VISVESVARAYA TECHNOLOGICAL UNIVERSITY "Jnana Sangama", Belgavi-590 018, Karnataka, India A PROJECT REPORT On “FAKE PRODUCT IDENTIFICATION USING BLOCKCHAIN” Submitted in Partial Fulfillment of the requirements for the award of the degree of BACHELOR OF ENGINEERING IN COMPUTER SCIENCE AND ENGINEERING SUBMITTED BY HARSHITHA G L 1SJ18CS039 LAVANYA V S 1SJ18CS051 MUSHAFFIQ AHMED MUJALE 1SJ18CS059 PAVAN KALYAN Y 1SJ18CS071 Carried out at B G S R&D Centre, Dept of CSE, SJCIT Under the guidance of Dr. Seshaiah M,BE, M.TECH,Ph.D Associate Professor Dept. of CSE, SJCIT S J C INSTITUTE OF TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CHIKKABALLAPUR-562 101 2021-2022 DECLARATION We Harshitha G L(1SJ18CS039), Lavanya V S (1SJ18CS051), Mushaffiq Ahmed Mujale (1SJ18CS059), Pavan Kalyan Y (1SJ18CS071) Student of VIII semester B.E in Computer Science and Engineering at S J C Institute of Technology, Chickballapur, hereby declare that this dissertation work entitled “Fake Product Identification using Blockchain” has been carried out at B.G.S R&D Centre, Dept. of CSE, SJCIT under the guidance of guide Dr.Seshaiah M, Associate Professor, Dept. of CSE, SJC Institute of Technology, Chickballapur and submitted in the partial fulfilment for the award of degree Bachelor of Engineering in Computer Science and Engineering of Visvesvaraya Technological University, Belagavi during the academic year 2021-2022. We further declare that the report had not been submitted to another university for the award of any other degree. Place:Chickballapur Date: HARSHITHA G L 1SJ18CS039 LAVANYA V S 1SJ18CS051 MUSHAFFIQ AHMED MUJALE 1SJ18CS059 PAVAN KALYAN Y 1SJ18CS071 i ABSTRACT Blockchain innovations have acquired interest in the course of the most recent years. One of the most talked about issues is currency exchange, but its application is not limited only to Digital currency. so it has the potential to influence different business sectors. Blockchain technology has brought greater transparency and ease in large transactions. We can detect counterfeit goods using blockchain technology. The question that arises when buying any item in today's world is whether it is fake or not. And the lack of these things has been shown a huge impact on economic progress. Therefore, in order to curb all counterfeit goods, it is important to bring transparency about the goods to the notice of the consumers. The growing presence of counterfeit and unsafe products in the world is a cause for concern and blockchain technology has taken the next step towards its complete annihilation. Not only the use of technology will reduce the production of counterfeit goods, but everyone needs to be aware of this. By producing and packaging the right items each of those items needs to be given a digital code with its own identity. The software implementation process in which the product code is scanned using this application and then verify if the given product is counterfeit or not. i ACKNOWLEDGEMENT With reverential pranam, we express my sincere gratitude and salutations to the feet of his holiness Paramapoojya Jagadguru Byravaikya Padmabhushana Sri Sri Sri Dr. Balagangadharanatha Maha Swamiji, and his holiness Paramapoojya Jagadguru Sri Sri Sri Dr. Nirmalanandanatha Maha Swamiji , Sri Adichunchanagiri Mutt for their unlimited blessings. First and foremost we wish to express our deep sincere feelings of gratitude to our institution, Sri Jagadguru Chndrashekaranatha Swamiji Institute of Technology, for providing us an opportunity for completing our Project Work successfully. We extend deep sense of sincere gratitude to Dr. G T Raju, Principal, S J C Institute of Technology, Chickballapur, for providing an opportunity to complete the Project Work. We extend special in-depth, heartfelt, and sincere gratitude to HOD Dr. Manjunatha Kumar B H, Head of the Department, Computer Science and Engineering, S J C Institute of Technology, Chickballapur, for his constant support and valuable guidance of the Project Work. We convey our sincere thanks to Project Guide Dr. Seshaiah M, Associate Professor, Department of Computer Science and Engineering, S J C Institute of Technology, for his/her constant support, valuable guidance and suggestions of the Project Work. We also feel immense pleasure to express deep and profound gratitude to Project Coordinators Prof. PradeepKumar G M and Prof Shrihari M R, Assistant Professors, Department of Computer Science and Engineering, S J C Institute of Technology, for their guidance and suggestions of the Project Work. Finally, we would like to thank all faculty members of Department of Computer Science and Engineering, S J C Institute of Technology, Chickaballapur for their support. We also thank all those who extended their support and co-operation while bringing out this Project Report. Harshitha G L(1SJ18CS039) Lavanya V S(1SJ18CS051) Mushaffiq Ahmed Mujale(1SJ18CS059) Pavan Kalyan Y (1SJ18CS071) ii TABLE OF CONTENTS Declaration i Abstract ii Acknowledgement iii Table of Contents iv List of Figures vi List of Tables viii CHAPTER NO. 1 CHAPTER TITLE PAGE NO. INTRODUCTION 1-5 1.1 Overview 1-2 1.2 Problem Statement 2 1.3 Significance and Relevance of Work 2-3 1.4 Objectives 3 1.5 Methodology 3-4 1.6 Organization of the Report 5 2 LITERATURE SURVEY 6-9 3 SYSTEM REQUIREMENTS AND SPECIFICTAION 10-15 3.1 System Requirement and Specification 10 3.2 Software Specification 11-13 3.3 Functional Requirements 14 3.4 Non – Functional Requirements 14 3.5 Performance Requirements 15 SYSTEM ANALYSIS 16-17 Existing System 16 4 4.1 iv 4.2 Proposed System 16-17 SYSTEM DESIGN 18-25 5.1 System Architecture 18-22 5.2 Use Case Diagram 23 5.3 Data Flow Diagram 24 5.4 Sequence Diagram 25 IMPLEMENTATION 26-30 Algorithm/Pseudocode 27-30 TESTING 31-35 Methods of Testing 31 7.1.1 Unit Testing 32 7.1.2 Integration Testing 32 7.1.3 Validation Testing 33 7.1.4 Acceptance Testing 33 Test Cases 34-35 8 PERFORMANCE ANALYSIS 36-38 9 CONCLUSION AND FUTURE ENHANCEMENT 39 BIBILOGRAPHY 40 APPENDIX 41-48 PAPER PUBLICATION DETAILS 49-55 5 6 6.1 7 7.1 7.2 v LIST OF FIGURES Figure No. Name of the Figure Page No. Figure 1 Block Diagram of Fake Product Identification 3 Figure 2 Manufacturer Module 12 Figure 3 Distributor Module 14 Figure 4 Retailer Module 15 Figure 5 Consumer Module 16 Figure 6 System Architecture 17 Figure 7 Use Case Diagram 23 Figure 8 Data Flow Diagram 24 Figure 9 Sequence Diagram 25 Figure 10 Block diagram of Performance analysis 36 Figure 11 Graph for ETH consumption in RFID and QR code 38 SNAPSHOTS Figure A1 User details storing 41 Figure A2 Remix IDE Initializing 41 Figure A3 Solidity Compilation 42 Figure A4 Metamask pops up after deployment. 42 Figure A5 Gas Estimation for Transaction 43 Figure A6 Ganache Blockchain 43 Figure A7 Blocks Generated 44 Figure A8 Transactions Recorded 44 Figure A9 Login Page 45 Figure A10 Signup Page 45 vi Figure A11 QR code generation 46 Figure A12 QR code scan and product track display 46 Figure A13 Scanning shipment 47 Figure A14 Invalid image upload to QR code Scanner 47 vii LIST OF TABLES TABLE NO. Table Name Page No. Table 1 Manufacturer Test Case 24 Table 2 Distributor Test Case 24 Table 3 Retailer Test Case 25 Table 4 Consumer Test Case 25 Table 5 Comparison between QR code and RFID 38 viii CHAPTER 1 INTRODUCTION 1.1 Overview Supply chain counterfeiting is a universal problem that plagues almost every industry. There are counterfeit electronic components, car parts, consumer goods, pharmaceuticals — even counterfeit wines. While manufacturers and distributors lose billions of dollars annually to counterfeit goods, the risks to consumers can be even greater. Faulty counterfeit auto parts or consumer products can overheat or catch fire, and more than 1 million people each year lose their lives due to counterfeit drugs.While manufacturers, distributors, shippers and government agencies are actively working to remove counterfeit goods from the supply chain, it’s challenging to identify counterfeits. Counterfeit goods cost global brands more than $232 billion in 2018. The counterfeit drug market alone costs more than $200 billion per year - enough to bring 13 new drugs to market annually. Losses from counterfeit automotive parts are estimated to be $2.2 billion per year, not counting those from safety issues and legal liability. Counterfeit consumer electronics cost more than $100 billion per year, and bogus computer chips cost U.S. companies $7.5 billion annually, as well as 11,000 jobs.Identifying counterfeit goods that enter the supply chain can be difficult, if not impossible. The only way to beat counterfeiters is to apply a fool proof means of authenticating goods from their point of origin to final delivery. New cloud-based security technology is now available that can create unique, fool proof digital identifiers for products so that they can be tracked at every point in the supply chain. Identification of counterfeit merchandise in cutting-edge market is being a exceptional assignment for customers and it is very life threatening for the customers while this takes vicinity in pharmaceutical fields. Other fields like electronics, clothing, fashion-accessories additionally face a large effect on their emblem because of counterfeit products. E-commerce has visible exceptional boom through the years from $39 billion in 2017 and it is projected to upward push to $200 billion via 2026[2]. This comes within the wake of extending penetration of the net and cell phones. After numerous market surveys it is observed that the counterfeit merchandise are growing rapidly and the rise of counterfeit products can badly affect the improvement and economic boom. Additionally because of this the many top companies have become bad comments and dropping their positions from the logo list. 1 Fake Product Identification using Blockchain Introduction Counterfeit merchandise are twins of the real merchandise in the marketplace. Often all reputed businesses are operating to forestall this system that is dangerous to all people in the entire international. The various branded or reputed groups are running on contemporary technology to identify the counterfeited products from the original product inside the market and to enhance this operating, the IT area can give them fine signals and can assist to prevent counterfeit items. Among those numerous technologies available inside the it area blockchain is one of the promising Technologies which may be used for decreasing the counterfeiting of goods. A blockchain is a kind of dispensed ledger that is designed to prevent tampering. Primarily based on the allotted consensus Set of rules, clever contracts and encrypted algorithms [3]. Blockchain generation facilitates to clear up the Problem of counterfeiting of a product. And on this studies we proposed a product surveillance blockchain device with the intention to share statistics about merchandise from the manufacturer to the clients. We are growing such an application that will work on smart phones so one can Be giving all of the designated data about the products to the client who orders that product and help them to identify if the product is authenticated or counterfeited 1.2 Problem Statement The worldwide improvement of an item or innovation consistently accompanies hazard factors, for example, forging and duplication. Forging items can influence the organization's name and the client's wellbeing. Presently days discovery of phony item is the greatest test. Fake items are causing a significant impact on the organization and the client's wellbeing. Hence, item creators are confronting enormous misfortune. India and different nations are battling such fake and fake items. In the proposed framework, the framework produces QR codes utilizing Blockchain innovation. This innovation stores exchange records in blocks. These squares are secure and difficult to access and change the data from it. By utilizing a QR code we can recognize the fake item 1.3 Significance and Relevance of Work A blockchain supply chain can help participants record price, date, location, quality, certification, and other relevant information to more effectively manage the supply chain. The availability of this information within blockchain can increase traceability of material supply chain, lower losses from counterfeit and gray market, improve visibility and compliance over Dept. of CSE, SJCIT 2 2021-2022 Fake Product Identification using Blockchain Introduction outsourced contract manufacturing, and potentially enhance an organization's position as a leader in responsible manufacturing. 