Skip to main content

Part of the book series: Studies in Computational Intelligence ((SCI,volume 972))

Abstract

Growth of Internet Technology signs Internet of Things as fourth Industrial Revolution. It enables communication between devices without the support of human. Embedded devices with Smart Sensor extract data from external environment and perform actuation according to the application. In spite of obtaining time driven data, this technology has downfalls due to various security issues as it relays on wireless technology for device communication. Hence it demands security solution to address this problem. This paper investigates the security flaws encountered in pharmaceutical supply chain. This study analyzes the problem with existing system in counterfeiting data tampering and user privacy for secure exchange of user data. Data security is improved with Block Chain adoption where Interplanetary File System (IPFS) is used here to enable tamper proof data storage and data retrieval. Cryptographic Smart Contracts for Device Authentication and User Access control scheme are written in Solidity Language and executed on Remix IDE. Transaction and Execution cost are evaluated for Advanced Encryption Standard (AES) algorithm and Rivest-Shamir-Adelman (RSA) algorithm in terms of ether as gas consumption unit. Artificial Intelligence (AI) is used here to forecast demand production with accurate supply chain information from Block chain without fraudulent activity. Regression analysis is performed and evaluated with metrics as mean square error (MSE), root mean square error (RMSE) and R-squared value on three regression models such as Long-Short Term Memory (LSTM), Ordinary Least Square (OLS) and Decision Tree. From the study it is found that LSTM outperforms other models with MSE value of 0.375 whereas OLS and Decision Tree outputs with 1.375 and 2.58 MSE respectively. Integration of AI with Block Chain provides business solution against data tampering in supply chain process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 279.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abayomi-Zannu, T. P., Odun-Ayo, I., Tatama, B. F., & Misra, S. (2020). Implementing a mobile voting system utilizing blockchain technology and two-factor authentication in Nigeria. In Proceedings of First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019) (pp. 857–872). Singapore: Springer.

    Google Scholar 

  2. Alsaadi, E., & Tubaishat, A. (2015). Internet of things: features, challenges, and vulnerabilities. International Journal of Advanced Computer Science and Information Technology, 4(1), 1–13.

    Google Scholar 

  3. Aich, S., Chakraborty, S., Sain, M., Lee, H. I., & Kim, H. C. (2019, February). A review on benefits of IoT integrated Blockchain based supply chain management implementations across different sectors with case study. In 2019 21st International Conference on Advanced Communication Technology (ICACT) (pp. 138–141). IEEE.

    Google Scholar 

  4. Bandara, K., Shi, P., Bergmeir, C., Hewamalage, H., Tran, Q., & Seaman, B. (2019, December). Sales demand forecast in e-commerce using a long short-term memory neural network methodology. In International Conference on Neural Information Processing (pp. 462–474). Cham: Springer.

    Google Scholar 

  5. Belapurkar, A., Chakrabarti, A., Ponnapalli, H., Varadarajan, N., Padmanabhuni, S., & Sundarrajan, S. (2009, February). Distributed Systems Security: Issues, Processes and Solutions. ISBN: 978-0-470-75177-0. (pp.1–334). Wiley.

    Google Scholar 

  6. Mehtab, S., Sen, J., & Dutta, A. (2020, September). Stock price prediction using machine learning and LSTM-based deep learning models. In Proceedings of the Second Symposium on Machine Learning and Metaheuristic Algorithms and Applications (SOMMA'’0) (pp. 1–18).

    Google Scholar 

  7. Billure, R., Tayur, V. M., & Mahesh, V. (2015, June). Internet of Things-a study on the security challenges. In 2015 IEEE International Advance Computing Conference (IACC) (pp. 247–252). IEEE.

    Google Scholar 

  8. Bogdanov, A., Khovratovich, D., & Rechberger, C. (2011, December). Biclique cryptanalysis of the full AES. In International Conference on the Theory and Application of Cryptology and Information Security (pp. 344–371). Berlin, Heidelberg: Springer.

    Google Scholar 

  9. Candan, G., Taskin, M. F., & Yazgan, H. R. (2014). Demand forecasting in pharmaceutical industry using artificial intelligence: Neuro-fuzzy approach. Journal of Management and Information Science, 2(2).

    Google Scholar 

  10. Chen, Y., Li, H., Li, K., & Zhang, J. (2017, December). An improved P2P file system scheme based on IPFS and blockchain. In 2017 IEEE International Conference on Big Data (Big Data) (pp. 2652–2657). IEEE.

    Google Scholar 

  11. Christidis, K., & Devetsikiotis, M. (2016). Blockchains and smart contracts for the internet of things. IEEE Access, 4, 2292–2303.

    Article  Google Scholar 

  12. Gołąbek, M., Senge, R., & Neumann, R. (2020). Demand forecasting using long short-term memory neural networks. arXiv preprint arXiv:2008.08522.

