based Sustainable Supply Chain Visibility Management
AbstractSupply chain visibility allows a state of being able to see end to end in a supply chain. Sustainable supply chain visibility is premised on sharing of mutually benefiting information, to achieve associated sustainability objectives including ...
Blockchain-enabled supply chain: analysis, challenges, and future directions
AbstractManaging the integrity of products and processes in a multi-stakeholder supply chain environment is a significant challenge. Many current solutions suffer from data fragmentation, lack of reliable provenance, and diverse protocol regulations ...






Comments