1.4 Objectives The idea of this project came into existence because of the increase in the counterfeit products. The objectives of this project are: • The goal of our project is to find whether a given product is fake or original using Blockchain Technology. • To ensure the identification and traceability of real product throughout the supply chain ,we propose a fully functional Blockchain system to prevent product counterfeting , for what are creating web interface for the user to scan the information of the product through the product QR code. 1.5 Methodology Figure 1 Block Diagram of Fake Product Identification Business runs on information. The faster it’s received and the more accurate it is, the better. Blockchain is ideal for delivering that information because it provides immediate, shared and completely transparent information stored on an immutable ledger that can be accessed only by Dept. of CSE, SJCIT 3 2021-2022 Fake Product Identification using Blockchain Introduction permissioned network members. A blockchain network can track orders, payments, accounts, production and much more. And because members share a single view of the truth, you can see all details of a transaction end to end, giving you greater confidence, as well as new efficiencies and opportunities. After the product is recorded in a network it will create a smart contract and a unique QR code of the product in which the details of the product is mentioned in an encrypted text form.The manufacturer will ship the product to the distributor and status is set as shipped; it will not change the ownership of the product until a request from both parties is approved to buy and sell the productt. Once the consumers receive the product the Buyers can scan QR code allocated to the item and verify the authenticity. SHA-256 Algorithm Secure Hashing Algorithm (SHA) - 256 is the hash capacity and mining calculation of the Bitcoin convention, alluding to the cryptographic hash work that yields a 256 pieces in length esteem. It directs the creation and the executives of addresses, and is likewise utilized for exchange check. Bitcoin utilizes twofold SHA-256, implying that it applies the hash capacities two times. The calculation is a variation of the SHA-2 (Secure Hash Algorithm 2), created by the National Security Agency (NSA). SHA-256 is likewise utilized in well known encryption conventions. Proof of Work (PoW) is the original consensus algorithm in a blockchain network. The algorithm is used to confirm the transaction and creates a new block to the chain. In this algorithm, minors (a group of people) compete against each other to complete the transaction on the network. The process of competing against each other is called mining. As soon as miners successfully created a valid block, he gets rewarded. The most famous application of Proof of Work (PoW) is Bitcoin. Producing proof of work can be a random process with low probability. In this, a lot of trial and error is required before a valid proof of work is generated. The main working principle of proof of work is a mathematical puzzle which can easily prove the solution. Proof of work can be implemented in a blockchain by the Hashcash proof of work system. Dept. of CSE, SJCIT 4 2021-2022 Fake Product Identification using Blockchain Introduction 1.6 Organization of the Report This report is organised into majorly into 5 different sections and each section provides detailed/ brief description about the project. The 5 sections mentioned are: Chapter 1 Introduction: It consists of the overview of the project and identifies the problem in the existing system. It also explains the significance and relevance of the project to solve the identified problems. Chapter 2 Literature Survey: It consists of the brief explanation of the IEEE papers and some other journal papers which will be referred during the implementation of the project Chapter 3 System Requirements Specification: It contains the details of both hardware and software requirements needed to implement the project. Chapter 4 System Design: It includes defining software and hardware architecture, components and data to enable a system to satisfy a set of well-specified operational requirements. Chapter 5 Implementation: It contains the concept of model and algorithm on which our model works. Chapter 6 Testing: It contains methods of testing and test cases to determine whether the model is working the way it should and producing the expected results. Chapter 7 System Analysis: It contains the details of existing system and its limitations and proposed system and its advantages. Chapter 8 Performance Analysis: It contains quantitative data. Chapter 9 Conclusion and Future Enhancement: It contains summary of our entire model and how our model can be updated in future. Bibliography contains the references to the referred paper that is mentioned in the literature survey Dept. of CSE, SJCIT 5 2021-2022 CHAPTER 2 LITERATURE SURVEY 2.1 A Survey on Blockchain Technology: Evolution, Architecture and Security Authors: Muhammad Nasir Mumtaz Bhutta, Amir A. Khwaja, Adnan Nadeem, Hafiz Farooq Ahmad , Muhammad Khurram Khan, Moataz A. Hanif, Houbing Song, Majed Alshamari , and Yue Cao This survey paper has covered architecture of cryptocurrencies, smart contracts and general Blockchain based applications. The paper has provided a perspective to describe the Blockchain architectures in relation to cryptocurrencies, smart contracts and other applications. The research advances in consensus are also highlighted with some key development and application frameworks. A detailed discussion with respect to future and open research avenues is also performed, which could help to pave the way for researchers to explore the key challenging areas in the Blockchain field. Disadvantages • Doesn’t give idea about hashing and all consensus algorithms 2.2 Product Traceability using Blockchain Authors: Rishabh Sushil Bhatnagar, Sneha Manoj Jha , Shrey Surendra Singh, Rajkumar Shende The conventional SCM systems are widely used in the current market whereas blockchain is a relatively new system and is yet to be introduced in the industry on a large scale. The current SCM systems have prevailed so long in the market due to its easy and cheaper implementation on a large scale. Despite being used on a large-scale platform, these systems have their flaws which have prevailed since the existence of these systems. The current system is opaque in nature and is very vulnerable to various frauds and scams due to poor maintenance of the records of the transactions within the system. Lack of trust between the participating entities is an issue yet to be resolved. The trust of the customer in the system is compromised by not providing a quality assured product even though it is a major factor in the growth of any business. Even with all these flaws, these systems are being used by various market giants as the prices of the products can be easily exploited with any credibility. 6 Fake Product Identification using Blockchain Literature Survey Disadvantages • Participation of too many entities, makes it difficult for transactions. 2.3 A Blockchain-based Supply Chain Quality Management Framework Author : Si Chen , Rui Shi , Zhuangyu Ren , Jiaqi Yan , Yani shi , Jinyu Zhang In this appropriate paper, they proposed a framework for blockchain based SCQI. This framework will provide a theoretical basis to intelligent quality management of supply chain based on the blockchain technology. Furthermore, it provides a foundation to develop theories about information resource management in distributed, virtual organizations, especially distributed, cross-organizational and decentralized management theory. Disadvantages • Design of complex smart contract system which is much inefficient. 2.4 A Block Chain based Management System for Detecting Counterfeit Product in Supply Chain Authors: M.C.Jayaprasanna, .V.A.Soundharya , M.Suhana, S.Sujatha In this Paper, they have discussed about counterfeit products are growing exponentially in online and black-market. The block market is a biggest challenge in supply chain. The government has introduced several laws and regulations against fake products even though the government cannot control counterfeit products. Therefore, there is a need of an approach for detecting counterfeit products and providing security techniques to alert both manufacturer and consumer in supply chain. Manufacturers may use the block chain management system to store relevant product sales information within the block chain, which is accessible to all. The total number of sales the seller can sell and the rest left behind by the seller are transparent. The user can perform vendor-side verification using an encryption algorithm. Only way to decrypt is to use a private key of the owner. In this paper, we proposed block chain management system activates the consumer and enterprise vendor to track and identify the real product using a Smartphone. It also will detect counterfeit products as well as authenticity of manufacturer for both end user and enterprise vendor. Disadvantages • Using RFID (Radio frequency Identification) takes too much time for computing in a BCBM(Block Chain Based Management System). Dept. of CSE, SJCIT 7 2021-2022 Fake Product Identification using Blockchain 2.5 A Blockchain-Based Literature Survey Application System for Product Anti- Counterfeiting Authors: Jinhua Ma , Shih-Ya Lin , Xin Chen , Hung-Min Sun In this particular Paper, Manufacturers can use the system to store relevant information on product sales in Blockchain which is accessible to everyone. The total amount of sales that can be sold by the seller and the number of products currently left by the seller are transparent. The user can use the functions provided by our system to immediately perform vendor-side verification. The system provides identity verification by using digital signatures. There are no other means to decrypt the private key of the key owner unless the key owner accidentally leaks his key. In their system analysis result, the cost of the initial product record contract will only cost 1.2893394289 US dollars, and the cost of each product sale process will cost 0.17415436749 US dollars. Disadvantages • This proposed system eventhough it uses a ethereum Blockchain which is best for smart contracts. It uses a digitalsignatures for transactions. Everytime Using a digital signatures for all transactions becomes clumsy. 2.6 A Blockchain-based decentralized system to ensure the transparency of organic food supply chain Authors: B. M. A L. Basnayake, C. Rajapakse This study is based on the applicability of Blockchain concept to improving transparency and validity of agricultural supply chain and its process. Since recent past, there has been a rapid change in the production of food and its raw materials. An efficient method to bridge the gap between the farmer producing commodities in the market and the end customer was studied. Blockchain based architecture and its concepts were taken for implanting trustworthiness and transparency within the users and their transactions. In this paper as there is a drawback of farmers may not be knowing about the product traceability once they register. Disadvantages • In this blockchain only farmers has the access to start or end transaction at any moment. As most of the farmers being an illiterates they don’t have much understanding of blockchains. Dept. of CSE, SJCIT 8 2021-2022 Fake Product Identification using Blockchain 2.7 User Interface of Literature Survey Blockchain-Based Agri-Food Traceability Applications Authors: Atima Tharatipyakul and Suporn Pongnumkul A Review: Blockchain technology is seen as a way to improve agri-food supply chain traceability and deliver food quality, safety, and nutrition information to stakeholders. Limited knowledge on how to design the user interface for the traceability application could lead to usability issues. As a step towards more usable blockchain-based agri-food traceability applications, this paper reviewed existing works from a user interface perspective. Disadvantages • Gives an idea about only existing user interface which are inefficient and ambiguous for users. The design proposed in this system requires high cost. Dept. of CSE, SJCIT 9 2021-2022 CHAPTER 3 SYSTEM REQUIREMENTS SPECIFICATION 3.1 System Requirements Hardware Requirements. Operating Systems: Windows 7 or above. Hard disk : 20GB RAM :4GB and above. Processor: i3 and Above Software Requirements Tools : Xampp Language : Solidity IDE’s : Visual Studio 2019 and Remix Ethereum IDE (online) Metamask wallet Ganache (personal blockchain). 10 Fake Product Identification using Blockchain System Requirements Specification 3.2 Software Specification Remix Ethereum IDE Remix Project is a platform for development tools that use a plugin architecture. It encompasses sub-projects including Remix Plugin Engine, Remix Libraries, and of course Remix IDE. Remix IDE is an open source web and desktop application. It fosters a fast development cycle and has a rich set of plugins with intuitive GUIs. Remix is used for the entire journey of contract development with Solidity language as well as a playground for learning and teaching Ethereum. Ganache Ganache is a personal blockchain for rapid Ethereum and Corda distributed application development. You can use Ganache across the entire development cycle; enabling you to develop, deploy, and test your dApps in a safe and deterministic environment. Ganache comes in two flavors: a UI and CLI. Ganache UI is a desktop application supporting both Ethereum and Corda technology. The command-line tool, ganache-cli (formerly known as the TestRPC), is available for Ethereum development. Ganache is used for setting up a personal Ethereum Blockchain for testing your Solidity contracts. It provides more features when compared to Remix. You will learn about the features when you work out with Ganache. Before you begin using Ganache, you must first download and install the Blockchain on your local machine. Solidity Solidity is an object-oriented programming language for implementing smart contracts on various blockchain platforms, most notably, Ethereum. It was developed by Christian Reitwiessner, Alex Beregszaszi, and several former Ethereum core contributors. Programs in Solidity run on Ethereum Virtual Machine. Solidity is a statically typed programming language designed for developing smart contracts that run on the Ethereum Virtual Machine (EVM). Dept. of CSE, SJCIT 11 2021-2022 Fake Product Identification using Blockchain System Requirements Specification Solidity uses ECMAScript-like syntax which makes it familiar for existing web developers; however unlike ECMAScript it has static typing and variadic return types. Solidity is different from other EVM-targeting languages such as Serpent and Mutan in some important ways. It supports complex member variables for contracts, including arbitrarily hierarchical mappings and structs. Solidity contracts support inheritance, including multiple inheritance with C3 linearization. Solidity introduces an application binary interface (ABI) that facilitates multiple type-safe functions within a single contract (this was also later supported by Serpent). The Solidity proposal also includes "Natural Language Specification", a documentation system for specifying user-centric descriptions of the ramifications of method-calls. Metamask MetaMask is a browser plugin that serves as an Ethereum wallet, and is installed like any other browser plugin. Once it's installed, it allows users to store Ether and other ERC-20 tokens, enabling them to transact with any Ethereum address. By connecting to MetaMask to Ethereum-based dapps, users can spend their coins in games, stake tokens in gambling applications, and trade them on decentralized exchanges (DEXs). It also provides users with an entry point into the emerging world of decentralized finance, or DeFi, providing a way to access DeFi apps such as Compound and PoolTogether. MetaMask’s open platform also plays a key role in promoting Ethereum-based dApp development for coders and technologists. For developers building a dApp, Metamask is preloaded with fast connections to Ethereum and several test networks via Infura. These built-in connections allow developers to begin building a new dApp on Ethereum without the need to set up and run a full network node. This can be helpful for bootstrapped entrepreneurs looking to build immediately, whether they are