Next Article in Journal
Too Defeated to Work? The Effects of Dispatched Employees’ Upward Social Comparison on Time Theft
Previous Article in Journal
Is Regulation Protection? Forest Logging Quota Impact on Forest Carbon Sinks in China
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Hyperledger Fabric-Based Tea Supply Chain Production Data Traceable Scheme

1
School of Information Engineering, Changchun Sci-Tech University, Changchun 130600, China
2
Department of Computer Science and Information Engineering, Chaoyang University of Technology, Taichung City 413310, Taiwan
3
School of Computer and Information Engineering, Xiamen University of Technology, Xiamen 361024, China
4
Department of Computer Science and Engineering, National Chung-Hsing University, Taichung 40227, Taiwan
5
Department of Industrial Education, National Taiwan Normal University, Taipei 10610, Taiwan
*
Authors to whom correspondence should be addressed.
Sustainability 2023, 15(18), 13738; https://doi.org/10.3390/su151813738
Submission received: 16 July 2023 / Revised: 17 August 2023 / Accepted: 30 August 2023 / Published: 14 September 2023
(This article belongs to the Section Sustainable Management)

Abstract

:
With the advent of Industry 4.0, blockchain is one of the emerging technologies that can be used in multiple fields, especially in supply chain networks, where it is considered a sustainable concept technology. Because of its decentralization, reliability, transparency, consistency, and traceability, blockchain can challenge existing conventional models in supply chain scenarios. Therefore, this study proposes a framework that integrates the technology of Blockchain 3.0 (Hyperledger Fabric) into the tea supply chain. The concept of data traceability driven by blockchain technology consists of documenting the tea supply chain system, in which the cultivation, processing, and retailing of tea leaves are documented, and optimizing the existing anti-counterfeiting mechanisms. The ECDSA algorithm is used to confirm the identity among the entities located in the Hyperledger Fabric channel, and IPFS technology is introduced to store tea traceability data to solve the problem of data increment in the tea production process. Only the hash value and traceability code of the traceability data are stored in the block. We analyze the relationship between the number of transactions and latency, and we can see the latency time of both write and read transactions. The system tested write transactions and read transactions with a minimum write speed of 0.97 s and a maximum of 6.26 s and a minimum read speed of 0.1 s and a maximum of 4.62 s via Caliper analysis. The experimental results show that the performance analysis sounds good. This study uses distributed theory and service-oriented thinking in its specific application to the tea supply chain system model and takes each entity through a B2B connection to achieve anti-counterfeit traceability in the tea supply chain of a regulatory nature.

1. Introduction

1.1. Background

During periods of economic development, many supply chain industries adopt a linear economic model in which a large number of raw materials are extracted and turned into products that are not reused or recycled. This economic model can lead to the destruction of our environmental resources such as air, water, and land [1]. As a result, many supply chain industries are gradually moving towards a circular economy, where product design and manufacturing take into account sustainability and the longest possible period of high-value utilization. However, due to the involvement of multiple stakeholders in the supply chain, it is easy to encounter difficulties in information tracing, information falsification, and trust crises during the various lifecycle stages of production [2]. Therefore, this study aims to use blockchain technology to address issues of product information authenticity and stakeholder trust in the tea supply chain and establish a recyclable model of the tea supply chain.
Blockchain technology is a decentralized ledger. Firstly, the ledger is transparent, and multiple users can verify the information recorded in the ledger, achieving data transparency within the blockchain [3]. Secondly, the blockchain is a distributed database maintained by multiple nodes and not owned by any individual, which makes the data in the blockchain immutable [4]. Thirdly, the data in the blockchain are stored in a Merkle tree structure and combined with cryptography to achieve accurate data verification and encryption of data information [5]. Finally, blockchain does not rely on a central authority for management, which can effectively avoid issues such as information leakage or data tampering caused by hacker attacks through its decentralized mechanism [6].
There are two reasons for studying the tea supply chain in this paper. Firstly, tea is popular worldwide, with a global tea market value of about USD 209.3 billion in 2022, expected to rise to USD 266.7 billion by 2025 [7]. Tea has a long history of popularity globally, originating in China, where approximately 3.12 million tons of tea were produced in 2021, up from about 2.74 million tons in 2020 [8]. India, China, Sri Lanka, and Kenya are the world’s largest tea exporting countries, with China exporting USD 1.6 billion, Sri Lanka exporting USD 1.5 billion, and Kenya exporting USD 1.4 billion in 2017 [9]. Secondly, there are many problems in the current tea supply chain network, such as poor information utilization, chaotic regulatory systems, and a lack of traceable monitoring systems [10].

1.2. Related Works

The usage of blockchain technology is currently a popular approach in the field of supply chain research to guarantee the traceability of each link in the supply chain process. Due to the limited storage space on the public chain, which is the format chosen for the study, it may be challenging to solve the resource access problem. Table 1 contains a list of the pertinent books, some of which are still difficult to understand. Treiblmaier et al. [11] suggest using blockchain technology to connect the food supply chain to address the problem of multiple information asymmetry, using it as a label that recognizes information based on a traceability system as a key factor in what consumers think of the product and their intent to purchase. Paul et al. [12] proposed a practical model to support a circular supply chain in the tea industry network, which completes the circular supply chain by using blockchain technology as a substrate to drive RFID technology. Paul et al. explored the possibility of combining multiple modules in the system with RFID technology by analyzing multiple existing system models, but they did not specify the specific combination process. Centobelli et al. [13] designed a circular blockchain platform that includes manufacturers, reverse logistics service providers, selection centers, recycling centers, and landfill applications in a supply chain scenario. However, the proposed blockchain platform was not analyzed for security. Helo et al. [14] proposed a pilot cloud-based portal system for real-time tracking and tracing of logistics and supply chains. And a detailed design of how the triple-loop framework of the system utilizes blockchain qualities is presented. Chang et al. [15] proposed the concept that blockchain and smart contract technology can help in business process re-engineering across enterprises and, through smart contract technology in their proposed system framework, ensure the intelligent advancement of business processes to be able to take advantage of the advantageous features of the blockchain platform. However, no logical description is given for the writing of smart contracts.
Based on reading the literature combined with the research in this paper, it is concluded that the specific problems are:
(1)
Redundancy of information and information asymmetry in the process of tea farming until tea selling;
(2)
Because tea is a non-standardized product and the tea supply chain network’s standardization is low, it can only be identified by tea tasters and tea artists (experienced people), so there is personal subjectivity;
(3)
Complex distribution channels for tea, where the source is difficult to determine and the quality cannot be ascertained, can easily give rise to the problem of substandard or counterfeit products.
(4)
The traditional tea supply chain lacks digital management due to the low adoption of information technology across all stages. There is poor information exchange and interaction, making it difficult for consumers to access comprehensive information.
Given the above problems, this study will create a secure channel using Hyperledger Fabric, a blockchain 3.0 federation chain technology, to pull the stakeholders in the tea supply chain into the channel. Due to the native nature of the Hyperledger Fabric channel, the various entities in the channel can share data securely, encrypt the required data using the private key generated by ECDSA, then use the algorithm known as Elliptic Curve Digital Signature Algorithm (ECDSA) to digitally sign the data at different stages of transmission. To solve the blockchain block capacity problem, an IPFS file storage system is introduced to store all the data recorded during the tea production process to ensure the quality of the tea and solve the tea anti-counterfeiting problem. Finally, all data will be hashed, the hash value will be uploaded to the chain, and the data will be made into a unique traceability code to follow the outer packaging of tea for identification between entities.
The research objectives of this study that can be achieved under the traditional tea supply chain model are as follows:
(1)
Solve the credit problem: There is more than one institution involved, and each institution supervises the other, thus ensuring the accuracy of the information and ensuring that the information on the chain cannot be tampered with, which greatly reduces the chance of cheating.
(2)
The whole record tracking: Relative to keeping the express logistics tracking open, transparent, and able to track the production, processing, testing, transportation, and warehousing of goods for sale, each link of time after the point is recorded in full.
(3)
Clear responsibilities and traceability of problems: The characteristics of blockchain, namely, openness and transparency, cannot be tampered with. Once a problem occurs at a certain link, it is timely and effective to find out where the problem link occurs.
(4)
Prevent commodity counterfeiting: After the information about the goods is put on the chain, the whole process is open and transparent, and the products from the source down to the hands of customers can be checked so that there is no problem of counterfeiting.
The format of this essay is as follows. The major technologies employed in this paper’s system are introduced in Section 2 of the text; Section 3 describes the main processes of the system operation as well as the architecture; Section 4 performs the security analysis; Section 5 discusses the performance analysis and comparison; finally, in Section 6, we conclude our scheme.

