Fake Product Detection Using Blockchain
Fake Product Detection Using Blockchain
https://doi.org/10.22214/ijraset.2023.50409
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
Abstract: Many applications have been developed using blockchain in recent years as its popularity has grown. The
cryptocurrency Bitcoin is a well-known example of a Blockchain application since it not only solves the issue of double
spendingin an efficient manner but also has the ability to independently verify the veracity of transactional data. As a result, any
application that uses Blockchain technology as its fundamental architecture guarantees the integrity of its data. Since
Blockchain technology is decentralised, consumers do not fully depend on merchants to verify the authenticity of their
purchases. We outline a decentralised Blockchain system with product anti- counterfeiting so that producers can utilise it to
deliver authentic goods without having to oversee directly owned storefronts, which can significantly reduce the cost of product
quality assurance.
Index Terms: Blockchain, ethereum, counterfeit.
I. INTRODUCTION
When developing technologies or products globally, there are always risks such as counterfeiting and duplication; these factors can
affect an organization’s reputation, revenue, and the well-being of its customers. There are so many products in the supply chain.
To make sure the product is genuine or fake or in order to know the authenticity of the product, we can use blockchain
technology.
Blockchain is a data storage system that makes it harder or harder to modify, hack, or cheat the system. A blockchain is simply a
replicated distributed record of transactions that runs across an entire network of computers on a blockchain. Several transactions
are contained in each block of the chain, and each time a new transaction is made on the blockchain, a record of that transaction is
added to each participant’s records. A decentralized database managed by the number of participants is called Distributed
Ledger Technology (DLT).
A blockchain is a type of distributed ledger technology that uses immutable cryptographic signa- tures called hashes to record
transactions. It uses the keccak- 256 algorithm. Keccak 256 belongs to the SHA 3 algorithm family, where SHA stands for Secure
Hash Algorithm.
The meaning of 256 in the name represents the final hash value, i.e. regardless of the size of the plaintext, the hash value is
always 256 bits. The hash function is one-way and there is no way to get the full text of the resulting hash. Each block header in a
blockchain contains the hash of the previous block header. This ensures that it is not possible to modify a single block in the
blockchain without being discovered.
From modifying a block, it requires generating a new version for each subsequent block. Blockchain technology thus helps solve the
problem of counterfeit products. For each product on the network, a hash code is generated and a string is created for each product
transaction and its current owner. All transaction records will be stored in the blockchain as blocks. In the proposed system, we
assign the generated QR code to a specific product, which customers can finally scan and get all the information about this product.
After scanning the QR code, we can identify the authenticity of the product.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 1879
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
As you can see from the diagram above, these are techniques used in existing systems. GPS spoofing occurs when someone uses a
radio transmitter. It sends fake GPS signals to the receiver antenna to counter legitimate GPS satellite signals. The majority of
navigation systems are built to utilise the most powerful GPS signals, with false signals overwhelming weaker but legitimate satellite
signals. Fingerprint recognition is the process of verifying the identity of a person by comparing their fingerprints with
previously registered samples. The best example we’ve researched is Shield, a third-party web application that primarily provides
security for organizations. Instead of using artificial intelligence and global intelligence, we use blockchain, so everything will be
decentralized.
V. PROPOSED MODEL
In our system we are enabling communication between the customer and manufacturer of the product. We decen- tralize this
service with a smart contract using the Ethereum blockchain. This decentralized application will use IPFS, the Ethereum
Ecosystem, ReactJS, Express, and Bootstrap. Reac- tJS to develop our frontend for this application, by creating user friendly GUI
for the customer to see their details. This blockchain-based system that traces the authenticity of goods and products. Blockchain
data storage replaces a common centralized database to ensure traceability and authenticity ofa product.
It uses QR code for authenticating the product originality, if the scan QR code shows the details of the product which includes the
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 1880
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
description, product name, manufac- turer name, company name, unique product id, and others then we can say that product is
authentic. Scanning the product QR code does not reveal any details, so we can assume the product data is not stored in the
blockchain system. So, we might conclude that the item is a fake.