creating a simple browser-friendly user interface (UI) or a full-fledged, mainnet-ready dApp that will support an entirely new decentralized marketplace. Additionally, since MetaMask extensions are compatible with popular browsers like Chrome, Firefox, and Safari, the application makes it easier for developers to create new applications that are designed to work within traditional browsers. Thus, MetaMask’s role in Dept. of CSE, SJCIT 12 2021-2022 Fake Product Identification using Blockchain System Requirements Specification enabling dApp adoption is two-fold: It provides a portal for end users to access dApps, while also enabling developers to streamline their path to getting those applications to market. Ethereum (ETH) Ethereum is a permissionless, non-hierarchical network of computers (nodes) that build and come to a consensus on an ever-growing series of "blocks", or batches of transactions, known as the blockchain. Each block contains an identifier of the chain that must precede it if the block is to be considered valid. Whenever a node adds a block to its chain, it executes the transactions in the block in the order they are listed, thereby altering the ETH balances and other storage values of Ethereum accounts. These balances and values, collectively known as the "state", are maintained on the node separately from the blockchain, in a Merkle tree. Each node communicates with a relatively small subset of the network—its "peers". Whenever a node wishes to include a new transaction in the blockchain, it sends a copy of the transaction to each of its peers, who then send a copy to each of their peers, and so on. In this way, it propagates throughout the network. Certain nodes, called miners, maintain a list of all of these new transactions and use them to create new blocks, which they then send to the rest of the network. Whenever a node receives a block, it checks the validity of the block and of all of the transactions therein and, if it finds the block to be valid, adds it to its blockchain and executes all of those transactions. Since block creation and broadcasting are permissionless, a node may receive multiple blocks competing to be the successor to a particular block. The node keeps track of all of the valid chains that result from this and regularly drops the shortest one: According to the Ethereum protocol, the longest chain at any given time is to be considered the canonical one. Ether (ETH) is the cryptocurrency generated by the Ethereum protocol as a reward to miners in a proof-of-work system for adding blocks to the blockchain. It is the only currency accepted to pay for transaction fees, which also go to miners. The block-addition reward together with the transaction fees provide the incentive to miners to keep the blockchain growing (i.e. to keep processing new transactions). Therefore, ETH is fundamental to the operation of the network. Each Ethereum account has an ETH balance and may send ETH to any other account. The smallest subunit of ETH is known as a Wei, named after cryptocurrency pioneer Wei Dai, and is equal to 10−18 ETH. Dept. of CSE, SJCIT 13 2021-2022 Fake Product Identification using Blockchain System Requirements Specification 3.3 Functional Requirements A functional requirement defines a function of a system or its component. Where a function is described as a specification of behavior between inputs and outputs. • System must be automatically connecting to Wallet. • System should be able to scan the QR code. • System Should be able to generate the QR code. • System Should show error message if the uploaded image is not QR code. • Auto update of scanned location of the QR code. • Storing all these details in blockchain nodes. 3.4 Non-Functional Requirements Software requirement can be non-functional and also be a performance requirement. Nonfunctional requirements are the characteristics or attributes of the system that can judge its operation. The nonfunctional requirements are divided into usability, reliability, performance, Supportability and safety. Usability The system must be easy to learn for manufacturers , retailers , distributors and mainly for consumers. Reliability The reliability of the device essentially depends on the software tools such as metamask, remix IDE, Ganache used for the system development. Performance The system shall allow the system administrator to add additional features. The system needs to be cost-effective to maintain. Safety In case of malfunction, scanning from the manufacturers side should be stopped , and also it must be notified to others that it is not working. Dept. of CSE, SJCIT 14 2021-2022 Fake Product Identification using Blockchain System Requirements Specification 3.5 Performance Requirement • Linking and correct deduction of gas amount for transaction. • Block generation for each and every transaction. • Automatic hub location generation for transaction. • Product code generation automatically once registering the product. Dept. of CSE, SJCIT 15 2021-2022 CHAPTER 4 SYSTEM ANALYSIS 4.1 Existing System A supply chain is a coordinated network. Therefore, any SCM system must also have a cohesive structure that enables functionality and visibility along the product delivery journey. As such, an SCM system would typically integrate features such as inventory management, warehouse management, purchase-order processing, demand forecasting, supplier relationship management, logistics planning, and so on. Also, most SCM systems are integrated with bookkeeping functionalities to enable the business to manage its ledger and optimize finances effectively. Over the years, there’s been increased adoption of cloud-based SCM systems as software-as-a-service (SaaS). Cloud management of the supply chain allows businesses to track the entire lifecycle of a project, offering close monitoring and adequate visibility at each touchpoint. It emerged to fill the gaps with traditional SCM systems, which lack the 360° management enabled by cloud technology. Overall, cloud-based SCM systems are more scalable and efficient. 4.2 Proposed System A blockchain supply chain can help participants record price, date, location, quality, certification, and other relevant information to more effectively manage the supply chain. The availability of this information within blockchain can increase traceability of material supply chain, lower losses from counterfeit and gray market, improve visibility and compliance over outsourced contract manufacturing, and potentially enhance an organization's position as a leader in responsible manufacturing. As blockchain gains publicity, large corporations and startups are exploring uses of the technology outside of the financial services industry. Many organizations are already experimenting with blockchain innovations to fulfill a range of needs. Provenance, a supply chain transparency start-up, recently completed a six-month pilot for tracking responsible 16 Fake Product Identification using Blockchain System Analysis sourcing of tuna in Indonesia via blockchain. Monegraph, a startup launched in 2014, uses blockchain to secure the usage and sharing rights of digital media such as video clips or brand-sponsored content and enable sharing of revenue across the media creators, publishers, and distributors. Skuchain builds blockchain-based B2B trade and supply chain finance products targeted towards the $18 trillion global trade finance market that involves numerous entities including buyers, sellers, logistics providers, banks, customs, and third parties. Blockchain driven innovations in the supply chain will have the potential to deliver tremendous business value by increasing supply chain transparency, reducing risk, and improving efficiency and overall supply chain management. Advantages ➢ It enables easy traceability of products through QR code scanning and location tracking. ➢ It enables easy registering of products into blockchain and QR code generation along with product ID. ➢ No data Immutability will take place so that it provides security to our data. It is a distributed ledger. Dept. of CSE, SJCIT 17 2021-2022 CHAPTER 5 SYSTEM DESIGN Manufacturer Module: Completion of Manufacturer Registration registration updating the Product Registration details Storing Blockchain Details Blockchain generation Scanning And Shipping to Distributer Generation of QR Code Figure 2 Manufacturer Module MM is mainly composed of two functions: (i) enrolling the manufacturer’s information in the blockchain and (ii) checking the authorship for a requesting manufacturer to enroll the product’s EPC.Alg. 1 shows the pseudo-code of enroll Manufacturer(), which enrolls the manufacturer’s information required when its product is stored in the blockchain. Since our POMS requires that only one administrator, e.g. GS1, can enroll the manufacturer’s information, this condition is checked at step 1. If it is True, then the admin enrolls the manufacturer’s information in the blockchain. MM (Manufacturers Manager) and PM (Products Manager). On the one hand, MM offers functions for managing the information of manufacturers, e.g. enrollment of a company prefix registered in GS1 and manufacturer’s address. On the other hand, PM is operated by each manufacturer and offers functions to manage the information of products, e.g. enrollment of a new product and ownership transfer.In contrast to PM, in MM we assume the existence of an administrator who manages the manufacturers’ information. To avoid impersonation, only the administrators can modify any manufacturer’s information. One of the administrative candidates is GS1, because it manages company prefix. Although this may 18 Fake Product Identification using Blockchain System Design break the assumption of fully decentralized system, it is inevitable in order to avoid impersonators, e.g. counterfeiters, from registering themselves as if they are legitimate manufacturers. Actually, it might be possible to make our MM decentralized by leveraging the notion of Namecoin . Namecoin is a decentralized domain name system and avoids “massive” registration by imposing cost for enrollment. However, if our MM might be constructed by introducing registering fee like Namecoin, there could be a chance for counterfeiters to illegally register themselves as genuine companies by paying the appropriate fees. However, it still might be possible to make MM decentralized. This is one of the open questions regarding the blockchain-based POMS. Distributer Module: Distributer Registration Completion of Storing the registration location hub Scanning Shipment Received Processing And Sending To Shipment Blockchain generation Transaction Complete Figure 3 Distributor Module In contrast to MM, the contract DM is created by each manufacturer and consists of four main functions: 1. enrollProduct() : Invoked when a manufacturer M first enrolls its own product specified by unique EPC and claims its initial ownership; 2. shipProduct() : Invoked when a current owner parts with a product and specifies the recipient; 3. receiveProduct() : Invoked by the new owner to successfully transfer its ownership when a product is successfully received; Dept. of CSE, SJCIT 19 2021-2022 Fake Product Identification using Blockchain System Design This describes the receive Product() which is for the receiver to confirm the arrival of the product. The function checks that the claimed EPC is specified by the current owner and that the status of EPC is Shipped. If this is True, the ownership is successfully transferred to the message sender’s address. In addition, the manufacturer of the product gives incentive, i.e. some ETH, to the message sender as a reward for obeying the protocol. Since Ethereum requires an execution fee for each transaction, when the current owner sends a product to the recipient, he/she might be reluctant to issue a transaction ship Product(). To avoid this kind of situation, the following procedure is introduced. If the ownership transfer has been successfully completed, a financial reward transfer Reward is paid back to the previous owner by the product’s manufacturer. The reason why the manufacturer should pay such reward is that in this way counterfeits can be detected and thus identified thanks to their cooperation. It is noted that, in order to avoid the case where two parties repeatedly transfer back and. Selecting appropriate values for transfer Reward and MAXTRANSFER will depend on the actual investment made by the manufacturer for the implementation of POMS. However, such topic is outside the scope of our current research, and thus it will not be considered further. Retailer Module: Completion of Retailer Registration registration Storing the Scanning Shipment Recieved location hub Verification Of Product New Blockchain Product Ready To Sell Figure 4 Retailer Module Dept. of CSE, SJCIT 20 2021-2022 Fake Product Identification using Blockchain System Design Retailer after the registration is done can see the product details such as the manufacturer where the manufacturer has stored after the scanning process take place in this process in back the execution take place where all the product is scanned and the stored location is sent to the verification of the product where there are many information are stored in the hub and the following new blockchain is created and the following product is ready to sell and given to the following consumers. Consumer Module: Completion of Consumer Registration registration Storing the Scanning Bought Shipment Recieved location hub Verifying The Product Figure 5 Consumer Module Consumers register itself and after the completion of registration scanning of the particular product take place respectively where all the storage of the location hub take place and the verification of the product happens as the product gets verified the product is identified in this process respectively. Dept. of CSE, SJCIT 21 2021-2022 Fake Product Identification using Blockchain System Design 5.1 System Architecture Figure 6 System Architecture Dept. of CSE, SJCIT 22 2021-2022 Fake Product Identification using Blockchain System Design 5.2 Use Case Diagram Figure 7 Use case Diagram Dept. of CSE, SJCIT 23 2021-2022 Fake Product Identification using Blockchain System Design 5.3 Data flow diagram Figure 8 Data Flow Diagram Dept. of CSE, SJCIT 24 2021-2022 Fake Product Identification using Blockchain System Design 5.4 Sequence Diagram Figure 9 Sequence Diagram A sequence diagram shows object interactions arranged in time sequence. It depicts the objects involved in the scenario and