×

注意!页面内容来自https://www.nature.com/articles/s41598-026-46101-z,本站不储存任何内容,为了更好的阅读体验进行在线解析,若有广告出现,请及时反馈。若您觉得侵犯了您的利益,请通知我们进行删除,然后访问 原网页

Supply chain information security sharing technology based on blockchain consensus algorithm and federated learning
Download PDF
Download PDF
  • Article
  • Open access
  • Published: 09 April 2026

Supply chain information security sharing technology based on blockchain consensus algorithm and federated learning

  • Dong Xu1
  • Jing Li1 &
  • Zhiwang Ren2 

Scientific Reports Article number:  (2026) Cite this article

  • 461 Accesses

  • Metrics details

We are providing an unedited version of this manuscript to give early access to its findings. Before final publicationthe manuscript will undergo further editing. Please note there may be errors present which affect the contentand all legal disclaimers apply.

Subjects

  • Computer science
  • Information technology

Abstract

Existing supply chain information security methods all suffer from the difficulty of balancing information sharing efficiency and information privacy protection. Data is prone to leakageresulting in an increase in the overall risk of the supply chain. In response to this situationthe study proposes a supply chain information security sharing method based on a blockchain consensus algorithm and federated learning. The study designs a blockchain formula algorithm based on a verifiable mechanism and combines this algorithm with federated learning to construct an encryption model. To address the issue of privacy leakage that is prone to occur in federated learningthis study introduces casual pseudo-random functions and cuckoo hashing to process data and reduce communication complexitythereby avoiding hash conflicts. Finallythe encryption model is applied to the data transmission systemand combined with multi-factor authenticationthe secure sharing of supply chain information is achieved. The experiment results indicated that the average latency of the consensus algorithm during node election was 115.20msand during node replacementthe average latency was 8.56ms. The information security sharing method proposed in the study achieved an accuracy rate of 92.48% in generating data after processingwith a data tampering detection rate of 98.87%. The frequency of privacy breaches during the experiment was only 0.1%and the average response time was 1.0 s. The study proposes a new technical framework that takes into account both privacy protection and efficient sharingeffectively balancing the trust establishment and data security requirements in multi-party collaboration in the supply chainand providing a verifiable and traceable technical path for information sharing in complex network environments. At the same timeby optimizing the integration mode of the consensus mechanism and federated learningthe system communication overhead and response delay have been significantly reducedand the overall operational efficiency has been improved.

Similar content being viewed by others

Blockchain-based privacy and security model for transactional data in large private networks

Article Open access 10 October 2023

Design of an improved model using federated learning and LSTM autoencoders for secure and transparent blockchain network transactions

Article Open access 10 January 2025

Efficient data consensus algorithm integrating FL and blockchain dynamic partition protocol PBFT

Article Open access 28 November 2025

Data availability

The datasets used and/or analyzed during the current study available from the corresponding author on reasonable request.

References

  1. TangY. M.ChauK. Y.KuoW. T. & LiuX. X. IoT-based information system on cold-chain logistics service quality (ICCLSQ) management in logistics 4.0. Inform. Syst. Front. 26(2)689–708. https://doi.org/10.1007/s10796-023-10393-7 (2024).

    Google Scholar 

  2. PrajapatiP. & ShahP. A review on secure data deduplication: Cloud storage security issue. J. King Saud Univ. Comput. Inform. Sci. 34(7)3996–4007. https://doi.org/10.1016/j.jksuci.2020.10.021 (2022).

    Google Scholar 

  3. PhilsoophianM.AkhavanP. & NamvarM. The mediating role of blockchain technology in improvement of knowledge sharing for supply chain management. Manag. Decis. 60(3)784–805. https://doi.org/10.1108/md-08-2020-1122 (2022).

    Google Scholar 

  4. BechtsisD.TsolakisN. & IakovouE. Data-driven secureresilient and sustainable supply chains: gapsopportunitiesand a new generalised data sharing and data monetisation framework. Int. J. Prod. Res. 60(14)4397–4417. https://doi.org/10.1080/00207543.2021.1957506 (2022).

    Google Scholar 

  5. LiY. et al. Threats and defenses in the federated learning life cycle: a comprehensive survey and challenges. IEEE Trans. Neural Netw. Learn. Syst. 5(15)1–21. https://doi.org/10.1109/TNNLS.2025.3563537 (2025).

    Google Scholar 

  6. Ramakrishna & Ali ShaikM. A. Comprehensive analysis of cryptographic algorithms: evaluating securityefficiencyand future challenges. IEEE Access. 13 (1)11576–11593. https://doi.org/10.1109/ACCESS.2024.3518533 (2025).

    Google Scholar 

  7. MouJ.ZhangZ.BanerjeeS. & ZhangY. Combining semi-tensor product compressed sensing and session keys for low-cost encryption of batch information in WBANs. IEEE Internet Things J. 11(20)33565–33576. https://doi.org/10.1109/JIOT.2024.3429349 (2024).