2. Preliminary

2.1. Blockchain

Blockchain is a decentralized, distributed ledger technology for recording and verifying transactions. It ensures the security and integrity of transaction data through cryptography and distributed consensus algorithms, making it impossible for transactions to be tampered with or forged. Due to its decentralized nature, blockchain technology is widely used in digital currency, smart contracts, supply chain management, asset management, and other fields [16].
Blockchain technology is a very promising technology when it comes to the tea industry since it can offer answers for transparency, safety, and traceability in the tea supply chain. Blockchain is a decentralized digital ledger that can keep track of transactions without requiring centralization [17]. The technology is unique in that it ensures transparency and security of transactions, as the record of transactions cannot be tampered with or deleted. In the tea supply chain, blockchain technology can be used to track the entire process of tea production, processing, packaging, and transportation and to ensure its authenticity and integrity [18]. Because the tea supply chain usually involves multiple participants, such as farmers, processors, retailers, and consumers, all of these participants can use blockchain to record and track the transaction records of tea. Through blockchain technology, participants in the tea supply chain can share the same transaction information, thus enabling real-time information sharing and collaboration and reducing un-necessary human intervention and errors.
In addition, blockchain technology can also ensure the quality and security of the tea supply chain. Through blockchain technology, the production and processing of tea can be traced, thus determining the quality and security of the beverage [19]. For example, if there is a problem with a batch of tea, the participants can use blockchain technology to determine where and when the problem occurred and find the source of the tea so that appropriate measures can be taken to prevent the problem from expanding.

2.2. Hyperledger Fabric

Hyperledger Fabric is an open source blockchain framework designed to provide a customizable, scalable, and highly secure blockchain solution for enterprise-class applications [20]. Unlike other public blockchains, Hyperledger Fabric has many customization features that can be configured to meet different business needs. It supports smart contracts that enable various forms of business logic while providing strict permission control to ensure the confidentiality and security of data and transactions.
In the past, the management of tea supply chains was usually conducted manually, which led to many problems, such as opaque information, frequent errors, difficulty tracking, and so on. This article uses Hyperledger Fabric technology to manage the supply chain for tea to address these issues. The enterprise-level blockchain system Hyperledger Fabric satisfies the supply chain for tea’s requirements for efficiency, dependability, and security.
(1)
Data privacy and security: Hyperledger Fabric uses a multi-tier architecture and smart contracts to ensure data privacy and security [21]. All data in the tea supply chain are encrypted and can only be decrypted by authorized participants.
(2)
Management and tracking: Hyperledger Fabric allows every participant in the tea supply chain to track every step of the tea’s transportation, processing, quality testing, and sales. This means that all participants in the tea supply chain can know the real-time status of the tea at all times, allowing them to better manage and plan the flow of tea [22].
(3)
Transparency and trust: Hyperledger Fabric can also establish an environment of transparency and trust, and through blockchain technology [23], all participants in the tea supply chain can view and verify information on the origin, processing, inspection, and quality of tea, thus ensuring the authenticity and quality of tea.

2.3. Inter Planetary File System (IPFS)

The Inter Planetary File System (IPFS) is a peer-to-peer distributed file storage and sharing protocol. It is designed to create a decentralized global file system that enables users to share and access files over the Internet without relying on centralized servers [24]. IPFS guarantees data uniqueness and reliability through hash addresses and content addressing and uses peer-to-peer network protocols to transfer data, improving the speed and security of file transfers [25]. By using this technology, the proposed scheme has the following advantages:
(1)
Data storage: the tea supply chain involves a large number of data, including production, processing, transportation, and quality inspection data. The use of IPFS can store these data on distributed nodes, avoiding the problem of a single point of failure, and can improve the reliability and security of the data.
(2)
Traceability: Customers should be able to trace the origin and production process of their tea. To enhance trustworthiness, details such as where and how the tea is grown, harvested, and processed can be recorded on the blockchain using IPFS. This allows customers to easily verify the authenticity and traceability of the tea online.

2.4. Elliptic Curve Digital Signature Algorithm (ECDSA)

The elliptic curve digital signature algorithm (ECDSA) was standardized by IEEE and NIST in 2000 [26]. There is no sub-exponential time solution to the elliptic curve discrete logarithm problem (ECDLP), in contrast to the integer factorization problem (IFP). ECDLP has advantages, including shorter keys, shorter signatures, and quicker calculation times. With Hyperledger Fabric, ECDSA may be employed, partially resolving the issue of insufficient processing and storage resources.
Assume that role A signs the message with m in the signer’s capacity, role B evaluates the message’s legitimacy in the verifier’s capacity, and A selects the elliptic curve’s parameters as y 2 = ( x 3 + a x + b ) mod p , p , and G . This generates the roles of an A key pair ( d A , Q A ) , a private key d A , and a public key, each of which is Q A = d A G .
Parameters selection:
(1)
Elliptic curve equation y 2 = ( x 3 + a x + b ) mod p : This represents an elliptic curve that has a definite shape.
(2)
Base point: A point G on the curve is chosen as the base point.
(3)
Large prime number: A random number is chosen as the modulus n, which is usually a very large prime number.
(4)
Private key: A random number d is chosen as the private key.
(5)
Public key: The public key Q is calculated as the product of the base point G and the private key d.
Role A uses the following steps to complete the signature:
(1)
Role A chooses a base point G and an elliptic curve E p ( a , b ) .
(2)
Role A picks the numbers k [ 1 , N 1 ] and N , which are in the order of G at random.
(3)
Role A does the H = h a s h ( m ) information hash calculation.
(4)
Role A figures out a point ( x , y ) = k G .
(5)
After role A calculates r = x mod n and r 0 , it sends role B the result of its ECDSA signature, which is s = k 1 ( H + r d A ) mod n and ( r , s ) .
Role B uses the following steps to complete the verification:
(1)
Role B calculates the m, H = h a s h ( m ) hash.
(2)
Role B determines u 1 = s 1 H mod n and u 2 = s 1 r mod n .
(3)
Role B determines ( x , y ) = u 1 G + u 2 Q A .
(4)
The verification of the signature is successful if x = r .