the sequence of messages exchanged between the objects needed to carry out the functionality of the scenario. Sequence diagrams are sometimes called event diagrams or event scenarios. Sequence diagram consists of 5 different blocks namely Manufacturer, Distributer, Retailer, Consumer, Verification Completes. Dept. of CSE, SJCIT 25 2021-2022 CHAPTER 6 IMPLEMENTATION Smart Contracts Smart contracts are simply programs stored on a blockchain that run when predetermined conditions are met. They typically are used to automate the execution of an agreement so that all participants can be immediately certain of the outcome, without any intermediary’s involvement or time loss. They can also automate a workflow, triggering the next action when conditions are met. Smart contracts work by following simple “if/when,then” statements that are written into code on a blockchain. A network of computers executes the actions when predetermined conditions have been met and verified. These actions could include releasing funds to the appropriate parties, registering a vehicle, sending notifications, or issuing a ticket. The blockchain is then updated when the transaction is completed. That means the transaction cannot be changed, and only parties who have been granted permission can see the results. Within a smart contract, there can be as many stipulations as needed to satisfy the participants that the task will be completed satisfactorily. To establish the terms, participants must determine how transactions and their data are represented on the blockchain, agree on the “if/when,then” rules that govern those transactions, explore all possible exceptions, and define a framework for resolving disputes. Then the smart contract can be programmed by a developer – although increasingly, organizations that use blockchain for business provide templates, web interfaces, and other online tools to simplify structuring smart contracts. Connecting Ganache, Metamask and Remix IDE. Ganache is used for setting up a personal Ethereum Blockchain to deploy contracts, develop your applications, and run tests. It gives you the ability to perform all actions you would on the main chain without the cost. It provides convenient tools such as advanced mining controls and a built-in block explorer. Basically Ganache runs local instance of Ethereum so we don’t need to struggle with Geth command line. 26 Fake Product Identification using Blockchain Implementation Remix IDE is a web browser based IDE that allows you to write smart contracts in Solidity. It also also allows you to test, debug and deploy your smart contracts.You can use Ganache to deploy your smart contract from Remix by following these steps: Open Remix IDE in browser by navigating to http://remix.ethereum.org.Create a sample smart contract in solidity.Compile the smart contract. Once it is compiled successfully go to deploy and run transactions..So select Web3 provider which prompts you whether you want to connect to Ethereum node. Clicking OK will gain prompt you to provide the Web3 provider endpoint.Open Ganache. You can see HTTP URL under RPC server. Copy it and paste it in Remix under Web3 provider endpoint. You should be able to connect to Ganache with Remix. If you have successfully connected to Ganache then you can see your 10 default Ganache accounts each with 100 ether added into your remix. Now click on deploy to deploy the contract to private Ethereum Blockchain using Ganache.Open Ganache and click on Transactions where your contract creation transaction will be present. We can check that by deploying your smart contract in Remix IDE with Ganache/Metamask. As we have already seen how to deploy smart contract using Ganache, let see how we can do with Metamask.Now your Metamask and Ganache are connected http://127.0.0.1:7545.Open Remix IDE and choose environment as Injected Web3 to deploy your environment and click on Deploy. This will prompt you with Metamask to confirm. Click confirm and your smart contract will be deployed in Ganache. Check the balances of the account in Metamask and Ganache to be same. Algorithm There are 4 modules designed inorder to complete Step 1: Signup to blockchain as manufacturer or distributor or consumer or retailer. Step 2: login to blockchain if user is manufacturer then register product and generate QR code scan the QR along with location deduct ETH for each product registration Dept. of CSE, SJCIT 27 2021-2022 Fake Product Identification using Blockchain Implementation record the transaction Step 3: if user is distributor and retailer scan the QR along with location deduct ETH from wallet for each scanning update the details in blockchain Step 4: if user is consumer Verify the received product By scanning the QR code if image is QR code and generated by blockchain than product details are shown else product details are not available Step 6: Logout of the transactions. Algorithm Written using Solidity pragma solidity ^0.6.0; contract SupplyChain { event Added(uint256 index); struct State{ string description; address person; } struct Product{ address creator; string productName; uint256 productId; Dept. of CSE, SJCIT 28 2021-2022 Fake Product Identification using Blockchain Implementation string date; uint256 totalStates; mapping (uint256 => State) positions; } mapping(uint => Product) allProducts; uint256 items=0; function concat(string memory _a, string memory _b) public returns (string memory){ bytes memory bytes_a = bytes(_a); bytes memory bytes_b = bytes(_b); string memory length_ab = new string(bytes_a.length + bytes_b.length); bytes memory bytes_c = bytes(length_ab); uint k = 0; for (uint i = 0; i < bytes_a.length; i++) bytes_c[k++] = bytes_a[i]; for (uint i = 0; i < bytes_b.length; i++) bytes_c[k++] = bytes_b[i]; return string(bytes_c); } function newItem(string memory _text, string memory _date) public returns (bool) { Product memory newItem = Product({creator: msg.sender, totalStates: 0,productName: _text, productId: items, date: _date}); allProducts[items]=newItem; items = items+1; emit Added(items-1); Dept. of CSE, SJCIT 29 2021-2022 Fake Product Identification using Blockchain Implementation return true; } function addState(uint _productId, string memory info) public returns (string memory) { require(_productId<=items); State memory newState = State({person: msg.sender, description: info}); allProducts[_productId].positions[ allProducts[_productId].totalStates ]=newState; allProducts[_productId].totalStates = allProducts[_productId].totalStates +1; return info; } function searchProduct(uint _productId) public returns (string memory) { require(_productId<=items); string memory output="Product Name: "; output=concat(output, allProducts[_productId].productName); output=concat(output, "<br>Manufacture Date: "); output=concat(output, allProducts[_productId].date); for (uint256 j=0; j<allProducts[_productId].totalStates; j++){ output=concat(output, allProducts[_productId].positions[j].description); } return output; } } Dept. of CSE, SJCIT 30 2021-2022 CHAPTER 7 TESTING 7.1Methods of Testing Software testing is an investigation conducted to provide stakeholders with information about the quality of the product or service under test. Software testing can also provide an objective,independent view of the software to allow the business to appreciate and understand the risks of software implementation. Test techniques include the process of executing a program or application with the intent of finding software bugs (errors or other defects). Software testing involves the execution of a software component or system component to evaluate one or more properties of interest. In general, these properties indicate the extent to which the component or system under test. • meets the requirements that guided its design and development, responds correctly to all kinds of inputs. • performs its functions within an acceptable time, is sufficiently usable, • can be installed and run in its intended environments, and • Achieves the general result its stakeholder’s desire. As the number of possible tests for even simple software components is practically infinite, all software testing uses some strategy to select tests that are feasible for the available time and resources. As a result, software testing typically (but not exclusively) attempts to execute a program or application with the intent of finding software bugs (errors or other defects). The job of testing is an iterative process as when one bug is fixed; it can illuminate other, deeper bugs, or can even create new ones. Software testing can provide objective, independent information about the quality of software and risk of its failure to users and/or sponsors. Software testing can be conducted as soon. 31 Fake Product Identification using Blockchain Testing Software testing can be conducted as soon as executable software (even if partially complete) exists. The overall approach to software development often determines when and how testing is conducted. For example, in a phased process, most testing occurs after system requirements have been defined and then implemented in testable programs. In contrast, under an Agile approach, requirements, programming, and testing are often done concurrently. The main aim of testing The main aim of testing is to analyze the performance and to evaluate the errors that occur when the program is executed with different input sources and running in different operating environments. The testing steps are: • Unit Testing. • Integration Testing. • Validation Testing. • User Acceptance Testing. 7.1.1 UNIT TESTING Unit testing, also known as component testing refers to tests that verify the functionality of a specific section of code, usually at the function level. In an object-oriented environment, this is usually at the class level, and the minimal unit tests include the constructors and destructors. Which helps in analyzing the Unit testing is a software development process that involves synchronized application of a broad spectrum of defect prevention and detection strategies in order to reduce software development risks, time, and costs. The following Unit Testing shows the functions that were tested at the time of programming which helps in maintaining the manufacturer, retailer, consumer, provider. 7.1.2 Integration Testing Integration testing is any type of software testing that seeks to verify the interfaces between components against a software design. Software components may be integrated in an iterative way or all together ("big bang"). Normally the former is considered a better practice since it allows interface issues to be located more quickly and fixed. Integration testing works to expose defects in the interfaces and interaction between integrated components (modules). Dept. of CSE, SJCIT 32 2021-2022 Fake Product Identification using Blockchain Testing Progressively larger groups of tested software components corresponding to elements of the architectural design are integrated and tested until the software works as a system. 7.1.3 Validation Testing At the culmination of integration testing, software is completed assembled as a package. Interfacing errors have been uncovered and corrected. Validation testing can be defined in many ways; here the testing validates the software function in a manner that is reasonably expected by the customer. In software project management, software testing, and software engineering, verification and validation (V&V) is the process of checking that a software system meets specifications and that it fulfills its intended purpose. It may also be referred to as software quality control. 7.1.4 User Acceptance Testing Performance of an acceptance test is actually the user’s show. User motivation and knowledge are critical for the successful performance of the system. The above tests were conducted on the newly designed system performed to the expectations. All the above testing strategies weredone using the following test case designs. The following are the type • Manufacturer • Distributer • Retailer • Consumer • Login Dept. of CSE, SJCIT 33 2021-2022 Fake Product Identification using Blockchain Testing 7.2Test Cases Table 1 Manufacturer test case Test Case 1 Name of Test Manufacturer Input Takes the data from the manufacturer Expected output Will generate code Actual output Result Gives the information to the following gives to distributer Successful Table 2 Distributer test case Test Case 2 Name of Test Distributer Input Takes the data from the manufacturer Expected output It will access and provide its information respectively Actual output Takes the input and provide the information to the next part Result Successful Dept. of CSE, SJCIT 34 2021-2022 Fake Product Identification using Blockchain Testing Table 3 Retailer test case Test Case 3 Name of Test Retailer Input Get the output from the distributer and gets the retailer Expected output QR code will be generated and all information will be given Actual output QR code is generated Result Successful Table 4 Consumer test case Test Case 4 Name of Test Consumer Input Get the output from the retailer and family gives Expected output QR code will be generated and all information will be given Actual output QR code is generated and the consumer will get history Result Successful Dept. of CSE, SJCIT 35 2021-2022 CHAPTER 8 PERFORMANCE ANALYSIS Performance: Several performance requirements were established, checking for inputs, outputs and working. Performance Analysis Input the product details Generate Product ID QR Code generation Success Login to the System Generate Product ID Scan the shipment Record the transaction and Generate the block Record the Transaction Success Figure 10 Block Diagram of Performance Analysis 36 And scan the shipment further Success Fake Product Identification using Blockchain Performance Analysis Environmental: No harm for environmental parameters.s Social: Feasibility for everyone in day to day life. Accuracy In general, performance data obtained using sampling techniques are less accurate than data obtained by using counters or timers. In the case of timers, the accuracy of the clock must be taken into account. Simplicity. User friendly. Flexibility: A flexible can be extended easily to collect additional performance data or to provide different views of the same data. Flexibility and simplicity are often opposing requirements. Feasibility Study The key goal of the feasibility study is to discuss the technological, organizational and economic feasibility of the application being built. Feasibility is