Show simple item record

dc.contributor.authorBrucker, AD
dc.contributor.authorYalman, S
dc.date.accessioned2025-02-03T10:44:28Z
dc.date.issued2025-01-27
dc.date.updated2025-02-02T15:51:58Z
dc.description.abstractModern supply chains of goods and services rely heavily on close collaborations between the partners within these supply chains. Consequently, there is a demand for IT systems that support collaborations between business partners, for instance, allowing for joint computations for global optimizations (in contrast to local optimizations that each partner can do on their own). Still, businesses are very reluctant to share data or connect their enterprise systems to allow for such joint computation. The topmost factor that businesses name as reason for not collaborating, is their security concern in general and, in particular, the confidentiality of business critical data. While there are techniques (e.g., homomorphic encryption or secure multi-party computation) that allow joint computations and, at the same time, that are protecting the confidentiality of the data that flows into such a joint computation, they are not widely used. One of the main problems that prevent their adoption is their perceived performance overhead. In this paper, we address this problem by an approach that utilized the structure of supply chains by decomposing global computations into local groups, and applying secure multi-party computation within each group. This results in a scalable (resulting in a significant smaller runtime overhead than traditional approaches) and secure (i. e., protecting the confidentiality of data provided by supply chain partners) approach for joint computations within supply chains. We evaluate our approach using life-cycle assessment (LCA) as a case study. Our experiments show that, for instance, secure LCA computations even in supply chains with 15 partners are possible within less than two minutes, while traditional approaches using secure multi-party computation need more than a day.en_GB
dc.description.sponsorshipTurkish Ministry of National Educationen_GB
dc.description.sponsorshipUKRIen_GB
dc.identifier.citationVol. 37 (1), article e2763en_GB
dc.identifier.doihttps://doi.org/10.1002/smr.2763
dc.identifier.urihttp://hdl.handle.net/10871/139893
dc.identifierORCID: 0000-0002-6355-1200 (Brucker, Achim D)
dc.language.isoenen_GB
dc.publisherWileyen_GB
dc.rights© 2025 The author(s). For the purpose of open access, the author has applied a Creative Commons Attribution (CC BY) licence to any Author Accepted Manuscript version arising from this submission.en_GB
dc.subjectconfidential computationen_GB
dc.subjectlife-cycle assessment (LCA)en_GB
dc.subjectsecure multiparty computation (SMPC)en_GB
dc.subjectsupply chainen_GB
dc.titleEnsuring Confidentiality in Supply Chains With an Application to Life-Cycle Assessmenten_GB
dc.typeArticleen_GB
dc.date.available2025-02-03T10:44:28Z
exeter.article-numbere2763
dc.descriptionThis is the author accepted manuscript. The final version is available from Wiley via the DOI in this recorden_GB
dc.descriptionData Availability Statement: Data sharing is not applicable. No new data generated.en_GB
dc.identifier.eissn2047-7481
dc.identifier.journalJournal of Software: Evolution and Processen_GB
dc.rights.urihttps://creativecommons.org/licenses/by/4.0en_GB
dcterms.dateAccepted2025-01-02
dcterms.dateSubmitted2024-03-29
rioxxterms.versionAMen_GB
rioxxterms.licenseref.startdate2025-01-02
rioxxterms.typeJournal Article/Reviewen_GB
refterms.dateFCD2025-02-02T15:52:00Z
refterms.versionFCDAM
refterms.dateFOA2025-03-07T01:08:29Z
refterms.panelBen_GB
exeter.rights-retention-statementYes


Files in this item

This item appears in the following Collection(s)

Show simple item record

© 2025 The author(s). For the purpose of open access, the author has applied a Creative Commons Attribution (CC BY) licence to any Author Accepted Manuscript version arising from this submission.
Except where otherwise noted, this item's licence is described as © 2025 The author(s). For the purpose of open access, the author has applied a Creative Commons Attribution (CC BY) licence to any Author Accepted Manuscript version arising from this submission.