{"id":"https://openalex.org/W4390443692","doi":"https://doi.org/10.1080/19393555.2023.2292996","title":"Privacy preservation of inventory management using adaptive key generation with Hyperledger blockchain technology","display_name":"Privacy preservation of inventory management using adaptive key generation with Hyperledger blockchain technology","publication_year":2023,"publication_date":"2023-12-30","ids":{"openalex":"https://openalex.org/W4390443692","doi":"https://doi.org/10.1080/19393555.2023.2292996"},"language":"en","primary_location":{"id":"doi:10.1080/19393555.2023.2292996","is_oa":false,"landing_page_url":"https://doi.org/10.1080/19393555.2023.2292996","pdf_url":null,"source":{"id":"https://openalex.org/S39280739","display_name":"Information Security Journal A Global Perspective","issn_l":"1939-3547","issn":["1939-3547","1939-3555"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Security Journal: A Global Perspective","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058044286","display_name":"Chinnaraj Govindasamy","orcid":null},"institutions":[{"id":"https://openalex.org/I85461943","display_name":"Saveetha University","ror":"https://ror.org/0034me914","country_code":"IN","type":"education","lineage":["https://openalex.org/I85461943"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Chinnaraj Govindasamy","raw_affiliation_strings":["Department of Computer Science and Engineering, Saveetha School of Engineering, Saveetha Institute of Medical And Technical Sciences, Chennai, Tamilnadu, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Saveetha School of Engineering, Saveetha Institute of Medical And Technical Sciences, Chennai, Tamilnadu, India","institution_ids":["https://openalex.org/I85461943"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5104080438","display_name":"Arokiasamy Antonidoss","orcid":null},"institutions":[{"id":"https://openalex.org/I43663321","display_name":"Hindustan Institute of Technology and Science","ror":"https://ror.org/037tgdn13","country_code":"IN","type":"education","lineage":["https://openalex.org/I43663321"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Arokiasamy Antonidoss","raw_affiliation_strings":["Department of Computer Science and Engineering, Hindustan Institute of Technology &amp; Science, Chennai, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Hindustan Institute of Technology &amp; Science, Chennai, India","institution_ids":["https://openalex.org/I43663321"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5058044286"],"corresponding_institution_ids":["https://openalex.org/I85461943"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.31600984,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"33","issue":"4","first_page":"374","last_page":"393"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9879999756813049,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9879999756813049,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6880643367767334},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6379284262657166},{"id":"https://openalex.org/keywords/traceability","display_name":"Traceability","score":0.634949266910553},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5663071274757385},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.5137887597084045},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.44324856996536255},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4276917576789856},{"id":"https://openalex.org/keywords/supply-chain","display_name":"Supply chain","score":0.42261236906051636},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.33394068479537964},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.19450584053993225}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6880643367767334},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6379284262657166},{"id":"https://openalex.org/C153876917","wikidata":"https://www.wikidata.org/wiki/Q899704","display_name":"Traceability","level":2,"score":0.634949266910553},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5663071274757385},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.5137887597084045},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.44324856996536255},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4276917576789856},{"id":"https://openalex.org/C108713360","wikidata":"https://www.wikidata.org/wiki/Q1824206","display_name":"Supply