期刊文献+

基于侧链技术的供应链溯源系统设计 被引量:44

Design of Supply Chain Traceability System Based on Side Chain Technology
下载PDF
导出
摘要 采用中心化设计的供应链溯源系统的性能提升依赖于中心服务器,且存在监管追责难、中间流转节点多、数据不透明等问题。为此,将区块链技术应用于供应链溯源领域,设计并实现一种基于侧链技术的供应链溯源系统。通过以太坊智能合约实现供应链中的货物管理、信息共享与产品溯源,利用侧链技术对以太坊进行扩容,使其满足实际应用的需求。实验结果表明,该系统能够对供应链上的产品进行全生命周期的追踪溯源,方便用户验证、查询以及第三方监管,且其吞吐量高达200 TPS,每笔交易开销低至0.07元。 The current supply chain traceability system based on centralized design has many disadvantages.Besides its performance improvement depending on the central server,other problems such as difficulty in supervision and accountability,excessive intermediate circulation nodes and opaque data also exist.Therefore,we design and implement a supply chain traceability system based on side chain technology.The system can achieve the goods management,information sharing and product traceability through Ethereum smart contract.At the same time,we use the side chain technology to expand the Ehtereum to meet the needs of practical applications.Experimental results show that the proposed system can trace the whole life circle of products in the supply chain,facilitating user verification query and third-party supervision.Besides,the throughput of the system reaches 200 TPS,and the cost of each transaction is reduced to 0.07 yuan.
作者 张朝栋 王宝生 邓文平 ZHANG Chaodong;WANG Baosheng;DENG Wenping(College of Computer Science and Technology,National University of Defense Technology,Changsha 410073,China)
出处 《计算机工程》 CAS CSCD 北大核心 2019年第11期1-8,共8页 Computer Engineering
基金 国家自然科学基金(61602503)
关键词 区块链 供应链溯源 侧链技术 扩容技术 智能合约 blockchain supply chain traceability side chain technology expansion technology smart contract
  • 相关文献

参考文献6

二级参考文献28

  • 1王飞跃.平行系统方法与复杂系统的管理和控制[J].控制与决策,2004,19(5):485-489. 被引量:333
  • 2王飞跃.关于复杂系统的建模、分析、控制和管理[J].复杂系统与复杂性科学,2006,3(2):26-34. 被引量:64
  • 3李亚子.数据起源标注模式与描述模型[J].现代图书情报技术,2007(7):10-13. 被引量:16
  • 4Moreau L, Clifford B, Freire J, et al. The open provenance model core specfication (vl. 1)[J]. Future Generation Comput- er Systems,2011,20(3) : 1-42.
  • 5Braun U, Shinnar A, Seltzer M. Securing provenance[C]//InHOTSEC'08: Proceedings of the 3rd conference on Hot topics in security 2008 : 1-5.
  • 6Hasan R, Sion R, Winslett M. Introducing secure provenance: problems and challenges[C]//In StorageSS'07 Proceedings of the ACM Workshop on Storage Security and Survivability, ACM Press, 2007 : 13-18.
  • 7Hasan R, Sion R, Winslett M. The case of the fake picassO : preventing history forgery with secure provenance[C]//Margo Seltzer, Ric Wheeler. Proceedings of the 7th USENIX Confer- ence on File and Storage Technologies, In: FAST, 2009 : 1-14.
  • 8Chaum D, Heyst E V. Group signatures[A], proceedings of the 10th annual international conference on Theory and application of coyptographic techniques, springer Verlag Berlin, Heidel berg 1991:257-265.
  • 9Merkle R C. Protocols for public key cryptosystems[C]//In IEEE Symposium on Security and Privacy, 1980 : 122-134.
  • 10王飞跃,曾大军,袁勇.基于ACP方法的电子商务系统复杂性研究[J].复杂系统与复杂性科学,2008,5(3):1-8. 被引量:20

共引文献197

同被引文献501

引证文献44

二级引证文献254

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部