Abstract
The environmental impact of products is an important factor in buying decisions of customers and it is also an increasing concern of law makers. Hence, companies are interested in determining the ecological footprint of their products. Life-cycle assessment (LCA) is a standardized method for computing the ecological footprint of a product.
Today, LCA is usually not computed in real-time and neither is LCA using actual sensor data: in contrast it is computed “offline” using “historic” values based on exemplary measurements. With the rise of the Internet of Things (IoT), LCA computations can be based on actual production processes. While an LCA based on actual sensor data is desirable from an ecological perspective, it also can reveal trade secrets, e.g., details about production processes or business relationships.
In this paper, we present an approach, using secure multi-party computation, to enable the confidential data sharing required for an LCA computation using sensor data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Life cycle assessment of aluminium: Inventory data for the primary aluminium industry (2007). http://www.world-aluminium.org/media/filer_public/2013/01/15/fl0000166.pdf
Acar, A., Aksu, H., Uluagac, A.S., Conti, M.: A survey on homomorphic encryption schemes. ACM Comput. Surv. 51(4) (2018). https://doi.org/10.1145/3214303
Accorsi, R., Lehmann, A.: Automatic information flow analysis of business process models. In: Barros, A., Gal, A., Kindler, E. (eds.) BPM 2012. LNCS, vol. 7481, pp. 172–187. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32885-5_13
Aly, A., et al.: SCALE-MAMBA v1.13 (2021)
Arbuckle, P., Kahn, E., Kriesberg, A.: Challenges to sharing data and models for life cycle assessment. ACM J. Data Inf. Qual. 9(1) (2017). https://doi.org/10.1145/3106236
Asgari, N., Nikbakhsh, E., Hill, A., Farahani, R.Z.: Supply chain management 1982–2015. J. Manag. Math. 27(3) (2016). https://doi.org/10.1093/imaman/dpw004
Asim, M., Yautsiukhin, A., Brucker, A.D., Baker, T., Shi, Q., Lempereur, B.: Security policy monitoring of BPMN-based service compositions. J. Softw. Evol. Proc. 30(1) (2018). https://doi.org/10.1002/smr.1944
Belluccini, S., Nicola, R.D., Dumas, M., Pullonen, P., Re, B., Tiezzi, F.: Verification of privacy-enhanced collaborations. In: FormaliSE. ACM (2020). https://doi.org/10.1145/3372020.3391553
Brucker, A.D., Hang, I.: Secure and compliant implementation of business process-driven systems. In: La Rosa, M., Soffer, P. (eds.) BPM 2012. LNBIP, vol. 132, pp. 662–674. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-36285-9_66
Brucker, A.D., Hang, I., Lückemeyer, G., Ruparel, R.: SecureBPMN: modeling and enforcing access control requirements in business processes. In: Atluri, V., Vaidya, J., Kern, A., Kantarcioglu, M. (eds.) SACMAT. ACM (2012). https://doi.org/10.1145/2295136.2295160
Camilleri, M.A.: Corporate sustainability and responsibility: creating value for business, society and the environment. Asian J. Sustain. Soc. Responsib. 2(1), 59–74 (2017). https://doi.org/10.1186/s41180-017-0016-5
Ciancimino, E., Cannella, S., Bruccoleri, M., Framinan, J.M.: On the bullwhip avoidance phase: the synchronised supply chain. Eur. J. Oper. Res. 221(1) (2012). https://doi.org/10.1016/j.ejor.2012.02.039
Evans, D., Kolesnikov, V., Rosulek, M.: A pragmatic introduction to secure multi-party computation. Found. Trends Priv. Secur. 2(2–3) (2018). https://doi.org/10.1561/3300000019
Hauschild, M.Z., Rosenbaum, R.K., Olsen, S.I. (eds.): Life Cycle Assessment. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-56475-3
Heijungs, R., Suh, S.: The Computational Structure of Life Cycle Assessment. Eco-Efficiency in Industry and Science. Springer, Heidelberg (2002)
Hong, Y., Vaidya, J., Wang, S.: A survey of privacy-aware supply chain collaboration. Inf. Syst. 28(1) (2014). https://doi.org/10.2308/isys-50692
