6,908 research outputs found

    Verifying the integrity of information along a supply chain using linked data and smart contracts

    Get PDF
    We showcase our approach to verify off-chained information using Linked Data, Smart Contracts, and RDF graph hashes stored on a Distributed Ledger. In this demo, we present our implementation and a use case from the supply chain domain

    Blockchain For Food: Making Sense of Technology and the Impact on Biofortified Seeds

    Get PDF
    The global food system is under pressure and is in the early stages of a major transition towards more transparency, circularity, and personalisation. In the coming decades, there is an increasing need for more food production with fewer resources. Thus, increasing crop yields and nutritional value per crop is arguably an important factor in this global food transition. Biofortification can play an important role in feeding the world. Biofortified seeds create produce with increased nutritional values, mainly minerals and vitamins, while using the same or less resources as non-biofortified variants. However, a farmer cannot distinguish a biofortified seed from a regular seed. Due to the invisible nature of the enhanced seeds, counterfeit products are common, limiting wide-scale adoption of biofortified crops. Fraudulent seeds pose a major obstacle in the adoption of biofortified crops. A system that could guarantee the origin of the biofortified seeds is therefore required to ensure widespread adoption. This trust-ensuring immutable proof for the biofortified seeds, can be provided via blockchain technology

    A SoLiD app to participate in a scalable semantic supply chain network on the blockchain (Demo)

    Get PDF
    To allow for inter-organisational processes in networks withlow trust, Supply Chains and corresponding information are moving tothe blockchain. On the blockchain, this information poses a scalabilitychallenge. To tackle this challenge, we propose a solution that minimisesthe data stored on the blockchain, which we base on semantic datamodelling in knowledge graphs, decentralised management of interlinkeddata, and a light-weight Smart Contract. In this demo, we focus onthe web agent to participate in Supply Chain networks built using ourapproach, and our corresponding data modellin

    Decentralized Identity and Access Management Framework for Internet of Things Devices

    Get PDF
    The emerging Internet of Things (IoT) domain is about connecting people and devices and systems together via sensors and actuators, to collect meaningful information from the devices surrounding environment and take actions to enhance productivity and efficiency. The proliferation of IoT devices from around few billion devices today to over 25 billion in the next few years spanning over heterogeneous networks defines a new paradigm shift for many industrial and smart connectivity applications. The existing IoT networks faces a number of operational challenges linked to devices management and the capability of devices’ mutual authentication and authorization. While significant progress has been made in adopting existing connectivity and management frameworks, most of these frameworks are designed to work for unconstrained devices connected in centralized networks. On the other hand, IoT devices are constrained devices with tendency to work and operate in decentralized and peer-to-peer arrangement. This tendency towards peer-to-peer service exchange resulted that many of the existing frameworks fails to address the main challenges faced by the need to offer ownership of devices and the generated data to the actual users. Moreover, the diversified list of devices and offered services impose that more granular access control mechanisms are required to limit the exposure of the devices to external threats and provide finer access control policies under control of the device owner without the need for a middleman. This work addresses these challenges by utilizing the concepts of decentralization introduced in Distributed Ledger (DLT) technologies and capability of automating business flows through smart contracts. The proposed work utilizes the concepts of decentralized identifiers (DIDs) for establishing a decentralized devices identity management framework and exploits Blockchain tokenization through both fungible and non-fungible tokens (NFTs) to build a self-controlled and self-contained access control policy based on capability-based access control model (CapBAC). The defined framework provides a layered approach that builds on identity management as the foundation to enable authentication and authorization processes and establish a mechanism for accounting through the adoption of standardized DLT tokenization structure. The proposed framework is demonstrated through implementing a number of use cases that addresses issues related identity management in industries that suffer losses in billions of dollars due to counterfeiting and lack of global and immutable identity records. The framework extension to support applications for building verifiable data paths in the application layer were addressed through two simple examples. The system has been analyzed in the case of issuing authorization tokens where it is expected that DLT consensus mechanisms will introduce major performance hurdles. A proof of concept emulating establishing concurrent connections to a single device presented no timed-out requests at 200 concurrent connections and a rise in the timed-out requests ratio to 5% at 600 connections. The analysis showed also that a considerable overhead in the data link budget of 10.4% is recorded due to the use of self-contained policy token which is a trade-off between building self-contained access tokens with no middleman and link cost

    Prototype of running clinical trials in an untrustworthy environment using blockchain.

    Get PDF
    Monitoring and ensuring the integrity of data within the clinical trial process is currently not always feasible with the current research system. We propose a blockchain-based system to make data collected in the clinical trial process immutable, traceable, and potentially more trustworthy. We use raw data from a real completed clinical trial, simulate the trial onto a proof of concept web portal service, and test its resilience to data tampering. We also assess its prospects to provide a traceable and useful audit trail of trial data for regulators, and a flexible service for all members within the clinical trials network. We also improve the way adverse events are currently reported. In conclusion, we advocate that this service could offer an improvement in clinical trial data management, and could bolster trust in the clinical research process and the ease at which regulators can oversee trials

    Blockchain technology in innovation ecosystems for sustainable purchases through the perception of public managers

    Get PDF
    The success of organizational processes is increasingly related to sustainable innovation. The concern with sustainable public purchases has been gaining strength over the years. However, several barriers are found to implementing this practice. At the same time, blockchain advances as technology part of the innovation of industry 4.0 and as a proposal to solve these difficulties. The study aimed to identify the perception of public procurement managers on the use of information systems with characteristic features of this technology, to reduce these barriers and elaborate a proposal for the use of blockchain in open innovation systems. The research developed is qualitative, quantitative and applied, being carried out through the application of a structured questionnaire to purchasing managers using the 92 prefectures of the State of Rio de Janeiro, located in Brazil, with subsequent analysis through descriptive statistics. The results of this work present relevant findings for public procurement through innovation and blockchain technology with the possibility of tracking the entire supply chain, allowing the verification of possible environmental and social damages such as the use of child or slave labor, the use of deforestation wood, counterfeit products, unethical agents, in addition to providing more transparency to the process of acquisition.publishe
    corecore