Assuring Non-fraudulent Transactions in Cash on Delivery by Introducing Double Smart Contracts
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 5
Abstract
The adoption of decentralized cryptocurrency plat-forms is growing fast, thanks to the implementation of Blockchain technology and smart contracts. It encourages the novel frame-works in a wide range of applications including finance and payment methods such as cash on delivery. However, a large number of smart contracts developed for cash on delivery suffer from fraudulent transactions which enable malicious participants to break the signed contracts without sufficient penalties. A shipper will involve in the system and place a mortgage to ensure reliability. A buyer also pledges an amount of money when making the order. Our process not only ensures the interests of a seller but also prevents a fraud shipper. The penalties will be made in two scenarios: (i) the buyer refuses to receive the commodities without any reliable reasons; and (ii) the shipper attempts to make any modification on the delivered goods during transportation. To help developers create more secure and reliable cash on delivery system, we introduce double smart contracts, a framework rooted in Blockchain technology and Ethereum, to tackle those mentioned problems. We also contribute our solution as an open source software that developers can easily add to their implementation to enhance functionality.
Authors and Affiliations
Ngoc Tien Thanh Le, Quoc Nghiep Nguyen, Nguyen Ngoc Phien, Nghia Duong-Trung, Thai Tam Huynh, The Phuc Nguyen, Ha Xuan Son
FTL Algorithm using Warm Block Technique for QLC+SLC Hybrid NAND Flash Memory
When applying the existing flash translation layer technique to a mixed NAND flash storage device composed of Quad Level Cell and Single Level Cell, because the characteristics of a semiconductor chip are not taken into...
Fast–ICA for Mechanical Fault Detection and Identification in Electromechanical Systems for Wind Turbine Applications
Recently, the approaches based on source separation are increasingly adopted for the fault diagnosis in several industrial applications. In particular, Independent Component Analysis (ICA) method is attractive, thanks to...
Duplicates Detection Within Incomplete Data Sets Using Blocking and Dynamic Sorting Key Methods
In database records duplicate detection, blocking method is commonly used to reduce the number of comparisons between the candidate record pairs. The main procedure in this method requires selecting attributes that will...
Detection of Suspicious of Diabetic Feet using Thermal Image
Diabetic foot is a chronic disease that occurs due to increased glucose levels, in addition to being the result of poorly controlled diabetes. In this case, the affected foot increases in temperature, because it contains...
Applying Machine Learning Techniques for Classifying Cyclin-Dependent Kinase Inhibitors
The importance of protein kinases made them a target for many drug design studies. They play an essential role in cell cycle development and many other biological processes. Kinases are divided into different subfamilies...