Abstract

As the concept of the visible product lifecycle and product tracking becomes important to consumers, emerging technologies such as Internet of Things (IoT)-based networks and Blockchain platforms are considered promising solutions by Original Equipment Manufacturers (OEMs) to increase their brand reputation, improve their consumers’ experiences, and reduce their operational costs. However, costly implementation, data verification issues, and the risk of uploading inaccurate information on those platforms have limited the adoption rate and capabilities offered by the aforementioned technologies. Companies often face the question of what type of distributed ledger technology and verification protocol is more efficient in terms of operational costs as well as security. The purpose of this study is to develop an optimization framework to make a trade-off between the cost of implementation of the technology and the security level. The framework is developed based on utility theory principles. The main focus is to discuss the cost associated with various aspects of technology implementation. Finally, this general cost framework is shown as a demo for an example of the food supply chain.

References

1.
Crosby
M.
,
Nachiappan
,
Pattanayak
P.
,
Verma
S.
,
Kalyanaraman
V.
, “
Blockchain Technology: Beyond Bitcoin
,”
Applied Innovation Review
2
(June
2016
):
6
19
.
2.
Gabison
G.
, “
Policy Considerations for the Blockchain Technology Public and Private Applications
,”
SMU Science and Technology Law Review
19
, no. 
3
(
2016
): 327.
3.
Zheng
Z.
,
Xie
S.
,
Dai
H.
,
Chen
X.
, and
Wang
H.
, “
An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends
,” in
IEEE International Congress on Big Data (BigData Congress)
(
Piscataway, NJ
:
Institute of Electrical and Electronics Engineers
,
2017
),
557
564
.
4.
Zyskind
G.
,
Nathan
O.
, and
Pentland
A.
, “
Decentralizing Privacy: Using Blockchain to Protect Personal Data
,” in
IEEE Security and Privacy Workshops
(
Piscataway, NJ
:
Institute of Electrical and Electronics Engineers
,
2015
),
180
184
.
5.
Toyoda
K.
,
Mathiopoulos
P. T.
,
Sasase
I.
, and
Ohtsuki
T.
, “
A Novel Blockchain-Based Product Ownership Management System (POMS) for Anti-Counterfeits in the Post Supply Chain
,”
IEEE Access
5
(June
2017
):
17465
17477
. https://doi.org/10.1109/ACCESS.2017.2720760
6.
Beck
R.
,
Czepluch
J. S.
,
Lollike
N.
, and
Malone
S.
, “
Blockchain–The Gateway to Trust-Free Cryptographic Transactions
” (paper presentation, 24th European Conference on Information Systems, Istanbul, Turkey, June 12–15,
2016
).
7.
Atzori
M.
, “
Blockchain Technology and Decentralized Governance: Is the State Still Necessary?
” SSRN,
2015
. http://web.archive.org/web/20191031034633/https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2709713
8.
Kumar
A.
,
Fischer
C.
,
Tople
S.
, and
Saxena
P.
, “
A Traceability Analysis of Monero’s Blockchain
,” in
European Symposium on Research in Computer Security
(
Cham, Switzerland
:
Springer Nature
,
2017
),
153
173
.
9.
Risius
M.
and
Spohrer
K.
, “
A Blockchain Research Framework
,”
Business & Information Systems Engineering
59
, no. 
6
(December
2017
):
385
409
. https://doi.org/10.1007/s12599-017-0506-0
10.
Novo
O.
, “
Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT
,”
IEEE Internet of Things Journal
5
, no. 
2
(April
2018
):
1184
1195
. https://doi.org/10.1109/JIOT.2018.2812239
11.
El Ioini
N.
,
Pahl
C.
, and
Helmer
S.
, “
A Decision Framework For Blockchain Platforms for IoT and Edge Computing
,” in
Third International Conference on Internet of Things, Big Data and Security
(
Setúbal
, Portugal
:
SciTePress
,
2018
),
105
113
.
12.
El Ioini
M.
and
Pahl
C.
