Volume no :
9 |
Issue no :
02
Article Type :
Scholarly Article
Author :
D.D.Shipne, Sanchi V. Rajane, , Gaurav.P.Birhade, Shantanu.S.Thosre, Rushikesh.R.Bhople
Published Date :
June, 2025
Publisher :
Journal of Artificial Intelligence and Cyber Security (JAICS)
Page No: 1 - 11
Abstract : Block chain technology is being explored to enhance transparency, efficiency, and trust in the a sector. At its core, block chain is a decentralized digital ledger that records transactions across a network of computers. In agriculture, this technology can revolutionize supply chain management by enabling farmers, distributors, retailers, and consumers to trace the journey of food products from farm to table. By recording every transaction or activity related to a product on the block chain, such as planting, harvesting, processing, and shipping, stakeholders can verify the authenticity and quality of agricultural products. This transparency helps to combat food fraud, ensure food safety, and improve accountability throughout the supply chain. Moreover, block chain can facilitate direct peer-to-peer transactions between farmers and consumers, eliminating intermediaries and reducing costs. Smart contracts, which are self-executing contracts with the terms directly written into code, can automate payments based on predefined conditions, such as delivery confirmation or quality inspection. Despite its potential benefits, challenges such as scalability, interoperability with existing systems, and the need for widespread adoption and education among stakeholders remain barriers to the full integration of block chain technology in agriculture. Ongoing research and pilot projects are exploring ways to overcome these challenges and unlock the full potential of block chain in transforming the agricultural industry.
Keyword Blockchain, Agriculture, stakeholders, agro-cultural, Farming
Reference:

1) J. Liu, J. Yang, L. Xiong, and J. Pei, ‘‘Secure and efficient skyline queries on  encrypted data,’’ IEEE Trans. Knowl. Data Eng., vol. 31, no. 7, pp. 1397–1411, Jul.  2019

2) R. Li, Z. Xu, W. Kang, K. C. Yow, and C.-Z. Xu, ‘‘Efficient multi-keyword ranked  query over encrypted data in cloud computing,’’ Future Gener. Comput. Syst., vol.  30, pp. 179–190, Jan. 2014.

3) J. Chi, C. Hong, M. Zhang, and Z. Zhang, ‘‘Privacy-enhancing range query  processing over encrypted cloud databases,’’ in Proc. Web Inf. Syst. Eng., Miami,  FL, USA, 2015, pp. 63–77

4) R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, ‘‘Order preserving encryption for  numeric data,’’ in Proc. ACM SIGMOD Int. Conf. Manag. Data, Jun. 2004, pp. 563– 574.

5) Gentry, ‘‘Fully homomorphic encryption using ideal lattices,’’ in Proc. 41st Annu.  ACM Symp. Theory Comput., May 2009, pp. 169–178.

6) Cuzzocrea, P. Karras, and A. Vlachou, ‘‘Effective and efficient skyline query  processing over attribute-order-preserving-free encrypted data in cloud-enabled  databases,’’ Future Gener. Comput. Syst., vol. 126, pp. 237–251, Jan. 2022.

7) C. Lopes, V. C. Times, S. Matwin, R. R. Ciferri, and C. Dutra de Aguiar Ciferri,  ‘‘Processing OLAP queries over an encrypted data warehouse stored in the cloud,’’  in Proc. Dawe, 2014, pp. 195–207.

8) S. Fugkeaw and H. Sato, ‘‘Privacy-preserving access control model for big data  cloud,’’ in Proc. Int. Comput. Sci. Eng. Conf. (ICSEC), Nov. 2015, pp. 1–6, doi:  10.1109/ICSEC.2015.7401416.

9) M. Kantarcioglu and F. Shaon, ‘‘Securing big data in the age of AI,’’ in Proc. 1st  IEEE Int. Conf. Trust, Privacy Secur. Intell. Syst. Appl. (TPS-ISA), Dec. 2019, pp.  218–220, doi: 10.1109/TPS-ISA48467.2019. 00035.

10) S. Fugkeaw, ‘‘A lightweight policy update scheme for outsourced personal health  records sharing,’’ IEEE Access, vol. 9, pp. 54862–54871, 2021, doi:  10.1109/ACCESS.2021.3071150.