Journal of Computer Science and Technology

, Volume 33, Issue 2, pp 237–248 | Cite as

CoC: A Unified Distributed Ledger Based Supply Chain Management System

  • Zhimin GaoEmail author
  • Lei Xu
  • Lin Chen
  • Xi Zhao
  • Yang Lu
  • Weidong Shi
Regular Paper


Modern supply chain is a complex system and plays an important role for different sectors under the globalization economic integration background. Supply chain management system is proposed to handle the increasing complexity and improve the efficiency of flows of goods. It is also useful to prevent potential frauds and guarantee trade compliance. Currently, most companies maintain their own IT systems for supply chain management. However, it is hard for these isolated systems to work together and provide a global view of the status of the highly distributed supply chain system. Using emerging decentralized ledger/blockchain technology, which is a special type of distributed system in essence, to build supply chain management system is a promising direction to go. Decentralized ledger usually suffers from low performance and lack of capability to protect information stored on the ledger. To overcome these challenges, we propose CoC (supply chain on blockchain), a novel supply chain management system based on a hybrid decentralized ledger with a novel two-step block construction mechanism. We also design an efficient storage scheme and information protection method that satisfy requirements of supply chain management. These techniques can also be applied to other decentralized ledger based applications with requirements similar to supply chain management.


blockchain distributed system supply chain management security 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Supplementary material

11390_2018_1816_MOESM1_ESM.pdf (1.6 mb)
ESM 1 (PDF 1617 kb)


