Abstract
The pharmaceutical supply chain is increasingly tending towards multi-party collaboration and high-dimensional data flow. Currently, existing blockchain technologies lack collaborative optimization of privacy and integrity for the pharmaceutical industry. Thus, this study tries to solve these issues by designing a blockchain-based approach for preserving data privacy integrity in a pharmaceutical supply chain. First, data privacy protection algorithms along with integrity verification are designed to implement access control and prevent leakage of sensitive information. Subsequently, a bidirectional gated recurrent unit, residual network, and extreme gradient boosting are used to develop a smart contract vulnerability identification approach. Finally, a data protection model is constructed. Experiments show that the proposed data verification algorithm achieves an attribute matching success rate of 99.94%, a high-concurrency authorization error rate of 0.07%, and encryption-decryption time lower than comparison algorithms. The proposed model reaches a maximum vulnerability detection accuracy of 99.31%, an area under the curve of 0.963, a minimum response latency of 132.64 ms, and a traceability data integrity verification rate of 99.96%. The results indicate that this mechanism effectively balances data privacy protection and integrity verification requirements in the pharmaceutical supply chain and provides a new method for secure data management.
References
Ghadge A, Bourlakis M, Kamble S, Seuring S. Blockchain implementation in pharmaceutical supply chains: A review and conceptual framework. International Journal of Production Research, 2023, 61(19): 6633–6651.
Chen E. Analysis of E-commerce Security Protection Technology Based on YOLO Algorithm Optimized by Lightweight Neural Network. Journal of Cyber Security and Mobility, 2025, 14(4): 849–876.
Fan M, Guo H. Privacy Attack Identification and Protection Strategy Analysis Based on Vertical Federation Clusteringr. Journal of Cyber Security and Mobility, 2025, 14(2): 475–504.
Akram W, Joshi R, Haider T, Sharma P, Jain V, Garud N, Singh N. Blockchain technology: A potential tool for the management of pharma supply chain. Research in Social and Administrative Pharmacy, 2024, 20(6): 156–164.
Maariz A, Wiputra M A, Armanto M R D. Blockchain technology: Revolutionizing data integrity and security in digital environments. International Transactions on Education Technology, 2024, 2(2): 92–98.
Wang J. Identification of SQL Injection Security Vulnerabilities in Web applications Based on Binary Code Similarity. Journal of Cyber Security and Mobility, 2024, 13(6): 1239–1262.
Kutybayeva K, Razaque A, Rai H M. Enhancing Pharmaceutical Supply Chain Transparency and Security with Blockchain and Big Data Integration. Procedia Computer Science, 2025, 259: 1511–1522.
Honarmand F, Keshavarz-Haddad A. T-AODV: A trust-based routing against black-hole attacks in VANETs. Peer-to-Peer Networking and Applications, 2024, 17(3): 1309–1321.
Mahamune A A, Chandane M M. Trust-based co-operative routing for secure communication in mobile ad hoc networks. Digital Communications and Networks, 2024, 10(4): 1079–1087.
Su B, Zhu B. TBMOR: A lightweight trust-based model for secure routing of opportunistic networks. Egyptian Informatics Journal, 2023, 24(2): 205–214.
Huang Y, Yu Y, Li H, Li Y, Tian A. Blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection. Digital Communications and Networks, 2022, 8(5): 604–613.
Jiang J, Zhang Y, Zhu Y, Dong X, Wang L, Xiang Y. DCIV: Decentralized cross-chain data integrity verification with blockchain. Journal of King Saud University-Computer and Information Sciences, 2022, 34(10): 7988–7999.
Nkereuwem E, Ansa G. Enhancing data integrity in telemedicine system using blockchain approach. Researchers Journal of Science and Technology, 2023, 3(2): 55–67.
Yuan Y, Zhang J, Xu W, Li Z. Identity-based public data integrity verification scheme in cloud storage system via blockchain. The Journal of Supercomputing, 2022, 78(6): 8509–8530.
Prantl T, Zeck T, Horn L, Bauer A, Krupitzer C, Kounev S. Towards a cryptography encyclopedia: a survey on attribute-based encryption. Journal of Surveillance, Security and Safety, 2023, 4(4): 129–154.
Benarroch D, Campanelli M, Fiore D, Gurkan K, Kolonelos D. Zero-knowledge proofs for set membership: Efficient, succinct, modular. Designs, Codes and Cryptography, 2023, 91(11): 3457–3525.
