Private Blockchain-based Procurement and Asset Management System with QR Code

Alonel A. Hugo,Gerard Nathaniel C. Ngo
DOI: https://doi.org/10.25147/ijcsr.2017.001.1.197
2024-07-12
Abstract:The developed system aims to incorporate a private blockchain technology in the procurement process for the supply office. The procurement process includes the canvassing, purchasing, delivery and inspection of items, inventory, and disposal. The blockchain-based system includes a distributed ledger technology, peer-to-peer network, Proof-of-Authority consensus mechanism, and SHA3-512 cryptographic hash function algorithm. This will ensure trust and proper accountability to the custodian of the property while safeguarding sensitive information in the procurement records. The extreme prototyping model will be used as software development life cycle. It is mostly used for web-based applications and has an increased user involvement. The prototype version of the system allows the users get a better understanding of the system being developed. It also reduces the time and cost, has quicker user feedback, missing and difficult functions can be recognized, and confusing processes can be addressed on an early stage. The implementation of a private blockchain technology has an increased privacy, enhanced security, improved efficiency, and reduced complexity over traditional blockchain network. The use of SHA3-512 as cryptographic hash function algorithm is much faster than its predecessors when cryptography is handled by hardware components. Furthermore, it is not vulnerable to length extension attacks making it reliable in terms of security of data. The study recommends the use of private blockchain-based technology with the procurement and asset management system in the supply office. The procurement records will be protected against tampering using this technology. This will promote trust and confidence of the stakeholders. The implementation of blockchain technology in developing a system served as advancement and innovation in terms of securing data.
Cryptography and Security
What problem does this paper attempt to address?
The problems that this paper attempts to solve are: How to improve the procurement and asset management processes in the supply office by introducing private blockchain technology. Specifically, the paper aims to solve the following problems: 1. **Enhance the transparency and trust in the procurement process**: - The procurement process includes steps such as inquiry, purchase, delivery, and inspection. In the traditional way, information asymmetry and trust issues are likely to occur, while blockchain technology can ensure that all transaction records are immutable and that every participant can verify these records. 2. **Protect sensitive information**: - In traditional procurement and asset management, sensitive information is vulnerable to the risks of leakage or tampering. The private blockchain can enhance data security and privacy through distributed ledger technology and encryption algorithms (such as SHA3 - 512). 3. **Improve efficiency and reduce complexity**: - The traditional procurement process usually involves multiple departments and complex document management, resulting in low efficiency. Private blockchain technology can simplify the process, reduce human intervention, and thus improve overall efficiency. 4. **Prevent fraud**: - The immutable nature of the blockchain enables any unauthorized changes to be detected immediately, which helps prevent the occurrence of fraud. 5. **Achieve better asset tracking and management**: - By integrating QR code technology, it is more convenient to identify and track assets. Especially during physical inventory, it can improve the accuracy and efficiency of asset management. To achieve the above - mentioned goals, the paper proposes a procurement and asset management system based on private blockchain, which combines distributed ledger technology, peer - to - peer network, Proof - of - Authority (PoA) consensus mechanism, and SHA3 - 512 cryptographic hash function algorithm. The implementation of this system will provide higher security, transparency, and efficiency for supply chain management and asset management. ### Formula Examples The SHA3 - 512 hash function mentioned in the paper can be expressed as: \[ H = SHA3 - 512(M) \] where \( M \) is the input message and \( H \) is the generated 512 - bit hash value. Furthermore, the block creation process in the PoA consensus mechanism can be described as: \[ B_{i + 1}=\text{PrimaryValidator}(B_i, T_i) \] where \( B_i \) is the \( i \) - th block, \( T_i \) is the transaction list in the \( i \) - th block, and PrimaryValidator represents the process of generating a new block by the primary validator. Through the application of these technologies, the paper expects to significantly improve the reliability and security of the procurement and asset management system in practical applications.