A Blockchain-Based Traceable Certification System

  • Po-Yeuan Chang
  • Min-Shiang Hwang
  • Chao-Chen Yang
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 733)


In recent years, product records become more common to merchandize sold in retail stores, but the current product record system used today can’t assure product’s quality after products were transported through the whole supply chain. During transportation, merchandise may be damaged accidentally or condition changed. Those events do not get recorded because records are predominantly focused by manufacturers. Also in second hand market, product record may be tampered or verification is weak. Nonexperiences buyers can’t distinguish counterfeit because records are not trustworthy and outdated. By using the concept borrowed from Bitcon, the advantage of the blockchain can be applied to the product record system. Because of the characteristics of the blockchain such as: decentralization, openness, and immutability, which can improve the system. To achieve the goal, ownership of products is introduced and smart contract is also embedded to further enhance the product record system.


Blockchain Product record Ethereum Security 


  1. 1. DENSO wave, the Inventor of QR code.
  2. 2.
    Qin, J., Sun, R., Xiang, X., Li, H., Huang, H.: Anti-fake digital watermarking algorithm based on QR codes and DWT. Int. J. Netw. Secur. 18(6), 1102–1108 (2016)Google Scholar
  3. 3.
    Narasimhan, H., Padmanabhan, T.R.: 3CAuth - a novel multi-factor authentication scheme using QR-code. Int. J. Netw. Secur. 18(1), 143–150 (2016)Google Scholar
  4. 4.
    Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008).
  5. 5.
    Ibrahim, M.H.: SecureCoin: a robust secure and efficient protocol for anonymous bitcoin ecosystem. Int. J. Netw. Secur. 19(2), 295–312 (2017)Google Scholar
  6. 6.
    Lin, I.C., Liao, T.C.: A survey of blockchain security issues and challenges. Int. J. Netw. Secur. 19(5), 653–659 (2017)Google Scholar
  7. 7.
    Zyskind, G., Nathan, O., Pentland, A.: Decentralizing privacy: using blockchain to protect personal data. In: Security and Privacy Workshops, pp. 180–184. IEEE (2015)Google Scholar
  8. 8.
    Liu, Y., Chang, C.C., Chang, S.C.: An efficient and secure smart card based password authentication scheme. Int. J. Netw. Secur. 19(1), 1–10 (2017)Google Scholar
  9. 9.
    Moon, J., Lee, D., Jung, J., Won, D.: Improvement of efficient and secure smart card based password authentication scheme. Int. J. Netw. Secur. 19(6), 1053–1061 (2017)Google Scholar
  10. 10.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)MathSciNetCrossRefzbMATHGoogle Scholar
  11. 11.
    Charlon, F.: Openassets/open-assets-protocol: Technical specification for the open assets protocol, a bitcoin based colored coins’ implementation (2013).
  12. 12.
    Christidis, K., Devetsikiotis, M.: Blockchains and smartcontracts for the Internet of Things. IEEE Access 4, 2292–2303 (2016)CrossRefGoogle Scholar
  13. 13.
    Wood, G.: Ethereum: A secure decentralised generalised transaction ledger, Ethereum Project Yellow Paper (2014)Google Scholar
  14. 14.
    Loibl, A., Naab, J.: Namecoin. Netw. Archit. Serv. 107–113 (2014)Google Scholar
  15. 15.
    Delmolino, K., Arnett, M., Kosba, A.E., Miller, A., Shi, E.: Step by step towards creating a safe smart contract: lessons and insights from a cryptocurrency lab. IACR Cryptol. ePrint Arch. 2015(460), 1–15 (2015)Google Scholar
  16. 16.
    Miers, I., Garman, C., Green, M., Rubin, A.D.: Zerocoin: anonymous distributed E-Cash from Bitcoin. In: IEEE Symposium on Security and Privacy (2013)Google Scholar
  17. 17.
    Sasson, E.B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., Virza, M.: Zerocash: decentralized anonymous payments from Bitcoin. In: IEEE Symposium on Security and Privacy (SP), pp. 459–474 (2014)Google Scholar
  18. 18.
    Gas fees for ethereum operations.
  19. 19.
    Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. SIGCOMM Comput. Commun. Rev. 34(2), 39–53 (2004)CrossRefGoogle Scholar
  20. 20.
    Baishya, R.C., Hoque, N., Bhattacharyya, D.K.: DDoS attack detection using unique source IP deviation. Int. J. Netw. Secur. 19(6), 29–939 (2017)Google Scholar
  21. 21.
    Behal, S., Kumar, K.: Characterization and comparison of DDoS attack tools and traffic generators: a review. Int. J. Netw. Secur. 19(3), 383–393 (2017)Google Scholar
  22. 22.
    Behal, S., Kumar, K., Sachdeva, M.: Discriminating flash events from DDoS attacks: a comprehensive review. Int. J. Netw. Secur. 19(5), 734–741 (2017)zbMATHGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Po-Yeuan Chang
    • 1
  • Min-Shiang Hwang
    • 2
    • 3
  • Chao-Chen Yang
    • 1
  1. 1.Department of Management Information SystemsNational Chung Hsing UniversityTaichungTaiwan, R.O.C.
  2. 2.Department of Computer Science and Information EngineeringAsia UniversityTaichungTaiwan, R.O.C.
  3. 3.Department of Medical ResearchChina Medical University Hospital, China Medical UniversityTaichungTaiwan, R.O.C.

Personalised recommendations