the assessment of whether it is worth undertaking a project or not. Technical Feasibility It is a measure of the particular technological approach and of the availability of knowledge and technical services. It is one of the first studies that must be performed after the selection of a project. Operational Feasibility Operational viability is primarily concerned with concerns such as if the device will be used if it is created and implemented and if user reluctance will impact the future advantages of the technology. It is the ability to utilize, assist and execute a system or program's required tasks. Result Analysis This proposed gives a better edge with least gas cost for each transaction, the QR code is generated and through the each scan certain amount of gas is deducted. It is user friendly where the products QR code can be directly scanned through inbuilt Scanner. The ETH that is used for each transaction is very minimal in this web application. The location updating while scanning enables easy tracking of product for other peers in the blockchain. Dept. of CSE, SJCIT 37 2021-2022 Fake Product Identification using Blockchain Performance Analysis Used mode for tracking Gas cost efficient SHA with QR code 0.01595334 ETH Comparatively less compared to RFID SHA with RFID 0.14327623 ETH This takes more transaction time. Table 5 comparison between QR code and RFID Gas cost QR code RFID Figure 11 Graph for ETH consumption in RFID and QR code Dept. of CSE, SJCIT 38 2021-2022 CHAPTER 9 CONCLUSION & FUTURE ENHANCEMENT This system is the first blockchain system to propose a fully functional anticounterfeiting system. By paying a very low transaction fee, users of our system no longer have to worry about the possibility of purchasing a counterfeit product. Manufacturers can use the system to store relevant information about product sales in blockchain for everyone to see. The total amount of sales that can be sold by the seller and the number of products that the seller currently has left are transparent. The user can use the functions provided by our system to carry out manufacturer verification immediately. The system provides identity verification using digital signatures. There are no other means of decrypting the key owner's private key unless the key owner accidentally loses their key.In our system analysis result, the cost of the initial product record contract is only $1.2893394289 US, and the cost of each product sales process is $0.17415436749 US. Both costs are much lower than working with reliable large chain stores and well-established direct selling stores. Our system can effectively lower the anti-counterfeiting threshold of branded goods and provide companies with limited financial resources with an easier approach to reassure consumers that they will not buy counterfeit goods. Blockchain technology is still in its general early stages in terms of usage, therefore more research is required. Future work on this framework may be proof of the simplicity of the code. The customer can believe that the proper applications and due to the simplicity of the code, without excessive code, will have additional use. With the experience gained in this project, it is clear that when assigning a chain of blocks that is counterfeit-resistant and traceable, then platform improvement is warranted by a move toward genuine product warranties. This would improve the customer experience by making the entire supply chain framework more open and transparent. In addition, it is hoped that a buyers' intellectual framework can be built on cross-line product tracing, providing more accurate and far-reaching product and seller tracing information to administrative authorities around the world. Obtaining data of such quality will be conceivable with estimates of coordinated efforts, for example, administrative support, framework creation, and data sharing. 39 BIBLIOGRAPHY [1] Muhammad Nasir Mumtaz Bhutta, Amir A. Khwaja, Adnan Nadeem, Hafiz Farooq Ahmad , Muhammad Khurram Khan, Moataz A. Hanif, Houbing Song, Majed Alshamari , and Yue Cao , “A Survey on Blockchain Technology: Evolution, Architecture and Security”, IEEE special section on intelligent big data analytics for internet of things, services and people,2021, pp. 61048 – 61073. [2] Rishabh Sushil Bhatnagar, Sneha Manoj Jha , Shrey Surendra Singh, Rajkumar Shende “Product Traceability using Blockchain”, 2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN). [3] Si Chen , Rui Shi , Zhuangyu Ren , Jiaqi Yan , Yani shi , Jinyu Zhang,“ A Blockchainbased Supply Chain Quality Management Framework”, 2017 IEEE 14th International Conference on e-Business Engineering (ICEBE). [4] M.C.Jayaprasanna, .V.A.Soundharya , M.Suhana, S.Sujatha,” A Block Chain based Management System for Detecting Counterfeit Product in Supply Chain” ,IEEE 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV). [5] Jinhua Ma , Shih-Ya Lin , Xin Chen , Hung-Min Sun,A Blockchain-Based Application System for Product Anti-Counterfeiting” International Journal Of Scientific & Technology Research Volume 8, Issue 12, December 2019 issn 2277-8616. [6] B. M. A. L. Basnayake, C. Rajapakse,” A Blockchain-based decentralized system to ensure the transparency of organic food supply chain” ,IEEE 2019 International Research Conference on Smart Computing and Systems Engineering (SCSE) [7] Atima Tharatipyakul and Suporn Pongnumkul, “User Interface of Blockchain-Based Agri-Food Traceability Applications”, IEEE vol 9, 2019,pp.82909-82929. 40 APPENDIX Appendix A: Screenshots Figure A1 User details storing Figure A2 Remix IDE Initializing 41 Fake Product Identification using Blockchain Appendix Figure A3 Solidity Compilation Figure A4 Metamask pops up after deployment. Dept. of CSE, SJCIT 42 2021-2022 Fake Product Identification using Blockchain Appendix Figure A5 Gas Estimation for Transaction Figure A6 Ganache Blockchain Dept. of CSE, SJCIT 43 2021-2022 Fake Product Identification using Blockchain Appendix Figure A7 Blocks Generated Figure A8 Transactions Recorded Dept. of CSE, SJCIT 44 2021-2022 Fake Product Identification using Blockchain Appendix Figure A9 Login Page Figure A10 Signup Page Dept. of CSE, SJCIT 45 2021-2022 Fake Product Identification using Blockchain Appendix Figure A11 QR Code Generation Figure A12 QR code scan and product track display Dept. of CSE, SJCIT 46 2021-2022 Fake Product Identification using Blockchain Appendix Figure A13 Scanning Shipment Figure A16 Invalid Image Upload For Scanner Dept. of CSE, SJCIT 47 2021-2022 Fake Product Identification using Blockchain Appendix Appendix B ETH- Ethereum Token SC- Smart Contract PoW- Proof of Work PoA-Proof of Authority SHA- Secure Hashing Algorithm P2P- Peer to Peer API-Application Programming Interface DAPP- Decentralized Application Tx- Transactions NONCE- Number Used Only once DLT- Distributed Ledger Technology DEX- Decentralized Exchange Dept. of CSE, SJCIT 48 2021-2022 PAPER PUBLICATION DETAILS Paper Name: Product Anticounterfeiting in Supply Chain using Blockchain Technology. Journal: International Research Journal of Engineering and Technology (IRJET). Volume: 09 Issue: 03 Published on: 23 March, 2022. 49 Fake Product Identification using Blockchain Dept. of CSE, SJCIT Paper Publication Details 50 2021-2022 Fake Product Identification using Blockchain Dept. of CSE, SJCIT Paper Publication Details 51 2021-2022 Fake Product Identification using Blockchain Paper Publication Details Paper Name: Blockchain Platform for Product Anticounterfeiting in Supply Chain. Journal: International Journal of Engineering Science and Invention (IJESI). Volume: 11 Issue: 06 Published on: 27 June,2022 Dept. of CSE, SJCIT 52 2021-2022 Fake Product Identification using Blockchain Dept. of CSE, SJCIT Paper Publication Details 53 2021-2022 Fake Product Identification using Blockchain Dept. of CSE, SJCIT Paper Publication Details 54 2021-2022 Fake Product Identification using Blockchain Dept. of CSE, SJCIT Paper Publication Details 55 2021-2022 INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 09 ISSUE: 03 | MAR 2022 P-ISSN: 2395-0072 WWW.IRJET.NET Product Anticounterfeiting in Supply Chain Using Blockchain Technology Dr.Seshaiah Merikapudi1 Assistant Professor Department of Computer Science and Engineering S J C Institute of Technology Chickaballapur Mushaffiq Ahmed Mujale4 Department of Computer Science and Engineering S J C Institue of Technology Chickaballapura Pavan Kalyan Y2 Department of Computer Science and Engineering S J C Institute of Technology Chickaballapur Harshitha G L3 Department of Computer Science and Engineering S J C Institute of Technology Chickballapur Lavanya V S5 Department of Computer Science and Engineering S J C Institute of Technology Chickaballapura ----------------------------------------------------------------------***-----------------------------------------------------------------------Abstract— Blockchain innovations have noninheritable interest within the course of the foremost recent years. one in every of the foremost talked regarding problems is currency exchange, however its application isn't restricted solely to Digital currency. thus it's the potential to influence totally different business sectors. Blockchain technology has brought bigger transparency and ease in massive transactions. we are able to sight counterfeit merchandise mistreatment blockchain technology. The question that arises once shopping for any item in today's world is whether or not it's faux or not. and therefore the lack of those things has been shown an enormous impact on economic progress. Therefore, so as to curb all counterfeit merchandise, it's vital to bring transparency regarding the products to the notice of the customers. The growing presence of counterfeit and unsafe product within the world could be a cause for concern and blockchain technology has taken following step towards its complete annihilation. Not solely the utilization of technology can scale back the assembly of counterfeit merchandise, however everybody must bear in mind of this. By manufacturing and packaging the correct things every of these things must tend a digital code with its own identity. The package implementation method in which the product code is scanned mistreatment this application then verify if the given product is counterfeit or not. Keywords— Blockchain, Hashing, Anticounterfeiting, Transparency. © 2022, IRJET | QR I. INTRODUCTION Blockchain is a methodology to store cryptographically associated records across parties in a common association to hinder modifying of records. The blockchain was devised to work with bitcoin trades. A "block" includes a lot of confirmed trades or records, a timestamp, and a hash code. The hash still up in the air from the substance in the square and the previous square (i.e., "chain"). Business runs on information. The faster it's gotten and the more exact it is, the better. For is extraordinary for conveying that information since it gives speedy, shared and absolutely clear information set away on an unchanging record that can be gotten to just by permissioned network people. A blockchain association can follow orders, portions, records, creation and extensively more. Besides in light of the fact that people share a singular viewpoint on the real world, you can see all nuances of a trade beginning to end, giving you more noticeable sureness, as well as new efficiencies and expected entryways. Blockchain can engage more direct and correct beginning to end continuing in the store organization: Organizations can digitize genuine assets and make a decentralized super durable record, taking everything into account, making it possible to follow assets from creation to movement or use by end client. This extended store network straightforwardness gives more noteworthy detectable quality to the two associations and clients. codes, Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1045 INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 09 ISSUE: 03 | MAR 2022 P-ISSN: 2395-0072 WWW.IRJET.NET Today, in this state of the art time frame, our life is stacked with advancement. It is no huge amazement that online shopping is creating by hop and cutoff points as a general rule. While there may be a couple of negatives of advancement, one reality stays in salvageable shape that development has improved on our life. A few decades back, who can imagine how one can buy anything, while without going out. Who may have accepted that sending gifts to a relative or buddy at a far distance would be so profitable, just by clicking a button. Nevertheless, notwithstanding the extraordinary improvement of online shopping recently, world’s electronic business industry is at this point in its beginning phase. Web shopping addresses shy of what one percent of the hard and fast shopping in the country, but has a huge load of potential to shoot up. Finally, blockchain can streamline definitive cycles and decrease costs by enabling a feasible survey of store network data. Processes including manual checks for consistency or acknowledge purposes that may at this point require weeks can be accelerated through a scattered record of every appropriate datum. Blockchain can drive extended store network straightforwardness to help with diminishing blackmail for high worth product like gems and medication drugs. Blockchain could help associations with perceiving how trimmings and finished product are gone through each subcontractor and decrease benefit adversities from phony and dull market trading, as well as addition trust in endmarket clients by lessening or discarding the impact of phony things. Figure 2 Structure of Block in Blockchain Blockchain has a typical structure where the block numbering starts from block one, and every block has it is own unique has values and these hash values are generated using an SHA-256 algorithm. The SHA-256 algorithm is the most generally used algorithm in blockchain for hashing and it contains a head node where the address of the next node is stored and the Transaction counter stores all the transactions that have happened. The nonce is also a part of block where it is widely known as “Number used only once” it is a random number that usually varies for each transaction moreover it provides security where one cannot modify the transaction once the data is entered inti blockchain. SHA-256 Algorithm Secure Hashing Algorithm (SHA) - 256 is the hash capacity and mining calculation of the Bitcoin convention, alluding to the cryptographic hash work that yields a 256 pieces in length