, “
A Review of Distributed Ledger Technologies
” in
On the Move to Meaningful Internet Systems: OTM 2018 Conferences
(
Cham, Switzerland
:
Springer Nature
,
2018
),
277
288
.
13.
Koens
T.
and
Poll
E.
, “
What Blockchain Alternative Do You Need?
” in
Data Privacy Management, Cryptocurrencies and Blockchain Technology
(
Cham, Switzerland
:
Springer Nature
,
2018
),
113
129
.
14.
Bitcoin Wiki “
Block Size Limit Controversy
,” Bitcoin Wiki,
2015
. https://web/20191031035003/https://en.bitcoin.it/wiki/Block_size_limit_controversy
15.
Beedham
M.
, “
Here’s the Difference between ‘Permissioned’ and ‘Permissionless’ Blockchains
,” Hard Fork TNW,
2018
. http://web.archive.org/web/20191031035229/https://thenextweb.com/hardfork/2018/11/05/permissioned-permissionless-blockchains/
16.
Biryukov
A.
,
Khovratovich
D.
, and
Pustogarov
I.
, “
Deanonymisation of Clients in Bitcoin P2P Network
,” in
ACM SIGSAC Conference on Computer and Communications Security
(
New York
:
ACM Publications
,
2014
),
15
29
.
17.
Velde
F. R.
, “
Bitcoin: A Primer
,” The Federal Reserve Bank of Chicago,
2013
. http://web.archive.org/web/20191031035545/http://blog.philippe-poisse.eu/public/monnaie_locale/bitcoin/cfldecember2013_317.pdf
18.
Blinder
M.
, “
Making Cryptocurrency More Environmentally Sustainable
,” Harvard Business Review,
2018
. http://web.archive.org/web/20191031035743/https://hbr.org/2018/11/making-cryptocurrency-more-environmentally-sustainable
19.
Conoscenti
M.
,
Vetrò
A.
, and
De Martin
J. C.
, “
Blockchain for the Internet of Things: A Systematic Literature Review
,” in
IEEE/ACS 13th International Conference on Computer Systems and Applications
(
Piscataway, NJ
:
Institute of Electrical and Electronics Engineers
,
2016
),
1
6
.
20.
Konstantopoulos
G.
, “
Understanding Blockchain Fundamentals, Part 3: Delegated Proof of Stake
,” Medium,
2018
. http://web.archive.org/web/20191031035904/https://medium.com/loom-network/understanding-blockchain-fundamentals-part-3-delegated-proof-of-stake-b385a6b92ef
22.
De Angelis
S.
,
Aniello
L.
,
Baldoni
R.
,
Lombardi
F.
,
Margheri
A.
, and
Sassone
V.
, “
PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain
” (paper presentation, Second Italian Conference on Cybersecurity, Milan, Italy, February 6–9,
2018
).
24.
Keichafer
R. M.
,
Walter
C. J.
,
Finn
A. M.
, and
Thambidurai
P. M.
, “
The MAFT Architecture for Distributed Fault Tolerance
,”
IEEE Transactions on Computers
37
, no. 
4
(April
1988
):
398
404
. https://doi.org/10.1109/12.2183
25.
Kotla
R.
,
Alvisi
L.
,
Dahlin
M.
,
Clement
A.
, and
Wong
E.
, “
Zyzzyva: Speculative Byzantine Fault Tolerance
,”
ACM SIGOPS Operating Systems Review
41
, no. 
6
(December
2007
):
45
58
.
26.
Castro
M.
and
Liskov
B.
, “
Practical Byzantine Fault Tolerance
,” in
Third Symposium on Operating Systems Design and Implementation
(
New York
:
Association for Computing Machinery
,
1999
),
173
186
.
27.
Yin
J.
,
Martin
J.-P.
,
Venkataramani
A.
,
Alvisi
L.
, and
Dahlin
M.
, “
Separating Agreement from Execution for Byzantine Fault Tolerant Services
,”
ACM SIGOPS Operating Systems Review
37
, no. 
5
(December
2003
):
253
267
. https://doi.org/10.1145/1165389.945470
28.
Gilad
Y.
