Abstract
Growth of Internet Technology signs Internet of Things as fourth Industrial Revolution. It enables communication between devices without the support of human. Embedded devices with Smart Sensor extract data from external environment and perform actuation according to the application. In spite of obtaining time driven data, this technology has downfalls due to various security issues as it relays on wireless technology for device communication. Hence it demands security solution to address this problem. This paper investigates the security flaws encountered in pharmaceutical supply chain. This study analyzes the problem with existing system in counterfeiting data tampering and user privacy for secure exchange of user data. Data security is improved with Block Chain adoption where Interplanetary File System (IPFS) is used here to enable tamper proof data storage and data retrieval. Cryptographic Smart Contracts for Device Authentication and User Access control scheme are written in Solidity Language and executed on Remix IDE. Transaction and Execution cost are evaluated for Advanced Encryption Standard (AES) algorithm and Rivest-Shamir-Adelman (RSA) algorithm in terms of ether as gas consumption unit. Artificial Intelligence (AI) is used here to forecast demand production with accurate supply chain information from Block chain without fraudulent activity. Regression analysis is performed and evaluated with metrics as mean square error (MSE), root mean square error (RMSE) and R-squared value on three regression models such as Long-Short Term Memory (LSTM), Ordinary Least Square (OLS) and Decision Tree. From the study it is found that LSTM outperforms other models with MSE value of 0.375 whereas OLS and Decision Tree outputs with 1.375 and 2.58 MSE respectively. Integration of AI with Block Chain provides business solution against data tampering in supply chain process.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abayomi-Zannu, T. P., Odun-Ayo, I., Tatama, B. F., & Misra, S. (2020). Implementing a mobile voting system utilizing blockchain technology and two-factor authentication in Nigeria. In Proceedings of First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019) (pp. 857–872). Singapore: Springer.
Alsaadi, E., & Tubaishat, A. (2015). Internet of things: features, challenges, and vulnerabilities. International Journal of Advanced Computer Science and Information Technology, 4(1), 1–13.
Aich, S., Chakraborty, S., Sain, M., Lee, H. I., & Kim, H. C. (2019, February). A review on benefits of IoT integrated Blockchain based supply chain management implementations across different sectors with case study. In 2019 21st International Conference on Advanced Communication Technology (ICACT) (pp. 138–141). IEEE.
Bandara, K., Shi, P., Bergmeir, C., Hewamalage, H., Tran, Q., & Seaman, B. (2019, December). Sales demand forecast in e-commerce using a long short-term memory neural network methodology. In International Conference on Neural Information Processing (pp. 462–474). Cham: Springer.
Belapurkar, A., Chakrabarti, A., Ponnapalli, H., Varadarajan, N., Padmanabhuni, S., & Sundarrajan, S. (2009, February). Distributed Systems Security: Issues, Processes and Solutions. ISBN: 978-0-470-75177-0. (pp.1–334). Wiley.
Mehtab, S., Sen, J., & Dutta, A. (2020, September). Stock price prediction using machine learning and LSTM-based deep learning models. In Proceedings of the Second Symposium on Machine Learning and Metaheuristic Algorithms and Applications (SOMMA'’0) (pp. 1–18).
Billure, R., Tayur, V. M., & Mahesh, V. (2015, June). Internet of Things-a study on the security challenges. In 2015 IEEE International Advance Computing Conference (IACC) (pp. 247–252). IEEE.
Bogdanov, A., Khovratovich, D., & Rechberger, C. (2011, December). Biclique cryptanalysis of the full AES. In International Conference on the Theory and Application of Cryptology and Information Security (pp. 344–371). Berlin, Heidelberg: Springer.
Candan, G., Taskin, M. F., & Yazgan, H. R. (2014). Demand forecasting in pharmaceutical industry using artificial intelligence: Neuro-fuzzy approach. Journal of Management and Information Science, 2(2).
Chen, Y., Li, H., Li, K., & Zhang, J. (2017, December). An improved P2P file system scheme based on IPFS and blockchain. In 2017 IEEE International Conference on Big Data (Big Data) (pp. 2652–2657). IEEE.
Christidis, K., & Devetsikiotis, M. (2016). Blockchains and smart contracts for the internet of things. IEEE Access, 4, 2292–2303.
Gołąbek, M., Senge, R., & Neumann, R. (2020). Demand forecasting using long short-term memory neural networks. arXiv preprint arXiv:2008.08522.