3. System Overview

3.1. System Architecture

As illustrated in Figure 1, we propose an architecture for a consortium blockchain network in this study. The system design consists of three key components that make up the architecture of the consortium’s distributed ledger service center: the blockchain network component, the application development and service component, and the data storage module. User entities joining the federation chain store data in the Data Storage Component via a client in the Application Component and subsequently interact with the Hyperledger Fabric Network with the address information it returns along with other transaction-required information.
(1)
Tea Planting Enterprise (PE)
The whole tea supply chain starts with tea farmers planting tea leaves, and the professional inspectors monitor their air temperature and humidity, light level, soil temperature, humidity, pH value, planting location, and other environmental data during the planting cycle. At the same time, we collect records of agricultural operations such as plot sowing, fertilization, and irrigation and take high-definition pictures of the whole growth cycle. After ensuring the quality of the picked tea leaves, they are transported to the tea processing facility.
(2)
Processing Mechanism (PM)
The tea processing process broadly consists of various steps such as killing, withering, kneading, fermentation, drying, etc. Different processing steps are carried out by different types of tea leaves. In the overall processing chain, professionals monitor the operation process to control the details of each operation, record all the operation data, and write the operation data and all the planting data of the planting enterprise into the tea traceability code. Finally, the processed tea leaves are transported to the distributors along with the traceability code.
(3)
Retailers (R)
After receiving the processed tea leaves, dealers verify the quality of the tea leaves through the traceability code to ensure the standardized production process of tea installation, and after confirmation, they can distribute the tea leaves to multiple platforms for retailing. A record of the sale is made and uploaded to the Hyperledger Fabric Network for subsequent review by consumers and market regulators for complaints.
(4)
Consumers (C)
Consumers can view the entire production process and detailed data of tea through the traceability code when purchasing tea and provide feedback to market supervision if they find quality problems with tea. The feedback process concludes with the need to submit feedback to the Hyperledger Fabric Network, which facilitates regulatory logging by market regulators.
(5)
Market Supervision (MS)
Market supervision can verify the whole process of the tea supply chain through the feedback information and evidence provided by consumers and carry out supervision operations if there is a problem.

3.2. Application Scenario

We describe the transaction flow of the tea supply chain as shown in Figure 2 below.
Step 1: Each entity in the system must register at this level. To join the blockchain network as a node, all entities—including producers, processors, distributors, market supervisors, and consumers—need to be certified by CA. After the authentication, the CA node will issue digital certificates, and all entities can share data through the blockchain network.
Step 2: All production-related data are recorded by the PE, who then uploads the finished product to the blockchain hub with an electronic signature and a hashing method. There, it is added to the ledger by the sorted nodes and updated on the local ledger. The raw materials and transaction information will be delivered to the PM after the production is finished.
Step 3: When the PM receives the transaction request, it verifies the legitimacy of the signature through the ECDSA algorithm to confirm the origin of the transaction and verifies the hash value to ensure that the transaction information and production data are not tampered with to ensure the quality of the raw materials. After the production is completed, it generates product information and order information, as well as its processing process, and uploads it to the blockchain center, which is converted into traceability code through coding and transported to the R with the product.
Step 4: After the R receives the products, they verify the data in the chain by scanning the traceability code and comparing the product information and order information, and can start selling after confirming all data sources and data integrity.
Step 5: C can access the data in the chain by scanning the traceability code on the products through the client and obtaining all the production data of the intended products. If they find any problems with the data after verification, they can report them to the MS and send the reporting information to the blockchain center.
Step 6: The MS can access two parts of the data in the chain through the client: one is all the product information and order information of the products to supervise whether there are crude and falsified orders in the market, and the other is to check whether there is any information reported by consumers, to realize the supervision of the whole market operation through the blockchain-shared data.

3.3. Notations

The notation of this article is as follows:
I D X The Identity of X
d X Party X’s private key for the ECDSA
Q X Party X’s public key for the ECDSA
C e r t X A user X’s digital certificate
k i The user selects the ith random number
D a t a X Data at the heart of each transaction
M P E PE endicates the transactions uploaded to Hyperledger Fabric
M P M PM indicates the transactions uploaded to Hyperledger Fabric
M R R indicates the transactions uploaded to Hyperledger Fabric
M C C indicates the transactions uploaded to Hyperledger Fabric
( r X , s X ) The signature that user X created
H X i The ith hash that user X produced
C X Information encrypted by user X
E P u k X ( M X ) / D P R K X ( C X ) Use the party X’s public key or private key to encrypt or decode the message M.
T i The ith timestamp
Δ T The standard for determining whether a timestamp is correct

3.4. Transaction Information Flow

Figure 3 depicts the transaction format used by the Hyperledger Fabric-based blockchain system.
If Entity A and Entity B need to communicate and exchange information within the supply chain, they will each establish an organization (Organization A and Organization B), register with a Certificate Authority (CA), and obtain their corresponding public–private key pairs and digital certificates. Peer nodes are the components that comprise an organization, including endorser nodes, orderer nodes, anchor nodes, and leader nodes. When Organization A interacts with Organization B, it encrypts the transaction data with its public key and then submits the transactions to the blockchain through its orderer node. Organization B receives the transaction data from Organization A over the channel and updates its local copy of the blockchain ledger to store the data by invoking chaincode functions. Each peer node in the network can deploy one or more chaincodes and maintain a copy of the ledger for the channel. The ordering node collects and packages the transactions and information exchange generated within the channel, before submitting to the Hyperledger Fabric network.

3.5. Registration Phase

The CA, which generates the key pairs required to issue the relevant digital certificates, must first receive registration information from all entities that intend to join the Hyperledger Fabric network. We use U s e r s   X to denote each entity in the proposed network.
Step 1. Using his client, the user sends the registration data I D x to the CA node of the Hyperledger Fabric Network; if the registration information is legal, the CA node will enter the second step of operation; if not, the client will give the corresponding prompt.
Step 2. The CA node creates a unique private key d X and determines the corresponding public key.
Q X = d X G
Using the ECDSA algorithm with G as the base point, it generates a private digital certificate C e r t X based on the registration information provided by U s e r s   X , and finally sends it back to the user.
Step 3. The client saves the key pair and certificate IDX provided by CA after user registration.
( I D X , d X , Q X , C e r t X )
The registered chaincode is shown in Algorithm 1:
Algorithm 1. Physical information sign up chaincode
func RegisterUser(ctx contractapi.TransactionContextInterface, userID string) error {
  //Obtain the client’s identity
  clientIdentity, err := ctx.GetClientIdentity()
  if err != nil {
    return fmt.Errorf(“failed to get client identity: %w”, err)
  }
  //Create a new user
  newUser := &User{
    ID:   userID,
    Balance: 0,
    Owner: clientIdentity.GetID(),
  }
  //Write the user to the ledger
  err = ctx.GetStub().PutState(userID, newUser.ToBytes())
  if err != nil {
    return fmt.Errorf(“failed to put user: %w”, err)
  }
  return nil
  }

3.6. Production Phase

The start of the tea supply chain is handled by the production phase, which is mainly the interaction between the two entities, the grower and the manufacturer, to which the tea farmer belongs, through Hyperledger Fabric with the following specific process:
Step 1. In the production phase, the PE first monitors the environmental data of the planting site, such as air and soil humidity, illumination, pH value, etc., and the records of various farming operations, such as sowing, right and wrong, irrigation, etc., and makes detailed records of the tea growth cycle, collectively referred to as production data D a t a P E , and then stores the D a t a P E in IPFS, which will return the corresponding address a d s D a t a P E .
Step 2. The PE chooses a random number k 1 at random and calculates the hash value
h D a t a P E = h a s h ( D a t a P E )
of D a t a P E , and generates a message containing h D a t a P E and the timestamp T 1 .
M P E = ( I D P E | |   I D P M | |   h D a t a P E | |   a d s D a t a P E       | |   T 1 )
PE generates the signature ( r P E , s P E ) by calling the signature function of Algorithm 2.
( r P E , s P E ) = S i g n ( M P E ,   k 1 ,   d P E )
The PE encrypts the data and generates an encrypted message using a public key issued by the PM at the center of the blockchain:
C P E = E P u k P M ( M P E )
PE encapsulates the encrypted data into transaction information and then uploads the transaction information to the Hyperledger Fabric network center by invoking Algorithm 3. PE sends the successful upload message to PM via the client and finally transports the tea to the processing machinery via logistics.
Algorithm 2. ECDSA’s process
func Signature( k string, d string, H string)
( r string, s string){
( x , y ) = k G                 r = x / n                 i f ( r ! = 0 )                           s = ( H + r d ) / k   mod   n                 e l s e                           r e t u r n   f a l s e r e t u r n   r , s
}
func Verify( H string, r string, s string)( r e s string){
              u 1 = ( H   m o d   n ) / s                 u 2 = ( r   m o d   n ) / s                 Q c e r t . P u b l i c K e y                 ( x , y ) = u 1 G + u 2 Q                 i f ( x = = r )                         r e t u r n     t r u e               e l s e                         r e t u r n   f a l s e      
}
Algorithm 3. Upload the transaction information link code
func addTransaction(stub shim.ChaincodeStubInterface, args []string) pb.Response {
  //Check input arguments
  if len(args) != 5 {
    return shim.Error(“Incorrect number of arguments. Expecting 5”)
  }
  //Create a new transaction
  transaction := Transaction{
    ID:       args [0],
    Signature:   args [1],
    Timestamp:   args [2],
    Address:     args [3],
    Message:    args [4],
  }
  //Marshal the transaction into bytes
  transactionBytes, err := json.Marshal(transaction)
  if err != nil {
    return shim.Error(“Failed to marshal transaction into bytes”)
  }
  //Store the transaction on the ledger
  err = stub.PutState(transaction.ID, transactionBytes)
  if err != nil {
    return shim.Error(fmt.Sprintf(“Failed to store transaction with ID %s: %s”, transaction.ID, err.Error()))
  }
  //Return a successful response
  return shim.Success(nil)
}

