Securing Drug Distribution Systems from Tampering Using Blockchain

نویسندگان

چکیده

The purpose of this study is to overcome coordination flaws and enhance end-to-end security in the drug distribution market (DDM). One major issues management absence a centralized monitoring system provide adequate control offer real-time prices, availability, authentication data. Further, tampering another serious issue affecting DDM, as consequence, there significant global for counterfeit drugs. This vast business presents risk system. blockchain-based solution challenges such failure, secure delivery, pharmaceutical authenticity. To optimize process (DDP), framework presented. proposed evaluated using mathematical modeling real-life case study. According our results, technique helps maintain equilibrium by guaranteeing that demand while maintaining supply. Using suggested framework, massive data created medication supply chain would be appropriately handled, allowing forces better regulated no manufactured shortages inflate medicine prices. calls Drug Regulatory Authority (DRA) authenticate users on blockchain monitor DDP. big generated through will properly managed; thus, controlled, artificial raise costs.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing Circuits against Constant-Rate Tampering

We present a compiler that converts any circuit into one that remains secure even if a constant fraction of its wires are tampered with. Following the seminal work of Ishai et al. (Eurocrypt 2006), we consider adversaries who may choose an arbitrary set of wires to corrupt, and may set each such wire to 0 or to 1, or may toggle with the wire. We prove that such adversaries, who continuously tam...

متن کامل

Securing Proof-of-Stake Blockchain Protocols

Proof-of-Stake (PoS) protocols have been actively researched for the past five years. PoS finds direct applicability in open blockchain platforms and has been seen as a strong candidate to replace the largely inefficient Proof of Work mechanism that is currently plugged in most existing open blockchains. Although a number of PoS variants have been proposed, these protocols suffer from a number ...

متن کامل

Securing Circuits and Protocols against 1/poly(k) Tampering Rate

In this work we present an efficient compiler that converts any circuitC into one that is resilient to tampering with 1/ poly(k) fraction of the wires, where k is a security parameter independent of the size of the original circuit |C|. Our tampering model is similar to the one proposed by Ishai et al. (Eurocrypt, 2006) where a tampering adversary may tamper with any wire in the circuit (as lon...

متن کامل

Securing Video Integrity Using Decentralized Trusted Timestamping on the Bitcoin Blockchain

The ability to verify the integrity of video files is important for consumer and business applications alike. Especially if video files are to be used as evidence in court, the ability to prove that a file existed in a certain state at a specific time and was not altered since is crucial. This paper proposes the use of blockchain technology to secure and verify the integrity of video files. To ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics

سال: 2022

ISSN: ['2079-9292']

DOI: https://doi.org/10.3390/electronics11081195