Grackin, A. (2008). Counterfeiting and piracy of pharmaceuticals. IEEE Engineering in Medicine and Biology Magazine, 27(6), 66–69.
Jin-cui, Y., & Bin-xing, F. (2011). Security model and key technologies for the Internet of Things. The Journal of China Universities of Posts and Telecommunications, 18, 109–112.
King, B., Zhang, X. (2007). Securing the pharmaceutical supply chain using RFID. In International Conference on Multimedia and Ubiquitous Engineering. IEEE.
Kumar, R., Tripathi, R. (2019). Traceability of counterfeit medicine supply chain through Blockchain. In International Conference on Communication Systems and Networks (COMSNETS), Bengaluru, India, pp. 568–570.
Law, C. Y., & Simon, S. O. (2010). QR codes in education. Journal of Educational Technology Development and Exchange.
Lawson, M. (2009). Helping secure the global pharmaceutical manu facturing supply chain. Drug Discovery Today, 11(14), 533–535.
Liang, L. (2018). Analysis of supply chain finance development based on block chain technology: a case study of pharmaceutical industry. Chinna Journal Commerce, 25, 7–8.
Malina, L., Hajny, J., Fujdiak, R., & Hosek, J. (2016). On perspective of security and privacy-preserving solutions in the Internet of Things. Computer Networks, 102, 83–95.
Marucheck, A., Greis, N., Mena, C., & Cai, L. (2011). Product safety and security in the global supply chain: Issues, challenges and research opportunities. Journal of Operations Management, 29(7–8), 707–720.
Nesarani, A., Ramar, R., & Pandian, S. (2020). An efficient approach for rice prediction from authenticated block chain node using machine learning technique. Environmental Technology & Innovation, 20,.
Potdar, V., Wu, C., & Chang, E. (2005, December). Tamper detection for ubiquitous RFID-enabled supply chain. In International Conference on Computational and Information Science (pp. 273–278). Berlin, Heidelberg: Springer,
Potdar, M., Chang, E., & Potdar, V. (2006, December). Applications of RFID in pharmaceutical industry. In 2006 IEEE International Conference on Industrial Technology (pp. 2860–2865). IEEE.
Schöner, M. M., Kourouklis, D., Sandner, P., Gonzalez, E., & Förster, J. (2017). Blockchain technology in the pharmaceutical industry. Frankfurt, Germany: Frankfurt School Blockchain Center.
Shi, J., Yi, D., & Kuang, J. (2019, October). Pharmaceutical supply chain management system with integration of Iot and blockchain technology. In International Conference on Smart Blockchain (pp. 97–108). Springer, Cham.
Yang, C., & Zheng, Z. (2011). Analysis on pharmaceutical supply chain in china and its operational process. Logistics Science-Technology, 34(3), 54–56.
Yılmaz, M. H., & Arslan, H. (2015, October). A survey: Spoofing attacks in physical layer security. In 2015 IEEE 40th Local Computer Networks Conference Workshops (pp. 812–817). IEEE.
Yu, Q., Wang, K., Strandhagen, J. O., & Wang, Y. (2017, September). Application of long short-term memory neural network to sales forecasting in retail—a case study. In International Workshop of Advanced Manufacturing and Automation (pp. 11–17). Singapore: Springer.
Zhang, P., White, J., Schmidt, D. C., Lenz, G., & Rosenbloom, S. T. (2018). FHIRChain: applying blockchain to securely and scalably share clinical data. Computational and structural biotechnology journal, 16, 267–278.
Zhang, K., Liang, X., Lu, R., & Shen, X. (2014). Sybil attacks and their defenses in the internet of things. IEEE Internet of Things Journal, 1(5), 372–383.
Acknowledgements
The author acknowledges School of Computing, Kalasalingam Academy of Research and Education, Tamilnadu, India for keen encouragement in doing research activity.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Appendix
Appendix
See Table 8.
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Abraham, N., Ramar, R. (2021). Secure Data Sharing with Interplanetary File System for Pharmaceutical Data. In: Misra, S., Kumar Tyagi, A. (eds) Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities. Studies in Computational Intelligence, vol 972. Springer, Cham. https://doi.org/10.1007/978-3-030-72236-4_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-72236-4_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-72235-7
Online ISBN: 978-3-030-72236-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)