3.7. Process Phase

Step 1. The PM receives the notification from the PE client at T2 and receives the material at the same time. The PM then accesses the Hyperledger Fabric Network Center to query the records uploaded by PE and decrypts them with his private key.
M P E = D P R K P M ( C P E )
The PM then verifies the timeliness of the data by timestamp.
C h e c k ( T 2 T 1 ) Δ T
PM verifies the validity of the signature by using the verification function in Algorithm 2.
h D a t a P E = h a s h ( D a t a P E )
V e r i f y ( h D a t a P E     ,   r P E , s P E )
If the signature is legitimate, the PM obtains the production data M P E through the IPFS address D a t a P E .
Step 2. The PM compares the quality of tea raw materials with the obtained D a t a P E . After ensuring the quality, the data D a t a P E as part of the traceability code will be encapsulated into retrospective source code (RSC) by using Algorithm 4. At the same time, the processing mechanism will process and package the raw material and encapsulate the relevant proof of technological operation ( D a t a T O ) into the RSC together. During the processing and packaging process, PM chooses the number k 2 at random and calculates the hash value
h D a t a T O = h a s h ( D a t a T O )
of D a t a T O , and generates a message containing h D a t a T O and the timestamp T 3 .
M P M = ( I D P M | |   I D R | |   h D a t a T O     | |   T 3 )
PM generates the signature ( r P M , s P M ) by using the signature function in Algorithm 2.
( r P M , s P M ) = S i g n ( M P M ,   k 2 ,   d P M )
R’s public key
C P M = E P u k R ( M P M )
encrypts the resulting encrypted message by PM.
PM encapsulates the data as transaction information and uploads them to the Hyperledger Fabric Network Center. Finally, the RSC is printed on the processed tea package and transported to R via logistics.
Algorithm 4. Generate retrospective source code.
import qrcode
import cv2 as cv
data_img = cv.imread(“img path”)
data_video = cv2.VideoCapture(“video path”)
data_word = “message”
rsc = qrcode.QRCode(version = 1,
         error_correction = qrcode.constants.ERROR_CORRECT_L,
         box_size = 8,
         border = 8,
         )
rsc.add_data(data_img,data_video,data_word)
rsc.make(fit = True)
img = rsc.make_image()
img.save(‘tsc_code.png’)

3.8. Sale and Purchase Phase

This phase is mainly composed of the retailing of tea by distributors and the purchase of tea by customers, and the physical interaction is between R and C.
Step 1. R receives the tea that has been processed and packaged at the moment. R accesses the Hyperledger Fabric Network Center to query the records uploaded by the PM and, at the same time, decrypts them using its private key:
M P M = D P R K R ( C P M )
R uses the timestamp to confirm the accuracy of the data:
C h e c k ( T 3 T 2 ) Δ T
R uses Algorithm 2’s verification function to check the signature’s validity.
h D a t a T O = h a s h ( D a t a T O )
V e r i f y ( h D a t a T O     ,   r P M , s P M )
R will then scan the RSC to verify all the production and processing processes of the tea, and if there is no problem, R will put it on the shelves for sale.
Step 2. C can scan the RSC of the tea to identify the authenticity of the tea before purchase, and after the purchase is complete, the system will generate the order. All the order information is available ( D a t a O r d e r ); R will randomly select a random number k 3 and calculate the hash value
h D a t a O r d e r     = h a s h ( D a t a o r d e r )
of D a t a O r d e r , and then generate transaction information containing h D a t a O r d e r and timestamp T 4 :
M R = ( I D R | |   I D C | |   h D a t a O r d e r     | |   T 4 )
R generates a signature ( r R , s R ) by invoking the signature algorithm.
( r R , s R ) = S i g n ( M R ,   k 3 ,   d R )
The public key of C is used to encrypt the message it generates in encrypted form.
C R = E P u k C ( M R )
R encapsulates all the data into a transaction message and uploads them to the Hyperledger Fabric hub, where the transaction ends.

3.9. Supervision Phase

After the generation of tea transaction records, customers will enter this stage only if they need to defend their rights and interests, and the main interaction objects of this stage are C and MS. The supervision flow chart is shown in Figure 4.
Step 1. The customer can file a complaint about his order with the market supervisor through the client. C edits the complaint and the evidence of the complaint D ata A p p e a l , then chooses a random number k 4 at random and calculates the hash value
h D a t a A p p e a l     = h a s h ( D a t a A p p e a l )
of D ata A p p e a l , and generates a transaction message containing h D a t a A p p e a l and the timestamp T 5 :
M C = ( I D C | |   I D M S | |   h D a t a A p p e a l       | |   T 5 )
C generates a signature ( r C , s C ) by invoking the signature algorithm.
( r C , s C ) = S i g n ( M C ,   k 4 ,   d C )
C’s public key encrypts the message
C C = E P u k M S ( M C )
it generates in encrypted form.
C sends the complaint message to MS.
Step 2. At time T6, when MS receives the complaint message from C, it decrypts it with the use of its private key.
M C = D P R K M S ( C C )
MS uses the timestamp to confirm the accuracy of the data.
C h e c k ( T 6 T 5 ) Δ T
R uses Algorithm 2’s verification function to check the signature’s validity.
h D a t a A p p e a l     = h a s h ( D a t a A p p e a l )
V e r i f y ( h D a t a A p p e a l       ,   r C , s C )
After confirming the authenticity of the complaint information, MS will intervene in the market to regulate fake and inferior tea.
Step 3. MS will first collect the signature information of each stage, such as the signature information of PE, PM, and R. If one or more of the signatures is faulty, it means there is counterfeiting at that stage. MS will regulate the entities involved in counterfeiting.