    Google Scholar 

  8. LianZ.ZengQ.WangW.GadekalluT. R. & SuC. Blockchain-based two-stage federated learning with non-IID data in IoMT system. IEEE Trans. Comput. Soc. Syst. 10(4)1701–1710. https://doi.org/10.1109/TCSS.2022.3216802 (2023).

    Google Scholar 

  9. AzbegK.OuchettoO. & AndaloussiS. J. BlockMedCare: A healthcare system based on IoTBlockchain and IPFS for data management security. Egypt. Inform. J. 23(2)329–343. https://doi.org/10.1016/j.eij.2022.02.004 (2022).

    Google Scholar 

  10. RabieinejadE.YazdinejadA.DehghantanhaA. & SrivastavaG. Two-level privacy-preserving framework: federated learning for attack detection in the consumer Internet of Things. IEEE Trans. Consum. Electron. 70(1)4258–4265. https://doi.org/10.1109/TCE.2024.3349490 (2024).

    Google Scholar 

  11. RaoB. et al. Privacy inference attack and defense in centralized and federated learning: A comprehensive survey. IEEE Trans. Artif. Intell. 6(2)333–353. https://doi.org/10.1109/TAI.2024.3363670 (2025).

    Google Scholar 

  12. ZhuJ.CaoJ.SaxenaD.JiangS. & FerradiH. Blockchain-empowered federated learning: Challengessolutionsand future directions. ACM Comput. Surv. 55(11)1–31. https://doi.org/10.1145/3570953 (2023).

    Google Scholar 

  13. ZhuM.YuanJ.WangG.XuZ. & WeiK. Enhancing collaborative machine learning for security and privacy in federated learning. JTPES 44(2)74–82. https://doi.org/10.53469/jtpes.2024.04(02).11 (2024).

    Google Scholar 

  14. KhanA. A. et al. BDLT-IoMT-a novel architecture: SVM machine learning for robust and secure data processing in Internet of Medical Things with blockchain cybersecurity. J. Supercomput. 81(1)1–22. https://doi.org/10.1007/s11227-024-06782-7 (2025).

    Google Scholar 

  15. KhanA. A. et al. Blockchain-enabled infrastructural security solution for serverless consortium fog and edge computing. PeerJ Comput. Sci. 3 (26)1933–1943. https://doi.org/10.7717/peerj-c.s.1933 (2024).

    Google Scholar 

  16. LotfiR.RajabzadehM.ZamaniA. & RajabiM. S. Viable supply chain with vendor-managed inventory approach by considering blockchainrisk and robustness. Ann. Oper. Res. 344(2)575–594. https://doi.org/10.1007/s10479-022-05119-y (2025).

    Google Scholar 

  17. LotfiR. et al. Resource-constrained time–cost-quality-energy-environment tradeoff problem by considering blockchain technologyrisk and robustness: a case study of healthcare project. Environ. Sci. Pollut. Res. 29(42)63560–63576. https://doi.org/10.1007/s11356-022-20334-7 (2022).

    Google Scholar 

  18. LotfiR. et al. A data-driven robust optimization in viable supply chain network design by considering open innovation and blockchain technology. J. Clean. Prod. 436(1)140369–140381. https://doi.org/10.1016/j.jclepro.2023.140369 (2024).

    Google Scholar 

  19. HebbiC. & MamathaH. Comprehensive dataset building and recognition of isolated handwritten kannada characters using machine learning models. Artif. Intell. 1(3)179–190. https://doi.org/10.47852/bonviewAIA3202624 (2023).

    Google Scholar 

  20. AliA. et al. A novel homomorphic encryption and consortium blockchain-based hybrid deep learning model for industrial internet of medical things. IEEE Trans. Netw. Sci. Eng. 10(5)2402–2418. https://doi.org/10.1109/TNSE.2023.3285070 (2023).

    Google Scholar 

  21. MooreS. K. Chips to compute with encrypted data are coming: fully homomorphic encryption could make data unhackable. IEEE Spectr. 61(1)38–40. https://doi.org/10.1109/MSPEC.2024.10380468 (2024).

    Google Scholar 

  22. KumariK. A.SharmaA.ChakrabortyC. & AnanyaM. Preserving health care data security and privacy using Carmichael’s theorem-based homomorphic encryption and modified enhanced homomorphic encryption schemes in edge computing systems. Big Data-US 10(1)1–17. https://doi.org/10.1089/big.2021.0012 (2022).

    Google Scholar 

  23. RazikinK. & SoewitoB. Cybersecurity decision support model to designing information technology security system based on risk analysis and cybersecurity framework. Egypt. Inform. J. 23(3)383–404. https://doi.org/10.1016/j.eij.2022.03.001 (2022).

    Google Scholar 

  24. WangY.ZhangF. & LiX. Methodology for mapping the ecological security pattern and ecological network in the arid region of XinjiangChina. Remote Sens. 15(11)2836–2848. https://doi.org/10.3390/rs15112836 (2023).

    Google Scholar 

  25. LiangW. et al. PDPChain: A consortium blockchain-based privacy protection scheme for personal data. IEEE Trans. Reliab. 72(2)586–598. https://doi.org/10.1109/TR.2022.3190932 (2023).

