skip to main content
10.1145/3523181.3523193acmotherconferencesArticle/Chapter ViewAbstractPublication PagesasseConference Proceedingsconference-collections
research-article

Research on Food Safety Data Sharing and Exchange Mechanism

Authors Info & Claims
Published:18 April 2022Publication History

ABSTRACT

With the development of the economy and the improvement of people's quality of life, the public demand for food taste has gradually changed to the demand for food safety. In order to better facilitate the government to strengthen food safety supervision and protect people's food safety, it is necessary for the government to realize information interaction with enterprises related to the food supply chain and ensure the traceability of food flowing into the market by exchanging and sharing the data of food safety information. With the rapid promotion and popularization of various mobile terminals in the Internet era, the data analysis technology based on artificial intelligence technology is more accurate, which makes the value contained in the data more and more important to people. At present, many fields need the opening and sharing of big data, but there is no reliable data sharing environment in the field of food supervision, and it is still difficult to ensure the traceability of data related to food safety. Blockchain has unique advantages of decentralization and distribution, which can help break the current obstacles of big data sharing and exchange and achieve a high degree of data sharing, interconnection and exchange. Based on the blockchain technology, this paper studies the food safety data sharing and exchange mechanism, combines the blockchain with the distributed file system, constructs the data connection model, stores the shared information on the blockchain, then introduces IPFs and zigzag coding, designs the corresponding control method, and establishes a reliable data sharing and exchange mechanism. The analysis shows that the data sharing and exchange mechanism proposed in this paper can meet the needs of food safety data sharing and exchange.

References

  1. P. Frauenthaler, M. Sigwart, C. Spanring, M. Sober and S. Schulte, 2020. ETH Relay: A Cost-efficient Relay for Ethereum-based Blockchains. In Proceedings of the 2020 IEEE International Conference on Blockchain (Blockchain), Rhodes, Greece, pp. 204-213.Google ScholarGoogle Scholar
  2. A. Kim, H. Kum, O. Roh, S. You and S. Lee. 2012. Robot gesture and user acceptance of information in human-robot interaction. In Proceedings of the 2012 7th ACM/IEEE International Conference on Human-Robot Interaction (HRI), Boston, MA, USA, pp. 279-280.Google ScholarGoogle Scholar
  3. Bakanov, T. Atanasova and N. Bakanova. 2019. Cognitive Approach to Modeling Human-Computer Interaction with a Distributed Intellectual Information Environment. In Proceedings of the 2019 Big Data, Knowledge and Control Systems Engineering (BdKCSE), Sofia, Bulgaria, pp. 1-4.Google ScholarGoogle Scholar
  4. J. Shen, T. Zhou, D. He, Y. Zhang, X. Sun and Y. Xiang. 2019. Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing. IEEE Transactions on Dependable and Secure Computing, IEEE 16, 6 (Nov.-Dec 2019), pp. 996-1010.Google ScholarGoogle Scholar
  5. X. Xu, S. Liu, L. Luo, Y. Luo and X. Liu. 2020. Shared Transport in a Digitalized World: A Case Study of Shared Bicycles through Data Mining and Visualization. In Proceedings of the 2020 4th Annual International Conference on Data Science and Business Analytics (ICDSBA), Changsha, China, 131-133.Google ScholarGoogle Scholar
  6. Wang, B. Li and H. Li. 2014. Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Transactions on Cloud Computing. IEEE 2, 1(Jan.-March 2014), 43-56, Jan.-March 2014.Google ScholarGoogle Scholar
  7. P. Frauenthaler, M. Sigwart, C. Spanring, M. Sober and S. Schulte. 2020. ETH Relay: A Cost-efficient Relay for Ethereum-based Blockchains. In Proceedings of the 2020 IEEE International Conference on Blockchain (Blockchain), Rhodes, Greece, pp. 204-213.Google ScholarGoogle Scholar
  8. X. Yang, Y. Chen and X. Chen, "Effective Scheme against 51% Attack on Proof-of-Work Blockchain with History Weighted Information," 2019 IEEE International Conference on Blockchain (Blockchain), Atlanta, GA, USA, pp. 261-265.Google ScholarGoogle Scholar
  9. S. Yang, Z. Chen, L. Cui, M. Xu, Z. Ming and K. Xu, "CoDAG: An Efficient and Compacted DAG-Based Blockchain Protocol. In Proceedings of the 2019 IEEE International Conference on Blockchain (Blockchain), Atlanta, GA, USA, pp. 314-318.Google ScholarGoogle Scholar
  10. A. Davenport and S. Shetty. 2019. Air Gapped Wallet Schemes and Private Key Leakage in Permissioned Blockchain Platforms. In Proceedings of the 2019 IEEE International Conference on Blockchain (Blockchain), Atlanta, GA, USA, pp. 541-545.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ASSE' 22: 2022 3rd Asia Service Sciences and Software Engineering Conference
    February 2022
    202 pages
    ISBN:9781450387453
    DOI:10.1145/3523181

    Copyright © 2022 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 18 April 2022

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)25
    • Downloads (Last 6 weeks)2

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format