Sun J, Li C, Song Y. A network security situation prediction approach based on MAML and BiGRU. Journal of Intelligent & Fuzzy Systems, 2024, 47(3): 307–319.
Li Y, Qi J, Chu X, Mu W. Customer segmentation using K-means clustering and the hybrid particle swarm optimization algorithm. The computer journal, 2023, 66(4): 941–962.
Yang M, Wang H, Wan Z. PUL-ABE: An efficient and quantum-resistant CP-ABE with policy update in cloud storage. IEEE Transactions on Services Computing, 2023, 17(3): 1126–1139.
Meng L, Xu H, Tang R, Zhou X, Han, Z. Dual hybrid cp-abe: How to provide forward security without a trusted authority in vehicular opportunistic computing. IEEE Internet of Things Journal, 2023, 11(5): 8800–8814.
Wahab S N, Ahmed N, Ab Talib M S. An overview of the SWOT analysis in India’s pharmaceutical supply chain. Arab Gulf Journal of Scientific Research, 2024, 42(3): 771–787.
Unnikrishnan K N, Victer Paul P. Zero-knowledge proof (ZKP) techniques within blockchain technology. Journal of Internet Services and Information Security, 2025, 15(2): 926–941.
Rana M R R, Nawaz A, Ali T, El-Sherbeeny A M, Ali W. A BiLSTM-CF and BiGRU-based deep sentiment analysis model to explore customer reviews for effective recommendations. Engineering, Technology & Applied Science Research, 2023, 13(5): 11739–11746.
Gheisari M, Hamidpour H, Liu Y, Saedi P, Raza A, Jalili A, Rokhsati H, Amin R. Data Mining Techniques for Web Mining: A Survey. Artificial Intelligence and Applications, 2023, 1(1): 3–10.
Qiao Y, Xu H M, Zhou W J, Peng B, Hu B, Guo X. A BiGRU joint optimized attention network for recognition of drilling conditions. Petroleum Science, 2023, 20(6): 3624–3637.
Xu L, Xu W, Cui Q, Li M, Luo B, Tang, Y. Deep heuristic evolutionary regression model based on the fusion of BiGRU and BiLSTM. Cognitive Computation, 2023, 15(5): 1672–1686.
Budholiya K, Shrivastava S K, Sharma V. An optimized XGBoost based diagnostic system for effective prediction of heart disease. Journal of King Saud University-Computer and Information Sciences, 2022, 34(7): 4514–4523.
Qiu Y, Zhou J, Khandelwal M, Yang H, Yang P, Li C. Performance evaluation of hybrid WOA-XGBoost, GWO-XGBoost and BO-XGBoost models to predict blast-induced ground vibration. Engineering with Computers, 2022, 38(5): 4145–4162.
Singamaneni K K, Muhammad G, Ali Z. A novel multi-qubit quantum key distribution ciphertext-policy attribute-based encryption model to improve cloud security for consumers. IEEE Transactions on Consumer Electronics, 2023, 70(1): 1092–1101.
Zhang F, Wang H, Zhou L, Xu D, Liu L. A blockchain-based security and trust mechanism for AI-enabled IIoT systems. Future Generation Computer Systems, 2023, 146: 78–85.
Han J, Bei M, Chen L, Xiang Y, Cao J, Guo F, Meng W. Attribute-based information flow control. The Computer Journal, 2019, 62(8): 1214–1231.
Zheng G, Kong L, Brintrup A. Federated machine learning for privacy preserving, collective supply chain risk prediction. International Journal of Production Research, 2023, 61(23): 8115–8132.
Xu C, Qu Y, Xiang Y, Luan T H, Gao L. An optimized privacy-protected blockchain system for supply chain on internet of things. IEEE Internet of Things Journal, 2023, 11(5): 9019–9030.
Li J, Han D, Wu Z, Wang J, Li K C, Castiglione A. A novel system for medical equipment supply chain traceability based on alliance chain and attribute and role access control. Future Generation Computer Systems, 2023, 142: 195–211.
Sarfaraz A, Chakrabortty R K, Essam D L. AccessChain: An access control framework to protect data access in blockchain enabled supply chain. Future Generation Computer Systems, 2023, 148: 380–394.

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright (c) 2026 Journal of Cyber Security and Mobility
