Skip to main content
Log in

The design of an electronic pedigree system for food safety

  • Published:
Information Systems Frontiers Aims and scope Submit manuscript

Abstract

The problem of food safety is a critical issue in recent years. To address the issue, the technologies of the Internet of Things are used to offer the possibilities to easily track the processes in the production, storage, transportation, sale, and even using phases of foods. This paper, therefore, introduces the design of an electronic pedigree system for food safety, which uses electronic pedigrees to enhance the safety of food supply. The system implements an extension of the pedigree standard of EPCglobal, and offers a more trustworthily tracking service to monitor and supervise the production and supply of food. We discuss the key issues of the design, and implement a prototype to evaluate the feasibility of the design. Finally, we analyze the trustworthiness assurance and security of our electronic pedigree system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  • Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: a survey. Computer Networks, 54, 2787–2805.

    Article  Google Scholar 

  • Boldyreva, A., Fischlin, M., Palacio, A., & Warinschi, B. (2007). A closer look at PKI: security and efficiency. PKC 2007 (LNCS 4450), 458–475.

  • Domingo, M. (2012). An overview of the internet of things for people with disabilities. Journal of Network and Computer Applications, 35, 584–596.

    Article  Google Scholar 

  • EPCglobal. (2007). Pedigree ratified standard, 2007, http://www.gs1.org/gsmp/kc/epcglobal/pedigree/pedigree_1_0-standard-20070105.pdf. Accessed April 2012.

  • GS1. (2011a). The global language of business, 2011, http://www.gs1.org/. Access April 2012.

  • GS1. (2011b). EPCIS - EPC Information Services Standard, 2011, http://www.gs1.org/gsmp/kc/epcglobal/epcis. Access April 2012.

  • Gu, Y., & Jing, T. (2011). The IOT research in supply chain management of fresh agricultural products. In: Proceedings of the 2nd international conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC) (7382–7385).

  • Han, W., & Lei, C. (2012). A survey on policy languages in network and security management. Computer Networks, 56(1), 477–489.

    Article  Google Scholar 

  • Harrison, M., & Inaba, T. (2008). Improving the safety and security of the pharmaceutical supply chain. Networked RFID Systems and Lightweight Cryptography, III, 223–246.

    Article  Google Scholar 

  • Kumar, S., Kadow, B., & Lamkin, M. (2011). Challenges with the introduction of radio-frequency identification systems into a manufacturer’s supply chain – a pilot study. Enterprise Information Systems, 5(2), 235–253.

    Article  Google Scholar 

  • Kwok, S., Tsang, A., Ting, J., Cheung, W., & Cheung, B. (2008). An intelligent RFID-based Electronic Anti-Counterfeit System (InRECS) for the manufacturing industry. In: Proceedings of the 17th world congress the international federation of automatic control. Seoul, Korea.

  • Lehtonen, M., Michahelles, F., & Fleisch, E. (2007). Trust and security in RFID-based product authentication systems. IEEE Systems Journal, 1(2), 129–144.

    Article  Google Scholar 

  • Li, L. (2012). Effects of enterprise technology on supply chain collaboration: analysis of China-linked supply chain. Enterprise Information Systems, 6(1), 55–77.

    Article  Google Scholar 

  • Li, L., & Liu, J. (2012). An efficient and flexible web services-based multidisciplinary design optimisation framework for complex engineering systems. Enterprise Information Systems, 6(3), 345–371.

    Article  Google Scholar 

  • Li, S., Xu, L., Wang, X., & Wang, J. (2012). Integration of hybrid wireless networks in cloud services oriented enterprise information systems. Enterprise Information Systems, 6(2), 165–187.

    Article  Google Scholar 

  • Meng, S., Chiu, D., Kafeza, E., Wenyin, L., & Li, Q. (2010). Automated management of assets based on RFID triggered alarm messages. Information Systems Frontiers, 12, 563–578.

    Article  Google Scholar 

  • MITRE. (2004). Horizontal Integration: broader access models for realizing information dominance. JASON Report, JSR–04–132.

  • Mitrokotsa, A., Rieback, M., & Tanenbaum, A. (2010). Classifying RFID attacks and defenses. Information Systems Frontiers, 12(5), 491–505.

    Article  Google Scholar 

  • Muckstadt, J., Murray, D., Rappold, J., & Collins, D. (2001). Guidelines for collaborative supply chain system design and operation. Information Systems Frontiers, 4, 427–453.

    Article  Google Scholar 

  • Pan, G., Qi, G., Wu, Z., Zhang, D., & Li, S. (2012). Land-use classification using taxi GPS traces. IEEE Transactions on Intelligent Transportation Systems, doi:10.1109/TITS.2012.2209201.