Hotz, L., von Riegen, S., Pokahr, A., Braubach, L., Schwinghammer, T.: Monitoring BPMN-processes with rules in a distributed environment. In: Aït-Kaci, H., Hu, Y., Nalepa, G.J., Palmirani, M., Roman, D. (eds.) RuleML2012, CEUR, vol. 874. CEUR-WS.org (2012)
Huong Tran, T.T., Childerhouse, P., Deakins, E.: Supply chain information sharing: challenges and risk mitigation strategies. J. Manuf. Technol. Manag. 27(8) (2016). https://doi.org/10.1108/JMTM-03-2016-0033
Ibn-Mohammed, T., et al.: Integrated hybrid life cycle assessment and supply chain environmental profile evaluations of lead-based (lead zirconate titanate) versus lead-free (potassium sodium niobate) piezoelectric ceramics. Energy Environ. Sci. 9 (2016). https://doi.org/10.1039/c6ee02429g
Irshad, H., Shafiq, B., Vaidya, J., Bashir, M.A., Shamail, S., Adam, N.R.: Preserving privacy in collaborative business process composition. In: Obaidat, M.S., Lorenz, P., Samarati, P. (eds.) SECRYPT. SciTePress (2015). https://doi.org/10.5220/0005567801120123
Kerschbaum, F.: Secure and sustainable benchmarking in clouds - a multi-party cloud application with an untrusted service provider. Bus. Inf. Syst. Eng. 3(3) (2011). https://doi.org/10.1007/s12599-011-0153-9
Kuczenski, B., Sahin, C., El Abbadi, A.: Privacy-preserving aggregation in life cycle assessment. Environ. Syst. Decis. 37(1), 13–21 (2016). https://doi.org/10.1007/s10669-016-9620-7
Labda, W., Mehandjiev, N., Sampaio, P.: Modeling of privacy-aware business processes in BPMN to protect personal data. In: Cho, Y., Shin, S.Y., Kim, S., Hung, C., Hong, J. (eds.) SAC. ACM (2014). https://doi.org/10.1145/2554850.2555014
Li, L., Zhang, H.: Confidentiality and information sharing in supply chain coordination. Manag. Sci. 54(8) (2008). https://doi.org/10.1287/mnsc.1070.0851
Parida, V., Wincent, J.: Why and how to compete through sustainability: a review and outline of trends influencing firm and network-level transformation. Int. Entrep. Manag. J. 15(1), 1–19 (2019). https://doi.org/10.1007/s11365-019-00558-9
Sahin, C., Kuczenski, B., Egecioglu, Ö., Abbadi, A.E.: Towards practical privacy-preserving life cycle assessment computations. In: Ahn, G., Pretschner, A., Ghinita, G. (eds.) CODAS. ACM (2017). https://doi.org/10.1145/3029806.3029845
Salnitri, M., Dalpiaz, F., Giorgini, P.: Designing secure business processes with SecBPMN. Softw. Syst. Model. 16(3), 737–757 (2015). https://doi.org/10.1007/s10270-015-0499-4
Schwarzbach, B., Glöckner, M., Makarov, S., Franczyk, B., Ludwig, A.: Privacy preserving BPMS for collaborative BPaaS. In: Ganzha, M., Maciaszek, L.A., Paprzycki, M. (eds.) FedCSIS, ACSIS, vol. 11 (2017). https://doi.org/10.15439/2017F330
Shostack, A.: Threat Modeling: Designing for Security. Wiley, Hoboken (2014)
Toots, A., et al.: Business process privacy analysis in pleak. In: Hähnle, R., van der Aalst, W. (eds.) FASE 2019. LNCS, vol. 11424, pp. 306–312. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-16722-6_18
Tran, T.T.H., Childerhouse, P., Deakins, E.: Supply chain information sharing: challenges and risk mitigation strategies. J. Manuf. Technol. Manag. 27(8) (2016). https://doi.org/10.1108/JMTM-03-2016-0033
Acknowledgements
This work was partially funded by the Turkish Ministry of National Education.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Ethics declarations
Availability
Our prototype is available at https://git.logicalhacking.com/PrivacyPreservingLCA/ConfidentialLCA under an Apache license (SPDX-License-Identifier: Apache-2.0).
Rights and permissions
Copyright information
© 2022 Springer Nature Switzerland AG
About this paper
Cite this paper
Brucker, A.D., Yalman, S. (2022). Confidentiality Enhanced Life-Cycle Assessment. In: Marrella, A., Weber, B. (eds) Business Process Management Workshops. BPM 2021. Lecture Notes in Business Information Processing, vol 436. Springer, Cham. https://doi.org/10.1007/978-3-030-94343-1_33
Download citation
DOI: https://doi.org/10.1007/978-3-030-94343-1_33
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-94342-4
Online ISBN: 978-3-030-94343-1
eBook Packages: Computer ScienceComputer Science (R0)