Asian Journal of Information Technology

Year: 2018
Volume: 17
Issue: 1
Page No. 14 - 22

Distributed Secure Information Flow Provenance Model Using BYOD to Control and Monitor Spurious Drugs

Authors : D. Vinod and S. Chandrasekaran

Abstract: The objective of the research is to propose a distributed secure provenance system to gauge the trustworthiness of the drugs amidst spurious and counterfeit drugs. The distributed secure model has been implemented to share information provenance procedures in a health care industry. There are a number of drug and cosmetic acts in the country for the control of illicit drugs but more than 33% of the drugs are not genuine which necessitates a distributed provenance system with a high degree of data security. In order to support the internal users with BYOD (Bring Your Own Device) whereas to monitor such unusual happenings against organization policy structure, apart from the customer awareness and severe punishment for such illicit activities, an on demand service which will assist the end user to know the origin of the drugs, the various transformations during processing and the final dealers. The secure provenance model addresses minimum loss of privacy of the pharmaceutical manufacturing companies, so as to enhance the trustworthiness of the product and also the people. The model is implemented as a mobile deployment model with secured provenance against possible attacks.

How to cite this article:

D. Vinod and S. Chandrasekaran, 2018. Distributed Secure Information Flow Provenance Model Using BYOD to Control and Monitor Spurious Drugs. Asian Journal of Information Technology, 17: 14-22.

Design and power by Medwell Web Development Team. © Medwell Publishing 2022 All Rights Reserved