  • Shon, T., & Choi, W. (2007). An analysis of mobile WiMAX security: vulnerabilities and Solutions. Network-based information systems (LNCS 4658), 88–97.

  • Sun, H., Hsieh, B., & Tseng, S. (2005). On the security of some proxy blind signature schemes. Journal of Systems and Software, 74(3), 297–302.

    Article  Google Scholar 

  • Tan, C., & Li, Q. (2006). A robust and secure RFID-based pedigree system. In: Proceedings of the 8th international conference on information and communications security (LNCS 4307) (21–29).

  • Thompson, C. (2004). Radio frequency tags for identifying legitimate drug products discussed by tech industry. American Journal of Health-System Pharmacy, 1430.

  • Xin, H., & Stone, R. (2007). Chinese probe unmasks high-tech adulteration with melamine. Science, 322(5906), 1310–1311.

    Article  Google Scholar 

  • Xu, L. (2011). Enterprise systems: state-of-the-art and future trends. IEEE Transactions on Industrial Informatics, 7(4), 630–640.

    Article  Google Scholar 

  • Yan, Q. (2008). A security evaluation approach for information systems in telecommunication enterprises. Enterprise Information Systems, 2(3), 309–324.

    Article  Google Scholar 

  • Yin, J., Zhang, X., Lu, Q., Xin, C., Liu, C., & Chen, Z. (2011). IOT based provenance platform for vegetables supplied to Hong Kong. Recent Advances in CSIE 2011 (LNEE 127), 591–596.

  • Zdravković, M., Panetto, H., Trajanović, M., & Aubry, A. (2011). An approach for formalising the supply chain operations. Enterprise Information Systems, 5(4), 401–421.

    Article  Google Scholar 

  • Zheng, L., Zhang, H., Han, W., Zhou, X., He, J., Zhang, Z., Gu, Y., & Wang, J. (2011). Technologies, applications, and governance in the Internet of Things. In: Internet of things - Global technological and societal trends. From smart environments and spaces to green ICT. River Publishers.

Download references

Acknowledgment

This paper is supported by the 863 project (Grant NO: 2011AA100701), the Project-sponsored by SRF for ROCS, SEM, and the project of Natural Science Foundation of Shanghai (Grant NO: 12ZR1402600). The corresponding author is Lirong Zheng. The documents can be viewed at http://crypto.fudan.edu.cn/epedigree/homepage.html. Thank Ms. Min Li for her English polish.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Li-Rong Zheng.

Appendix A: Pedigree types in the previous pedigree standard of EPCglobal

Appendix A: Pedigree types in the previous pedigree standard of EPCglobal

Initial pedigree

This kind of electronic pedigree is used to describe the initial condition of the products. When a product is produced, its initial pedigree should be generated. Initial pedigree includes a product’s serial number and its initial information. Environment pedigrees and birth pedigrees can be related to initial pedigrees, which record the initial environment and birth condition of the product.

Repacking pedigree

This kind of electronic pedigree is always used to record the repacking information. When a product is split into several smaller products or several products are merged into one product, a repacking pedigree is required. Repacking pedigree includes the repacking information such as repacking time and location. Besides, the previous pedigree’s identifier should be related to the new repacking pedigrees so that we can trace the complete product information through it.

Alt pedigree

This kind of electronic pedigree is used to link accessories. Other electronic pedigrees can only contain word information. But sometimes pictures, audio or video are necessary. Besides, in some cases, certificates with much data need to be related into an electronic pedigree while the amount of information in an electronic pedigree is limited. So we use the alt pedigrees to link the accessories.

Shipped pedigree

This kind of electronic pedigree is used to record the shipping information. When the present company ships the products to another company, shipped pedigree should be generated. The shipped pedigree includes shipping time, location, receiver and other shipping information.

Received pedigree

This kind of electronic pedigree is used to record the receiving information. When the company receives products, their received pedigrees should be generated. The received pedigree includes receiving time, location, recipient and other receiving information.

Unsigned received pedigree

This kind of electronic pedigree is similar to the received pedigree, except that it has not a digital signature. In some cases, the product is refused by other companies for some reasons after shipment. It means the company will generate a received electronic pedigree based on a shipped pedigree which is generated by the same company. So the digital signature is redundant since the product is always under the control of the present company. In this case, we may generate an unsigned received pedigree instead of a received pedigree.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Han, W., Gu, Y., Wang, W. et al. The design of an electronic pedigree system for food safety. Inf Syst Front 17, 275–287 (2015). https://doi.org/10.1007/s10796-012-9372-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10796-012-9372-y

Keywords

Navigation