esteem. It directs the creation and the executives of addresses, and is likewise utilized for exchange check. Bitcoin utilizes twofold SHA-256, implying that it applies the hash capacities two times. Figure 1 Characteristics of Blockchain Basically, blockchain possesses a certain characteristics that provides a huge and wide variety of applications in order to develop and design a useful products in the society. The calculation is a variation of the SHA-2 (Secure Hash Algorithm 2), created by the National Security Agency (NSA). SHA-256 is likewise utilized in well known encryption conventions, for example, SSL,TLS, SSH and open source working frameworks like Unix/Linux. Additionally, associations can stay aware of more control over re-appropriated understanding delivering. Blockchain gives all parties inside a singular creation network permission to comparable information, possibly diminishing correspondence or moving data botches. Less time can be spent endorsing data and more can be spent on conveying work and items either dealing with quality, decreasing expense, or both. © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1046 INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 09 ISSUE: 03 | MAR 2022 P-ISSN: 2395-0072 WWW.IRJET.NET Many factors affect a student’s academic performance. Student achievement depends on teachers, education programs, learning environment, study hours, academic infrastructure, institutional climate, and financial issues [1,2]. Another extremely important factor is the learner’s behavior. H.K. Ning and K. Downing believe that major constructs of study behavior, including study skills, study attitude, and motivation, to have strong interaction with students’ learning results. Students’ perceptions of the teaching and learning environments influence their study behavior. This means if teachers can grasp the bad attitudes of students, they can make more reasonable adjustments to change the learning environment for the students. To conclude whether good or bad behavior for a particular student is not an easy problem to solve, it must be identified by the teacher who has worked directly in the real environment. The teacher can track student behavior by observing and questioning them in the classroom. This process is not difficult in a classroom that has few students, but it is a big challenge for a classroom with a large number of students. It is valuable to develop an effective tool that can help teachers and other roles to collect data of student behavior accurately without spending too much human effort, which could assist them in developing strategies to support the learners to performances could be increased. [2] Figure 3 Usage of SHA-256 Algorithm in Blockchain The hash calculation is very secure and its functions aren't known in the public area. It's utilized by the United States government to safeguard touchy data, because of its capacity to confirm a substance of information without uncovering it because of the utilization of computerized marks. Moreover, it is likewise used for secret phrase check, since it helpfully doesn't need the capacity of precise passwords, as the hash values can be put away and coordinated with the client section to confirm on the off chance that it's right or not. As a matter of fact, it is almost difficult to uncover the underlying information from a hash esteem itself. In addition, a savage power assault is incredibly improbable to succeed on account of the galactic number of possible blends. Furthermore, it's additionally seriously impossible that two information values (known as impact) have a similar hash. In the have analyzed with respect to counterfeit things are filling significantly in the online market. The square market is the biggest test in-store organization. The government has introduced a couple of guidelines and rules against fake things regardless of the way that the government can't deal with counterfeit things. Consequently, a system needs to be designed for recognizing counterfeit things and giving security techniques to alert both maker and purchaser underway organization. Creators may use the square chain the leader's system to store critical thing bargains information inside the square chain, which is accessible to all. The total number of arrangements the dealer can sell and the rest left behind by the seller are clear. The client can perform a vendor-side check using an encryption computation. In this paper, we proposed blockchain the chiefs system institutes the client and undertaking merchant to follow and perceive the real thing using a PDA. It will recognize counterfeit things as well as the authenticity of the producer for both end client and adventure vendor. [3] II. LITERATURE SURVEY Barcodes were broadly utilized for computerized item distinguishing proof purposes for a wide scope of ongoing applications. Holograms are utilized to battle fakes and lessen phony. Joining the possibility of standardized tags into Holograms offers two Protections against counterfeiting. In a paper, the creator presented recognizable proof by utilizing strategic standardized tags that increment the wellbeing and dependability of the item. Client characterized item recognizable proof code that is remarkable and conveyed to each is changed over to Product Quick Response (QR) code. QR-produced code is then changed over into a multidimensional image to give higher security to the item. The creator has centered on holographic scanner tags utilizing PC-produced Holograms are carried out utilizing Matlab. The Barcode interpreting gives the reproduced from the visualization the item ID number relegated to the item. At last, it provides an idea about will assist with expanding security and credibility in item recognizable proof and to forestall duplicating of items. Notwithstanding, the creator has thought about just the PC-created standardized tag utilizing Matlab and has not thought of imitation of QR code. [1] © 2022, IRJET | Impact Factor value: 7.529 In further reviews, the author proposes an RFID procedure for perceiving counterfeit things and ensuring thing authenticity. The author has proposed an RFID system containing two parts; there are mark approval show and informational collection modification show. The mark check show to confirm names without revealing their critical information and its licenses the client to scrutinize the tag openly. The RFID mark information use to prevent the spread of phony things. Meanwhile, the informational index correction show ensures the rightness of the mark | ISO 9001:2008 Certified Journal | Page 1047 INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 09 ISSUE: 03 | MAR 2022 P-ISSN: 2395-0072 WWW.IRJET.NET status. Finally, the phony structure is outstandingly safeguarded against phony and the name affirmation show is satisfactory to do it in RFID-based applications. The maker has focused the RFID name development simply applies to expensive things yet doesn't sensible for sensible things [4] identification, the end-consumers take photos of an item packaging, which contains product text information, logos, and perhaps accreditation marks/logos. These photos will be sent in a solicitation to the worker for processing and confirmation. Afterward, the detection result will be returned to the end-consumer to make a further decision. In the case of fake product detection, the end-consumer has the ability to report this counterfeit product to the government system, such as the Safety Gate - EU's Rapid Alert System[8] Author of paper [5] paper disusses how the traditional cloud storage model runs in a centralized manner, so single point of failure might lead to the collapses of system. Th system is a combination of the decentralized storage system, IPFS, the Ethereum blockchain and the attributebased encryption technology. Based on the Ethereum blockchain, the decentralized system has keyword search function on the cipher text solving the problem in traditional storage systems where cloud server returns wrong results. Holograms have been utilized to fight against fakes and to diminish forgery. Incorporating the possibility of standardized identifications into holograms give two level protection from forging. This framework acquaints a technique with increased security and genuineness in item distinguishing proof by utilizing holographic standardized identifications. The unique and client characterized item distinguishing proof code accommodated every item is changed over into Quick Response (QR) Code. The QR Code created is then changed over into a 3D image, hence giving a prominent security to the item. In this framework, Holographic standardized tags utilizing Computer created visualizations are actualized utilizing MATLAB. The decoding of the barcode recreated from the holograms gives the corresponding product recognizable proof number assigned for the product.[9] In this paper the author proposes a system that provides a solution to the originality and authenticity of published and posted online digital content like music, books, etc. The system utilizes emerging technologies that primarily include blockchain and (interplanetary file system) IPFS. The solution is focused on the authenticity of online books, but the solution in terms of architecture, design, logic, smart contract code is generic enough to be easily extended and is used to provide the originality, authenticity, and integrity to all the other forms of digital assets. The author considered two scenarios based on the approval results provided by the author for every publication requesting an attestation or validation before uploading the content.[6] III. PROPOSED METHODS FOR PRODUCT COUNTERFEITING USING BLOCKCHAIN The main aim of this paper We propose an associate degree inimitable and complete product anticounterfeiting system, that relies on Blockchain. In our theme, makers will use this method to store relevant info on product sales in Blockchain that is accessible to anyone. the whole quantity of sales that may be oversubscribed by the vendor and therefore the variety of merchandise presently left by the vendor square measure clear to users. The user will use the functions provided by our system to immediately perform vendor-side verification, and this verification cannot be created In further surveys we studied that, we propose a blockchain-based framework. This framework will provide a theoretical basis for intelligent quality management of the supply chain based on blockchain technology. Furthermore, it provides a foundation to develop theories about information resource management in distributed, virtual organizations. A fake commercial center can influence the improvement of a country. Fake items are fakes or unapproved copies of the genuine item. Fake items are regularly created with the expectation to exploit the prevalent estimation of the imitated item. Pretty much every organization faces a fake danger since it's influencing an organization's income as well as harms the brand's standing. While technology offers several solutions to authenticate the original product, some technological tools, particularly artificial intelligence help create clones, blockchain technology creates chaining and tracing. What is required is consistent up-gradation and development to remain in front of the forgers. Therefore, it is important that we have regulations for the marketplace.[7] This system proposes a solution that relies on machine learning-based technology which enables end-consumers to identify and verify products without any special equipment. By using image and text recognition. For © 2022, IRJET | Impact Factor value: 7.529 ANTI- Fig 1: Product Anticounterfeiting Block Diagram | ISO 9001:2008 Certified Journal | Page 1048 INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 09 ISSUE: 03 | MAR 2022 P-ISSN: 2395-0072 WWW.IRJET.NET In the above diagram, we show the details of the design of our system, including a full description of the user interface of the system. Our goal is to use the Blockchain features to provide a more complete, convenient, and lowcost product anti-counterfeiting solution for manufacturing, sellers, and consumers. Step-3: User Can Verify The Product In this stage clients will be given an android application and buyers can scan QR code allocated to the item utilizing android application. The Scanner scans the product and decrypts the encrypted text in a given algorithm and gets the detail about the product that is the manufacturer and current owner of the product and can conclude if to purchase the item or not. There is no correct resolution before effort his drawback. As barcodes are derived simply there is no guaranteed system after either, nor an honest resolution to differentiate the faux product from original products. Blockchain technology is one of the promising technologies that is rising in recent years that may be useful to tackle such a tangle. Blockchain Technology is accustomed to monitoring and regulating the merchandise provide chain within the market thus users will solely get the original product. The project’s main goal is to deliver folks original products and facilitate people to spot whether or not the product they are shopping for is ingenious or faux simply. The system example is a distributed application (Dapp) with a supporting blockchain network. The network is developed on hyper-ledger cloth that is AN open supply Blockchain development tool and uses DPos/PBFT agreement rule by default. IV. CONCLUSION This paper is the main Blockchain framework that proposes a completely functional fake item forgery framework. Without paying any transaction charge, clients of our framework at this point should not be worried about the chance of obtaining a counterfeit item. Accordingly, the proposed framework is valuable for end clients to identify counterfeit items in the inventory network. End client can check QR code allotted to an item and can get all the data like exchange history, current proprietor dependent on which end client can check if the item is counterfeited or not. V. REFERENCES Execution Stages: [1] Muhammad Nasir Mumtaz Bhutta, Amir A. Khwaja, Adnan Nadeem, Hafiz Farooq Ahmad , Muhammad Khurram Khan, Moataz A. Hanif, Houbing Song, Majed Alshamari , and Yue Cao , “A Survey on Blockchain Technology: Evolution, Architecture and Security”, IEEE special section on intelligent big data analytics for internet of things, services and people,2021, pp. 61048 – 61073. Step-1: Product Enrolling in Blockchain Network The first step is to bring