chain","level":2,"score":0.42261236906051636},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.33394068479537964},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.19450584053993225},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/19393555.2023.2292996","is_oa":false,"landing_page_url":"https://doi.org/10.1080/19393555.2023.2292996","pdf_url":null,"source":{"id":"https://openalex.org/S39280739","display_name":"Information Security Journal A Global Perspective","issn_l":"1939-3547","issn":["1939-3547","1939-3555"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Security Journal: A Global Perspective","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6100000143051147,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W2067691498","https://openalex.org/W2341338678","https://openalex.org/W2756802391","https://openalex.org/W2791899797","https://openalex.org/W2902681228","https://openalex.org/W2902800369","https://openalex.org/W2907843228","https://openalex.org/W2922985695","https://openalex.org/W2963436925","https://openalex.org/W2967081794","https://openalex.org/W2969082783","https://openalex.org/W2971376523","https://openalex.org/W2980381981","https://openalex.org/W2991178537","https://openalex.org/W2999609570","https://openalex.org/W3004476180","https://openalex.org/W3006577290","https://openalex.org/W3017682633","https://openalex.org/W3031209802","https://openalex.org/W3035050356","https://openalex.org/W3042936917","https://openalex.org/W3046504831","https://openalex.org/W3119269115","https://openalex.org/W3133006985","https://openalex.org/W3158987807","https://openalex.org/W3161127642","https://openalex.org/W3191714523","https://openalex.org/W3206288486","https://openalex.org/W3206757200","https://openalex.org/W3208409840","https://openalex.org/W3212168594","https://openalex.org/W4307110308","https://openalex.org/W4307110694","https://openalex.org/W4310509657","https://openalex.org/W4312870946","https://openalex.org/W6846831628"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W4386732777","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047","https://openalex.org/W4304136894","https://openalex.org/W2989851257","https://openalex.org/W4221078281"],"abstract_inverted_index":{"The":[0,30,109,173],"blockchain":[1],"is":[2,89,149,175],"an":[3,75],"emerging":[4],"and":[5,19,43,128,181],"essential":[6],"technology":[7],"in":[8,53,113,141],"offering":[9],"various":[10],"services":[11],"to":[12,49,64],"several":[13],"applications":[14],"including":[15,37],"the":[16,28,50,59,81,92,116,121,134,142,146,150,159,164,182],"financial":[17],"industry":[18],"information":[20,24,41,125],"technology.":[21],"Consequently,":[22],"recent":[23],"methodologies":[25],"cannot":[26],"satisfy":[27],"constraints.":[29],"data":[31,46,84,107,135],"management":[32,55,73,78,83,112],"issue":[33],"may":[34],"rise":[35],"complexities":[36],"tracking":[38],"operations":[39],"with":[40,74],"security":[42],"unsatisfactory":[44],"traceability":[45],"quality":[47],"due":[48],"high":[51],"increase":[52],"inventory":[54,72,82,171],"data.":[56],"To":[57],"address":[58],"challenge,":[60],"this":[61],"paper":[62],"aims":[63],"focus":[65],"on":[66,120],"developing":[67],"new":[68],"hyperledger":[69,143],"blockchain-enabled":[70],"secure":[71],"adaptive":[76,93,166],"key":[77,94,111,167],"process.":[79],"Here,":[80],"processed":[85],"by":[86,96],"different":[87],"distributors":[88],"encrypted":[90],"using":[91],"generation":[95],"Fitness-derived":[97],"Predator":[98],"Presence":[99],"Probability-based":[100],"Squirrel":[101],"Search":[102],"Algorithm":[103],"(FPPP-SSA)":[104],"that":[105],"ensures":[106],"control.":[108],"optimal":[110],"encryption":[114],"solves":[115],"multi-objective":[117],"function":[118],"based":[119],"\"degree":[122],"of":[123],"modification":[124],"preservation":[126],"rate":[127],"hiding":[129],"ratio":[130],"(Euclidean":[131],"distance).\"":[132],"Once":[133],"are":[136,139,184],"enciphered,":[137],"they":[138],"saved":[140],"blockchain,":[144],"where":[145],"smart":[147],"contract":[148],"chain":[151],"code":[152],"application.":[153],"While":[154],"restoring":[155],"or":[156],"decrypting":[157],"data,":[158],"authorized":[160],"distributor":[161],"should":[162],"use":[163],"same":[165],"for":[168],"maintaining":[169],"secured":[170],"management.":[172],"performance":[174,188],"evaluated":[176],"under":[177,186],"diverse":[178],"test":[179],"cases,":[180],"results":[183],"estimated":[185],"certain":[187],"metrics.":[189]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
