Abstract
Existing supply chain information security methods all suffer from the difficulty of balancing information sharing efficiency and information privacy protection. Data is prone to leakageresulting in an increase in the overall risk of the supply chain. In response to this situationthe study proposes a supply chain information security sharing method based on a blockchain consensus algorithm and federated learning. The study designs a blockchain formula algorithm based on a verifiable mechanism and combines this algorithm with federated learning to construct an encryption model. To address the issue of privacy leakage that is prone to occur in federated learningthis study introduces casual pseudo-random functions and cuckoo hashing to process data and reduce communication complexitythereby avoiding hash conflicts. Finallythe encryption model is applied to the data transmission systemand combined with multi-factor authenticationthe secure sharing of supply chain information is achieved. The experiment results indicated that the average latency of the consensus algorithm during node election was 115.20msand during node replacementthe average latency was 8.56ms. The information security sharing method proposed in the study achieved an accuracy rate of 92.48% in generating data after processingwith a data tampering detection rate of 98.87%. The frequency of privacy breaches during the experiment was only 0.1%and the average response time was 1.0 s. The study proposes a new technical framework that takes into account both privacy protection and efficient sharingeffectively balancing the trust establishment and data security requirements in multi-party collaboration in the supply chainand providing a verifiable and traceable technical path for information sharing in complex network environments. At the same timeby optimizing the integration mode of the consensus mechanism and federated learningthe system communication overhead and response delay have been significantly reducedand the overall operational efficiency has been improved.
Similar content being viewed by others
Data availability
The datasets used and/or analyzed during the current study available from the corresponding author on reasonable request.
References
TangY. M.ChauK. Y.KuoW. T. & LiuX. X. IoT-based information system on cold-chain logistics service quality (ICCLSQ) management in logistics 4.0. Inform. Syst. Front. 26(2)689–708. https://doi.org/10.1007/s10796-023-10393-7 (2024).
PrajapatiP. & ShahP. A review on secure data deduplication: Cloud storage security issue. J. King Saud Univ. Comput. Inform. Sci. 34(7)3996–4007. https://doi.org/10.1016/j.jksuci.2020.10.021 (2022).
PhilsoophianM.AkhavanP. & NamvarM. The mediating role of blockchain technology in improvement of knowledge sharing for supply chain management. Manag. Decis. 60(3)784–805. https://doi.org/10.1108/md-08-2020-1122 (2022).
BechtsisD.TsolakisN. & IakovouE. Data-driven secureresilient and sustainable supply chains: gapsopportunitiesand a new generalised data sharing and data monetisation framework. Int. J. Prod. Res. 60(14)4397–4417. https://doi.org/10.1080/00207543.2021.1957506 (2022).
LiY. et al. Threats and defenses in the federated learning life cycle: a comprehensive survey and challenges. IEEE Trans. Neural Netw. Learn. Syst. 5(15)1–21. https://doi.org/10.1109/TNNLS.2025.3563537 (2025).
Ramakrishna & Ali ShaikM. A. Comprehensive analysis of cryptographic algorithms: evaluating securityefficiencyand future challenges. IEEE Access. 13 (1)11576–11593. https://doi.org/10.1109/ACCESS.2024.3518533 (2025).
MouJ.ZhangZ.BanerjeeS. & ZhangY. Combining semi-tensor product compressed sensing and session keys for low-cost encryption of batch information in WBANs. IEEE Internet Things J. 11(20)33565–33576. https://doi.org/10.1109/JIOT.2024.3429349 (2024).
LianZ.ZengQ.WangW.GadekalluT. R. & SuC. Blockchain-based two-stage federated learning with non-IID data in IoMT system. IEEE Trans. Comput. Soc. Syst. 10(4)1701–1710. https://doi.org/10.1109/TCSS.2022.3216802 (2023).
AzbegK.OuchettoO. & AndaloussiS. J. BlockMedCare: A healthcare system based on IoTBlockchain and IPFS for data management security. Egypt. Inform. J. 23(2)329–343. https://doi.org/10.1016/j.eij.2022.02.004 (2022).
