Implementasi Teknologi Blockchain Proof of Work Pada Penelusuran Supply Chain Produk Komputer

2021 ◽  
Vol 5 (3) ◽  
pp. 446-455
Author(s):  
Annisya ◽  
Emy Haryatmi

In recent times, the supply chain has developed into a large ecosystem. Various products moving from party to party require cooperation between stakeholders in managing the data generated. The problem is that every company has its own transaction records that can be inconsistent and their storage is centralized and not integrated between companies. This makes transaction records easy to falsify. Efficient data management is needed from the producer to the store so that consumers can trust the product. Therefore, the authors designed a product tracking system using blockchain by implementing proof of work (PoW) as the consensus algorithm, SHA-3 256 as data security, Mongo database as cloud-based data storage and QR Code as the output. As a result, transaction data from producers, distributors to retail stores are stored completely in MongoDB which is a cloud-based database, then the resulting QR Code can be used to view details of producers, distributors to retail stores that sell them. The simulation and trial results show the product tracing system design is successful as expected.  

2022 ◽  
Vol 2146 (1) ◽  
pp. 012036
Author(s):  
Yungui Chen ◽  
Liwei Tian ◽  
Lei Yang ◽  
Longqing Zhang

Abstract With the development of Internet technology, with the continuous increase of data volume, it has become more and more difficult to maintain the traditional centralized data storage method. Data is easy to copy, difficult to share, high storage costs, and low data usage efficiency. Further trigger the demand for more efficient data storage technology. This article aims to study the application of blockchain technology in the data security storage and sharing system. On the basis of analyzing the problems of data sharing and cryptography, the functional modules of the data security storage and sharing system are designed. Encryption uses public key encryption algorithm to ensure encryption performance. The simulation experiment results show that the system is effective for file sharing, and the average generation time of the algorithm in this paper is within the controllable range.


2018 ◽  
Vol 3 (2) ◽  
Author(s):  
I Gede Sujana Eka Putra

ABSTRACT<br /> <br />Utilization of information systems in the industry provides convenience in the management of<br />large amount of transaction data, to be processed efficiently and obtain accurate data. This<br />research focuses on designing and developing a tuna fish processing system from whole product or<br />loin product into frozen loin 30 Kg product. There are some step of system design, preliminary<br />study, system analysis, system design, system development, system development and system<br />implementation.The processing of tuna in PT Blue Ocean Grace International consists of<br />receiving, cutting, retouching, packing and shipping. The use of internal lot code, facilitate in<br />searching the source of fish, based on QR Code on loin label, the data input process becomes<br />faster and efficient. Through the utilization of fish processing information system, the company can<br />manage the transaction data and the user can make traceability of product related to supplier,<br />process date, and batch area<br /><br />Keywords: Tuna Processing, Information System, Traceability <br /><br />ABSTRAK <br /><br />Pemanfaatan sistem informasi dalam industri memberikan kemudahan dalam pengelolaan data <br />transaksi yang jumlahnya besar, untuk dapat diolah dengan efisien dan memperoleh data yang<br />akurat.Penelitian ini memfokuskan pada perancangan dan pembangunan sistem pengolahan ikan<br />tuna dari produk utuh atau produk loin menjadi produk frozen loin 30 Kg.  Tahapan perancangan<br />sistem terdiri dari studi pendahuluan, analisa sistem, desain sistem, pembuatan sistem, pembuatan<br />sistem dan implementasi sistem. Proses pengolahan ikan tuna di PT Blue Ocean Grace International<br />terdiri dari proses receiving, cutting, retouching, packing dan shipping. Penggunaan kode internal<br />lot, memudahkan dalam melakukan penelusuran sumber ikan, berbasis QR Code pada label loin,<br />proses input data menjadi lebih cepat dan efisien. Melalui pemanfaatan sistem informasi <br />pengolahan ikan, maka perusahaan dapat mengelola data transaksi dengan baik dan pengguna dapat<br />melakukan penelusuran balik tehadap produk akhir terkait supplier, tanggal proses, dan wilayah<br />(batch) tangkapan ikan<br /><br />Kata Kunci: Pengolahan, Ikan Tuna, Sistem Informasi, Ketertelusuran