,
Hemo
R.
,
Micali
S.
,
Vlachos
G.
, and
Zeldovich
N.
, “
Algorand: Scaling Byzantine Agreements for Cryptocurrencies
,” in
26th Symposium on Operating Systems Principles
(
New York
:
ACM Publications
,
2017
),
51
68
.
29.
Castro
M.
and
Liskov
B.
, “
Proactive Recovery in a Byzantine-Fault-Tolerant System
,” in
Fourth Conference on Symposium on Operating System Design & Implementation
(
New York
:
ACM Publications
,
2000
), 19.
30.
Rosic
A.
, “
Basic Primer: Blockchain Consensus Protocol
,” Blockgeeks,
2017
. http://web.archive.org/web/20191031040712/https://blockgeeks.com/guides/blockchain-consensus/
31.
Thurston
D. L.
,
Carnahan
J. V.
, and
Liu
T.
, “
Optimization of Design Utility
,”
Journal of Mechanical Design
116
, no. 
3
(September
1994
):
801
808
. https://doi.org/10.1115/1.2919453
32.
Sola
A. V. H.
and
de Miranda Mota
C. M.
, “
A Multi-Attribute Decision Model for Portfolio Selection Aiming to Replace Technologies in Industrial Motor Systems
,”
Energy Conversion and Management
57
(May
2012
):
97
106
. https://doi.org/10.1016/j.enconman.2011.12.013
33.
Kainuma
Y.
and
Tawara
N.
, “
A Multiple Attribute Utility Theory Approach to Lean and Green Supply Chain Management
,”
International Journal of Production Economics
101
, no. 
1
(May
2006
):
99
108
. https://doi.org/10.1016/j.ijpe.2005.05.010
34.
Thurston
D. L.
, “
Real and Misconceived Limitations to Decision Based Design with Utility Analysis
,”
Journal of Mechanical Design
123
, no. 
2
(June
2001
):
176
182
. https://doi.org/10.1115/1.1363610
35.
Keeney
R. L.
and
Raiffa
H.
,
Decisions with Multiple Objectives: Preferences and Value Trade-offs
(
Cambridge, UK
:
Cambridge University Press
,
1993
).
36.
Adam
B. D.
,
Craige
C. C.
, and
Buser
M. D.
, “
How Much Does Whole Chain Traceability Cost?
” National Whole Chain Traceability Institute,
2013
. http://web.archive.org/web/20191031041550/https://nifa.usda.gov/sites/default/files/resource/How%20much%20does%20whole%20chain%20traceability%20cost%2013.pdf
37.
Santhana
P.
and
Biswas
A.
, “
Blockchain Risk Management: Risk Functions Need to Play an Active Role in Shaping Blockchain Strategy
,” Deloitte,
2017
. http://web.archive.org/web/20191031041701/https://www2.deloitte.com/content/dam/Deloitte/us/Documents/financial-services/us-fsi-blockchain-risk-management.pdf
38.
Caron
F.
, “
Blockchain: Identifying Risk on the Road to Distributed Ledgers
,”
ISACA Journal
 5 (
2017
). http://web.archive.org/web/20191031042058/https://www.isaca.org/Journal/archives/2017/Volume-5/Pages/blockchain-identifying-risk-on-the-road-to-distributed-ledgers.aspx?utm_referrer=
39.
Boehm
B.
,
Abts
C.
, and
Chulani
S.
, “
Software Development Cost Estimation Approaches—A Survey
,”
Annals of Software Engineering
10
, nos. 
1–4
(November
2000
):
177
205
. https://doi.org/10.1023/A:1018991717352
40.
Jorgensen
M.
and
Shepperd
M.
, “
A Systematic Review of Software Development Cost Estimation Studies
,”
IEEE Transactions on Software Engineering
33
, no. 
1
(January
2007
):
33
53
. https://doi.org/10.1109/TSE.2007.256943
41.
Rimba
P.
,
Tran
A. B.
,
Weber
I.
,
Staples
M.
,
Ponomarev
A.
, and
Xu
X.