RabieinejadE.YazdinejadA.DehghantanhaA. & SrivastavaG. Two-level privacy-preserving framework: federated learning for attack detection in the consumer Internet of Things. IEEE Trans. Consum. Electron. 70(1)4258–4265. https://doi.org/10.1109/TCE.2024.3349490 (2024).
RaoB. et al. Privacy inference attack and defense in centralized and federated learning: A comprehensive survey. IEEE Trans. Artif. Intell. 6(2)333–353. https://doi.org/10.1109/TAI.2024.3363670 (2025).
ZhuJ.CaoJ.SaxenaD.JiangS. & FerradiH. Blockchain-empowered federated learning: Challengessolutionsand future directions. ACM Comput. Surv. 55(11)1–31. https://doi.org/10.1145/3570953 (2023).
ZhuM.YuanJ.WangG.XuZ. & WeiK. Enhancing collaborative machine learning for security and privacy in federated learning. JTPES 44(2)74–82. https://doi.org/10.53469/jtpes.2024.04(02).11 (2024).
KhanA. A. et al. BDLT-IoMT-a novel architecture: SVM machine learning for robust and secure data processing in Internet of Medical Things with blockchain cybersecurity. J. Supercomput. 81(1)1–22. https://doi.org/10.1007/s11227-024-06782-7 (2025).
KhanA. A. et al. Blockchain-enabled infrastructural security solution for serverless consortium fog and edge computing. PeerJ Comput. Sci. 3 (26)1933–1943. https://doi.org/10.7717/peerj-c.s.1933 (2024).
LotfiR.RajabzadehM.ZamaniA. & RajabiM. S. Viable supply chain with vendor-managed inventory approach by considering blockchainrisk and robustness. Ann. Oper. Res. 344(2)575–594. https://doi.org/10.1007/s10479-022-05119-y (2025).
LotfiR. et al. Resource-constrained time–cost-quality-energy-environment tradeoff problem by considering blockchain technologyrisk and robustness: a case study of healthcare project. Environ. Sci. Pollut. Res. 29(42)63560–63576. https://doi.org/10.1007/s11356-022-20334-7 (2022).
LotfiR. et al. A data-driven robust optimization in viable supply chain network design by considering open innovation and blockchain technology. J. Clean. Prod. 436(1)140369–140381. https://doi.org/10.1016/j.jclepro.2023.140369 (2024).
HebbiC. & MamathaH. Comprehensive dataset building and recognition of isolated handwritten kannada characters using machine learning models. Artif. Intell. 1(3)179–190. https://doi.org/10.47852/bonviewAIA3202624 (2023).
AliA. et al. A novel homomorphic encryption and consortium blockchain-based hybrid deep learning model for industrial internet of medical things. IEEE Trans. Netw. Sci. Eng. 10(5)2402–2418. https://doi.org/10.1109/TNSE.2023.3285070 (2023).
MooreS. K. Chips to compute with encrypted data are coming: fully homomorphic encryption could make data unhackable. IEEE Spectr. 61(1)38–40. https://doi.org/10.1109/MSPEC.2024.10380468 (2024).
KumariK. A.SharmaA.ChakrabortyC. & AnanyaM. Preserving health care data security and privacy using Carmichael’s theorem-based homomorphic encryption and modified enhanced homomorphic encryption schemes in edge computing systems. Big Data-US 10(1)1–17. https://doi.org/10.1089/big.2021.0012 (2022).
RazikinK. & SoewitoB. Cybersecurity decision support model to designing information technology security system based on risk analysis and cybersecurity framework. Egypt. Inform. J. 23(3)383–404. https://doi.org/10.1016/j.eij.2022.03.001 (2022).
WangY.ZhangF. & LiX. Methodology for mapping the ecological security pattern and ecological network in the arid region of XinjiangChina. Remote Sens. 15(11)2836–2848. https://doi.org/10.3390/rs15112836 (2023).
