1. Introduction
1.1. Background
During periods of economic development, many supply chain industries adopt a linear economic model in which a large number of raw materials are extracted and turned into products that are not reused or recycled. This economic model can lead to the destruction of our environmental resources such as air, water, and land [1]. As a result, many supply chain industries are gradually moving towards a circular economy, where product design and manufacturing take into account sustainability and the longest possible period of high-value utilization. However, due to the involvement of multiple stakeholders in the supply chain, it is easy to encounter difficulties in information tracing, information falsification, and trust crises during the various lifecycle stages of production [2]. Therefore, this study aims to use blockchain technology to address issues of product information authenticity and stakeholder trust in the tea supply chain and establish a recyclable model of the tea supply chain.
Blockchain technology is a decentralized ledger. Firstly, the ledger is transparent, and multiple users can verify the information recorded in the ledger, achieving data transparency within the blockchain [3]. Secondly, the blockchain is a distributed database maintained by multiple nodes and not owned by any individual, which makes the data in the blockchain immutable [4]. Thirdly, the data in the blockchain are stored in a Merkle tree structure and combined with cryptography to achieve accurate data verification and encryption of data information [5]. Finally, blockchain does not rely on a central authority for management, which can effectively avoid issues such as information leakage or data tampering caused by hacker attacks through its decentralized mechanism [6].
There are two reasons for studying the tea supply chain in this paper. Firstly, tea is popular worldwide, with a global tea market value of about USD 209.3 billion in 2022, expected to rise to USD 266.7 billion by 2025 [7]. Tea has a long history of popularity globally, originating in China, where approximately 3.12 million tons of tea were produced in 2021, up from about 2.74 million tons in 2020 [8]. India, China, Sri Lanka, and Kenya are the world’s largest tea exporting countries, with China exporting USD 1.6 billion, Sri Lanka exporting USD 1.5 billion, and Kenya exporting USD 1.4 billion in 2017 [9]. Secondly, there are many problems in the current tea supply chain network, such as poor information utilization, chaotic regulatory systems, and a lack of traceable monitoring systems [10].
1.2. Related Works
The usage of blockchain technology is currently a popular approach in the field of supply chain research to guarantee the traceability of each link in the supply chain process. Due to the limited storage space on the public chain, which is the format chosen for the study, it may be challenging to solve the resource access problem. Table 1 contains a list of the pertinent books, some of which are still difficult to understand. Treiblmaier et al. [11] suggest using blockchain technology to connect the food supply chain to address the problem of multiple information asymmetry, using it as a label that recognizes information based on a traceability system as a key factor in what consumers think of the product and their intent to purchase. Paul et al. [12] proposed a practical model to support a circular supply chain in the tea industry network, which completes the circular supply chain by using blockchain technology as a substrate to drive RFID technology. Paul et al. explored the possibility of combining multiple modules in the system with RFID technology by analyzing multiple existing system models, but they did not specify the specific combination process. Centobelli et al. [13] designed a circular blockchain platform that includes manufacturers, reverse logistics service providers, selection centers, recycling centers, and landfill applications in a supply chain scenario. However, the proposed blockchain platform was not analyzed for security. Helo et al. [14] proposed a pilot cloud-based portal system for real-time tracking and tracing of logistics and supply chains. And a detailed design of how the triple-loop framework of the system utilizes blockchain qualities is presented. Chang et al. [15] proposed the concept that blockchain and smart contract technology can help in business process re-engineering across enterprises and, through smart contract technology in their proposed system framework, ensure the intelligent advancement of business processes to be able to take advantage of the advantageous features of the blockchain platform. However, no logical description is given for the writing of smart contracts.
Based on reading the literature combined with the research in this paper, it is concluded that the specific problems are:
(1). Redundancy of information and information asymmetry in the process of tea farming until tea selling;
(2). Because tea is a non-standardized product and the tea supply chain network’s standardization is low, it can only be identified by tea tasters and tea artists (experienced people), so there is personal subjectivity;
(3). Complex distribution channels for tea, where the source is difficult to determine and the quality cannot be ascertained, can easily give rise to the problem of substandard or counterfeit products.
(4). The traditional tea supply chain lacks digital management due to the low adoption of information technology across all stages. There is poor information exchange and interaction, making it difficult for consumers to access comprehensive information.
Given the above problems, this study will create a secure channel using Hyperledger Fabric, a blockchain 3.0 federation chain technology, to pull the stakeholders in the tea supply chain into the channel. Due to the native nature of the Hyperledger Fabric channel, the various entities in the channel can share data securely, encrypt the required data using the private key generated by ECDSA, then use the algorithm known as Elliptic Curve Digital Signature Algorithm (ECDSA) to digitally sign the data at different stages of transmission. To solve the blockchain block capacity problem, an IPFS file storage system is introduced to store all the data recorded during the tea production process to ensure the quality of the tea and solve the tea anti-counterfeiting problem. Finally, all data will be hashed, the hash value will be uploaded to the chain, and the data will be made into a unique traceability code to follow the outer packaging of tea for identification between entities.
The research objectives of this study that can be achieved under the traditional tea supply chain model are as follows:
(1). Solve the credit problem: There is more than one institution involved, and each institution supervises the other, thus ensuring the accuracy of the information and ensuring that the information on the chain cannot be tampered with, which greatly reduces the chance of cheating.
(2). The whole record tracking: Relative to keeping the express logistics tracking open, transparent, and able to track the production, processing, testing, transportation, and warehousing of goods for sale, each link of time after the point is recorded in full.
(3). Clear responsibilities and traceability of problems: The characteristics of blockchain, namely, openness and transparency, cannot be tampered with. Once a problem occurs at a certain link, it is timely and effective to find out where the problem link occurs.
(4). Prevent commodity counterfeiting: After the information about the goods is put on the chain, the whole process is open and transparent, and the products from the source down to the hands of customers can be checked so that there is no problem of counterfeiting.
The format of this essay is as follows. The major technologies employed in this paper’s system are introduced in Section 2 of the text; Section 3 describes the main processes of the system operation as well as the architecture; Section 4 performs the security analysis; Section 5 discusses the performance analysis and comparison; finally, in Section 6, we conclude our scheme.
2. Preliminary
2.1. Blockchain
Blockchain is a decentralized, distributed ledger technology for recording and verifying transactions. It ensures the security and integrity of transaction data through cryptography and distributed consensus algorithms, making it impossible for transactions to be tampered with or forged. Due to its decentralized nature, blockchain technology is widely used in digital currency, smart contracts, supply chain management, asset management, and other fields [16].