  13. Grackin, A. (2008). Counterfeiting and piracy of pharmaceuticals. IEEE Engineering in Medicine and Biology Magazine, 27(6), 66–69.

    Article  Google Scholar 

  14. Jin-cui, Y., & Bin-xing, F. (2011). Security model and key technologies for the Internet of Things. The Journal of China Universities of Posts and Telecommunications, 18, 109–112.

    Article  Google Scholar 

  15. King, B., Zhang, X. (2007). Securing the pharmaceutical supply chain using RFID. In International Conference on Multimedia and Ubiquitous Engineering. IEEE.

    Google Scholar 

  16. Kumar, R., Tripathi, R. (2019). Traceability of counterfeit medicine supply chain through Blockchain. In International Conference on Communication Systems and Networks (COMSNETS), Bengaluru, India, pp. 568–570.

    Google Scholar 

  17. Law, C. Y., & Simon, S. O. (2010). QR codes in education. Journal of Educational Technology Development and Exchange.

    Google Scholar 

  18. Lawson, M. (2009). Helping secure the global pharmaceutical manu facturing supply chain. Drug Discovery Today, 11(14), 533–535.

    Article  Google Scholar 

  19. Liang, L. (2018). Analysis of supply chain finance development based on block chain technology: a case study of pharmaceutical industry. Chinna Journal Commerce, 25, 7–8.

    Google Scholar 

  20. Malina, L., Hajny, J., Fujdiak, R., & Hosek, J. (2016). On perspective of security and privacy-preserving solutions in the Internet of Things. Computer Networks, 102, 83–95.

    Article  Google Scholar 

  21. Marucheck, A., Greis, N., Mena, C., & Cai, L. (2011). Product safety and security in the global supply chain: Issues, challenges and research opportunities. Journal of Operations Management, 29(7–8), 707–720.

    Article  Google Scholar 

  22. Nesarani, A., Ramar, R., & Pandian, S. (2020). An efficient approach for rice prediction from authenticated block chain node using machine learning technique. Environmental Technology & Innovation, 20,.

    Article  Google Scholar 

  23. Potdar, V., Wu, C., & Chang, E. (2005, December). Tamper detection for ubiquitous RFID-enabled supply chain. In International Conference on Computational and Information Science (pp. 273–278). Berlin, Heidelberg: Springer,

    Google Scholar 

  24. Potdar, M., Chang, E., & Potdar, V. (2006, December). Applications of RFID in pharmaceutical industry. In 2006 IEEE International Conference on Industrial Technology (pp. 2860–2865). IEEE.

    Google Scholar 

  25. Schöner, M. M., Kourouklis, D., Sandner, P., Gonzalez, E., & Förster, J. (2017). Blockchain technology in the pharmaceutical industry. Frankfurt, Germany: Frankfurt School Blockchain Center.

    Google Scholar 

  26. Shi, J., Yi, D., & Kuang, J. (2019, October). Pharmaceutical supply chain management system with integration of Iot and blockchain technology. In International Conference on Smart Blockchain (pp. 97–108). Springer, Cham.

    Google Scholar 

  27. Yang, C., & Zheng, Z. (2011). Analysis on pharmaceutical supply chain in china and its operational process. Logistics Science-Technology, 34(3), 54–56.

    Google Scholar 

  28. Yılmaz, M. H., & Arslan, H. (2015, October). A survey: Spoofing attacks in physical layer security. In 2015 IEEE 40th Local Computer Networks Conference Workshops (pp. 812–817). IEEE.

    Google Scholar 

  29. Yu, Q., Wang, K., Strandhagen, J. O., & Wang, Y. (2017, September). Application of long short-term memory neural network to sales forecasting in retail—a case study. In International Workshop of Advanced Manufacturing and Automation (pp. 11–17). Singapore: Springer.

    Google Scholar 

  30. Zhang, P., White, J., Schmidt, D. C., Lenz, G., & Rosenbloom, S. T. (2018). FHIRChain: applying blockchain to securely and scalably share clinical data. Computational and structural biotechnology journal, 16, 267–278.

    Article  Google Scholar 

  31. Zhang, K., Liang, X., Lu, R., & Shen, X. (2014). Sybil attacks and their defenses in the internet of things. IEEE Internet of Things Journal, 1(5), 372–383.

    Article  Google Scholar 

Download references

Acknowledgements

The author acknowledges School of Computing, Kalasalingam Academy of Research and Education, Tamilnadu, India for keen encouragement in doing research activity.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Appendix

Appendix

See Table 8.

Table 8 Review of literature studied

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Abraham, N., Ramar, R. (2021). Secure Data Sharing with Interplanetary File System for Pharmaceutical Data. In: Misra, S., Kumar Tyagi, A. (eds) Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities. Studies in Computational Intelligence, vol 972. Springer, Cham. https://doi.org/10.1007/978-3-030-72236-4_11

Download citation

Publish with us

Policies and ethics