4. Security Analysis

4.1. Data Integrity

The suggested study subject employs the ECDSA method to sign the data used in the supply chain process for tea to ensure the integrity and tamper resistance of the information in the transmission process. We take the example of the production stage added to the blockchain tea supply chain and verify the signature process of its production data as follows:
( r P E , s P E ) = S i g n ( M P E ,   k 1 ,   d P E ) = ( rG , r + h a s h ( M P E = ( I D P E | |   I D P M | |   h D a t a P E | |   a d s D a t a P E     | |   T 1 ) ) )
The validation process is as follows:
h D a t a P E = h a s h ( D a t a P E )
u 1 = s P E 1 h D a t a P E mod n
u 2 = s P E 1 r P E mod n
( x P E , y P E ) = u 1 G + u 2 G
When x P E = r P E , the data have not been altered, the validity of the data source can be confirmed, and the signature is recognized to be legitimate. If the data integrity has been damaged, x P E r P E will appear. The hash value validation of each stage is shown in Table 2.
Scenario: False data will be signed and posted to the blockchain center if an unethical merchant attempts to tamper with the production data to use it as a stand-in for actual goods.
Analysis: After receiving the tea raw materials, the entity at the center of the blockchain network, such as the processing company, employs the verification function in Algorithm 2 to confirm their authenticity. If the verification is successful, the processing organization parses the data, obtains the detailed IPFS address, and submits a request to view the data. The hash value of the data is then calculated, and if it differs from the hash value recorded in the blockchain ledger, either the batch of tea has poor quality, or the businessman has lied about his identity.

4.2. Tamper-Resistant

The security of the on-chain data is guaranteed by federated blockchain technology. A binary tree integrated with a Merkle tree structure will be constructed using all the chain data stored in a block. As illustrated in Figure 5, the hash value between every two data records in the Merkle tree will be concatenated as the input to the next binary tree node. If an attacker attempts to tamper with any data record, the root node of the Merkle tree will change dramatically due to the property of the SHA-256 cryptographic hash. If you arbitrarily change the left side of the data, the corresponding right hash value will be completely different. Just like in SHA-256 encryption, as long as the input is slightly changed, the output hash value will be substantially different.
So, if an attacker tries to modify the blockchain data, the hash of the corresponding Merkel tree leaf nodes will change. The root hash is calculated recursively based on all leaf nodes; any leaf node changes will lead to a completely different root hash. As a result, when others who participated check the block information, they will see that the content has been altered [27].

4.3. Traceability

Since blockchain is employed as the fundamental technology, all transactions conducted by members of the federated blockchain will be acknowledged as valid transactions recorded on-chain, safeguarding them from malicious tampering [28]. Owing to the immutability of data, the system can enable reliable traceability and prevent fraud at the source. For instance, in the stage of producing tea, the information about tea in the ledger will be permanently maintained in the blockchain after uploading the information relevant to the production of tea to the blockchain.
Situation: PE discovers a flaw in the tea’s quality but is unable to identify which link in the production process is at fault.
Analysis: To compare and verify the data in the blockchain and assure their traceability by signature, utilize the blockchain’s immutability and traceability. If we wish to verify and track how PM interacts with PE, we can assess whether the data between PE and PM are accurate using the following formula:
( r P E , s P E ) = S i g n ( M P E ,   k 1 ,   d P E )
( r P M , s P M ) = S i g n ( M P M ,   k 2 ,   d P M )

4.4. Non-Repudiation

ECDSA signature verification is necessary at every level; therefore, data non-repudiation can be achieved by checking it. The recipient needs the public key for verification since every data transmission requires the participant’s secret key signature. After verifying that the sender’s message content is correct and authentic, the receiver will not reject it. The non-repudiation of each level is displayed in Table 3.

4.5. Privacy Protection

At the ledger level, a Hyperledger Fabric offers a channel-like structure for data privacy protection. A channel’s function in a blockchain network is to enable business isolation, where a business correlates to a channel and entities outside of that channel are unable to access the data within that channel. Participants in the same Hyperledger Fabric network can create multiple channels according to their business needs, ensuring that data are exchanged only within that channel. The creation of channels significantly protects data privacy. Participants send their I D X to the CA node, which will then return the associated public–private key pair ( d X , Q X ) for that entity if the CA confirms that the information is accurate.

4.6. Resist Known Attacks

Every node in the tea supply chain can participate in a decentralized platform that is constructed using Hyperledger Fabric applied to the tea supply chain. Every transaction on the platform will be recorded in a tamper-proof distributed ledger that can be verified and audited by every node in the tea supply chain. In this approach, issues like data manipulation and man-in-the-middle attacks may be prevented, ensuring the reliability and security of transactions throughout the tea supply chain.
Hyperledger Fabric provides the following capabilities to successfully ward off blockchain attacks:
Byzantine Fault Tolerance (BFT): Hyperledger Fabric makes use of the BFT algorithm, which keeps the platform’s dependability and accuracy even if a few nodes are attacked or fail.
Protection from data leakage and tampering with encryption: Hyperledger Fabric supports a variety of encryption techniques, including hash algorithms, symmetric encryption algorithms, and asymmetric encryption algorithms.
Scalability: Hyperledger Fabric has a high degree of scalability and can dynamically change the network’s size and capacity to meet changing demands.

4.6.1. Man-in-the-Middle Attack

A man-in-the-middle assault occurs when a perpetrator can alter messages in transit to ask particular queries or make requests as part of their attack if they have control over the communication channel [29].
Scenario: For instance, during PM and PE communication, an attacker might intercept data about tea production or might try to manipulate the assessed price of tea after intentionally interfering with the data sent by the PM.
C P E = E P u k P M ( M P E )
M P E = D P R K P M ( C P E )

4.6.2. Replay Attack

In a replay attack, the attacker repeatedly requests the same packets that were previously received from the server side. If it is not effectively avoided, the server side can successfully pass the authentication because the packets have already been verified as legitimate [30]. To guard against replay attacks, each transaction message has a timestamp that is set as it is posted and received. The time difference between when the transaction message was transmitted and when it was received can be calculated by the receiver. As an illustration, consider how PM and PE interacted. The verdict is as follows:
If an attacker intercepts a transaction message sent by a sender in the tea supply chain, they could launch a replay attack by resending the identical message to the intended recipient.
Analysis: To establish a distinctive timestamp, the recipient decrypts the encrypted message they have just received. They then subtract the time stamp from when the message was sent from the time they are currently receiving it. If the timestamp verification is incorrect, the receiver can be recognized as a replay attack.
M P E = ( I D P E | |   I D P M | |   h D a t a P E | |   a d s D a t a P E | |   T 1 )
C P E = E P u k P M ( M P E )
M P E = D P R K P M ( C P E )
C h e c k ( T 2 T 1 ) Δ T

5. Performance Evaluation

5.1. Performance Analysis

This section assesses the chain code contract calls’ performance for the scenarios put forth in this study. The testing tool uses Hyperledger Caliper version 0.42, whereas the blockchain platform utilizes Hyperledger Fabric version 2.3. A benchmarking tool called Hyperledger Caliper was created to evaluate the blockchain platform’s scalability and performance. Caliper can be used to create and run a range of benchmark tests, including ones for transaction speed, latency, resource usage, and other metrics. It was developed by 30 founding corporate members, including IBM, and is headed by the Linux Foundation. We tested transaction throughput (number of transactions per second: the performance bottleneck of the system in processing transactions), latency (average response time: the response time and performance bottleneck of the system), and resource utilization (the resource utilization and performance bottleneck of the system in processing transactions) on our Intel Core i9-11900K, RAM: 32GB DDR4 configuration. The results are displayed in Figure 6, Figure 7, Figure 8 and Figure 9.
We examine the connection between transaction volume and CPU and memory consumption in Figure 6 and Figure 7. The progressive increase in CPU and memory usage as the number of transactions rises suggests that the system’s processing power may be constrained as the workload rises. Figure 8 and Figure 9 illustrate how the system’s performance degrades as the number of transactions rises, resulting in increased latency and decreased throughput. When there are 3500 transactions, the CPU and memory use spike dramatically because the system has hit its processing capacity and cannot effectively handle any more requests.
In Figure 8, we analyze the relationship between the number of transactions and the throughput, and we can see that the number of write transactions and read transactions show a gradual increase as the number of transactions increases. At a transaction count of 500, the number of write transactions is 456 TPS and the number of read transactions is 1042 TPS, while at a transaction count of 5000, the number of write transactions increases to 3713 TPS and the number of read transactions increases to 3930 TPS.
In Figure 9, we analyze the relationship between the number of transactions and latency, and we can see that the latency time of both write and read transactions increases as the number of transactions increases, with a minimum write speed of 0.97 s and a maximum of 6.26 s, and a minimum read speed of 0.1 s and a maximum of 4.62 s. This performance system’s processing capacity may be limited as the load increases. For the same number of transactions, the latency of write transactions is usually longer than that of read transactions because write transactions require more computation and storage operations. As the number of transactions increases, the gap between the latency times of write and read transactions gradually shrinks, which may indicate that the processing capacity of the system has reached a bottleneck and cannot efficiently handle more requests.
When combined, these statistics offer helpful details on load management and system performance that can be used to improve the system’s performance. We are effective when compared to the functionality of current Hyperledger Fabric application solutions [31]. Decisions must be taken based on the unique system architecture and application scenarios if particular optimization tactics are still required. System performance enhancement will probably be required, including expanding hardware resources, streamlining the code, and changing load-balancing tactics.

