A Blockchain and Fingerprinting Traceability Method for Digital Product Lifecycle Management
<p>Digital product lifecycle management with online and offline verification.</p> "> Figure 2
<p>ETL metadata capturing in a building block.</p> "> Figure 3
<p>The abstraction of a value chain built by Building Blocks.</p> "> Figure 4
<p>Fingerprint embedding system.</p> "> Figure 5
<p>Colluder detection system.</p> "> Figure 6
<p>Group ID detection system.</p> "> Figure 7
<p>User ID detection system.</p> "> Figure 8
<p>Controlled experimentation with audio fingerprinting process in 10 value chains.</p> "> Figure 9
<p>Distribution of services of the three networks of the solution.</p> "> Figure 10
<p>Response time of a value chain with three different configurations.</p> "> Figure 11
<p>Percentage of time used by each component in a value chain.</p> "> Figure 12
<p>Absolute response time per value chain divided by components using (<b>a</b>) 1 file, (<b>b</b>) 10 files and (<b>c</b>) 100 files.</p> "> Figure 13
<p>Percentage of time of each component per value chain using (<b>a</b>) 1 file, (<b>b</b>) 10 files and (<b>c</b>) 100 files in an experiment with ten chains.</p> "> Figure 14
<p>Throughput per configuration in a ten-value chain experiment using (<b>a</b>) 1 file, (<b>b</b>) 10 files and (<b>c</b>) 100 files.</p> "> Figure 15
<p>Comparison between experiments with one and ten value chains.</p> ">
Abstract
:1. Introduction
2. Related Work
2.1. Blockchain-Based Supply Chains
2.2. Tampering-Resistant Approaches
2.3. Traceability Enabling Technologies
3. A Blockchain and Fingerprinting Traceability Method for DPLM
3.1. Definition of Smart Contracts for DPLM Pipelines
3.2. Online Verification of Transactions by Using Blockchain
Algorithm 1 Online verificability process |
Require: whiledo if then else if then else end if ▹ Symmetric Key ▹ Digital envelope ▹ Registry method end while |
Algorithm 2 Offline verificability process |
Require: ▹ Consult method |
3.3. Offline Transaction Registration and Verification Using Fingerprinting
3.3.1. Offline Verification by Using Fingerprinting
3.3.2. Fingerprinting Design Principles
3.3.3. Fingerprint Embedding
3.3.4. Fingerprint Detection
3.3.5. Group ID Detection
3.3.6. User ID Detection
3.4. Security Management in the Verifiability of Transactions
- Privacy, confidentiality and access controls: These services are implemented in the DPLM middleware by using different cryptosystems to ensure the information is registered in the blockchain. AES cryptosystem is used to encrypt the information about the paths where data have been extracted by a stage and the path wherein outcomes were deposited as well as the timestamps that provide information about the productivity among the involved stages in the DPLM. The key management and delivery is performed by using digital envelopes, which operate at the creation of the stages.
- Integrity: The Sha256 algorithm is used as a method in the smart contracts to create the hashes of the input and outcomes as well as to produce the hash of all the information stored in the block chains (input and outcome hashes, timestamps and information required by smart contracts). This means the integrity of the inputs and outcomes are provided by digital envelopes and this information is registered both in the blockchain and within the contents by using the fingerprinting method. The verifiability process is thus supported by integrity service at the registration phase and by the blockchain querying at the online phase as well as by the fingerprinting at the offline phase.
4. Experimental Evaluation
4.1. Experiment Methodology
- 1.
- Raw material. In this stage the raw material provided by the producer is received and stored and the processing begins within the corresponding value chain, generating the identifiers, orders and elements necessary for the control, management and shipment of the assets through each of the flows.
- 2.
- Noise reduction. Noise cleaning processing on each of the provided audios. This aims to minimize these unwanted sounds while preserving the original signal as much as possible.
- 3.
- Fingerprint insertion. Process of inserting direct information to the digital audio content which helps to obtain better levels of security and privacy.
- 4.
- Compression. Process of reducing the size of the information to occupy less storage space, without affecting the content.
4.2. Implementation Details
4.3. Single Value Chain Experiment
4.4. Ten Value Chain Experiment
4.5. Experiments Summary
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- MarketStudyReport. Global Digital Content Market 2020 by Company, Regions, Type and Application, Forecast to 2025; Technical Report; Skyline Market Research LLP: Pune, India, 2020. [Google Scholar]
- Mussomeli, A.; Gish, D.; Laaper, S. The Rise of the Digital Supply Network; White Paper; Deloitte: London, UK, 2021. [Google Scholar]
- Li, J.; Tao, F.; Cheng, Y.; Zhao, L. Big data in product lifecycle management. Int. J. Adv. Manuf. Technol. 2015, 81, 667–684. [Google Scholar] [CrossRef]
- Martinez-Rendon, C.; Camarmas-Alonso, D.; Carretero, J.; Gonzalez-Compean, J.L. On the continuous contract verification using blockchain and real-time data. Clust. Comput. 2022, 25, 2179–2201. [Google Scholar] [CrossRef]
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. Decentralized Business Review. 2008. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 21 March 2021).
