INFORMATION TECHNOLOGY FOR DATA AUTHENTICATION BASED ON BLOCKCHAIN TITLE OF MANUSCRIPT

Victoria Vysotska, Oleg Prokipchuk, Mariya Nazarkevych, Roman Romanchuk

Abstract


Background. The article describes the process of developing a blockchain-based technology for information support of the processes of authentication of goods. The paper also investigates the performance of the developed system depending on the adjustment of four parameters: mining complexity, dependence of mining time on technical support capacity, dependence of block creation time on the number of transactions, and dependence of blockchain validation time on the number of blocks.

Materials and Methods. The mining complexity was analyzed in the range from 1 to 7 (with a complexity of 8 or more, mining on a working device takes too long). This parameter determines the number of zeros that must be at the beginning of the hash to consider the work as confirmed. Each subsequent difficulty increases the total time several times. This is due to a significant increase in the number of operations that need to be performed during mining. Of course, mining also depends on the capacity of the technical support, which should be a complex of advanced processors and video cards. The analysis of the dependence of mining time on the processor frequency was conducted for a mining complexity of 5.

Results and Discussion. Additional processor power can significantly reduce mining time. The next study is to analyze the dependence of block creation time on the number of transactions. The main resource burden of this stage is the calculation of hash functions for transactions and for the block, as well as the construction of the hash tree. From the data obtained, we can conclude that the number of transactions in a block is its main resource load. This should be taken into account when choosing the maximum number of transactions per block. The last study was to identify the dependence of blockchain validation time on the number of blocks. The data shows a linear dependence of the blockchain validation time on the number of blocks.

Conclusion. This indicates that the validation process is not overloaded with resource-dependent operations. As the blockchain expands over time, the expected duration of blockchain validation can be calculated according to the following linear relationship.

Keywords: network communication, information system, counterfeit goods, blockchain technology, product life cycle, intelligent information retrieval system


Full Text:

PDF

References


  1. Li X., Wang C. The technology and economic determinants of cryptocurrency exchange rates: The case of Bitcoin. Decision support systems, 2017, 95: 49-60. https://doi.org/10.1016/j.dss.2016.12.001
  2. Чубенко А.Г., Лошицький М.В., Павлов Д.М., Бичкова С.С., Юнін О.С. Термінологічний словник з питань запобігання та протидії легалізації доходів, одержаних злочинним шляхом, фінансуванню тероризму, фінансуванню розповсюдження зброї масового знищення та корупції, К.: Ваіте, 2018. – 826 с.
  3. Allison. Behind the industry of counterfeit products in China and lawsuit success cases, 2021. URL: https://daxueconsulting.com/counterfeit-products-in-china/
  4. Butticè, V., Caviggioli, F., Franzoni, C., Scellato, G., Stryszowski, P., & Thumm, N. Counterfeiting in digital technologies: An empirical analysis of the economic performance and innovative activities of affected companies. Research Policy, 49(5) (2020) 103959. https://doi.org/10.1016/j.respol.2020.103959
  5. Richter F. The Industries Most Affected by Counterfeit Products, 2019. URL: https://www.statista.com/chart/17410/counterfeit-and-pirated-products-by-category/.
  6. Prokipchuk, O., Chyrun, L., Bublyk, M., Panasyuk, V., Yakimtsov, V., & Kovalchuk, R. (2021). Intelligent System for Checking the Authenticity of Goods Based on Blockchain Technology. In MoMLeT+ D, pp. 618-665.
  7. Kumar R., Tripathi R. Traceability of counterfeit medicine supply chain through Blockchain. In: 11th international conference on communication systems & networks (COMSNETS). IEEE, 2019. p. 568-570. https://doi.org/10.1109/COMSNETS.2019.8711418
  8. Alipour S. Ninety Eight Per Cent Of Fake Or Lookalike IPhone Chargers Put Consumers At Risk Of Lethal Electric Shock And Fire, 2017. URL: https://www.electricalsafetyfirst.org.uk/media-centre/press-releases/2017/12/ninety-eight-per-cent-of-fake-or-lookalike-iphone-chargers-put-consumers-at-risk-of-lethal-electric-shock-and-fire/.
  9. Casassus B. Health agency reveals scourge of fake drugs in developing world, 2017. URL: https://www.nature.com/news/health-agency-reveals-scourge-of-fake-drugs-in-developing-world-1.23051.
  10. Hamelin N., Nwankwo S., El Hadouchi R. Faking brands’: consumer responses to counterfeiting. Journal of Consumer Behaviour, 12(3), (2013) 159-170. https://doi.org/10.1002/cb.1406
  11. Zhang L. Platformizing family production: The contradictions of rural digital labor in China. The Economic and Labour Relations Review, 32(3), (2021). 341-359. https://doi.org/10.1177/10353046211037093
  12. Horstmann C. S., Cornell G. Core Java 2: Fundamentals (Vol. 1). Prentice Hall Professional, 2001.
  13. Martin R. Clean Architecture: A Craftsman's Guide To Software Structure And Design. U.S.A.: Pearson, 2017.
  14. Freeman E., Robson E., Bates B., Sierra K. Head First Design Patterns: A Brain-Friendly Guide. " O'Reilly Media, Inc.", 2004.
  15. Walls C. Spring in Action. New York: Manning Publications, 2018.
  16. Walls C. Spring Boot in Action. New York: Manning Publications, 2018.
  17. Grinev S. Mastering JavaFX 10: Build advanced and visually stunning Java applications. New York: Packt Publishing, 2018.
  18. Chaitanya S., JSON Tutorial, 2015. URL: https://beginnersbook.com/2015/04/json-tutorial/.
  19. Aravind M. Gson Library, 2017. URL: https://medium.com/@manuaravindpta/gson-library-b7d4ef0381e2.
  20. Maven: The Definitive Guide: The Definitive Guide – New York: O'Reilly Media, 2008.
  21. Schlager R. The OSI Model: simply explained. New York: CreateSpace Independent Publishing Platform, 2013.
  22. Gourley D., Totty B., Sayer M., Aggarwal A. HTTP: The Definitive Guide. New York: O'Reilly Media, 2002.
  23. Kurniawan B. How Tomcat Works. New York: Brainy Software, 2005.
  24. Aquino C., Gandee T. Front-End Web Development. New York: Big Nerd Ranch Guides, 2016.
  25. Kommadi B. IntelliJ vs Eclipse Complete IDE Comparison, 2019. URL: https://medium.com/@bhagvankommadi/hi-team-6d2dee22d8b2.
  26. Reed J. Blockchain: The Essential Guide to Understanding the Blockchain Revolution. New York: CreateSpace Independent Publishing Platform, 2016.
  27. Walker G. Block Header. A summary of the data in the block, 2016. URL: https://learnmeabitcoin.com/technical/block-header.
  28. Walker G. Merkle Root. A fingerprint for all the transactions in a block, 2016. – URL: https://learnmeabitcoin.com/technical/merkle-root.
  29. Canty R. Understanding Cryptography with RSA, 2020. URL: https://jryancanty.medium.com/understanding-cryptography-with-rsa-74721350331f.
  30. Nagpal A. How to create your own decentralized file sharing service using python, 2018. URL: https://medium.com/@amannagpal4/how-to-create-your-own-decentralized-file-sharing-service-using-python-2e00005bdc4a.




DOI: http://dx.doi.org/10.30970/eli.30.5

Refbacks

  • There are currently no refbacks.