5.2. Communication Cost

The communication scenario analyzed in this study is summarized in the following table: The highest transmission speed in a 4G network environment is 100 Mbps, while in a 5G network environment, it is 20 Gbps. The length of the ECDSA signature is 160 bits, 160 bits is the length of the key, 256 bits is the length of the hash function, 1024 bits is the length of the request information, 1024 bits is the length of the transaction information, and 160 bits is the length of other information (such as the identifying timestamp, etc.).
As an illustration, let us use the selling and purchase phase, which has the largest communication cost. First, R needs to verify the decrypted PM message, which contains a decrypted message, a hash value, and another message with a total size of 160 bits + 256 bits + 160 bits = 576 bits. R purchases the tea operation, which contains an encrypted message, a hash value, a signature, another message, and a transaction message, with a total size of 160. R uploads the order data after verifying it, which has a total size of 160 bits + 160 bits + 2*256 bits + 160 bits + 1024 bits + 160 bits = 2176 bits and includes a decryption message, an encryption message, two hash values, a signature, a transaction message, and another message. Speed is therefore necessary in diverse network contexts, as indicated in Table 4.

5.3. Computation Cost

The costs connected with each stage of the approach for this article are listed in Table 5 below. The asymmetric decryption and encryption processes in ECDSA, along with the hashing operation, provide the basis for the cost analysis.

5.4. Comparison

Treiblmaier et al. [11] suggested applying blockchain technology to the food supply chain to address the problem of multiple instances of information asymmetry by using it as a label to identify blockchain-based traceability systems as a primary driver of perceived product quality and purchase intentions. Paul et al. [12] proposed a workable architecture to support a circular supply chain for the tea industry network that uses blockchain technology as a substrate to drive RFID technology to complete the circular supply chain operation, despite the fact that they did not specify the precise integrated procedure. The circular blockchain platform developed by Centobelli et al. includes manufacturers, reverse logistics service providers, selection centers, recycling facilities, and landfill applications in a supply chain scenario (ref. [13]). However, the security of the proposed blockchain platform was not investigated. Helo et al. [14] developed a cloud-based portal pilot system for real-time logistics and supply chain tracking and tracing. Chang et al. [15] proposed that blockchain and smart contract technology can support cross-enterprise business process re-engineering and ensure the intelligent advancement of business processes through smart contract technology within the framework of their proposed system in order to benefit from the advantages of the blockchain platform. However, there is no logical justification for the creation of smart contracts. A comparison of the proposed scheme’s functionality to earlier designs is shown in Table 6.

5.5. Architecture Comparison

The three main types of blockchain architectures available now are public, private, and federated blockchains. While public blockchains allow open data visibility for anyone, they are not ideal for preserving confidential business data. On the other hand, private blockchains concentrate data access, which is unfavorable for inter-enterprise data sharing. Table 7 compares the three systems: Bitcoin [32], Ethereum [33], and Hyperledger Fabric [34]. The figure below illustrates Hyperledger Fabric, which can be applied to various application scenarios, including the one discussed in this study, and has more flexible and pluggable modules than Bitcoin and Ethereum. Additional benefits of Hyperledger Fabric are confidentiality, improved performance, and higher throughput.

6. Conclusions

In this paper, we provide a Hyperledger Fabric-based method for tracking manufacturing data along the tea supply chain. We employ ECDSA and IPFS storage as well as smart contracts to guarantee data confidentiality, integrity, non-repudiation, storage performance, and automatic transaction triggering throughout the system to increase system efficiency. The contributions that can be achieved are as follows:
(1)
The addressing of the credit issue. The involvement of multiple institutions, each of which oversees the others, ensures the accuracy of the information. Additionally, the chain of information cannot be altered, considerably reducing the possibility of cheating.
(2)
The tracking of all records. Regarding the open, transparent, and capable express logistics tracking of the manufacturing, processing, testing, transportation, and warehousing to the shelves of items for sale, each link in time following the point is fully recorded.
(3)
The definition of roles and the ability to track down issues. The open and transparent features of blockchain cannot be altered. Finding the problematic link as soon as it manifests itself in one link is both timely and efficient.
(4)
The stopping of product counterfeiting. Since the products can be checked from the source all the way to the customer’s hands when the information about the goods is posted on the supply chain, there will not be a problem with counterfeiting.
In the future, we will focus on practical system application landing research. Blockchain technology can help enterprises in the tea supply chain to achieve more accurate inventory management and logistics distribution, thus improving their operational efficiency and reducing costs. At the same time, blockchain technology can also help tea enterprises to achieve reductions in carbon emissions and increased energy savings, so as to better fulfill their social responsibility and environmental protection obligations. In summary, the application of blockchain technology in the tea supply chain has a very broad prospect. In the future, with the continuous development of technology and the continuous expansion of the tea market, we believe that blockchain technology will play an increasingly important role in the tea supply chain and contribute to the sustainable development of the tea industry.

Author Contributions

C.-L.C.: Conceptualization, Investigation, Methodology, Writing—review and editing, Formal analysis, Funding acquisition, and Supervision. W.-B.Z.: Conceptualization, Investigation, Methodology, Data curation, Software, and Writing—original draft. D.-C.H.: Investigation, Validation, and Supervision. L.-C.L.: Investigation, Validation, and Formal analysis. Y.-Y.D.: Formal analysis, Investigation, and Methodology. C.-G.K.: Investigation and Validation. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Science and Technology Council, Taiwan, R.O.C., under contract NSTC 112-2410-H-324-001-MY2.

Institutional Review Board Statement

This study is only based on basic theoretical research. It does not involve humans.

Informed Consent Statement

This study is only based on basic theoretical research. It does not involve humans.