all manufacture into the blockchain community and acquire their huge product database. The manufacture authentication is carried out via registration and giving them a proper identification and password. producer might be the number one owner of the item. producer will request the administrator to add a product on the network on the time QR code will get assigned to that product. Administrator will join the product and manufacturer on the network if the requestor is a authentic manufacturer. After the product is recorded in a community it will create a smart agreement and a unique QR code of the product wherein the info of the product is cited in an encrypted text form. To at ease the QR code from copying there's a duplicate touchy virtual photo in QR code. [2] Rishabh Sushil Bhatnagar, Sneha Manoj Jha , Shrey Surendra Singh, Rajkumar Shende “Product Traceability using Blockchain”, 2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN). [3] Si Chen , Rui Shi , Zhuangyu Ren , Jiaqi Yan , Yani shi , Jinyu Zhang,“ A Blockchain-based Supply Chain Quality Management Framework”, 2017 IEEE 14th International Conference on e-Business Engineering (ICEBE) [4] M.C.Jayaprasanna, .V.A.Soundharya , M.Suhana, S.Sujatha,” A Block Chain based Management System for Detecting Counterfeit Product in Supply Chain” ,IEEE 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV) Step-2: Retailer Acknowledgement In the next step the manufacturer will send the merchandise to the distributor and standing is regarding as shipped. It’ll not amendment the possession of the merchandise till missive of invitation from each parties is approved to shop for and sell the merchandise. As presently as each parties approve reciprocally, its possession within the blockchain network are going to be transferred within the variety of good contract mechanically once the payment is eminent. © 2022, IRJET | Impact Factor value: 7.529 [5] Jinhua Ma , Shih-Ya Lin , Xin Chen , Hung-Min Sun,A Blockchain-Based Application System for Product AntiCounterfeiting” International Journal Of Scientific & Technology Research Volume 8, Issue 12, December 2019 issn 2277-8616. | ISO 9001:2008 Certified Journal | Page 1049 INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 09 ISSUE: 03 | MAR 2022 P-ISSN: 2395-0072 WWW.IRJET.NET [6] B. M. A. L. Basnayake, C. Rajapakse,” A Blockchainbased decentralized system to ensure the transparency of organic food supply chain” ,IEEE 2019 International Research Conference on Smart Computing and Systems Engineering (SCSE) [7] Atima Tharatipyakul and Suporn Pongnumkul, “User Interface of Blockchain-Based Agri-Food Traceability Applications”, IEEE vol 9, 2019,pp.82909-82929. [8] Shuai Wang , Liwei Ouyang , Yong Yuan, Xiaochun Ni, Xuan Han and Fei-Yue Wang,“Blockchain-Enabled Smart Contracts: Architecture, Applications, and Future Trends”, IEEE Transactions on Systems, Man, and Cybernetics: Systems ,2019, pp.2266-2277 [9] Shuai Wang , Liwei Ouyang , Yong Yuan, Xiaochun Ni , Xuan Han and Fei-Yue Wang,“Blockchain-Enabled Smart Contracts: Architecture, Applications, and Future Trends”, IEEE Transactions on Systems, Man, and Cybernetics: Systems ,2019, pp.2266-2277 [10] Laura Ricci, Damiano Di Francesco Maesa, Alfredo Favenza and Enrico Ferro, “Blockchains for COVID-19 Contact Tracing and Vaccine Support: A Systematic Review”, IEEE 2021, pp.37936 - 37950. [11]Online: https://coinmarketcap.com/alexandria/glossary/sha-256 [12]Online:https://www.geeksforgeeks.org/blockchaintechnology-introduction/ © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1050 International Journal of Engineering Science Invention (IJESI) ISSN (Online): 2319-6734, ISSN (Print): 2319-6726 www.ijesi.org ||Volume 11 Issue 6 Series I || June 2022 || PP 50-56 Blockchain Platform For Product Anticounterfeiting In Supply Chain Dr.Vikas Reddy Associate Professor Department of Computer Science and Engineering S J C Institute of Technology Chickaballapur Pavan Kalyan Y Department of Computer Science and Engineering S J C Institute of Technology Chickaballapur Dr.Seshaiah Merikapudi Asscoiate Professor Department of Computer Science and Engineering S J C Institute of Technology Chickaballapur Harshitha G L Department of Computer Science and Engineering S J C Institute of Technology Chickballapur Mushaffiq Ahmed Mujale Department of Computer Science and Engineering S J C Institue of Technology Chickaballapura Abstract— In current years, blockchain has obtained increasing interest and numerous packages have emerged from this technology. A renowned blockchain software is the cryptocurrency bitcoin, that has Not simplest been effectively fixing the double-spending problem however also it could verify the legitimacy of transactional facts without counting on a centralized system to achieve this. Therefore, any application the use of blockchain technology because the base structure guarantees that the contents of its statistics are tamperevidence. This Paper uses the decentralized blockchain technology technique to make sure that customers do no longer completely rely upon the traders to determine if products are genuine. We describe a decentralized blockchain machine with products anti-counterfeiting, in that way producers can use this device to provide real merchandise without having to control direct-operated stores, that may substantially reduce the value of product high-quality guarantee. Keywords— Blockchain, Hashing, QR codes, Anticounterfeiting, Transparency. -------------------------------------------------------------------------------------------------------------------------------------Date of Submission: 13-06-2022 Date of Acceptance: 27-06-2022 --------------------------------------------------------------------------------------------------------------------------------------I. INTRODUCTION Identification of counterfeit merchandise in cutting-edge market is being a exceptional assignment for customers and it is very life threatening for the customers while this takes vicinity in pharmaceutical fields. Other fields like electronics, clothing, fashion-accessories additionally face a large effect on their emblem because of counterfeit products. E-commerce has visible exceptional boom through the years from $39 billion in 2017 and it is projected to upward push to $200 billion via 2026. This comes within the wake of extending penetration of the net and cell phones. After numerous market surveys it is observed that the counterfeit merchandise are growing rapidly and the rise of counterfeit products can badly affect the improvement and economic boom. Additionally because of this the many top companies have become bad comments and dropping their positions from the logo list. Counterfeit merchandise are twins of the real merchandise in the marketplace. Often all reputed businesses are operating to forestall this system that is dangerous to all people in the entire international. The various branded or reputed groups are running on contemporary technology to DOI: 10.35629/6734-1106015056 www.ijesi.org 50 | Page Blockchain Platform For Product Anticounterfeiting In Supply Chain identify the counterfeited products from the original product inside the market and to enhance this operating, the it area can give them fine signals and can assist to prevent counterfeit items. Among those numerous technologies available inside the it area blockchain is one of the promising Technologies which may be used for decreasing the counterfeiting of goods. A blockchain is a kind of dispensed ledger that is designed to prevent tampering. Primarily based on the allotted consensus Set of rules, clever contracts and encrypted algorithms. Blockchain generation facilitates to clear up the Problem of counterfeiting of a product. And on this studies paper we proposed a product surveillance blockchain device with the intention to share statistics about merchandise from the manufacturer to the clients. We are growing such an application that will work on smart phones so one can Be giving all of the designated data about the products to the client who orders that product and help them to identify if the product is authenticated or counterfeited. Background: A.BLOCKCHAIN OVERVIEW: Blockchain is a decentralized gadget. It refers back to the collective renovation of a technical solution that maintains a Continuous document document as a dependable database thru decentralization. It become to start with used drastically on bitcoin the block era method of blockchain is to gather and verify the records and then generate a brand new block via. We first describe the blockchain consensus mechanism the use of bitcoin as an example, its blockchain consensus mechanism is a proof of work algorithm (poor or worse). Every node competes based on their respective computing energy to remedy a SHA256 math problem this is complex to solve but easy to verify. The first node that solves this hassle will get the new block accounting right. Blockchain facts is stored on every node, then the nodes exchange data with each different over the community. Every node maintains a whole blockchain records. The node will verify the received transactions and encompass them in the new block based on its own blockchain information, and try to achieve the accounting rights of the brand new block within the above manner. Figure 1. Connections Between Blocks In Blockchain B. BLOCKCHAIN FEATURES: In these day’s social machine, a large a part of the economic conduct of individuals relies upon on believe wherein frequently facets interact with a third birthday celebration, as a consequence forming a trust relationship. Generally, there is a mutual non-consider between those two parties which have lengthy been primarily based on believe ensures supplied with the aid of 1/3 events, consequently it is critical to take observe of the characteristics of blockchain technology that assist subvert the inspiration of human transactions that have been performed for thousands of years. The use of blockchain you'll create a information report device that does not rely on a trusted third party as a transaction middleman, and that is overtly shared and reliable at the identical time. The traits of blockchain technology are defined in detail beneath. There are few basic properties of blockchain 1. Decentralization: Inside the conventional centralized machine, a trusted authority is required to validate each taking place transaction within the network. But, the decentralized surroundings do not support any governing authority or single entity to manipulate the entire network. All of the nodes in the network collectively control the community, i.e., decentralized governance. The transaction in blockchain can consequently be finished among 2 friends (p2p) without the approval of a valuable enterprise. 2. Security and Privacy: SHA– 256 cryptography set of rules is used for hashing. Further fixed-duration has output DOI: 10.35629/6734-1106015056 www.ijesi.org 51 | Page Blockchain Platform For Product Anticounterfeiting In Supply Chain value is generated regardless of the input facts length. This makes it hard to hack. Additionally, the components that go into block generation increase the difficulty degree for hacking. Immutability is every other factor including securing information. Thus the systemic thing of BCT inherently affords security. 3. Untraceability: After a block has been determined in the Blockchain, it cannot be tampered with. Due to the following circumstances, once a block in the Blockchain is altered, it will be immediately detected and rejected by other nodes. 4. Transparency: The shape of peer to peer community allows equality among the nodes. Even supposing the shape will become slightly altered, the members can inspect the kingdom of any transaction, while it's far in the system. Therefore a consensus is given by using anode with full focus. Similarly, the peers have replicated shared ledgers. Consequently, any interest or transaction in a blockchain is facilitated with full transparency. 5. Flexibility: The technology of blockchain is open supply and all of us can use it to regulate it into our very own version. There are already several flexible blockchain platforms available, and users can also redevelop a new blockchain platform if they desire to. Blockchain is a limitless generation which means that customers can create more than one application based totally on a blockchain. Fig ur e2. Characteristics of Blockchain. SHA-256 Algorithm Secure Hashing Algorithm (SHA) - 256 is the hash capacity and mining calculation of the Bitcoin convention, alluding to the cryptographic hash work that yields a 256 pieces in length esteem. It directs the creation and the executives of addresses, and is likewise utilized for exchange check. Bitcoin utilizes twofold SHA-256, implying that it applies the hash capacities two times. The calculation is a variation of the SHA-2 (Secure Hash Algorithm 2), created by the National Security Agency (NSA). SHA-256 is likewise utilized in well known encryption conventions, for example, SSL,TLS, SSH and open source working frameworks like Unix/Linux. Figure 3 Usage of SHA-256 Algorithm in Blockchain The hash calculation is very secure and its functions aren't known in the public area. It's utilized by the United States government to safeguard touchy data, because of its capacity to confirm a substance of information without uncovering it because of the utilization of computerized marks. Moreover, it is likewise DOI: 10.35629/6734-1106015056 www.ijesi.org 52 | Page Blockchain Platform For Product Anticounterfeiting In Supply Chain used for secret phrase check, since it helpfully doesn't need the capacity of precise passwords, as the hash values can be put away and coordinated with the client section to confirm on the off chance that it's right or not. As a matter of fact, it is almost difficult to uncover the underlying information from a hash esteem itself. In addition, a savage power assault is incredibly improbable to succeed on account of the galactic number of possible blends. Furthermore, it's additionally seriously impossible that two information values (known as impact) have a similar hash. II. LITERATURE SURVEY A faux business middle can affect the improvement of a country. Fake items are fake or unapproved copies of the real object. Fake objects are frequently created with the expectancy to make the most frequent estimation of the imitated item. Quite plenty every agency faces a fake chance when you consider that it is influencing a corporation's earnings in