The suggested solution would be a decentralised application (Dapp) that is constructed utilising the Ethereum Network as the
primary blockchain for preserving all the records and managing the transactions related the goods of the companies registered on
Dapp. The major objective of this suggested approach is to preserve the originality of the product by assisting the consumer in
identifying counterfeit goods on the market. Using blockchain, the system gives customers the ability to access all of the
product’s details from manufacturer to customer. The Manufacturer role, the Admin role, and the Customer role are the three roles
that make up this Blockchain- based system for preventing product counterfeiting. In the proposed system there will be three
modules- USER, MAN- UFACTURER AND ADMIN. Firstly there will be a reg- istration page which needs to be filled in
order to proceed to login. Manufacturer logs into the manufacturer account, generates a QR code for the product, adds any
additional information that is needed, and then uses his Ethereum wallet to submit a block to the Ethereum blockchain. Portis is
acting like an admin over hear. Portis is the platform which helps to make decentralized application and it act as a wallet which
stores the encrypted private keys necessary for blockchain transaction. It take cares of every transaction without installing any third
party plugins because every action perform inside browser itself. A consumer can scan the QR code provided with each product
and verify the genuineness of the product. The customer is flexible to use any scanner to scan the QR code. Here user is
customer who will check if the product is fake or genuine. after scanning the QR code it will checkif the product is present in
the blockchain if its there then it will show the details of the product including name of the product, price and id of the product or
we can say the product is genuine else it will show the product is fake.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 1881
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
VII. MODULES
A. User
1) The customer is flexible to use any scanner to scan the QR code. Here user is customer who wants to confirm whether the
product is legit or not.
2) The unique scanned code from the customer will be compared with the code produced by the manufacturer in blocks. Then the
user will be notified with authenticityof the product.
3) There is an option for customers to check product de- tails/information like name, price, and ID of the product.
B. Manufacturer
1) Manufacturer logs into the manufacturer account.
2) Add the details of the product such as product name, product price and product id. and then uses his Ethereum wallet to submit
a block to the Ethereum blockchain.
3) Once product added successfully it generates a QR code for the product.
4) If the userid of our local database and the wallet address of the entity are mapped together, then only the block will be added to
the digital ledger whenever a manufacturer logs in using his own account and uses his own wallet.
C. Admin
1) Portis is acting like an admin over hear. Portis is the platform which helps to make decentralized application
2) It act as a wallet which stores the encrypted private keys necessary for blockchain transaction
3) It take cares of every transaction without installing any third party plugins because every action perform inside browser itself.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 1882
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 1883
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
2) Truffle: We use truffle to compile Smart contracts. We need to deploy the Solidity code on Ganache, we need to turn it
into machine-readable code.
3) Ethereum: Decentralized applications can be built and deployed using Ethereum, which is a blockchain-based computing
platform.
4) ReactJs: The React.js framework is an open-source JavaScript framework and library which allows you to build interactive
user interfaces and web applications quickly and efficiently.
5) NodeJs: Node.js is a single-threaded, open-source, cross- platform runtime environment for building fast and scalable server-
side and networking applications.
6) Portis: Portis is the platform which helps to make decentralized application. It act as a wallet which stores the encrypted private
keys necessary for blockchain transaction. It take cares of every transaction without installing any third party plugins because
every action perform inside browser itself.
7) MongoDb: MongoDB is a non-relational database that provides support for JSON-like storage.
8) Visual Studio Code: Visual Studio Code is a code editor use for writing, editing debugging and running your code. It is useful to
code any programming language.
X. CONCLUSION
This system provides a friendly graphical user interface, provides reliability, system and data security whic makes it efficient. This
platform will provide decentralized application which ensures that the blockchain is not governed by an individual, group, or even
the government, So no third party can entered into the system and tampered the data. also ensures the genuinity of the product so,
customer can able to buythe original products which will also help the manufacturer to maintain the reputation of the company
providing genuine products to the customer. Therefore, the proposed system will provide hassle-free platform where user can
check the genuinity of the product.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 1884
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
REFERENCES
[1] INHUA MA1, SHIH-YA LIN2, XIN CHEN3, HUNG-MIN SUN4, YEH-CHENG CHEN5, and HUAXIONG WANG6. “A Blockchain-Based
Application System for Product Anti-Counterfeiting” IEEE,10.1109/ACCESS.2020.2972026, IEEE Access.
[2] Swaroop Jambhulkar, Harsh Bhoyar, Shantanu Dhore, Arpita Bidkar, Prema Desai, “BLOCKCHAIN BASED FAKE PRODUCT IDENTIFI- CATION
SYSTEM,” 05/May-2022, International Research Journal of Modernization in Engineering Technology and Science.
[3] Tejaswini Tambe, Sonali Chitalkar, Manali Khurud, Madhavi Varpe, S. Y.Raut, “Fake Product Detection Using Blockchain Technology”, IJARIIE-
ISSN(O)-2395-4396, Vol-7 Issue-4 2021.
[4] Blockchain Based Fake Product Identification in Supply Chain www.irjet.net: Ajay Funde, Pranjal Nahar, Ashwini Khilari, International Research Journal of
Engineering and Technology (IRJET).
[5] Si Chen, Rui Shi, Ren, Jiaqi Yan, Yani Shi, “A Blockchain-based Supply Chain Quality Management Framework”, 14th, IEEE International Conference on e-
Business Engineering, 2017.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 1885