Data Availability Statement

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Hall, J. Environmental Supply Chain Innovation. In Greening the Supply Chain; Taylor & Francis, Ltd.: Milton Park, UK, 2001; pp. 233–249. [Google Scholar]
  2. Fawcett, S.E.; Jones, S.L.; Fawcett, A.M. Supply Chain Trust: The Catalyst for Collaborative Innovation. Bus. Horiz. 2012, 55, 163–178. [Google Scholar] [CrossRef]
  3. Golosova, J.; Romanovs, A. The advantages and disadvantages of the blockchain technology. In Proceedings of the 2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE), Vilnius, Lithuania, 8–10 November 2018. [Google Scholar] [CrossRef]
  4. Kuo, T.-T.; Kim, H.-E.; Ohno-Machado, L. Blockchain distributed Ledger Technologies for Biomedical and Health Care Applications. J. Am. Med. Inform. Assoc. 2017, 24, 1211–1220. [Google Scholar] [CrossRef] [PubMed]
  5. Kim, S.; Kwon, Y.; Cho, S. A survey of scalability solutions on Blockchain. In Proceedings of the 2018 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Republic of Korea, 17–19 October 2018. [Google Scholar] [CrossRef]
  6. Zhang, R.; Xue, R.; Liu, L. Security and privacy on Blockchain. ACM Comput. Surv. 2019, 52, 1–34. [Google Scholar] [CrossRef]
  7. Tea Market Revenue 2012–2025. Available online: https://www.statista.com/statistics/326384/global-tea-beverage-market-size/ (accessed on 13 February 2023).
  8. Tea Production by Leading Producing Countries Worldwide 2021. Available online: https://www.statista.com/statistics/264188/production-of-tea-by-main-producing-countries-since-2006/ (accessed on 12 December 2022).
  9. Mangla, S.K.; Kazançoğlu, Y.; Yıldızbaşı, A.; Öztürk, C.; Çalık, A. A conceptual framework for blockchain-based Sustainable Supply Chain and evaluating implementation barriers: A case of the Tea Supply Chain. Bus. Strategy Environ. 2022, 31, 3693–3716. [Google Scholar] [CrossRef]
  10. Bai, Y.; Fan, K.; Zhang, K.; Cheng, X.; Li, H.; Yang, Y. Blockchain-based trust management for Agricultural Green Supply: A game theoretic approach. J. Clean. Prod. 2021, 310, 127407. [Google Scholar] [CrossRef]
  11. Treiblmaier, H.; Garaus, M. Using blockchain to signal quality in the food supply chain: The impact on consumer purchase intentions and the moderating effect of brand familiarity. Int. J. Inf. Manag. 2023, 68, 102514. [Google Scholar] [CrossRef]
  12. Paul, T.; Islam, N.; Mondal, S.; Rakshit, S. RFID-integrated blockchain-driven circular supply chain management: A system architecture for B2B tea industry. Ind. Mark. Manag. 2022, 101, 238–257. [Google Scholar] [CrossRef]
  13. Centobelli, P.; Cerchione, R.; Vecchio, P.D.; Oropallo, E.; Secundo, G. Blockchain technology for Bridging Trust, traceability and transparency in Circular Supply Chain. Inf. Manag. 2022, 59, 103508. [Google Scholar] [CrossRef]
  14. Helo, P.; Shamsuzzoha, A.H.M. Real-time supply chain—A blockchain architecture for project deliveries. Robot. Comput.-Integr. Manuf. 2020, 63, 101909. [Google Scholar] [CrossRef]
  15. Chang, S.E.; Chen, Y.-C.; Lu, M.-F. Supply chain re-engineering using blockchain technology: A case of smart contract based tracking process. Technol. Forecast. Soc. Chang. 2019, 144, 1–11. [Google Scholar] [CrossRef]
  16. Li, X.; Jiang, P.; Chen, T.; Luo, X.; Wen, Q. A survey on the security of Blockchain Systems. Future Gener. Comput. Syst. 2020, 107, 841–853. [Google Scholar] [CrossRef]
  17. Demestichas, K.; Peppes, N.; Alexakis, T.; Adamopoulou, E. Blockchain in agriculture traceability systems: A Review. Appl. Sci. 2020, 10, 4113. [Google Scholar] [CrossRef]
  18. Basnayake, B.M.; Rajapakse, C. A blockchain-based decentralized system to ensure the transparency of Organic Food Supply Chain. In Proceedings of the 2019 International Research Conference on Smart Computing and Systems Engineering (SCSE), Colombo, Sri Lanka, 28 March 2019. [Google Scholar] [CrossRef]
  19. Menon, S.; Jain, K. Blockchain technology for transparency in Agri-Food Supply Chain: Use cases, limitations, and Future Directions. IEEE Trans. Eng. Manag. 2022, 1–15. [Google Scholar] [CrossRef]
  20. Mirabelli, G.; Solina, V. Blockchain and agricultural supply chains traceability: Research trends and future challenges. Procedia Manuf. 2020, 42, 414–421. [Google Scholar] [CrossRef]
  21. Androulaki, E.; Barger, A.; Bortnikov, V.; Cachin, C.; Christidis, K.; De Caro, A.; Enyeart, D.; Ferris, C.; Laventman, G.; Manevich, Y.; et al. Hyperledger fabric: A distributed operating system for permissioned blockchains. In Proceedings of the Thirteenth EuroSys Conference, Porto, Portugal, 23–26 April 2018. [Google Scholar] [CrossRef]
  22. Naveen, P.; Manikandan, P.; Maragatharajan, M.; Ashok Kumar, S.R.; Saravanan, M.; Puviarasu, A. Traceability of tea powder supply chain based on Hyperledger Fabric. In Proceedings of the 3rd International Conference on Smart Electronics and Communication (ICOSEC), Trichy, India, 20–22 October 2022. [Google Scholar] [CrossRef]
  23. Hasan, I.; Habib, M.M. Blockchain technology: Revolutionizing Supply Chain Management. Int. Supply Chain Technol. J. 2022, 8. [Google Scholar] [CrossRef]
  24. Benet, J. Ipfs-content addressed, versioned, p2p file system. arXiv 2014, arXiv:1407.3561. [Google Scholar] [CrossRef]
  25. Chen, Y.; Li, H.; Li, K.; Zhang, J. An improved P2P file system scheme based on ipfs and Blockchain. In Proceedings of the IEEE International Conference on Big Data (Big Data), Boston, MA, USA, 11–14 December 2017. [Google Scholar] [CrossRef]
  26. Johnson, D.; Menezes, A.; Vanstone, S. The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 2001, 1, 36–63. [Google Scholar] [CrossRef]
  27. Szydlo, M. Merkle tree traversal in log space and Time. Adv. Cryptol. EUROCRYPT 2004, 3027, 541–554. [Google Scholar] [CrossRef]
  28. Tian, F. A supply chain traceability system for food safety based on HACCP, Blockchain Internet of Things. In Proceedings of the International Conference on Service Systems and Service Management, Dalian, China, 16–18 June 2017. [Google Scholar] [CrossRef]
  29. Callegati, F.; Cerroni, W.; Ramilli, M. Man-in-the-middle attack to the HTTPS protocol. IEEE Secur. Priv. Mag. 2009, 7, 78–81. [Google Scholar] [CrossRef]
  30. Mo, Y.; Sinopoli, B. Secure control against replay attacks. In Proceedings of the 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA, 30 September–2 October 2009. [Google Scholar] [CrossRef]
  31. Wang, R.; Ye, K.; Meng, T.; Xu, C.-Z. Performance evaluation on Blockchain Systems: A case study on Ethereum, fabric, sawtooth and Fisco-Bcos. Serv. Comput. SCC 2020, 12409, 120–134. [Google Scholar] [CrossRef]
  32. A Peer-To-Peer Electronic Cash System. Available online: https://bitcoin.org/en/bitcoin-paper (accessed on 1 May 2023).
  33. Ethereum.org. Available online: https://ethereum.org/en/ (accessed on 1 May 2023).
  34. Hyperledger—Open Source Blockchain Technologies. Available online: https://www.hyperledger.org/ (accessed on 1 May 2023).
Figure 1. The consortium blockchain service architecture.
Figure 1. The consortium blockchain service architecture.
Sustainability 15 13738 g001
Figure 2. A flowchart of the transactions in the tea supply chain.
Figure 2. A flowchart of the transactions in the tea supply chain.
Sustainability 15 13738 g002
Figure 3. Transaction information format.
Figure 3. Transaction information format.
Sustainability 15 13738 g003
Figure 4. Supervision flow chart.
Figure 4. Supervision flow chart.
Sustainability 15 13738 g004
Figure 5. Merkle tree structure.
Figure 5. Merkle tree structure.
Sustainability 15 13738 g005
Figure 6. CPU occupancy variation graph.