Blockchain technology is a very promising technology when it comes to the tea industry since it can offer answers for transparency, safety, and traceability in the tea supply chain. Blockchain is a decentralized digital ledger that can keep track of transactions without requiring centralization [17]. The technology is unique in that it ensures transparency and security of transactions, as the record of transactions cannot be tampered with or deleted. In the tea supply chain, blockchain technology can be used to track the entire process of tea production, processing, packaging, and transportation and to ensure its authenticity and integrity [18]. Because the tea supply chain usually involves multiple participants, such as farmers, processors, retailers, and consumers, all of these participants can use blockchain to record and track the transaction records of tea. Through blockchain technology, participants in the tea supply chain can share the same transaction information, thus enabling real-time information sharing and collaboration and reducing un-necessary human intervention and errors.
In addition, blockchain technology can also ensure the quality and security of the tea supply chain. Through blockchain technology, the production and processing of tea can be traced, thus determining the quality and security of the beverage [19]. For example, if there is a problem with a batch of tea, the participants can use blockchain technology to determine where and when the problem occurred and find the source of the tea so that appropriate measures can be taken to prevent the problem from expanding.
2.2. Hyperledger Fabric
Hyperledger Fabric is an open source blockchain framework designed to provide a customizable, scalable, and highly secure blockchain solution for enterprise-class applications [20]. Unlike other public blockchains, Hyperledger Fabric has many customization features that can be configured to meet different business needs. It supports smart contracts that enable various forms of business logic while providing strict permission control to ensure the confidentiality and security of data and transactions.
In the past, the management of tea supply chains was usually conducted manually, which led to many problems, such as opaque information, frequent errors, difficulty tracking, and so on. This article uses Hyperledger Fabric technology to manage the supply chain for tea to address these issues. The enterprise-level blockchain system Hyperledger Fabric satisfies the supply chain for tea’s requirements for efficiency, dependability, and security.
-
(1). Data privacy and security: Hyperledger Fabric uses a multi-tier architecture and smart contracts to ensure data privacy and security [21]. All data in the tea supply chain are encrypted and can only be decrypted by authorized participants.
-
(2). Management and tracking: Hyperledger Fabric allows every participant in the tea supply chain to track every step of the tea’s transportation, processing, quality testing, and sales. This means that all participants in the tea supply chain can know the real-time status of the tea at all times, allowing them to better manage and plan the flow of tea [22].
-
(3). Transparency and trust: Hyperledger Fabric can also establish an environment of transparency and trust, and through blockchain technology [23], all participants in the tea supply chain can view and verify information on the origin, processing, inspection, and quality of tea, thus ensuring the authenticity and quality of tea.
2.3. Inter Planetary File System (IPFS)
The Inter Planetary File System (IPFS) is a peer-to-peer distributed file storage and sharing protocol. It is designed to create a decentralized global file system that enables users to share and access files over the Internet without relying on centralized servers [24]. IPFS guarantees data uniqueness and reliability through hash addresses and content addressing and uses peer-to-peer network protocols to transfer data, improving the speed and security of file transfers [25]. By using this technology, the proposed scheme has the following advantages:
(1). Data storage: the tea supply chain involves a large number of data, including production, processing, transportation, and quality inspection data. The use of IPFS can store these data on distributed nodes, avoiding the problem of a single point of failure, and can improve the reliability and security of the data.
(2). Traceability: Customers should be able to trace the origin and production process of their tea. To enhance trustworthiness, details such as where and how the tea is grown, harvested, and processed can be recorded on the blockchain using IPFS. This allows customers to easily verify the authenticity and traceability of the tea online.
2.4. Elliptic Curve Digital Signature Algorithm (ECDSA)
The elliptic curve digital signature algorithm (ECDSA) was standardized by IEEE and NIST in 2000 [26]. There is no sub-exponential time solution to the elliptic curve discrete logarithm problem (ECDLP), in contrast to the integer factorization problem (IFP). ECDLP has advantages, including shorter keys, shorter signatures, and quicker calculation times. With Hyperledger Fabric, ECDSA may be employed, partially resolving the issue of insufficient processing and storage resources.
Assume that role A signs the message with m in the signer’s capacity, role B evaluates the message’s legitimacy in the verifier’s capacity, and A selects the elliptic curve’s parameters as , , and . This generates the roles of an A key pair , a private key , and a public key, each of which is .
Parameters selection:
-
(1). Elliptic curve equation : This represents an elliptic curve that has a definite shape.
-
(2). Base point: A point G on the curve is chosen as the base point.
-
(3). Large prime number: A random number is chosen as the modulus n, which is usually a very large prime number.
-
(4). Private key: A random number d is chosen as the private key.
-
(5). Public key: The public key Q is calculated as the product of the base point G and the private key d.
Role A uses the following steps to complete the signature:
-
(1). Role A chooses a base point and an elliptic curve .
-
(2). Role A picks the numbers and , which are in the order of at random.
-
(3). Role A does the information hash calculation.
-
(4). Role A figures out a point .
-
(5). After role A calculates and , it sends role B the result of its ECDSA signature, which is and .
Role B uses the following steps to complete the verification:
-
(1). Role B calculates the m, hash.
-
(2). Role B determines and .
-
(3). Role B determines .
-
(4). The verification of the signature is successful if .
3. System Overview
3.1. System Architecture
As illustrated in Figure 1, we propose an architecture for a consortium blockchain network in this study. The system design consists of three key components that make up the architecture of the consortium’s distributed ledger service center: the blockchain network component, the application development and service component, and the data storage module. User entities joining the federation chain store data in the Data Storage Component via a client in the Application Component and subsequently interact with the Hyperledger Fabric Network with the address information it returns along with other transaction-required information.
-
(1). Tea Planting Enterprise (PE)
The whole tea supply chain starts with tea farmers planting tea leaves, and the professional inspectors monitor their air temperature and humidity, light level, soil temperature, humidity, pH value, planting location, and other environmental data during the planting cycle. At the same time, we collect records of agricultural operations such as plot sowing, fertilization, and irrigation and take high-definition pictures of the whole growth cycle. After ensuring the quality of the picked tea leaves, they are transported to the tea processing facility.
-
(2). Processing Mechanism (PM)
The tea processing process broadly consists of various steps such as killing, withering, kneading, fermentation, drying, etc. Different processing steps are carried out by different types of tea leaves. In the overall processing chain, professionals monitor the operation process to control the details of each operation, record all the operation data, and write the operation data and all the planting data of the planting enterprise into the tea traceability code. Finally, the processed tea leaves are transported to the distributors along with the traceability code.
-
(3). Retailers (R)
After receiving the processed tea leaves, dealers verify the quality of the tea leaves through the traceability code to ensure the standardized production process of tea installation, and after confirmation, they can distribute the tea leaves to multiple platforms for retailing. A record of the sale is made and uploaded to the Hyperledger Fabric Network for subsequent review by consumers and market regulators for complaints.