, “
Comparing Blockchain and Cloud Services for Business Process Execution
,” in
IEEE/IFIP International Conference on Software Architecture
(
Piscataway, NJ
:
Institute of Electrical and Electronics Engineers
,
2017
),
257
260
.
42.
Rimba
P.
,
Tran
A. B.
,
Weber
I.
,
Staples
M.
,
Ponomarev
A.
, and
Xu
X.
, “Quantifying the Cost of Distrust: Comparing Blockchain and Cloud Services for Business Process Execution,”
Information Systems Frontiers
(
2018
). https://doi.org/10.1007/s10796-018-9876-1
43.
DeCovny
S.
, “
Chips off the Old Blockchain
,”
CFA Institute Magazine
26
, no. 
6
(November–December
2015
):
24
25
. https://doi.org/10.2469/cfm.v26.n6.8
44.
Mainelli
M.
and
Smith
M.
, “
Sharing Ledgers for Sharing Economies: An Exploration of Mutual Distributed Ledgers (Aka Blockchain Technology)
,”
Journal of Financial Perspectives
3
, no. 
3
(
2015
):
38
58
.
45.
Catalini
C.
and
Gans
J. S.
,
Initial Coin Offerings and the Value of Crypto Tokens
(
Cambridge, MA
:
National Bureau of Economic Research
,
2018
).
47.
Curtis
K. R.
,
Cowee
M.
,
Acosta
A.
,
Hu
W.
,
Lewis
S.
, and
Harris
T.
, “
Cost Estimates for the Mobile Units & Stationary Fabrication Facility
,” Extension.org,
2014
. http://web.archive.org/web/20191031043745/https://www.nichemeatprocessing.org/cost-estimates-for-the-mobile-units-stationary-fabrication-facility
48.
Hryniuk
O.
, “
The Use of Cryptocurrency Consensus: Why and How
,” Applicature,
2018
. http://web.archive.org/web/20191031044004/https://applicature.com/blog/blockchain-technology/consensus-protocol
49.
Jenks
T.
, “
Pros and Cons of Different Blockchain Consensus Protocols
,” Very,
2018
. http://web.archive.org/web/20191031044112/https://www.verypossible.com/blog/pros-and-cons-of-different-blockchain-consensus-protocols
50.
Bau
J.
,
Bursztein
E.
,
Gupta
D.
, and
Mitchell
J.
, “
State of the Art: Automated Black-Box Web Application Vulnerability Testing
,” in
IEEE Symposium on Security and Privacy
(
Piscataway, NJ
:
Institute of Electrical and Electronics Engineers
,
2010
),
332
345
.
51.
Cherdantseva
Y.
,
Burnap
P.
,
Blyth
A.
,
Eden
P.
,
Jones
K.
,
Soulsby
H.
, and
Stoddart
K.
, “
A Review of Cyber Security Risk Assessment Methods for SCADA Systems
,”
Computers & Security
56
(February
2016
):
1
27
. https://doi.org/10.1016/j.cose.2015.09.009
52.
Chockalingam
S.
,
Hadžiosmanović
D.
,
Pieters
W.
,
Teixeira
A.
, and
van Gelder
P.
, “
Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications
,” in
International Conference on Critical Information Infrastructures Security
(
Cham, Switzerland
:
Springer Nature
,
2016
),
50
62
.
53.
54.
Gervais
A.
,
Karame
G. O.
,
Wüst
K.
,
Glykantzis
V.
,
Ritzdorf
H.
, and
Capkun
S.
, “
On the Security and Performance of Proof of Work Blockchains
,” in
ACM SIGSAC Conference on Computer and Communications Security
(
New York
:
ACM Publications
,
2016
),
3
16
.
55.
Galvez
J. F.
,
Mejuto
J. C.
, and
Simal-Gandara
J.
, “
Future Challenges on the Use of Blockchain for Food Traceability Analysis
,”
TrAC Trends in Analytical Chemistry
107
(October
2018
):
222
232
. https://doi.org/10.1016/j.trac.2018.08.011
This content is only available via PDF.
You do not currently have access to this content.