Advertisement

Information Systems Frontiers

, Volume 17, Issue 2, pp 275–287 | Cite as

The design of an electronic pedigree system for food safety

  • Weili Han
  • Yun Gu
  • Wei Wang
  • Yin Zhang
  • Yuliang Yin
  • Junyu Wang
  • Li-Rong Zheng
Article

Abstract

The problem of food safety is a critical issue in recent years. To address the issue, the technologies of the Internet of Things are used to offer the possibilities to easily track the processes in the production, storage, transportation, sale, and even using phases of foods. This paper, therefore, introduces the design of an electronic pedigree system for food safety, which uses electronic pedigrees to enhance the safety of food supply. The system implements an extension of the pedigree standard of EPCglobal, and offers a more trustworthily tracking service to monitor and supervise the production and supply of food. We discuss the key issues of the design, and implement a prototype to evaluate the feasibility of the design. Finally, we analyze the trustworthiness assurance and security of our electronic pedigree system.

Keywords

Electronic pedigree Food safety Internet of things Trustworthiness 

Notes

Acknowledgment

This paper is supported by the 863 project (Grant NO: 2011AA100701), the Project-sponsored by SRF for ROCS, SEM, and the project of Natural Science Foundation of Shanghai (Grant NO: 12ZR1402600). The corresponding author is Lirong Zheng. The documents can be viewed at http://crypto.fudan.edu.cn/epedigree/homepage.html. Thank Ms. Min Li for her English polish.