-
(4). Consumers (C)
Consumers can view the entire production process and detailed data of tea through the traceability code when purchasing tea and provide feedback to market supervision if they find quality problems with tea. The feedback process concludes with the need to submit feedback to the Hyperledger Fabric Network, which facilitates regulatory logging by market regulators.
-
(5). Market Supervision (MS)
Market supervision can verify the whole process of the tea supply chain through the feedback information and evidence provided by consumers and carry out supervision operations if there is a problem.
3.2. Application Scenario
We describe the transaction flow of the tea supply chain as shown in Figure 2 below.
Step 1: Each entity in the system must register at this level. To join the blockchain network as a node, all entities—including producers, processors, distributors, market supervisors, and consumers—need to be certified by CA. After the authentication, the CA node will issue digital certificates, and all entities can share data through the blockchain network.
Step 2: All production-related data are recorded by the PE, who then uploads the finished product to the blockchain hub with an electronic signature and a hashing method. There, it is added to the ledger by the sorted nodes and updated on the local ledger. The raw materials and transaction information will be delivered to the PM after the production is finished.
Step 3: When the PM receives the transaction request, it verifies the legitimacy of the signature through the ECDSA algorithm to confirm the origin of the transaction and verifies the hash value to ensure that the transaction information and production data are not tampered with to ensure the quality of the raw materials. After the production is completed, it generates product information and order information, as well as its processing process, and uploads it to the blockchain center, which is converted into traceability code through coding and transported to the R with the product.
Step 4: After the R receives the products, they verify the data in the chain by scanning the traceability code and comparing the product information and order information, and can start selling after confirming all data sources and data integrity.
Step 5: C can access the data in the chain by scanning the traceability code on the products through the client and obtaining all the production data of the intended products. If they find any problems with the data after verification, they can report them to the MS and send the reporting information to the blockchain center.
Step 6: The MS can access two parts of the data in the chain through the client: one is all the product information and order information of the products to supervise whether there are crude and falsified orders in the market, and the other is to check whether there is any information reported by consumers, to realize the supervision of the whole market operation through the blockchain-shared data.
3.3. Notations
The notation of this article is as follows:
The Identity of X | |
Party X’s private key for the ECDSA | |
Party X’s public key for the ECDSA | |
A user X’s digital certificate | |
The user selects the ith random number | |
Data at the heart of each transaction | |
PE endicates the transactions uploaded to Hyperledger Fabric | |
PM indicates the transactions uploaded to Hyperledger Fabric | |
R indicates the transactions uploaded to Hyperledger Fabric | |
C indicates the transactions uploaded to Hyperledger Fabric | |
The signature that user X created | |
The ith hash that user X produced | |
Information encrypted by user X | |
Use the party X’s public key or private key to encrypt or decode the message M. | |
The ith timestamp | |
The standard for determining whether a timestamp is correct |
3.4. Transaction Information Flow
Figure 3 depicts the transaction format used by the Hyperledger Fabric-based blockchain system.
If Entity A and Entity B need to communicate and exchange information within the supply chain, they will each establish an organization (Organization A and Organization B), register with a Certificate Authority (CA), and obtain their corresponding public–private key pairs and digital certificates. Peer nodes are the components that comprise an organization, including endorser nodes, orderer nodes, anchor nodes, and leader nodes. When Organization A interacts with Organization B, it encrypts the transaction data with its public key and then submits the transactions to the blockchain through its orderer node. Organization B receives the transaction data from Organization A over the channel and updates its local copy of the blockchain ledger to store the data by invoking chaincode functions. Each peer node in the network can deploy one or more chaincodes and maintain a copy of the ledger for the channel. The ordering node collects and packages the transactions and information exchange generated within the channel, before submitting to the Hyperledger Fabric network.
3.5. Registration Phase
The CA, which generates the key pairs required to issue the relevant digital certificates, must first receive registration information from all entities that intend to join the Hyperledger Fabric network. We use to denote each entity in the proposed network.
Step 1. Using his client, the user sends the registration data to the CA node of the Hyperledger Fabric Network; if the registration information is legal, the CA node will enter the second step of operation; if not, the client will give the corresponding prompt.
Step 2. The CA node creates a unique private key and determines the corresponding public key.
(1)
Using the ECDSA algorithm with G as the base point, it generates a private digital certificate based on the registration information provided by , and finally sends it back to the user.
Step 3. The client saves the key pair and certificate IDX provided by CA after user registration.
(2)
The registered chaincode is shown in Algorithm 1:
Algorithm 1. Physical information sign up chaincode |
func RegisterUser(ctx contractapi.TransactionContextInterface, userID string) error { |
3.6. Production Phase
The start of the tea supply chain is handled by the production phase, which is mainly the interaction between the two entities, the grower and the manufacturer, to which the tea farmer belongs, through Hyperledger Fabric with the following specific process:
Step 1. In the production phase, the PE first monitors the environmental data of the planting site, such as air and soil humidity, illumination, pH value, etc., and the records of various farming operations, such as sowing, right and wrong, irrigation, etc., and makes detailed records of the tea growth cycle, collectively referred to as production data , and then stores the in IPFS, which will return the corresponding address .
Step 2. The PE chooses a random number at random and calculates the hash value
(3)
of , and generates a message containing and the timestamp .(4)
PE generates the signature by calling the signature function of Algorithm 2.(5)
The PE encrypts the data and generates an encrypted message using a public key issued by the PM at the center of the blockchain:(6)
PE encapsulates the encrypted data into transaction information and then uploads the transaction information to the Hyperledger Fabric network center by invoking Algorithm 3. PE sends the successful upload message to PM via the client and finally transports the tea to the processing machinery via logistics.Algorithm 2. ECDSA’s process |
func Signature( string, string, string) |
Algorithm 3. Upload the transaction information link code |
func addTransaction(stub shim.ChaincodeStubInterface, args []string) pb.Response { |
3.7. Process Phase
Step 1. The PM receives the notification from the PE client at T2 and receives the material at the same time. The PM then accesses the Hyperledger Fabric Network Center to query the records uploaded by PE and decrypts them with his private key.
(7)
The PM then verifies the timeliness of the data by timestamp.(8)
PM verifies the validity of the signature by using the verification function in Algorithm 2.(9)
(10)
If the signature is legitimate, the PM obtains the production data through the IPFS address .Step 2. The PM compares the quality of tea raw materials with the obtained . After ensuring the quality, the data as part of the traceability code will be encapsulated into retrospective source code (RSC) by using Algorithm 4. At the same time, the processing mechanism will process and package the raw material and encapsulate the relevant proof of technological operation () into the RSC together. During the processing and packaging process, PM chooses the number at random and calculates the hash value
(11)
of , and generates a message containing and the timestamp .(12)
PM generates the signature by using the signature function in Algorithm 2.(13)
R’s public key(14)
encrypts the resulting encrypted message by PM.PM encapsulates the data as transaction information and uploads them to the Hyperledger Fabric Network Center. Finally, the RSC is printed on the processed tea package and transported to R via logistics.