- Swan, M. Blockchain: Blueprint for a New Economy, 1st ed.; O’Reilly Media, Inc.: Sebastopol, CA, USA, 2015. [Google Scholar]
- Saberi, S.; Kouhizadeh, M.; Sarkis, J.; Shen, L. Blockchain technology and its relationships to sustainable supply chain management. Int. J. Prod. Res. 2019, 57, 2117–2135. [Google Scholar] [CrossRef] [Green Version]
- McDonald, P.; Donoghue, C.B.; Havens, T. Digital Media Distribution: Portals, Platforms, Pipelines; NYU Press: New York, NY, USA, 2021. [Google Scholar]
- Furon, T.; Doërr, G. Tracing pirated content on the Internet: Unwinding Ariadne’s thread. IEEE Secur. Priv. 2010, 8, 69–71. [Google Scholar] [CrossRef]
- Westerkamp, M.; Victor, F.; Küpper, A. Tracing manufacturing processes using blockchain-based token compositions. Digit. Commun. Netw. 2020, 6, 167–176. [Google Scholar] [CrossRef]
- Garcia-Hernandez, J.J.; Feregrino-Uribe, C.; Cumplido, R. Collusion-Resistant Audio Fingerprinting System in the Modulated Complex Lapped Transform Domain. PLoS ONE 2013, 8, e65985. [Google Scholar] [CrossRef] [Green Version]
- Wang, B.; Luo, W.; Zhang, A.; Tian, Z.; Li, Z. Blockchain-enabled circular supply chain management: A system architecture for fast fashion. Comput. Ind. 2020, 123, 103324. [Google Scholar] [CrossRef]
- Cao, Y.; Jia, F.; Manogaran, G. Efficient Traceability Systems of Steel Products Using Blockchain-Based Industrial Internet of Things. IEEE Trans. Ind. Inform. 2020, 16, 6004–6012. [Google Scholar] [CrossRef]
- Perboli, G.; Musso, S.; Rosano, M. Blockchain in logistics and supply chain: A lean approach for designing real-world use cases. IEEE Access 2018, 6, 62018–62028. [Google Scholar] [CrossRef]
- Leng, K.; Bi, Y.; Jing, L.; Fu, H.C.; Van Nieuwenhuyse, I. Research on agricultural supply chain system with double chain architecture based on blockchain technology. Future Gener. Comput. Syst. 2018, 86, 641–649. [Google Scholar] [CrossRef]
- Wang, Y.; Han, J.H.; Beynon-Davies, P. Understanding blockchain technology for future supply chains: A systematic literature review and research agenda. Supply Chain Manag. Int. J. 2019, 24, 62–84. [Google Scholar] [CrossRef] [Green Version]
- Aich, S.; Chakraborty, S.; Sain, M.; Lee, H.i.; Kim, H.C. A Review on Benefits of IoT Integrated Blockchain based Supply Chain Management Implementations across Different Sectors with Case Study. In Proceedings of the 21st International Conference on Advanced Communication Technology (ICACT), Pyeongchang, Korea, 17–20 February 2019; pp. 138–141. [Google Scholar] [CrossRef]
- Wang, S.; Li, D.; Zhang, Y.; Chen, J. Smart Contract-Based Product Traceability System in the Supply Chain Scenario. IEEE Access 2019, 7, 115122–115133. [Google Scholar] [CrossRef]
- Hyperledger-Foundation. Hyperledger Fabric; Technical Report; Hyperledger Foundation: San Francisco, CA, USA, 2022; Available online: https://www.hyperledger.org/use/fabric (accessed on 20 February 2022).
- Cui, P.; Dixon, J.; Guin, U.; Dimase, D. A Blockchain-Based Framework for Supply Chain Provenance. IEEE Access 2019, 7, 157113–157125. [Google Scholar] [CrossRef]
- Mehta, J.; Mehta, D.; Jain, J.; Dholay, S. Asset Tracking System Using Blockchain. In Proceedings of the Asian Conference on Innovation in Technology (ASIANCON), Pune, India, 27–29 August 2021; pp. 1–7. [Google Scholar] [CrossRef]
- Leng, J.; Zhou, M.; Zhao, J.L.; Huang, Y.; Bian, Y. Blockchain Security: A Survey of Techniques and Research Directions. IEEE Trans. Serv. Comput. 2022, 15, 2490–2510. [Google Scholar] [CrossRef]
- Bagga, P.; Das, A.K.; Chamola, V.; Guizani, M. Blockchain-envisioned access control for internet of things applications: A comprehensive survey and future directions. Telecommun. Syst. 2022, 81, 125–173. [Google Scholar] [CrossRef]
- Chaabane, F.; Charfeddine, M.; Ben Amar, C. A survey on digital tracing traitors schemes. In Proceedings of the 9th International Conference on Information Assurance and Security (IAS), Gammarth, Tunisia, 4–6 December 2013; pp. 85–90. [Google Scholar] [CrossRef]
- Kiyavash, N.; Moulin, P.; Kalker, T. Regular Simplex Fingerprints and Their Optimality Properties. IEEE Trans. Inf. Forensics Secur. 2009, 4, 318–329. [Google Scholar] [CrossRef]
- Zhao, J.; Zong, T.; Xiang, Y.; Gao, L.; Hua, G. Segmental DCT Coefficient Reversal Based Anti-Collusion Audio Fingerprinting Mechanism. IEEE Signal Process. Lett. 2021, 28, 1833–1837. [Google Scholar] [CrossRef]
- Trappe, W.; Wu, M.; Wang, Z.J.; Liu, K.J.R. Anti-collusion fingerprinting for multimedia. IEEE Trans. Signal Process. 2003, 51, 1069–1087. [Google Scholar] [CrossRef] [Green Version]
- Li, M.; Chang, H.; Xiang, Y.; An, D. A Novel Anti-Collusion Audio Fingerprinting Scheme Based on Fourier Coefficients Reversing. IEEE Signal Process. Lett. 2020, 27, 1794–1798. [Google Scholar] [CrossRef]
- Yasui, T.; Kuribayashi, M.; Funabiki, N.; Echizen, I. Near-Optimal Detection for Binary Tardos Code by Estimating Collusion Strategy. IEEE Trans. Inf. Forensics Secur. 2020, 15, 2069–2080. [Google Scholar] [CrossRef]
- IBM. Blockchain for Supply Chain Solutions; IBM: Armonk, NY, USA, 2022; Available online: https://www.ibm.com/blockchain-supply-chain (accessed on 20 February 2022).