    Google Scholar 

  26. JayabalanJ. & JeyanthiN. Scalable blockchain model using off-chain IPFS storage for healthcare data security and privacy. J. Parallel. Distr. Com. 164(1)152–167. https://doi.org/10.1016/j.jpdc.2022.03.009 (2022).

    Google Scholar 

  27. ZhangY.WangT. & YuenK. V. Construction site information decentralized management using blockchain and smart contracts. Comput.-Aided Civ. Infrastruct. Eng. 37(11)1450–1467. https://doi.org/10.1111/mice.12804 (2022).

    Google Scholar 

  28. AlsamhiS. H.ShvetsovA. V. & ShvetsovaS. V. Blockchain-empowered security and energy efficiency of drone swarm consensus for environment exploration. IEEE T. Green. Commun. 7(1)328–338. https://doi.org/10.1109/TGCN.2022.3195479 (2023).

    Google Scholar 

  29. LiuY.HaoX. & RenW. A blockchain-based decentralizedfair and authenticated information sharing scheme in zero trust internet-of-things. IEEE Trans. Comput. 72(2)501–512. https://doi.org/10.1109/TC.2022.3157996 (2023).

    Google Scholar 

  30. XuX. & HeY. Blockchain application in modern logistics information sharing: A review and case study analysis. Prod. Plan. Control 35(9)886–900. https://doi.org/10.1080/09537287.2022.2058997 (2024).

    Google Scholar 

  31. Al-ShaaraniF. & GutubA. Securing matrix counting-based secret-sharing involving crypto steganography. J. King Saud Univ. Comput. Inform. Sci. 34(9)6909–6924. https://doi.org/10.1016/j.jksuci.2021.09.009 (2022).

    Google Scholar 

  32. ZhangQ.SunH. & GaoX. Time-division ISAC enabled connected automated vehicles cooperation algorithm design and performance evaluation. IEEE J. Sel. Areas Commun. 40(7)2206–2218. https://doi.org/10.1109/JSAC.2022.3155506 (2022).

    Google Scholar 

  33. MishraR.RameshD.EdlaD. R. & QiL. VaccineChain: A checkpoint assisted scalable blockchain based secure vaccine supply chain with selective revocation. J. Ind. Inf. Integr. 34(1)100485–100500. https://doi.org/10.1016/j.jii.2023.100485 (2023).

    Google Scholar 

  34. MishraR.RameshD.MohammadN. & MondalB. Blockchain enabled secure pharmaceutical supply chain framework with traceability: An efficient searchable pharmachain approach. Cluster Comput. 27(10)13621–13641. https://doi.org/10.1007/s10586-024-04626-w (2024).

    Google Scholar 

Download references

Funding

The research is supported by: Scientific research Foundation of the Education Department of Hubei Provinceunder Grant NO. B2020301; the major project Foundation of philosophy and social sciences research in Hubei Province under Grant NO. 20ZD107; And the Fundation of excellent young and middle-aged scientific and Technological Innovation Team project in Hubei Province under Grant NO. T201943.

Author information

Authors and Affiliations

  1. School of Information EngineeringWuhan CollegeWuhan430212China

    Dong Xu & Jing Li

  2. CRRC Yangtze Co.Ltd.Wuhan430000China

    Zhiwang Ren

Authors
  1. Dong Xu
    View author publications

    Search author on:PubMed Google Scholar

  2. Jing Li
    View author publications

    Search author on:PubMed Google Scholar

  3. Zhiwang Ren
    View author publications

    Search author on:PubMed Google Scholar

Contributions

D.X. processed the numerical attribute linear programming of communication big dataand the mutual information feature quantity of communication big data numerical attribute was extracted by the cloud extended distributed feature fitting method. J.L. Combined with fuzzy C-means clustering and linear regression analysisthe statistical analysis of big data numerical attribute feature information was carried outand the associated attribute sample set of communication big data numerical attribute cloud grid distribution was constructed. D.X. and Z.W.R. did the experimentsrecorded dataand created manuscripts. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Zhiwang Ren.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Licensewhich permits any non-commercial usesharingdistribution and reproduction in any medium or formatas long as you give appropriate credit to the original author(s) and the sourceprovide a link to the Creative Commons licenceand indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licenceunless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted useyou will need to obtain permission directly from the copyright holder. To view a copy of this licencevisit http://creativecommons.org/licenses/by-nc-nd/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

XuD.LiJ. & RenZ. Supply chain information security sharing technology based on blockchain consensus algorithm and federated learning. Sci Rep (2026). https://doi.org/10.1038/s41598-026-46101-z

Download citation

  • Received: 19 June 2025

  • Accepted: 24 March 2026

  • Published: 09 April 2026

  • DOI: https://doi.org/10.1038/s41598-026-46101-z

Share this article

Anyone you share the following link with will be able to read this content:

Sorrya shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Blockchain
  • Consensus algorithm
  • Federated learning
  • Supply chain
  • Information security
  • Data sharing
Download PDF

Advertisement

登录

首页 排行榜
反馈 友链-推书君 免责声明