Algorithm 4. Generate retrospective source code. |
import qrcode |
3.8. Sale and Purchase Phase
This phase is mainly composed of the retailing of tea by distributors and the purchase of tea by customers, and the physical interaction is between R and C.
Step 1. R receives the tea that has been processed and packaged at the moment. R accesses the Hyperledger Fabric Network Center to query the records uploaded by the PM and, at the same time, decrypts them using its private key:
(15)
R uses the timestamp to confirm the accuracy of the data:(16)
R uses Algorithm 2’s verification function to check the signature’s validity.(17)
(18)
R will then scan the RSC to verify all the production and processing processes of the tea, and if there is no problem, R will put it on the shelves for sale.Step 2. C can scan the RSC of the tea to identify the authenticity of the tea before purchase, and after the purchase is complete, the system will generate the order. All the order information is available (); R will randomly select a random number and calculate the hash value
(19)
of , and then generate transaction information containing and timestamp :(20)
R generates a signature by invoking the signature algorithm.(21)
The public key of C is used to encrypt the message it generates in encrypted form.(22)
R encapsulates all the data into a transaction message and uploads them to the Hyperledger Fabric hub, where the transaction ends.3.9. Supervision Phase
After the generation of tea transaction records, customers will enter this stage only if they need to defend their rights and interests, and the main interaction objects of this stage are C and MS. The supervision flow chart is shown in Figure 4.
Step 1. The customer can file a complaint about his order with the market supervisor through the client. C edits the complaint and the evidence of the complaint , then chooses a random number at random and calculates the hash value
(23)
of , and generates a transaction message containing and the timestamp :(24)
C generates a signature by invoking the signature algorithm.(25)
C’s public key encrypts the message(26)
it generates in encrypted form.C sends the complaint message to MS.
Step 2. At time T6, when MS receives the complaint message from C, it decrypts it with the use of its private key.
(27)
MS uses the timestamp to confirm the accuracy of the data.(28)
R uses Algorithm 2’s verification function to check the signature’s validity.(29)
(30)
After confirming the authenticity of the complaint information, MS will intervene in the market to regulate fake and inferior tea.Step 3. MS will first collect the signature information of each stage, such as the signature information of PE, PM, and R. If one or more of the signatures is faulty, it means there is counterfeiting at that stage. MS will regulate the entities involved in counterfeiting.
4. Security Analysis
4.1. Data Integrity
The suggested study subject employs the ECDSA method to sign the data used in the supply chain process for tea to ensure the integrity and tamper resistance of the information in the transmission process. We take the example of the production stage added to the blockchain tea supply chain and verify the signature process of its production data as follows:
(31)
The validation process is as follows:
(32)
(33)
(34)
(35)
When , the data have not been altered, the validity of the data source can be confirmed, and the signature is recognized to be legitimate. If the data integrity has been damaged, will appear. The hash value validation of each stage is shown in Table 2.
Scenario: False data will be signed and posted to the blockchain center if an unethical merchant attempts to tamper with the production data to use it as a stand-in for actual goods.
Analysis: After receiving the tea raw materials, the entity at the center of the blockchain network, such as the processing company, employs the verification function in Algorithm 2 to confirm their authenticity. If the verification is successful, the processing organization parses the data, obtains the detailed IPFS address, and submits a request to view the data. The hash value of the data is then calculated, and if it differs from the hash value recorded in the blockchain ledger, either the batch of tea has poor quality, or the businessman has lied about his identity.
4.2. Tamper-Resistant
The security of the on-chain data is guaranteed by federated blockchain technology. A binary tree integrated with a Merkle tree structure will be constructed using all the chain data stored in a block. As illustrated in Figure 5, the hash value between every two data records in the Merkle tree will be concatenated as the input to the next binary tree node. If an attacker attempts to tamper with any data record, the root node of the Merkle tree will change dramatically due to the property of the SHA-256 cryptographic hash. If you arbitrarily change the left side of the data, the corresponding right hash value will be completely different. Just like in SHA-256 encryption, as long as the input is slightly changed, the output hash value will be substantially different.
So, if an attacker tries to modify the blockchain data, the hash of the corresponding Merkel tree leaf nodes will change. The root hash is calculated recursively based on all leaf nodes; any leaf node changes will lead to a completely different root hash. As a result, when others who participated check the block information, they will see that the content has been altered [27].
4.3. Traceability
Since blockchain is employed as the fundamental technology, all transactions conducted by members of the federated blockchain will be acknowledged as valid transactions recorded on-chain, safeguarding them from malicious tampering [28]. Owing to the immutability of data, the system can enable reliable traceability and prevent fraud at the source. For instance, in the stage of producing tea, the information about tea in the ledger will be permanently maintained in the blockchain after uploading the information relevant to the production of tea to the blockchain.
Situation: PE discovers a flaw in the tea’s quality but is unable to identify which link in the production process is at fault.
Analysis: To compare and verify the data in the blockchain and assure their traceability by signature, utilize the blockchain’s immutability and traceability. If we wish to verify and track how PM interacts with PE, we can assess whether the data between PE and PM are accurate using the following formula:
(36)
(37)
4.4. Non-Repudiation
ECDSA signature verification is necessary at every level; therefore, data non-repudiation can be achieved by checking it. The recipient needs the public key for verification since every data transmission requires the participant’s secret key signature. After verifying that the sender’s message content is correct and authentic, the receiver will not reject it. The non-repudiation of each level is displayed in Table 3.
4.5. Privacy Protection
At the ledger level, a Hyperledger Fabric offers a channel-like structure for data privacy protection. A channel’s function in a blockchain network is to enable business isolation, where a business correlates to a channel and entities outside of that channel are unable to access the data within that channel. Participants in the same Hyperledger Fabric network can create multiple channels according to their business needs, ensuring that data are exchanged only within that channel. The creation of channels significantly protects data privacy. Participants send their to the CA node, which will then return the associated public–private key pair for that entity if the CA confirms that the information is accurate.
4.6. Resist Known Attacks
Every node in the tea supply chain can participate in a decentralized platform that is constructed using Hyperledger Fabric applied to the tea supply chain. Every transaction on the platform will be recorded in a tamper-proof distributed ledger that can be verified and audited by every node in the tea supply chain. In this approach, issues like data manipulation and man-in-the-middle attacks may be prevented, ensuring the reliability and security of transactions throughout the tea supply chain.
Hyperledger Fabric provides the following capabilities to successfully ward off blockchain attacks:
Byzantine Fault Tolerance (BFT): Hyperledger Fabric makes use of the BFT algorithm, which keeps the platform’s dependability and accuracy even if a few nodes are attacked or fail.
Protection from data leakage and tampering with encryption: Hyperledger Fabric supports a variety of encryption techniques, including hash algorithms, symmetric encryption algorithms, and asymmetric encryption algorithms.
Scalability: Hyperledger Fabric has a high degree of scalability and can dynamically change the network’s size and capacity to meet changing demands.
4.6.1. Man-in-the-Middle Attack
A man-in-the-middle assault occurs when a perpetrator can alter messages in transit to ask particular queries or make requests as part of their attack if they have control over the communication channel [29].
Scenario: For instance, during PM and PE communication, an attacker might intercept data about tea production or might try to manipulate the assessed price of tea after intentionally interfering with the data sent by the PM.
(38)
(39)
4.6.2. Replay Attack
In a replay attack, the attacker repeatedly requests the same packets that were previously received from the server side. If it is not effectively avoided, the server side can successfully pass the authentication because the packets have already been verified as legitimate [30]. To guard against replay attacks, each transaction message has a timestamp that is set as it is posted and received. The time difference between when the transaction message was transmitted and when it was received can be calculated by the receiver. As an illustration, consider how PM and PE interacted. The verdict is as follows:
If an attacker intercepts a transaction message sent by a sender in the tea supply chain, they could launch a replay attack by resending the identical message to the intended recipient.
Analysis: To establish a distinctive timestamp, the recipient decrypts the encrypted message they have just received. They then subtract the time stamp from when the message was sent from the time they are currently receiving it. If the timestamp verification is incorrect, the receiver can be recognized as a replay attack.
(40)
(41)
(42)
(43)
5. Performance Evaluation
5.1. Performance Analysis
This section assesses the chain code contract calls’ performance for the scenarios put forth in this study. The testing tool uses Hyperledger Caliper version 0.42, whereas the blockchain platform utilizes Hyperledger Fabric version 2.3. A benchmarking tool called Hyperledger Caliper was created to evaluate the blockchain platform’s scalability and performance. Caliper can be used to create and run a range of benchmark tests, including ones for transaction speed, latency, resource usage, and other metrics. It was developed by 30 founding corporate members, including IBM, and is headed by the Linux Foundation. We tested transaction throughput (number of transactions per second: the performance bottleneck of the system in processing transactions), latency (average response time: the response time and performance bottleneck of the system), and resource utilization (the resource utilization and performance bottleneck of the system in processing transactions) on our Intel Core i9-11900K, RAM: 32GB DDR4 configuration. The results are displayed in Figure 6, Figure 7, Figure 8 and Figure 9.
We examine the connection between transaction volume and CPU and memory consumption in Figure 6 and Figure 7. The progressive increase in CPU and memory usage as the number of transactions rises suggests that the system’s processing power may be constrained as the workload rises. Figure 8 and Figure 9 illustrate how the system’s performance degrades as the number of transactions rises, resulting in increased latency and decreased throughput. When there are 3500 transactions, the CPU and memory use spike dramatically because the system has hit its processing capacity and cannot effectively handle any more requests.
In Figure 8, we analyze the relationship between the number of transactions and the throughput, and we can see that the number of write transactions and read transactions show a gradual increase as the number of transactions increases. At a transaction count of 500, the number of write transactions is 456 TPS and the number of read transactions is 1042 TPS, while at a transaction count of 5000, the number of write transactions increases to 3713 TPS and the number of read transactions increases to 3930 TPS.
In Figure 9, we analyze the relationship between the number of transactions and latency, and we can see that the latency time of both write and read transactions increases as the number of transactions increases, with a minimum write speed of 0.97 s and a maximum of 6.26 s, and a minimum read speed of 0.1 s and a maximum of 4.62 s. This performance system’s processing capacity may be limited as the load increases. For the same number of transactions, the latency of write transactions is usually longer than that of read transactions because write transactions require more computation and storage operations. As the number of transactions increases, the gap between the latency times of write and read transactions gradually shrinks, which may indicate that the processing capacity of the system has reached a bottleneck and cannot efficiently handle more requests.
When combined, these statistics offer helpful details on load management and system performance that can be used to improve the system’s performance. We are effective when compared to the functionality of current Hyperledger Fabric application solutions [31]. Decisions must be taken based on the unique system architecture and application scenarios if particular optimization tactics are still required. System performance enhancement will probably be required, including expanding hardware resources, streamlining the code, and changing load-balancing tactics.
5.2. Communication Cost
The communication scenario analyzed in this study is summarized in the following table: The highest transmission speed in a 4G network environment is 100 Mbps, while in a 5G network environment, it is 20 Gbps. The length of the ECDSA signature is 160 bits, 160 bits is the length of the key, 256 bits is the length of the hash function, 1024 bits is the length of the request information, 1024 bits is the length of the transaction information, and 160 bits is the length of other information (such as the identifying timestamp, etc.).
As an illustration, let us use the selling and purchase phase, which has the largest communication cost. First, R needs to verify the decrypted PM message, which contains a decrypted message, a hash value, and another message with a total size of 160 bits + 256 bits + 160 bits = 576 bits. R purchases the tea operation, which contains an encrypted message, a hash value, a signature, another message, and a transaction message, with a total size of 160. R uploads the order data after verifying it, which has a total size of 160 bits + 160 bits + 2*256 bits + 160 bits + 1024 bits + 160 bits = 2176 bits and includes a decryption message, an encryption message, two hash values, a signature, a transaction message, and another message. Speed is therefore necessary in diverse network contexts, as indicated in Table 4.
5.3. Computation Cost
The costs connected with each stage of the approach for this article are listed in Table 5 below. The asymmetric decryption and encryption processes in ECDSA, along with the hashing operation, provide the basis for the cost analysis.
5.4. Comparison
Treiblmaier et al. [11] suggested applying blockchain technology to the food supply chain to address the problem of multiple instances of information asymmetry by using it as a label to identify blockchain-based traceability systems as a primary driver of perceived product quality and purchase intentions. Paul et al. [12] proposed a workable architecture to support a circular supply chain for the tea industry network that uses blockchain technology as a substrate to drive RFID technology to complete the circular supply chain operation, despite the fact that they did not specify the precise integrated procedure. The circular blockchain platform developed by Centobelli et al. includes manufacturers, reverse logistics service providers, selection centers, recycling facilities, and landfill applications in a supply chain scenario (ref. [13]). However, the security of the proposed blockchain platform was not investigated. Helo et al. [14] developed a cloud-based portal pilot system for real-time logistics and supply chain tracking and tracing. Chang et al. [15] proposed that blockchain and smart contract technology can support cross-enterprise business process re-engineering and ensure the intelligent advancement of business processes through smart contract technology within the framework of their proposed system in order to benefit from the advantages of the blockchain platform. However, there is no logical justification for the creation of smart contracts. A comparison of the proposed scheme’s functionality to earlier designs is shown in Table 6.