Figure 6. CPU occupancy variation graph.
Sustainability 15 13738 g006
Figure 7. Memory occupancy variation graph.
Figure 7. Memory occupancy variation graph.
Sustainability 15 13738 g007
Figure 8. Fabric’s throughput under various loads.
Figure 8. Fabric’s throughput under various loads.
Sustainability 15 13738 g008
Figure 9. Fabric latency with changing workload.
Figure 9. Fabric latency with changing workload.
Sustainability 15 13738 g009
Table 1. Comparison of business data-sharing options that have been proposed and those that now exist.
Table 1. Comparison of business data-sharing options that have been proposed and those that now exist.
AuthorsYearObjectiveTechnologiesMeritsDemerits
Treiblmaier et al. [11]2023Blockchain tagging as a signaling mechanism proves, through signaling theory, that blockchain can influence and perceive purchase intention.Blockchain
Signaling theory
Blockchain can record the product flow while applying it as a tag to signal theory.There is no good integration of signal theory with the underlying logic of the blockchain.
Paul et al. [12]2022A useful model has been developed using Radio Frequency Identification (RFID) technology and Blockchain Technology (BCT) to assist the tea industry’s web-based circular supply chain.Blockchain
RFID
Various system models for integrating the supply chain with RFID are analyzed in detail, and their possibilities are analyzed.No specific supply chain system architecture process is indicated.
Centobelli et al. [13]2022Create a thorough triple-retesting framework that links three reverse elliptical supply chain procedures (such as recycling, redistribution, and remanufacturing) for circular blockchain platforms.Blockchain
Distributed ledger
Reverse logistics service providers (RLSPs)
A detailed design of the system framework and how the triple loop framework leverages blockchain qualities.No encryption mechanism is used, and the flow of information in the system may make it difficult to resist hacking attacks.
Helo et al. [14]2020Propose a pilot cloud-based portal system for real-time tracking and tracing of logistics and supply chains.Blockchain
IoT
RFID
By combining RFID, IoT, and blockchain technologies into one integrated, real-time view.No detailed description of the entire business logic is provided.
Chang et al. [15]2019It is suggested and investigated to automate business flows in tracking supply chain processes using a blockchain-based business process re-engineering (BPR) architecture.Blockchain
Smart contract
The logic of how a smart contract works when multiple data interaction processes are given.The detailed coding of smart contracts has not been elaborated.
Table 2. Validation of each stage’s hash value.
Table 2. Validation of each stage’s hash value.
Hash ValueIntegrity Check
Process phase h D a t a P E = h a s h ( D a t a P E ) V e r i f y ( h D a t a P E ,   r P E , s P E )
Sale and Purchase phase h D a t a T O = h a s h ( D a t a T O ) V e r i f y ( h D a t a T O ,   r P M , s P M )
Supervision phase h D a t a A p p e a l = h a s h ( D a t a A p p e a l ) V e r i f y ( h D a t a A p p e a l     ,   r C , s C )
Table 3. Non-repudiation of the suggested plan.
Table 3. Non-repudiation of the suggested plan.
ItemSignature ValueSenderReceiverSignature Verification
Phase
Production phase ( r P E , s P E ) PEPM x P E = ? r P E mod n
Process phase ( r P M , s P M ) PMR x P M = ? r P M mod n
Sale and Purchase phase ( r R , s R ) RC x R = ? r R mod n
Supervision phase ( r C , s C ) CMS x C = ? r C mod n
( r M S , s M S ) MSHyperledger Fabric x M S = ? r M S mod n
Table 4. Cost of communication.
Table 4. Cost of communication.
ItemMessage Length4G (100 Mbps)5G (20 Gbps)
Phase
Registration phase (X-HFN)736 bits7.4 μs0.037 μs
Production phase (PE-PM)1760 bits17.6 μs0.088 μs
Process phase (PM-R)2016 bits20.2 μs0.101 μs
Sale and Purchase phase (R-C)4032 bits40.3 μs0.202 μs
Supervision Phase (R-C-MS)3232 bits32.32 μs0.162 μs
Notes: Any user in the alliance chain (X); planting enterprise (PE); processing mechanism (PM); retailers (R); consumers (C); market supervision (MS); hyperledger fabric network (HFN).
Table 5. Computation cost.
Table 5. Computation cost.
Phase\Party
Production phase\(PM) T E n c + 2 T S i g + T H
Process phase\(PE) 2 T H + T E n c + T S i g + T D e c + T V e r
Sale and Purchase phase\(R and C) 4 T H + 2 T E n c + 2 T S i g + 2 T D e c + 2 T V e r
Supervision Phase\(MS) 3 T H + T E n c + 2 T S i g + 3 T D e c + 3 T V e r
Notes: T E n c : encryption operation, T D e c : decryption operation, T S i g : signature operation, T H : hash function operation, and T V e r : verify operation.
Table 6. Comparison of the proposed scheme’s functionality to that of earlier schemes.
Table 6. Comparison of the proposed scheme’s functionality to that of earlier schemes.
AuthorsYearObjective12345
Treiblmaier et al. [11] 2023As a signaling mechanism, a blockchain tag proves that blockchain can influence and perceive purchase intention through signal theory.YYNYN
Paul et al. [12] 2022An operational model supporting the network cycle supply chain of the tea sector is created by radio frequency identification (RFID) technology, which is driven by blockchain technology (BCT) encryption based on policies.YYYYN
Centobelli et al. [13] 2022For the circular blockchain platform, the objective was to construct a thorough triple retry architecture to link three circular supply chain reverse operations (such as recycling, redistribution, and remanufacturing) technologies and establish a reward system between the two.YNNYN
Helo et al. [14] 2020Proposed a cloud-based portal pilot system for real-time tracking and traceability of logistics and supply chains.YNYNN
Chang et al. [15] 2019A blockchain-based business process re-engineering (BPR) framework was proposed and explored to automate business flows in tracking supply chain processes.YNYNN
Ours2023A fabric-based production data sharing and storage model system for the tea supply chain was proposed.YYYYY
Notes: 1: Blockchain architecture, 2: Encryption key, 3: Authorization, 4: Scalability, 5: Off-chain storage; (Y) Yes; (N) No.
Table 7. Comparison between Ethereum and Hyperledger Fabric.
Table 7. Comparison between Ethereum and Hyperledger Fabric.
BitcoinEthereumHyperledger Fabric
DescriptionPlatform for quantitative blockchainsPlatform for a modular blockchainPlatform for a generic blockchain
ScenePublic chainPublic chainFederation chain
Consensus algorithmProof of Work (POW)Proof of Work (POW)Practical Byzantine Fault Tolerance (PBFT)
Throughput7 TPS25 TPS5000 TPS
DecentralizationCompletely decentralizationCompletely decentralizationPartial de-centralization
Smart contractNoYESYES
ScalabilityNoNoYES
AuthenticationNoNoYES
PrivacyNoNoYES
PluggabilityNoNoYES
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Chen, C.-L.; Zhan, W.-B.; Huang, D.-C.; Liu, L.-C.; Deng, Y.-Y.; Kuo, C.-G. Hyperledger Fabric-Based Tea Supply Chain Production Data Traceable Scheme. Sustainability 2023, 15, 13738. https://doi.org/10.3390/su151813738

AMA Style

Chen C-L, Zhan W-B, Huang D-C, Liu L-C, Deng Y-Y, Kuo C-G. Hyperledger Fabric-Based Tea Supply Chain Production Data Traceable Scheme. Sustainability. 2023; 15(18):13738. https://doi.org/10.3390/su151813738

Chicago/Turabian Style

Chen, Chin-Ling, Wan-Bing Zhan, Der-Chen Huang, Ling-Chun Liu, Yong-Yuan Deng, and Chin-Guo Kuo. 2023. "Hyperledger Fabric-Based Tea Supply Chain Production Data Traceable Scheme" Sustainability 15, no. 18: 13738. https://doi.org/10.3390/su151813738

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop