Competent Methods to Shield the SCM from New Age Blockchain Attacks

Bethapudi Ratnakanth*, Bhaludra R. Nad**, N. Satyanandam***
* Department of Computer Science and Engineering, Sri Indu Institute of Engineering and Technology, Sheriguda Ibrahimpatnam, Hyderabad, India.
**-*** Department of Computer Science and Engineering, Bhoj Reddy Engineering College for Women, Hyderabad, Telangana, India.
Periodicity:July - December'2022
DOI : https://doi.org/10.26634/jcc.9.2.18950

Abstract

The interior technology of the blockchain is the decentralized ledger, which can be used to record and secure transaction data across many parties in a blockchain. Cryptocurrencies such as Bitcoin, Ethereum, and other coins can use the blockchain to perform transactions between infinity and unknown parties without the need for an intermediary. A blockchain-based supply chain can support participants in recording price, location, cost, certification, quality, and other significant information. As a characteristic of blockchain, the information available within the blockchain can provide traceability of the material supply chain, reduce losses from the fake and grey markets, improve visibility and agreement over outsourced contract manufacturing, and effectively enhance an organization's position as a leader in responsible manufacturing. This paper proposed a Supply Chain Management (SCM) framework and tested it against various blockchain-based new age attacks, like peer-to-peer network-based attacks and consensus and ledger-based attacks, to analyze the impact of SCM.

Keywords

Blockchain, Smart Contract, Attacks, Supply Chain Management (SCM).

How to Cite this Article?

Ratnakanth, B., Nadh, B. R., and Satyanandam, N. (2022). Competent Methods to Shield the SCM from New Age Blockchain Attacks. i-manager’s Journal on Cloud Computing, 9(2), 13-20. https://doi.org/10.26634/jcc.9.2.18950

References

[1]. ACM Digital Library. (n.d.). Retrieved from https://dl.acm.org/action/doSearch?AllField=blockchain+attacks&expand=all&ConceptID=118230
[2]. Barratt, M. (2004). Understanding the meaning of collaboration in the supply chain. Supply Chain Management: An International Journal, 9(1), 30-42. https://doi.org/10.1108/13598540410517566
[3]. Bayer, D., Haber, S., & Stornetta, W. S. (1993). Improving the efficiency and reliability of digital timestamping. In Sequences Ii (pp. 329-334). Springer, New York. https://doi.org/10.1007/978-1-4613-9323-8_24
[4]. Blogs. (n.d.). 10 Blockchain and New Age Security Attacks you Should Know. Retrieved from https://blogs.arubanetworks.com/solutions/10-blockchain-and-newage-security-attacks-you-should-know/
[5]. Chaum, D. L. (1982). Computer Systems Established, Maintained and Trusted by Mutually Suspicious Groups (Doctoral Dissertation, University of California, Berkeley).
[6]. Cloud Security Alliance. (n.d.). Over 200 Documented Blockchain Attacks, Vulnerabilities and Weaknesses. Retrieved from https://cloudsecurityalliance.org/blog/2020/10/26/blockchain-attacks-vulnerabilities-and-weaknesses
[7]. Ethereum Whitepaper. (n.d.). A Next-Generation Smart Contract and Decentralized Application Platform. Retrieved from https://ethereum.org/en/whitepaper/
[8]. Ethereum. (2017). Ethereum Home stead Documentation. Retrieved from https://buildmedia.readthedocs.org/media/pdf/ethereum-homestead/latest/ethereum-homestead.pdf
[9]. Fawcett, S. E., Fawcett, A. M., Watson, B. J., & Magnan, G. M. (2012). Peeking inside the black box: toward an understanding of supply chain collaboration dynamics. Journal of Supply Chain Management, 48(1), 44-72. https://doi.org/10.1111/j.1745-493X.2011.03241.x
[10]. Fawcett, S. E., Osterhaus, P., Magnan, G. M., Brau, J. C., & McCarter, M. W. (2007). Information sharing and supply chain performance: the role of connectivity and willingness. Supply Chain Management: An International Journal, 12(5), 358–368. https://doi.org/10.1108/13598540710776935
[11]. Frankel, R., Goldsby, T. J., & Whipple, J. M. (2002). Grocery industry collaboration in the wake of ECR. The International Journal of Logistics Management, 13(1), 57-72. https://doi.org/10.1108/09574090210806360
[12]. Groetsema, A., Groetsema, A., Sahdev, N., Salami, N., Schwentker, R., & Cioanca, F. (2019). Blockchain for Business: An Introduction to Hyperledger Technologies. The Linux Foundation.
[13]. Gurugubilli, S. T., Ratnakanth, B., & Ramana, K. V. (2019). Secure payment system in supplychain management using blockchain technologies. Journal of Emerging Technologies and Innovative Research (JETIR), 6(6), 364-372.
[14]. Haber, S., & Stornetta, W. S. (1991). How to timestamp a digital document. In Conference on the Theory and Application of Cryptography (pp. 437-455). Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-38424-3_32
[15]. Habib, M. (2011). Supply Chain Management (SCM): Theory and Evolution, IntechOpen, 1-14.
[16]. Hackius, N., & Petersen, M. (2017). Blockchain in logistics and supply chain: trick or treat? In Digitalization in Supply Chain Management and Logistics: Smart and Digital Solutions for an Industry 4.0 Environment. Proceedings of the Hamburg International Conference of Logistics (HICL), Vol. 23 (pp. 3-18), epubli GmbH, Berlin. https://doi.org/10.15480/882.1444
[17]. Horvath, L. (2001). Collaboration: The key to value creation in supply chain management. Supply Chain Management: An International Journal, 6(5), 205-207. https://doi.org/10.1108/EUM0000000006039
[18]. IBM. (n.d.). What is Blockchain Security? Retrieved from https://www.ibm.com/in-en/topics/blockchainsecurity
[19]. Kanth, B. R., & Ramana, K. V. (2020). Satchain: Secured autonomous transactions in supply chain using block chain. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 9(6), 1661-1669. https://doi.org/10.35940/ijitee.F4365.049620
[20]. Nakamoto, S. (n.d.). Bitcoin: A Peer-to-Peer Electronic Cash System. Retrieved from https://bitcoin.org/bitcoin.pdf
[21]. Ratnakanth, B., & Ramana, K. V. (2021). Secure methods for supplychain management to protect from attacks in blockchain. International Journal of Science and Research (IJSR), 10(6), 1240-1249.
[22]. Ratnakanth, B., & VenkataRamana, K. (2020). Systematic approach to analyze attacks on SCM: Using blockchain. International Journal of Recent Technology and Engineering (IJRTE), 9(2), 1086-1093. http://doi.org/10.35940/ijrte.B4091.079220
[23]. Ratnakanth, B., Sahiti, M., & Ramana, K. V. (2020). Efficient methods to avoid smart contract vulnerabilities using block chain. International Journal of Science and Research (IJSR), 9(8), 600-606.
[24]. Sharma, R. (2021). Bit Gold. Retrieved from https://www.investopedia.com/terms/b/bit-gold.asp
[25]. Sheldon, (2021). A Timeline and History of Blockchain Technology. Retrieved from https://www.techtarget.com/whatis/feature/A-timeline-and-histor y-ofblockchain-technology
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.