5.5. Architecture Comparison
The three main types of blockchain architectures available now are public, private, and federated blockchains. While public blockchains allow open data visibility for anyone, they are not ideal for preserving confidential business data. On the other hand, private blockchains concentrate data access, which is unfavorable for inter-enterprise data sharing. Table 7 compares the three systems: Bitcoin [32], Ethereum [33], and Hyperledger Fabric [34]. The figure below illustrates Hyperledger Fabric, which can be applied to various application scenarios, including the one discussed in this study, and has more flexible and pluggable modules than Bitcoin and Ethereum. Additional benefits of Hyperledger Fabric are confidentiality, improved performance, and higher throughput.
6. Conclusions
In this paper, we provide a Hyperledger Fabric-based method for tracking manufacturing data along the tea supply chain. We employ ECDSA and IPFS storage as well as smart contracts to guarantee data confidentiality, integrity, non-repudiation, storage performance, and automatic transaction triggering throughout the system to increase system efficiency. The contributions that can be achieved are as follows:
(1). The addressing of the credit issue. The involvement of multiple institutions, each of which oversees the others, ensures the accuracy of the information. Additionally, the chain of information cannot be altered, considerably reducing the possibility of cheating.
(2). The tracking of all records. Regarding the open, transparent, and capable express logistics tracking of the manufacturing, processing, testing, transportation, and warehousing to the shelves of items for sale, each link in time following the point is fully recorded.
(3). The definition of roles and the ability to track down issues. The open and transparent features of blockchain cannot be altered. Finding the problematic link as soon as it manifests itself in one link is both timely and efficient.
(4). The stopping of product counterfeiting. Since the products can be checked from the source all the way to the customer’s hands when the information about the goods is posted on the supply chain, there will not be a problem with counterfeiting.
In the future, we will focus on practical system application landing research. Blockchain technology can help enterprises in the tea supply chain to achieve more accurate inventory management and logistics distribution, thus improving their operational efficiency and reducing costs. At the same time, blockchain technology can also help tea enterprises to achieve reductions in carbon emissions and increased energy savings, so as to better fulfill their social responsibility and environmental protection obligations. In summary, the application of blockchain technology in the tea supply chain has a very broad prospect. In the future, with the continuous development of technology and the continuous expansion of the tea market, we believe that blockchain technology will play an increasingly important role in the tea supply chain and contribute to the sustainable development of the tea industry.
C.-L.C.: Conceptualization, Investigation, Methodology, Writing—review and editing, Formal analysis, Funding acquisition, and Supervision. W.-B.Z.: Conceptualization, Investigation, Methodology, Data curation, Software, and Writing—original draft. D.-C.H.: Investigation, Validation, and Supervision. L.-C.L.: Investigation, Validation, and Formal analysis. Y.-Y.D.: Formal analysis, Investigation, and Methodology. C.-G.K.: Investigation and Validation. All authors have read and agreed to the published version of the manuscript.
This study is only based on basic theoretical research. It does not involve humans.
This study is only based on basic theoretical research. It does not involve humans.
The data used to support the findings of this study are available from the corresponding author upon request.
The authors declare no conflict of interest.
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Comparison of business data-sharing options that have been proposed and those that now exist.
Authors | Year | Objective | Technologies | Merits | Demerits |
---|---|---|---|---|---|
Treiblmaier et al. [ |
2023 | Blockchain tagging as a signaling mechanism proves, through signaling theory, that blockchain can influence and perceive purchase intention. | Blockchain |
Blockchain can record the product flow while applying it as a tag to signal theory. | There is no good integration of signal theory with the underlying logic of the blockchain. |
Paul et al. [ |
2022 | A useful model has been developed using Radio Frequency Identification (RFID) technology and Blockchain Technology (BCT) to assist the tea industry’s web-based circular supply chain. | Blockchain |
Various system models for integrating the supply chain with RFID are analyzed in detail, and their possibilities are analyzed. | No specific supply chain system architecture process is indicated. |
Centobelli et al. [ |
2022 | Create a thorough triple-retesting framework that links three reverse elliptical supply chain procedures (such as recycling, redistribution, and remanufacturing) for circular blockchain platforms. | Blockchain |
A detailed design of the system framework and how the triple loop framework leverages blockchain qualities. | No encryption mechanism is used, and the flow of information in the system may make it difficult to resist hacking attacks. |
Helo et al. [ |
2020 | Propose a pilot cloud-based portal system for real-time tracking and tracing of logistics and supply chains. | Blockchain |
By combining RFID, IoT, and blockchain technologies into one integrated, real-time view. | No detailed description of the entire business logic is provided. |
Chang et al. [ |
2019 | It is suggested and investigated to automate business flows in tracking supply chain processes using a blockchain-based business process re-engineering (BPR) architecture. | Blockchain |
The logic of how a smart contract works when multiple data interaction processes are given. | The detailed coding of smart contracts has not been elaborated. |
Validation of each stage’s hash value.
Hash Value | Integrity Check | |
---|---|---|
Process phase |
|
|
Sale and Purchase phase |
|
|
Supervision phase |
|
|
Non-repudiation of the suggested plan.
Item | Signature Value | Sender | Receiver | Signature Verification | |
---|---|---|---|---|---|
Phase | |||||
Production phase |
|
PE | PM |
|
|
Process phase |
|
PM | R |
|
|
Sale and Purchase phase |
|
R | C |
|
|
Supervision phase |
|
C | MS |
|
|
|
MS | Hyperledger Fabric |
|
Cost of communication.
Item | Message Length | 4G (100 Mbps) | 5G (20 Gbps) | |
---|---|---|---|---|
Phase | ||||
Registration phase (X-HFN) | 736 bits | 7.4 μs | 0.037 μs | |
Production phase (PE-PM) | 1760 bits | 17.6 μs | 0.088 μs | |
Process phase (PM-R) | 2016 bits | 20.2 μs | 0.101 μs | |
Sale and Purchase phase (R-C) | 4032 bits | 40.3 μs | 0.202 μs | |
Supervision Phase (R-C-MS) | 3232 bits | 32.32 μs | 0.162 μs |
Notes: Any user in the alliance chain (X); planting enterprise (PE); processing mechanism (PM); retailers (R); consumers (C); market supervision (MS); hyperledger fabric network (HFN).
Computation cost.
Phase\Party | |
---|---|
Production phase\(PM) |
|
Process phase\(PE) |
|
Sale and Purchase phase\(R and C) |
|
Supervision Phase\(MS) |
|
Notes:
Comparison of the proposed scheme’s functionality to that of earlier schemes.
Authors | Year | Objective | 1 | 2 | 3 | 4 | 5 |
---|---|---|---|---|---|---|---|
Treiblmaier et al. [ |
2023 | As a signaling mechanism, a blockchain tag proves that blockchain can influence and perceive purchase intention through signal theory. | Y | Y | N | Y | N |
Paul et al. [ |
2022 | An operational model supporting the network cycle supply chain of the tea sector is created by radio frequency identification (RFID) technology, which is driven by blockchain technology (BCT) encryption based on policies. | Y | Y | Y | Y | N |
Centobelli et al. [ |
2022 | For the circular blockchain platform, the objective was to construct a thorough triple retry architecture to link three circular supply chain reverse operations (such as recycling, redistribution, and remanufacturing) technologies and establish a reward system between the two. | Y | N | N | Y | N |
Helo et al. [ |
2020 | Proposed a cloud-based portal pilot system for real-time tracking and traceability of logistics and supply chains. | Y | N | Y | N | N |
Chang et al. [ |
2019 | A blockchain-based business process re-engineering (BPR) framework was proposed and explored to automate business flows in tracking supply chain processes. | Y | N | Y | N | N |
Ours | 2023 | A fabric-based production data sharing and storage model system for the tea supply chain was proposed. | Y | Y | Y | Y | Y |
Notes: 1: Blockchain architecture, 2: Encryption key, 3: Authorization, 4: Scalability, 5: Off-chain storage; (Y) Yes; (N) No.
Comparison between Ethereum and Hyperledger Fabric.
Bitcoin | Ethereum | Hyperledger Fabric | |
---|---|---|---|
Description | Platform for quantitative blockchains | Platform for a modular blockchain | Platform for a generic blockchain |
Scene | Public chain | Public chain | Federation chain |
Consensus algorithm | Proof of Work (POW) | Proof of Work (POW) | Practical Byzantine Fault Tolerance (PBFT) |
Throughput | 7 TPS | 25 TPS | 5000 TPS |
Decentralization | Completely decentralization | Completely decentralization | Partial de-centralization |
Smart contract | No | YES | YES |
Scalability | No | No | YES |
Authentication | No | No | YES |
Privacy | No | No | YES |
Pluggability | No | No | YES |
References
1. Hall, J. Environmental Supply Chain Innovation. Greening the Supply Chain; Taylor & Francis, Ltd.: Milton Park, UK, 2001; pp. 233-249.
2. Fawcett, S.E.; Jones, S.L.; Fawcett, A.M. Supply Chain Trust: The Catalyst for Collaborative Innovation. Bus. Horiz.; 2012; 55, pp. 163-178. [DOI: https://dx.doi.org/10.1016/j.bushor.2011.11.004]
3. Golosova, J.; Romanovs, A. The advantages and disadvantages of the blockchain technology. Proceedings of the 2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE); Vilnius, Lithuania, 8–10 November 2018; [DOI: https://dx.doi.org/10.1109/aieee.2018.8592253]
4. Kuo, T.-T.; Kim, H.-E.; Ohno-Machado, L. Blockchain distributed Ledger Technologies for Biomedical and Health Care Applications. J. Am. Med. Inform. Assoc.; 2017; 24, pp. 1211-1220. [DOI: https://dx.doi.org/10.1093/jamia/ocx068] [PubMed: https://www.ncbi.nlm.nih.gov/pubmed/29016974]
5. Kim, S.; Kwon, Y.; Cho, S. A survey of scalability solutions on Blockchain. Proceedings of the 2018 International Conference on Information and Communication Technology Convergence (ICTC); Jeju, Republic of Korea, 17–19 October 2018; [DOI: https://dx.doi.org/10.1109/ictc.2018.8539529]
6. Zhang, R.; Xue, R.; Liu, L. Security and privacy on Blockchain. ACM Comput. Surv.; 2019; 52, pp. 1-34. [DOI: https://dx.doi.org/10.1145/3158369]
7. Tea Market Revenue 2012–2025. Available online: https://www.statista.com/statistics/326384/global-tea-beverage-market-size/ (accessed on 13 February 2023).
8. Tea Production by Leading Producing Countries Worldwide 2021. Available online: https://www.statista.com/statistics/264188/production-of-tea-by-main-producing-countries-since-2006/ (accessed on 12 December 2022).
9. Mangla, S.K.; Kazançoğlu, Y.; Yıldızbaşı, A.; Öztürk, C.; Çalık, A. A conceptual framework for blockchain-based Sustainable Supply Chain and evaluating implementation barriers: A case of the Tea Supply Chain. Bus. Strategy Environ.; 2022; 31, pp. 3693-3716. [DOI: https://dx.doi.org/10.1002/bse.3027]
10. Bai, Y.; Fan, K.; Zhang, K.; Cheng, X.; Li, H.; Yang, Y. Blockchain-based trust management for Agricultural Green Supply: A game theoretic approach. J. Clean. Prod.; 2021; 310, 127407. [DOI: https://dx.doi.org/10.1016/j.jclepro.2021.127407]
11. Treiblmaier, H.; Garaus, M. Using blockchain to signal quality in the food supply chain: The impact on consumer purchase intentions and the moderating effect of brand familiarity. Int. J. Inf. Manag.; 2023; 68, 102514. [DOI: https://dx.doi.org/10.1016/j.ijinfomgt.2022.102514]
12. Paul, T.; Islam, N.; Mondal, S.; Rakshit, S. RFID-integrated blockchain-driven circular supply chain management: A system architecture for B2B tea industry. Ind. Mark. Manag.; 2022; 101, pp. 238-257. [DOI: https://dx.doi.org/10.1016/j.indmarman.2021.12.003]
13. Centobelli, P.; Cerchione, R.; Vecchio, P.D.; Oropallo, E.; Secundo, G. Blockchain technology for Bridging Trust, traceability and transparency in Circular Supply Chain. Inf. Manag.; 2022; 59, 103508. [DOI: https://dx.doi.org/10.1016/j.im.2021.103508]
14. Helo, P.; Shamsuzzoha, A.H.M. Real-time supply chain—A blockchain architecture for project deliveries. Robot. Comput.-Integr. Manuf.; 2020; 63, 101909. [DOI: https://dx.doi.org/10.1016/j.rcim.2019.101909]
15. Chang, S.E.; Chen, Y.-C.; Lu, M.-F. Supply chain re-engineering using blockchain technology: A case of smart contract based tracking process. Technol. Forecast. Soc. Chang.; 2019; 144, pp. 1-11. [DOI: https://dx.doi.org/10.1016/j.techfore.2019.03.015]
16. Li, X.; Jiang, P.; Chen, T.; Luo, X.; Wen, Q. A survey on the security of Blockchain Systems. Future Gener. Comput. Syst.; 2020; 107, pp. 841-853. [DOI: https://dx.doi.org/10.1016/j.future.2017.08.020]
17. Demestichas, K.; Peppes, N.; Alexakis, T.; Adamopoulou, E. Blockchain in agriculture traceability systems: A Review. Appl. Sci.; 2020; 10, 4113. [DOI: https://dx.doi.org/10.3390/app10124113]
18. Basnayake, B.M.; Rajapakse, C. A blockchain-based decentralized system to ensure the transparency of Organic Food Supply Chain. Proceedings of the 2019 International Research Conference on Smart Computing and Systems Engineering (SCSE); Colombo, Sri Lanka, 28 March 2019; [DOI: https://dx.doi.org/10.23919/scse.2019.8842690]
19. Menon, S.; Jain, K. Blockchain technology for transparency in Agri-Food Supply Chain: Use cases, limitations, and Future Directions. IEEE Trans. Eng. Manag.; 2022; pp. 1-15. [DOI: https://dx.doi.org/10.1109/TEM.2021.3110903]
20. Mirabelli, G.; Solina, V. Blockchain and agricultural supply chains traceability: Research trends and future challenges. Procedia Manuf.; 2020; 42, pp. 414-421. [DOI: https://dx.doi.org/10.1016/j.promfg.2020.02.054]
21. Androulaki, E.; Barger, A.; Bortnikov, V.; Cachin, C.; Christidis, K.; De Caro, A.; Enyeart, D.; Ferris, C.; Laventman, G.; Manevich, Y. et al. Hyperledger fabric: A distributed operating system for permissioned blockchains. Proceedings of the Thirteenth EuroSys Conference; Porto, Portugal, 23–26 April 2018; [DOI: https://dx.doi.org/10.1145/3190508.3190538]
22. Naveen, P.; Manikandan, P.; Maragatharajan, M.; Ashok Kumar, S.R.; Saravanan, M.; Puviarasu, A. Traceability of tea powder supply chain based on Hyperledger Fabric. Proceedings of the 3rd International Conference on Smart Electronics and Communication (ICOSEC); Trichy, India, 20–22 October 2022; [DOI: https://dx.doi.org/10.1109/icosec54921.2022.9952056]
23. Hasan, I.; Habib, M.M. Blockchain technology: Revolutionizing Supply Chain Management. Int. Supply Chain Technol. J.; 2022; 8, [DOI: https://dx.doi.org/10.20545/isctj.v08.i03.02]
24. Benet, J. Ipfs-content addressed, versioned, p2p file system. arXiv; 2014; [DOI: https://dx.doi.org/10.48550/arXiv.1407.3561] arXiv: 1407.3561
25. Chen, Y.; Li, H.; Li, K.; Zhang, J. An improved P2P file system scheme based on ipfs and Blockchain. Proceedings of the IEEE International Conference on Big Data (Big Data); Boston, MA, USA, 11–14 December 2017; [DOI: https://dx.doi.org/10.1109/bigdata.2017.8258226]
26. Johnson, D.; Menezes, A.; Vanstone, S. The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur.; 2001; 1, pp. 36-63. [DOI: https://dx.doi.org/10.1007/s102070100002]
27. Szydlo, M. Merkle tree traversal in log space and Time. Adv. Cryptol. EUROCRYPT; 2004; 3027, pp. 541-554. [DOI: https://dx.doi.org/10.1007/978-3-540-24676-3_32]
28. Tian, F. A supply chain traceability system for food safety based on HACCP, Blockchain Internet of Things. Proceedings of the International Conference on Service Systems and Service Management; Dalian, China, 16–18 June 2017; [DOI: https://dx.doi.org/10.1109/icsssm.2017.7996119]
29. Callegati, F.; Cerroni, W.; Ramilli, M. Man-in-the-middle attack to the HTTPS protocol. IEEE Secur. Priv. Mag.; 2009; 7, pp. 78-81. [DOI: https://dx.doi.org/10.1109/MSP.2009.12]
30. Mo, Y.; Sinopoli, B. Secure control against replay attacks. Proceedings of the 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton); Monticello, IL, USA, 30 September–2 October 2009; [DOI: https://dx.doi.org/10.1109/allerton.2009.5394956]
31. Wang, R.; Ye, K.; Meng, T.; Xu, C.-Z. Performance evaluation on Blockchain Systems: A case study on Ethereum, fabric, sawtooth and Fisco-Bcos. Serv. Comput. SCC; 2020; 12409, pp. 120-134. [DOI: https://dx.doi.org/10.1007/978-3-030-59592-0_8]
32. A Peer-To-Peer Electronic Cash System. Available online: https://bitcoin.org/en/bitcoin-paper (accessed on 1 May 2023).
33. Ethereum.org. Available online: https://ethereum.org/en/ (accessed on 1 May 2023).
34. Hyperledger—Open Source Blockchain Technologies. Available online: https://www.hyperledger.org/ (accessed on 1 May 2023).
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
With the advent of Industry 4.0, blockchain is one of the emerging technologies that can be used in multiple fields, especially in supply chain networks, where it is considered a sustainable concept technology. Because of its decentralization, reliability, transparency, consistency, and traceability, blockchain can challenge existing conventional models in supply chain scenarios. Therefore, this study proposes a framework that integrates the technology of Blockchain 3.0 (Hyperledger Fabric) into the tea supply chain. The concept of data traceability driven by blockchain technology consists of documenting the tea supply chain system, in which the cultivation, processing, and retailing of tea leaves are documented, and optimizing the existing anti-counterfeiting mechanisms. The ECDSA algorithm is used to confirm the identity among the entities located in the Hyperledger Fabric channel, and IPFS technology is introduced to store tea traceability data to solve the problem of data increment in the tea production process. Only the hash value and traceability code of the traceability data are stored in the block. We analyze the relationship between the number of transactions and latency, and we can see the latency time of both write and read transactions. The system tested write transactions and read transactions with a minimum write speed of 0.97 s and a maximum of 6.26 s and a minimum read speed of 0.1 s and a maximum of 4.62 s via Caliper analysis. The experimental results show that the performance analysis sounds good. This study uses distributed theory and service-oriented thinking in its specific application to the tea supply chain system model and takes each entity through a B2B connection to achieve anti-counterfeit traceability in the tea supply chain of a regulatory nature.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details

1 School of Information Engineering, Changchun Sci-Tech University, Changchun 130600, China;
2 School of Computer and Information Engineering, Xiamen University of Technology, Xiamen 361024, China
3 Department of Computer Science and Engineering, National Chung-Hsing University, Taichung 40227, Taiwan;
4 Department of Computer Science and Information Engineering, Chaoyang University of Technology, Taichung City 413310, Taiwan
5 Department of Industrial Education, National Taiwan Normal University, Taipei 10610, Taiwan;