  1. 1.
    Laseter T, Oliver K. When will supply chain management grow up? Strategy + Business, 2003., Jan. 2018.
  2. 2.
    Dai J, Ding Z M, Xu J J. Context-based moving object trajectory uncertainty reduction and ranking in road network. Journal of Computer Science and Technology, 2016, 31(1): 167-184.MathSciNetCrossRefGoogle Scholar
  3. 3.
    Liu H L, Chen Q, Li Z H. Optimization techniques for RFID complex event processing. Journal of Computer Science and Technology, 2009, 24(4): 723-733.CrossRefGoogle Scholar
  4. 4.
    He W, Tan E L, Lee E W, Li T Y. A solution for integrated track and trace in supply chain based on RFID & GPS. In Proc. IEEE Conf. Emerging Technologies & Factory Automation, September 2009.Google Scholar
  5. 5.
    Lindner M, Marquez F G, Chapman C, Clayman S, Henriksson D, Elmroth E. The cloud supply chain: A framework for information, monitoring, accounting and billing. In Proc. the 2nd Int. ICST Conf. Cloud Computing, October 2010.Google Scholar
  6. 6.
    Gazet A. Comparative analysis of various ransomware virii. Journal in Computer Virology, 2010, 6(1): 77-90.CrossRefGoogle Scholar
  7. 7.
    Garay J, Kiayias A, Leonardos N. The Bitcoin backbone protocol: Analysis and applications. In Proc. the 34th Annual Int. Conf. the Theory and Applications of Cryptographic Techniques, April 2015, pp.281-310.Google Scholar
  8. 8.
    Lemieux V L. Trusting records: Is blockchain technology the answer? Records Management Journal, 2016, 26(2): 110-139.CrossRefGoogle Scholar
  9. 9.
    Morabito V. Blockchain practices. In Business Innovation Through Blockchain: The B 3 Perspective, Morabito V (ed.), Springer, 2017, pp.145-166.Google Scholar
  10. 10.
    Lehmacher W. Global dynamics and key trends. In The Global Supply Chain: How Technology and Circular Thinking Transform Our Future, Lehmacher W (ed.), Springer, 2017, pp.67-112.Google Scholar
  11. 11.
    Cooper M C, Lambert D M, Pagh J D. Supply chain management: More than a new name for logistics. The International Journal of Logistics Management, 1997, 8(1): 1-14.CrossRefGoogle Scholar
  12. 12.
    Fox M S, Chionglo J F, Barbuceanu M. The integrated supply chain management system. Technical Report, Department of Industrial Engineering, University of Toronto, 1993.Google Scholar
  13. 13.
    Buterin V. What proof of stake is and why it matters. Bitcoin Magazine, 2013., Jan. 2018.
  14. 14.
    Xu X W, Pautasso C, Zhu L M, Gramoli V, Ponomarev A, Tran A B, Chen S P. The blockchain as a software connector. In Proc the 13th Working IEEE/IFIP Conf. Software Architecture, April 2016, pp.182-191.Google Scholar
  15. 15.
    Castro M, Liskov B. Practical Byzantine fault tolerance and proactive recovery. ACM Trans. Computer Systems, 2002, 20(4): 398-461.CrossRefGoogle Scholar
  16. 16.
    Lamport L, Shostak R, Pease M. The Byzantine Generals Problem. ACM Trans. Programming Languages and Systems, 1982, 4(3): 382-401.CrossRefzbMATHGoogle Scholar
  17. 17.
    Kermarrec A M, van Steen M. Gossiping in distributed systems. ACM SIGOPS Operating Systems Review, 2007, 41(5): 2-7.CrossRefGoogle Scholar
  18. 18.
    Lamport L. The part-time parliament. ACM Trans. Computer Systems, 1998, 16(2): 133-169.CrossRefGoogle Scholar
  19. 19.
    Eyal I, Gencer A E, Sirer E G, van Renesse R. Bitcoin-NG: A scalable blockchain protocol. In Proc. the 13th USENIX Conf. Networked Systems Design and Implementation, March 2016, pp.45-59.Google Scholar
  20. 20.
    Lewison K, Corella F. Backing rich credentials with a blockchain PKI. Technical Report, Pomcor, 2016., Jan. 2018.
  21. 21.
    Al-Bassam M. SCPKI: A smart contract-based PKI and identity system. In Proc. the ACM Workshop on Blockchain Cryptocurrencies and Contracts, April 2017, pp.35-40.Google Scholar
  22. 22.
    Xu L, Wu X X, Zhang X W. CL-PRE: A certificateless proxy re-encryption scheme for secure data sharing with public cloud. In Proc. the 7th ACM Symp. Information Computer and Communications Security, May 2012, pp.87-88.Google Scholar
  23. 23.
    Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In Proc. IEEE Symp. Security and Privacy, May 2007, pp.321-334.Google Scholar
  24. 24.
    Vukolić M. The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication. In Proc. the Int. Workshop on Open Problems in Network Security, October 2015, pp.112-125.Google Scholar
  25. 25.
    Vukolić M. Rethinking permissioned blockchains. In Proc. the ACM Workshop on Blockchain Cryptocurrencies and Contracts, April 2017, pp.3-7.Google Scholar
  26. 26.
    Guerraoui R, Knežević N, Quéma V, Vukolić M. The next 700 BFT protocols. In Proc. the 5th European Conf. Computer Systems, April 2010, pp.363-376.Google Scholar
  27. 27.
    Kotla R, Dahlin M. High throughput Byzantine fault tolerance. In Proc. Int. Conf. Dependable Systems and Networks, July 2004, pp.575-584.Google Scholar
  28. 28.
    Croman K, Decker C, Eyal I, Gencer A E, Juels A, Kosba A, Miller A, Saxena P, Shi E, Sirer E G, Song D, Wattenhofer R. On scaling decentralized blockchains. In Proc. Int. Conf. Financial Cryptography and Data Security, February 2016, pp.106-125.Google Scholar
  29. 29.
    Cachin C. Architecture of the hyperledger blockchain fabric. In Proc. the Workshop on Distributed Cryptocurrencies and Consensus Ledgers, July 2016.Google Scholar
  30. 30.
    Wood T, Singh R, Venkataramani A, Shenoy P, Cecchet E. ZZ and the art of practical BFT execution. In Proc. the 6th Conf. Computer Systems, April 2011, pp.123-138.Google Scholar
  31. 31.
    Korpela K, Hallikas J, Dahlberg T. Digital supply chain transformation toward blockchain integration. In Proc. the 50th Hawaii Int. Conf. System Sciences, Jan. 2017, pp.4182-4191.Google Scholar
  32. 32.
    Tian F. An agri-food supply chain traceability system for China based on RFID & blockchain technology. In Proc. the 13th Int. Conf. Service Systems and Service Management, June 2016, pp.1-6.Google Scholar
  33. 33.
    Abeyratne S A, Monfared R P. Blockchain ready manufacturing supply chain using distributed ledger. International Journal of Research in Engineering and Technology, 2016, 5(9): 1-10.CrossRefGoogle Scholar
  34. 34.
    Milutinovic M, He W, Wu H, Kanwal M. Proof of luck: An efficient blockchain consensus protocol. In Proc. the 1st Workshop on System Software for Trusted Execution, Dec. 2016, Article No. 2.Google Scholar
  35. 35.
    Intel. Blockchain and its emerging role in healthcare and health-related research. Technical Report 4150-45-P, 2016., Jan. 2018.

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Zhimin Gao
    • 1
    Email author
  • Lei Xu
    • 1
  • Lin Chen
    • 1
  • Xi Zhao
    • 2
  • Yang Lu
    • 1
  • Weidong Shi
    • 1
  1. 1.Department of Computer ScienceUniversity of HoustonHoustonU.S.A.
  2. 2.School of ManagementXi’an Jiaotong UniversityXi’anChina

Personalised recommendations