Paper
28 July 2023 Privacy protection and data coordination mechanism of supply chain based on blockchain
Fei Tang, Jingwen Lin, Lili Xing, Xianggui Yang, Hao He, Shuai Ma, Dong Huang
Author Affiliations +
Proceedings Volume 12756, 3rd International Conference on Applied Mathematics, Modelling, and Intelligent Computing (CAMMIC 2023); 127563U (2023) https://doi.org/10.1117/12.2685950
Event: 2023 3rd International Conference on Applied Mathematics, Modelling and Intelligent Computing (CAMMIC 2023), 2023, Tangshan, China
Abstract
With the rapid development of science and knowledge economy, traditional supply chain management has been unable to adapt to the ever-changing competitive environment. When a large amount of data is exchanged, it is easy to cause various privacy and security issues, and data between enterprises cannot be accurately shared. At the same time, there are still a lot of manual operations in each link, with long process delays and low efficiency. This paper proposes a blockchain-based supply chain privacy protection and data collaboration scheme. By using blockchain, data privacy and collaboration can be guaranteed based on a more accurate assessment of supplier capabilities. At the same time, this solution improves the efficiency of cooperation between enterprises more safely and reasonably, and makes the supply chain system circulate more smoothly.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Fei Tang, Jingwen Lin, Lili Xing, Xianggui Yang, Hao He, Shuai Ma, and Dong Huang "Privacy protection and data coordination mechanism of supply chain based on blockchain", Proc. SPIE 12756, 3rd International Conference on Applied Mathematics, Modelling, and Intelligent Computing (CAMMIC 2023), 127563U (28 July 2023); https://doi.org/10.1117/12.2685950
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Blockchain

Data privacy

Computer security

Data transmission

Information security

Analytical research

Data modeling

Back to Top