2021 ◽  
Vol 16 (2) ◽  
pp. 102-108
Author(s):  
Ivan Taufan Adiwinoto

Industrial Revolution 4.0 menyebabkan pelaku supply chain untuk dapat terus beradaptasi dengan teknologi agar tetap kompetitif. Salah satu cara yang dapat digunakan bagi pelaku supply chain adalah dengan menerapkan teknologi IoT untuk membantu memudahkan pelaku supply chain dalam melakukan proses tracking dan tracing inventory. Dengan adanya IoT ini, seluruh pergerakan mulai dari proses penerimaan inventory sampai proses pengeluaran inventory dapat tercatat secara sistem online. Proses tracking dan tracing ini bertujuan untuk membantu mengetahui posisi dari inventory pada warehouse dan memastikan jika inventory dikeluarkan mengikuti aturan FIFO. Desain sistem berbasis IoT ini dibuat dengan menggunakan metode pendekatan System Development Live Cycle (SDLC) sampai pada tahapan desain sistem. Hasil akhir dari studi ini adalah desain sistem informasi yang menggunakan teknologi IoT dan QR code untuk proses tracking dan tracing inventory di dalam warehouse. Dengan adanya sistem informasi ini, jumlah inventory yang kadaluarsa dapat menurun. Abstract[Information System Design for Tracking and Tracing Using QR Code in Warehouse] Industrial Revolution 4.0 causes supply chain player to continue adapting technology to stay competitive. One way for supply chain player is by implementing Internet of Things (IoT) for tracking dan tracing inventory in supply chain process. With IoT, all inventory movement and activity from inbound area to outbound area can be recorded by system. This tracking and tracing process aim to help determine the position of the inventory in warehouse and ensure the issued inventory is following FIFO rules. This IoT-based system created using System Development Live Cycle (SDLC) approach up to system design step. The result of this study is an information system design that uses IoT and QR code technology for tracking and tracing inventory in warehouse. With this information system, the amount of expired inventory can decrease.Keyword: supply chain; tracing; tracking; QR code


2021 ◽  
Vol 11 (2) ◽  
pp. 807
Author(s):  
Llanos Tobarra ◽  
Alejandro Utrilla ◽  
Antonio Robles-Gómez ◽  
Rafael Pastor-Vargas ◽  
Roberto Hernández

The employment of modern technologies is widespread in our society, so the inclusion of practical activities for education has become essential and useful at the same time. These activities are more noticeable in Engineering, in areas such as cybersecurity, data science, artificial intelligence, etc. Additionally, these activities acquire even more relevance with a distance education methodology, as our case is. The inclusion of these practical activities has clear advantages, such as (1) promoting critical thinking and (2) improving students’ abilities and skills for their professional careers. There are several options, such as the use of remote and virtual laboratories, virtual reality and game-based platforms, among others. This work addresses the development of a new cloud game-based educational platform, which defines a modular and flexible architecture (using light containers). This architecture provides interactive and monitoring services and data storage in a transparent way. The platform uses gamification to integrate the game as part of the instructional process. The CyberScratch project is a particular implementation of this architecture focused on cybersecurity game-based activities. The data privacy management is a critical issue for these kinds of platforms, so the architecture is designed with this feature integrated in the platform components. To achieve this goal, we first focus on all the privacy aspects for the data generated by our cloud game-based platform, by considering the European legal context for data privacy following GDPR and ISO/IEC TR 20748-1:2016 recommendations for Learning Analytics (LA). Our second objective is to provide implementation guidelines for efficient data privacy management for our cloud game-based educative platform. All these contributions are not found in current related works. The CyberScratch project, which was approved by UNED for the year 2020, considers using the xAPI standard for data handling and services for the game editor, game engine and game monitor modules of CyberScratch. Therefore, apart from considering GDPR privacy and LA recommendations, our cloud game-based architecture covers all phases from game creation to the final users’ interactions with the game.


Author(s):  
Oryza Putri Suriana ◽  
Alfan Reynaldo ◽  
Muhammad Dwi Ferdian Suwardi ◽  
Indra Kusumadi Hartono

2018 ◽  
Vol 30 (4) ◽  
pp. 14-31 ◽  
Author(s):  
Suyel Namasudra ◽  
Pinki Roy

This article describes how nowadays, cloud computing is one of the advanced areas of Information Technology (IT) sector. Since there are many hackers and malicious users on the internet, it is very important to secure the confidentiality of data in the cloud environment. In recent years, access control has emerged as a challenging issue of cloud computing. Access control method allows data accessing of an authorized user. Existing access control schemes mainly focus on the confidentiality of the data storage. In this article, a novel access control scheme has been proposed for efficient data accessing. The proposed scheme allows reducing the searching cost and accessing time, while providing the data to the user. It also maintains the security of the user's confidential data.


Sign in / Sign up

Export Citation Format

Share Document