LiangW. et al. PDPChain: A consortium blockchain-based privacy protection scheme for personal data. IEEE Trans. Reliab. 72(2)586–598. https://doi.org/10.1109/TR.2022.3190932 (2023).
JayabalanJ. & JeyanthiN. Scalable blockchain model using off-chain IPFS storage for healthcare data security and privacy. J. Parallel. Distr. Com. 164(1)152–167. https://doi.org/10.1016/j.jpdc.2022.03.009 (2022).
ZhangY.WangT. & YuenK. V. Construction site information decentralized management using blockchain and smart contracts. Comput.-Aided Civ. Infrastruct. Eng. 37(11)1450–1467. https://doi.org/10.1111/mice.12804 (2022).
AlsamhiS. H.ShvetsovA. V. & ShvetsovaS. V. Blockchain-empowered security and energy efficiency of drone swarm consensus for environment exploration. IEEE T. Green. Commun. 7(1)328–338. https://doi.org/10.1109/TGCN.2022.3195479 (2023).
LiuY.HaoX. & RenW. A blockchain-based decentralizedfair and authenticated information sharing scheme in zero trust internet-of-things. IEEE Trans. Comput. 72(2)501–512. https://doi.org/10.1109/TC.2022.3157996 (2023).
XuX. & HeY. Blockchain application in modern logistics information sharing: A review and case study analysis. Prod. Plan. Control 35(9)886–900. https://doi.org/10.1080/09537287.2022.2058997 (2024).
Al-ShaaraniF. & GutubA. Securing matrix counting-based secret-sharing involving crypto steganography. J. King Saud Univ. Comput. Inform. Sci. 34(9)6909–6924. https://doi.org/10.1016/j.jksuci.2021.09.009 (2022).
ZhangQ.SunH. & GaoX. Time-division ISAC enabled connected automated vehicles cooperation algorithm design and performance evaluation. IEEE J. Sel. Areas Commun. 40(7)2206–2218. https://doi.org/10.1109/JSAC.2022.3155506 (2022).
MishraR.RameshD.EdlaD. R. & QiL. VaccineChain: A checkpoint assisted scalable blockchain based secure vaccine supply chain with selective revocation. J. Ind. Inf. Integr. 34(1)100485–100500. https://doi.org/10.1016/j.jii.2023.100485 (2023).
MishraR.RameshD.MohammadN. & MondalB. Blockchain enabled secure pharmaceutical supply chain framework with traceability: An efficient searchable pharmachain approach. Cluster Comput. 27(10)13621–13641. https://doi.org/10.1007/s10586-024-04626-w (2024).
Funding
The research is supported by: Scientific research Foundation of the Education Department of Hubei Provinceunder Grant NO. B2020301; the major project Foundation of philosophy and social sciences research in Hubei Province under Grant NO. 20ZD107; And the Fundation of excellent young and middle-aged scientific and Technological Innovation Team project in Hubei Province under Grant NO. T201943.
Author information
Authors and Affiliations
Contributions
D.X. processed the numerical attribute linear programming of communication big dataand the mutual information feature quantity of communication big data numerical attribute was extracted by the cloud extended distributed feature fitting method. J.L. Combined with fuzzy C-means clustering and linear regression analysisthe statistical analysis of big data numerical attribute feature information was carried outand the associated attribute sample set of communication big data numerical attribute cloud grid distribution was constructed. D.X. and Z.W.R. did the experimentsrecorded dataand created manuscripts. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Licensewhich permits any non-commercial usesharingdistribution and reproduction in any medium or formatas long as you give appropriate credit to the original author(s) and the sourceprovide a link to the Creative Commons licenceand indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licenceunless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted useyou will need to obtain permission directly from the copyright holder. To view a copy of this licencevisit http://creativecommons.org/licenses/by-nc-nd/4.0/.
About this article
Cite this article
XuD.LiJ. & RenZ. Supply chain information security sharing technology based on blockchain consensus algorithm and federated learning. Sci Rep (2026). https://doi.org/10.1038/s41598-026-46101-z
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598-026-46101-z