- De Mel, S.; Herath, D.; McKenzie, D.; Pathak, Y. Radio frequency (un)identification: Results from a proof-of-concept trial of the use of RFID technology to measure microenterprise turnover in Sri Lanka. Dev. Eng. 2016, 1, 4–11. [Google Scholar] [CrossRef] [Green Version]
- Wang, J.; Chi, H.L.; Shou, W.; Chong, H.Y.; Wang, X. A Coordinated Approach for Supply-Chain Tracking in the Liquefied Natural Gas Industry. Sustainability 2018, 10, 4822. [Google Scholar] [CrossRef] [Green Version]
- Haji, M.; Kerbache, L.; Sheriff, K.M.; Al-Ansari, T. Critical Success Factors and Traceability Technologies for Establishing a Safe Pharmaceutical Supply Chain. Methods Protoc. 2021, 4, 85. [Google Scholar] [CrossRef] [PubMed]
- Hassoun, A.; Abdullah, N.A.; Aït-Kaddour, A.; Ghellam, M.; Beşir, A.; Zannou, O.; Önal, B.; Aadil, R.M.; Lorenzo, J.M.; Khaneghah, A.M.; et al. Food traceability 4.0 as part of the fourth industrial revolution: Key enabling technologies. Crit. Rev. Food Sci. Nutr. 2022, 1–17. [Google Scholar] [CrossRef] [PubMed]
- Reddy, P.; Kurnia, S.; Tortorella, G.L. Digital Food Supply Chain Traceability Framework. Proceedings 2022, 82, 9. [Google Scholar] [CrossRef]
- Luu, L.; Chu, D.; Olickel, H.; Saxena, P.; Hobor, A. Making Smart Contracts Smarter. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; pp. 254–269. [Google Scholar] [CrossRef]
- Kuribayashi, M. Hierarchical Spread Spectrum Fingerprinting Scheme Based on the CDMA Technique. EURASIP J. Inf. Secur. 2011, 2011, 502782. [Google Scholar] [CrossRef]
- Liu, K.J.R.; Trappe, W.; Wang, Z.J.; Wu, M.; Zhao, H. Multimedia Fingerprinting Forensics for Traitor Tracing; EURASIP Book Series on Signal Processing and Communications; Hindawi Publishing Corporation: New York, NY, USA, 2005; Volume 4. [Google Scholar]
- Wang, Z.J.; Wu, M.; Zhao, H.V.; Trappe, W.; Liu, K.J.R. Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. IEEE Trans. Image Process. 2005, 14, 804–821. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Gonzalez-Compean, J.L.; Sosa-Sosa, V.J.; Garcia-Hernandez, J.J.; Galeana-Zapien, H.; Reyes-Anastacio, H.G. A Blockchain and Fingerprinting Traceability Method for Digital Product Lifecycle Management. Sensors 2022, 22, 8400. https://doi.org/10.3390/s22218400
Gonzalez-Compean JL, Sosa-Sosa VJ, Garcia-Hernandez JJ, Galeana-Zapien H, Reyes-Anastacio HG. A Blockchain and Fingerprinting Traceability Method for Digital Product Lifecycle Management. Sensors. 2022; 22(21):8400. https://doi.org/10.3390/s22218400
Chicago/Turabian StyleGonzalez-Compean, Jose Luis, Victor Jesus Sosa-Sosa, Jose Juan Garcia-Hernandez, Hiram Galeana-Zapien, and Hugo German Reyes-Anastacio. 2022. "A Blockchain and Fingerprinting Traceability Method for Digital Product Lifecycle Management" Sensors 22, no. 21: 8400. https://doi.org/10.3390/s22218400