References

  1. Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: a survey. Computer Networks, 54, 2787–2805.CrossRefGoogle Scholar
  2. Boldyreva, A., Fischlin, M., Palacio, A., & Warinschi, B. (2007). A closer look at PKI: security and efficiency. PKC 2007 (LNCS 4450), 458–475.Google Scholar
  3. Domingo, M. (2012). An overview of the internet of things for people with disabilities. Journal of Network and Computer Applications, 35, 584–596.CrossRefGoogle Scholar
  4. EPCglobal. (2007). Pedigree ratified standard, 2007, http://www.gs1.org/gsmp/kc/epcglobal/pedigree/pedigree_1_0-standard-20070105.pdf. Accessed April 2012.
  5. GS1. (2011a). The global language of business, 2011, http://www.gs1.org/. Access April 2012.
  6. GS1. (2011b). EPCIS - EPC Information Services Standard, 2011, http://www.gs1.org/gsmp/kc/epcglobal/epcis. Access April 2012.
  7. Gu, Y., & Jing, T. (2011). The IOT research in supply chain management of fresh agricultural products. In: Proceedings of the 2nd international conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC) (7382–7385).Google Scholar
  8. Han, W., & Lei, C. (2012). A survey on policy languages in network and security management. Computer Networks, 56(1), 477–489.CrossRefGoogle Scholar
  9. Harrison, M., & Inaba, T. (2008). Improving the safety and security of the pharmaceutical supply chain. Networked RFID Systems and Lightweight Cryptography, III, 223–246.CrossRefGoogle Scholar
  10. Kumar, S., Kadow, B., & Lamkin, M. (2011). Challenges with the introduction of radio-frequency identification systems into a manufacturer’s supply chain – a pilot study. Enterprise Information Systems, 5(2), 235–253.CrossRefGoogle Scholar
  11. Kwok, S., Tsang, A., Ting, J., Cheung, W., & Cheung, B. (2008). An intelligent RFID-based Electronic Anti-Counterfeit System (InRECS) for the manufacturing industry. In: Proceedings of the 17th world congress the international federation of automatic control. Seoul, Korea.Google Scholar
  12. Lehtonen, M., Michahelles, F., & Fleisch, E. (2007). Trust and security in RFID-based product authentication systems. IEEE Systems Journal, 1(2), 129–144.CrossRefGoogle Scholar
  13. Li, L. (2012). Effects of enterprise technology on supply chain collaboration: analysis of China-linked supply chain. Enterprise Information Systems, 6(1), 55–77.CrossRefGoogle Scholar
  14. Li, L., & Liu, J. (2012). An efficient and flexible web services-based multidisciplinary design optimisation framework for complex engineering systems. Enterprise Information Systems, 6(3), 345–371.CrossRefGoogle Scholar
  15. Li, S., Xu, L., Wang, X., & Wang, J. (2012). Integration of hybrid wireless networks in cloud services oriented enterprise information systems. Enterprise Information Systems, 6(2), 165–187.CrossRefGoogle Scholar
  16. Meng, S., Chiu, D., Kafeza, E., Wenyin, L., & Li, Q. (2010). Automated management of assets based on RFID triggered alarm messages. Information Systems Frontiers, 12, 563–578.CrossRefGoogle Scholar
  17. MITRE. (2004). Horizontal Integration: broader access models for realizing information dominance. JASON Report, JSR–04–132.Google Scholar
  18. Mitrokotsa, A., Rieback, M., & Tanenbaum, A. (2010). Classifying RFID attacks and defenses. Information Systems Frontiers, 12(5), 491–505.CrossRefGoogle Scholar
  19. Muckstadt, J., Murray, D., Rappold, J., & Collins, D. (2001). Guidelines for collaborative supply chain system design and operation. Information Systems Frontiers, 4, 427–453.CrossRefGoogle Scholar
  20. Pan, G., Qi, G., Wu, Z., Zhang, D., & Li, S. (2012). Land-use classification using taxi GPS traces. IEEE Transactions on Intelligent Transportation Systems, doi: 10.1109/TITS.2012.2209201.
  21. Shon, T., & Choi, W. (2007). An analysis of mobile WiMAX security: vulnerabilities and Solutions. Network-based information systems (LNCS 4658), 88–97.Google Scholar
  22. Sun, H., Hsieh, B., & Tseng, S. (2005). On the security of some proxy blind signature schemes. Journal of Systems and Software, 74(3), 297–302.CrossRefGoogle Scholar
  23. Tan, C., & Li, Q. (2006). A robust and secure RFID-based pedigree system. In: Proceedings of the 8th international conference on information and communications security (LNCS 4307) (21–29).Google Scholar
  24. Thompson, C. (2004). Radio frequency tags for identifying legitimate drug products discussed by tech industry. American Journal of Health-System Pharmacy, 1430.Google Scholar
  25. Xin, H., & Stone, R. (2007). Chinese probe unmasks high-tech adulteration with melamine. Science, 322(5906), 1310–1311.CrossRefGoogle Scholar
  26. Xu, L. (2011). Enterprise systems: state-of-the-art and future trends. IEEE Transactions on Industrial Informatics, 7(4), 630–640.CrossRefGoogle Scholar
  27. Yan, Q. (2008). A security evaluation approach for information systems in telecommunication enterprises. Enterprise Information Systems, 2(3), 309–324.CrossRefGoogle Scholar
  28. Yin, J., Zhang, X., Lu, Q., Xin, C., Liu, C., & Chen, Z. (2011). IOT based provenance platform for vegetables supplied to Hong Kong. Recent Advances in CSIE 2011 (LNEE 127), 591–596.Google Scholar
  29. Zdravković, M., Panetto, H., Trajanović, M., & Aubry, A. (2011). An approach for formalising the supply chain operations. Enterprise Information Systems, 5(4), 401–421.CrossRefGoogle Scholar
  30. Zheng, L., Zhang, H., Han, W., Zhou, X., He, J., Zhang, Z., Gu, Y., & Wang, J. (2011). Technologies, applications, and governance in the Internet of Things. In: Internet of things - Global technological and societal trends. From smart environments and spaces to green ICT. River Publishers.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2012

Authors and Affiliations

  • Weili Han
    • 1
  • Yun Gu
    • 1
  • Wei Wang
    • 1
  • Yin Zhang
    • 1
  • Yuliang Yin
    • 1
  • Junyu Wang
    • 2
  • Li-Rong Zheng
    • 2
  1. 1.Software SchoolFudan UniversityShanghaiChina
  2. 2.School of Information Science and EngineeringFudan UniversityShanghaiChina

Personalised recommendations