addition to harming the logo's status. Whilst the era gives numerous answers to authenticate the original product, a few technological types of equipment, particularly artificial intelligence help create clones, and blockchain generation creates chaining and tracing. What is required is regular up-gradation and improvement to remain in the front of the forgers. Therefore, we must have guidelines for the market. Existing system: 1. RFID Based Anti-Counterfeiting System: The paper entitled 'a contrast survey to observe on RFID primarily based anti-counterfeiting structures' describes radio frequency identification tag anti-forging as an implemented association that has gotten consideration within the last few years. This system represents an overview concentrating on the exploration subject as opposed to duplicating gadgets using radio frequency identification tags on the product. Radio frequency identification (RFID) and remote sensor networks (WSN) are substantial far-off advances that have a wide assortment of utilization and provide infinite future possibilities, even as RFID tags are like an actuator that requires a control sign and a wellspring of electricity. RFID perceives regions and recognizable evidence of classified matters — yet in place of perusing laser mild reflections from published standardized tag names, it makes use of low-electricity radio frequencies to collect and store statistics. In a stockroom or distribution center, this gadget is utilized to automate facts assortment. The transceiver scans radio frequencies and sends them to an RFID tag. The distinguishing statistics are then communicated from a little microchip inserted in the tag and communicated to the RFID reader. [1] 2. Fake Product Detection Using AI-Based Technology: This system proposes an answer that is predicated on device learning-based totally technology which allows stop-consumers to discover and verify products with no special device. Through the usage of the picture and textual content popularity. For identification, the give up-clients take pictures of an object packaging, which incorporates product text facts, emblems, and possibly accreditation marks/emblems. These pics might be sent in a solicitation to the worker for processing and confirmation. In a while, the detection result can be lowered back to the cease-consumer to make a further decision. Inside the case of faux product detection, the quit-purchaser can record this counterfeit product to the authorities machine, along with the protection gate - European's fast alert gadget [2]. 3. Security with holographic bar code using computer-generated holograms: Holograms had been utilized to fight against fakes and to diminish forgery. Incorporating the possibility of standardized identifications into holograms supplies two-degree safety from forging. This framework acquaints a method with multiplied safety and genuineness in object distinguishing evidence employing using holographic standardized identifications. The particular and patron characterized object distinguishing evidence code accommodated every object is modified over into a brief reaction (QR) code. The QR code created is then modified over right into a 3D photo, as a result giving outstanding security to the item. In this framework, holographic standardized tags using laptop-created visualizations are actualized by making use of MatLab. The deciphering of The barcode recreated from the holograms gives the corresponding product recognizable evidence number assigned for the product.[3] III. PROPOSED METHODS FOR PRODUCT ANTI-COUNTERFEITING USING BLOCKCHAIN There is no proper solution before tackling this issue. As barcodes can be easily copied it is also not a guarantee system, nor a good solution to differentiate counterfeit products from originals some products. Blockchain technology is one of the promising technologies emerging in recent years that can help solve such a problem. Blockchain technology can be used to monitor and regulate the supply chain of products in the market so that users can only obtain original products. The main goal of the project was to provide people's original product and help people identify whether the product they buy is original or fake easily. The prototype of the system will be a distributed application (DApp) with a supporting blockchain network. The network will be developed on hyper-ledger fabric which is an open-source Blockchain development tool and uses the default DPoS/PBFT consensus algorithm. DOI: 10.35629/6734-1106015056 www.ijesi.org 53 | Page Blockchain Platform For Product Anticounterfeiting In Supply Chain The basic module of our system; 1. Manufacturer role: For the seller, the available functions include adding a new seller's address in contracts, adding the number of products the seller can sell, and retrieving information on sellers so that the status of recent sales can be retrieved. On the consumer side, it is possible to query the product that the seller has provided to the consumer, check whether the product has been replaced, or confirm whether the current state of the product has been verified through the consumer's public key certificate. 2. The role of the seller: On the consumer side, the seller can use the system functions to encrypt verification information with a private key, and the consumer can use the seller's public key to check whether the seller is what it claims to be. After the sale and purchase, the seller specifies the buyer's address in the contract for the manufacturer to obtain the information. The seller can access information about his products, such as sales lists and the amount of his remaining inventory. 3. The role of the consumer: On the part of the seller, the consumer can check whether the seller has a sales relationship with the manufacturer, and also check whether the seller's inventory has not been sold. On the manufacturer's side, consumers can prove that their identity matches their address and in the case of a wellpreserved contract address, consumers can get individual purchase records and product status in their product. Figure 3 Modules and dataflow in Blockchain. IMPLEMENTATION Figure 4 System Architecture of Dapp 1)Login process: Before establishing a connection to the system, the user must choose which account to log into. The user's accounts are linked to the accounts in Geth, as long as Geth is started, the user can choose the account which is also linked to the serial number of the list of accounts in Geth. Next, the user has to type the Keystore file, which is an encrypted file that contains the private key. Finally, the user can type the contract address and click the save button to set the basic information. DOI: 10.35629/6734-1106015056 www.ijesi.org 54 | Page Blockchain Platform For Product Anticounterfeiting In Supply Chain 2)Public information about the contract: With the aim of disclosure of information, information about the sellers is completely public. Our system provides smart contract data search functions, which can return the list of sellers, the list of consumers, all information about the seller, and the remaining number of products of each seller. The data storage format in the smart contract. 3) Adding new sellers and number of products: In our system, manufacturers can check seller information, including adding new seller addresses and also the number of products that can be sold by a specific seller. The program in the smart contract will first check if the function setter is the producer. If correct, the program will build a seller structure and set the maximum number of products that can be sold for sellers, this amount can also be changed later. 4) Exchange provision for specific user products: as customers provide proof of identity and the address to send the product to. The manufacturer will initially check if the identity is correct and then determine if the consumer's product information is in the smart contract, then proceed to change the product status to exchange status. As an observation, this function will check if the setter is the producer. Otherwise, the function will return without setting the value. 5) Smart Contract: When the transaction between seller and consumer is established, the seller will add the consumer's address in the smart contract. Each seller has a product structure in the seller structure, the seller enters the consumer's addresses in the product owner field. Also, the access rights of the seller's product owner field can only be set by the seller. 6) Identity Verification: Identity Verification is one of the most important components of our system. Users of our system can use their addresses as their representation. The address is defined within the last 20 bits of the user's public key. Whenever a user wants to make a change to the current status of the Ethereum contract, the user must sign the transaction with his or her private key to perform a digital signature. As long as the user's private key is secure, there will be no other means to change the user's identity Result and discussion: The system enhanced security, the system provides decentralization, it provides transparency and it protects the data which we are given to the system it gives privacy and it increased efficiency. IV. CONCLUSION This paper is the first blockchain system to propose a fully functional anti-counterfeiting system. By paying a very low transaction fee, users of our system no longer have to worry about the possibility of purchasing a counterfeit product. Manufacturers can use the system to store relevant information about product sales in blockchain for everyone to see. The total amount of sales that can be sold by the seller and the number of products that the seller currently has left are transparent. The user can use the functions provided by our system to carry out manufacturer verification immediately. The system provides identity verification using digital signatures. There are no other means of decrypting the key owner's private key unless the key owner accidentally loses their key. In our system analysis result, the cost of the initial product record contract is only $1.2893394289 US, and the cost of each product sales process is $0.17415436749 US. Both costs are much lower than working with reliable large chain stores and well-established direct selling stores. Our system can effectively lower the anti-counterfeiting threshold of branded goods and provide companies with limited financial resources with an easier approach to reassure consumers that they will not buy count erfeit goods. Future work: Blockchain technology is still in its general early stages in terms of usage, therefore more research is required. Future work on this framework may be proof of the simplicity of the code. The customer can believe that the proper applications and due to the simplicity of the code, without excessive code, will have additional use. With the experience gained in this project, it is clear that when assigning a chain of blocks that is counterfeit-resistant and traceable, then platform improvement is warranted by a move toward genuine product warranties. This would improve the customer experience by making the entire supply chain framework more open and transparent. In addition, it is hoped that a buyers' intellectual framework can be built on cross-line product tracing, providing more accurate and far-reaching product and seller tracing information to administrative authorities around the world. Obtaining data of such quality will be DOI: 10.35629/6734-1106015056 www.ijesi.org 55 | Page Blockchain Platform For Product Anticounterfeiting In Supply Chain conceivable with estimates of coordinated efforts, for example, administrative support, framework creation, and data sharing. REFERENCES [1]. [2]. [3]. [4]. [5]. [6]. [7]. [8]. [9]. [10]. [11]. [12]. Muhammad Nasir Mumtaz Bhutta, Amir A. Khwaja, Adnan Nadeem, Hafiz Farooq Ahmad , Muhammad Khurram Khan, Moataz A. Hanif, Houbing Song, Majed Alshamari , and Yue Cao , “A Survey on Blockchain Technology: Evolution, Architecture and Security”, IEEE special section on intelligent big data analytics for internet of things, services and people,2021, pp. 61048 – 61073. Rishabh Sushil Bhatnagar, Sneha Manoj Jha , Shrey Surendra Singh, Rajkumar Shende “Product Traceability using Blockchain”, 2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN). Si Chen , Rui Shi , Zhuangyu Ren , Jiaqi Yan , Yani shi , Jinyu Zhang,“ A Blockchain-based Supply Chain Quality Management Framework”, 2017 IEEE 14th International Conference on e-Business Engineering (ICEBE) M.C.Jayaprasanna, .V.A.Soundharya , M.Suhana, S.Sujatha,” A Block Chain based Management System for Detecting Counterfeit Product in Supply Chain” ,IEEE 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV) Jinhua Ma , Shih-Ya Lin , Xin Chen , Hung-Min Sun,A Blockchain-Based Application System for Product Anti-Counterfeiting” International Journal Of Scientific & Technology Research Volume 8, Issue 12, December 2019 issn 2277-8616. B. M. A. L. Basnayake, C. Rajapakse,” A Blockchain-based decentralized system to ensure the transparency of organic food supply chain” ,IEEE 2019 International Research Conference on Smart Computing and Systems Engineering (SCSE) Atima Tharatipyakul and Suporn Pongnumkul, “User Interface of Blockchain-Based Agri-Food Traceability Applications”, IEEE vol 9, 2019,pp.82909-82929. Shuai Wang , Liwei Ouyang , Yong Yuan, Xiaochun Ni , Xuan Han and Fei-Yue Wang,“Blockchain-Enabled Smart Contracts: Architecture, Applications, and Future Trends”, IEEE Transactions on Systems, Man, and Cybernetics: Systems ,2019, pp.22662277 Shuai Wang , Liwei Ouyang , Yong Yuan, Xiaochun Ni , Xuan Han and Fei-Yue Wang,“Blockchain-Enabled Smart Contracts: Architecture, Applications, and Future Trends”, IEEE Transactions on Systems, Man, and Cybernetics: Systems ,2019, pp.22662277 Laura Ricci, Damiano Di Francesco Maesa, Alfredo Favenza and Enrico Ferro, “Block chains for COVID-19 Contact Tracing and Vaccine Support: A Systematic Review”, IEEE 2021,pp.37936 - 37950. Online:https://coinmarketcap.com/alexandria/glossary/sha-256 Online:https://www.geeksforgeeks.org/blockchain-technology-introduction/ Dr.Vikas Reddy,Dr.Seshaiah Merikapudi,Pavan Kalyan Y, Harshitha G L, Mushaffiq Ahmed Mujale et. al. "Blockchain Platform For Product Anticounterfeiting In Supply Chain.” International Journal of Engineering Science Invention (IJESI), Vol. 11(06), 2022, PP 50-56. Journal DOI- 10.35629/6734 DOI: 10.35629/6734-1106015056 www.ijesi.org 56 | Page