Block Chain Technology in Supply Chain Management Using Key Generation

Article History: Received: 10 November 2020; Revised: 12 January 2021; Accepted: 27 January 2021; Published online: 05 April 2021 Abstract: An information system is very important in today's changing world, and therefore choosing the proper system is becoming a very important decision. With the time, the information systems have become more crucial, with multiple problems affecting the supply chain and the continuous writing of performance areas. The principle of chain management aims at chain values. The working of chain management states that chain management enhances the value of the chain by establishing operational units. Traditional manufacturing supply chains bear a lot from additional, costs, delays and information loss due to information middleware’s. Therefore, we propose a blockchain oriented supply chain architecture to reduce intrusion in traditional ones. Current approaches to private-key security include signature schemes based on biometrics, index-hidden private key design, and post-quantum block chain schemes. Nevertheless, recovering the lost private key is difficult in all approaches. Here we proposed an optimal key formation procedure using a fitness-based self-adaptive sea lion algorithm for secure information sharing in SCM using block chain.


Introduction
Information sharing is the main part behind the supply chain. Blockchain is a attractive IOT technology that can provide many lucrative applications compromises of logistics and supply chains. Recently, the chance of implementing blockchain technology is a lucrative technology in many industries. Blockchain is taking a role from important multiple disciplines, such as medical services, army and other centralized credible identity intermediator (Jian Weng, Ming Lee, Lin Hou, Anija Wang, Jia-Nan Liu, Yang Xiang, Wei Lu, Yue Zhang Robert H. Deng 2018). Blockchain is able to provide an immutable leader solution for many distributed stakeholders by distributed design architecture having heterogeneous designs and technologies which are computationally strong as well as advance. Blockchain security is maintain by verifying the transaction using cryptography of public and private key, and blocks. But the recording of transaction cannot be done. Once modified because they are connected to each other as a part of table they are accepted (Avinash Samvedi, Vipul Jain, F. T. S. Chan, S. H. Chung 2016, Maozhu Jin, Hua Zhang, Yucheng Zeng 2018). There is a block attached at every level which needs to be hidden from the middlemen. Now days, supply chains nature is becoming complex in design, working is difficult, and variety of stakeholders, and large application areas mostly don't have an abstract version of the chain, largely organizations have their Identity created and has the power to instruct systems and their suppliers to manage global coverage of operations. A blockchain oriented supply chain largely recommended and should be reliable in authentication and traceability, eliminating intermediator auditors (Scott DuHadway, Steven Carnovale, Benjamin Hazen 2017). By adopting blockchain technology in SCM, operations management is secured, more transparent, permeable and efficient blockchain technology is liable to increase collaboration among SCM members, thereby indirectly impacting efficiency and cost in the supply chain. Also blockchain technology is able to increase customers' trust, due to the goods traceability throughout their communication between the supply chains (Amit Karamchandani, Samir K. Srivastava, Rajiv K. Srivastavam 2017).

Literature Review
The blockchain was first introduced by Satoshi Nakamoto for solving the security problem in electronic transactions. A blockchain is an shared, open and distributed bookkeeping that enables information security and responsibility, and is apt for dealing with important information ( However, supply chain management has several important issues in its current business operations. First, supply chain management mostly influenced by the enhancing applications of Internet of Things (IoT). Using IoT, the exact locations of packages, containers and products will be easily tracked at every level for achieving transparency in information with supply chain (Shuchih Ernest Chang, Yi-Chian Chen, Ming-Fang Lu 2019). Blockchain technology give users feasibility of recording transactions, but cannot simply be considered as "records", as it has different other features, such as preventing fraud and responding to technical disruptions Smart contract to deliver. Blockchain is basically associated with different technology that enables cryptocurrency, like bitcoin, but, by explaining the idea of blockchain technology with its different applications.
The blockchain technology has features such as decentering, distributed storage, traceability, non-tamper capacity, and smart contracts (Petri Helo, Yuqiuge Hao 2019). Due to the nature of distributed storage one has to go to the center first. Each node of a P2P network always have backup of data for entire blockchain system, and node failure has no impact on the whole network operation. In a blockchain network data storage is permanent, and for tracking information of transmission path timestamp technology can be used. There are different types of block chains that are in use. Public Blockchain: There is absolutely no restriction on a public blockchain. Simply with an Internet connection it becomes a verifier as soon as they make a transaction. Private Blockchain: A private blockchain is allowed. No one can join unless network administrators send an invitation. Consortium Blockchain: A consortium blockchain is frequently called as semidecentralized. Butin place of a single organization handling it; many companies can operate one node on each such network (Geeta S. Navale, Suresh N. Mali 2018, M. M. Annie Alphonsa, P. Amudhavalli 2018) .

Proposed privacy preservation using key generation
In this paper a new privacy preservation technique is proposed where by using the process of data sanitization and restoration sensitive information is hidden from the intermediate level which is more vulnerable to the stakeholders involve in communication.

Figure 1. Process of key generation
In supply chain management the data travels from level 1 to level n which is manufacturer to manufacturer and the secure block chain technology is used when processing this data. Manufacturers build their databases with separate fields where there is both a sensitive and a sensitive information, sensitive information needs to be hidden from the manager and the distribution agent. The authentication process takes place at the manufacturer level where, after successful key generation, the key can be passed. The next level by adding data blocks to the block chain (Priti Lale, Dr. Manish Sharma 2020). Figure 1 shows the services provided in the supply chain where cost, capacity is the major part of the inventory chain. This information is passed on the block chain in which sensitive information is hidden in the block. To make the data secure the optimal key is selected using the optimized fittest self-adaptive sea lion algorithm.

FSA-SLnO algorithm Mathematical Model
In the mathematical models encircling, tracking and identification of pray attack is explained.

1) Tracking and detecting phase
For representing distance between the target prey and the sea the symbol used is Dis , and the vector position ) (t S and target prey ) (t (1) (2)

2)
Attacking phase The sea lions in this exploration phase have to locate the target prey and surround them. The "Dwindling encircling technique and Circle updating position" are used to model the prey attacking concept in an effective way.

3) Searching for prey
The sea lions positions update isfor identification of the optimal search agent. In exploration phase, by random selection of sea lion the position of sea lion is updated. Means, when value is greater than one, SLnO algorithm will globally identify search agent and optimal solution will be identified which is again global.
Step 1: Initialization of overall population and assigning index.
Step 2: Finding the fitness of overall population.
Step 3: If ( leader SP <0.25) i.e. the first five best solutions of the fitness Fit is updated using the Phase-1 Prey detection and tracking.
Step 4: In case if 1 ) 1 ( = abs , then update the position of the solution using the exploration phase.

Conclusion
In this work, the key used will be optimally selected via a up to the minute optimization model referred to FSA-SLnO, The major benefit relied on this process were: Only the authenticated person will be able to retrieve the data shared the sender having same key. The validation of proposed key generation in SCM with block chain technology will be done with comparison with existed model while comparing security as well.