Nothing Special   »   [go: up one dir, main page]

Skip to main content

Confidentiality Enhanced Life-Cycle Assessment

  • Conference paper
  • First Online:
Business Process Management Workshops (BPM 2021)

Abstract

The environmental impact of products is an important factor in buying decisions of customers and it is also an increasing concern of law makers. Hence, companies are interested in determining the ecological footprint of their products. Life-cycle assessment (LCA) is a standardized method for computing the ecological footprint of a product.

Today, LCA is usually not computed in real-time and neither is LCA using actual sensor data: in contrast it is computed “offline” using “historic” values based on exemplary measurements. With the rise of the Internet of Things (IoT), LCA computations can be based on actual production processes. While an LCA based on actual sensor data is desirable from an ecological perspective, it also can reveal trade secrets, e.g., details about production processes or business relationships.

In this paper, we present an approach, using secure multi-party computation, to enable the confidential data sharing required for an LCA computation using sensor data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Life cycle assessment of aluminium: Inventory data for the primary aluminium industry (2007). http://www.world-aluminium.org/media/filer_public/2013/01/15/fl0000166.pdf

  2. Acar, A., Aksu, H., Uluagac, A.S., Conti, M.: A survey on homomorphic encryption schemes. ACM Comput. Surv. 51(4) (2018). https://doi.org/10.1145/3214303

  3. Accorsi, R., Lehmann, A.: Automatic information flow analysis of business process models. In: Barros, A., Gal, A., Kindler, E. (eds.) BPM 2012. LNCS, vol. 7481, pp. 172–187. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32885-5_13

    Chapter  Google Scholar 

  4. Aly, A., et al.: SCALE-MAMBA v1.13 (2021)

    Google Scholar 

  5. Arbuckle, P., Kahn, E., Kriesberg, A.: Challenges to sharing data and models for life cycle assessment. ACM J. Data Inf. Qual. 9(1) (2017). https://doi.org/10.1145/3106236

  6. Asgari, N., Nikbakhsh, E., Hill, A., Farahani, R.Z.: Supply chain management 1982–2015. J. Manag. Math. 27(3) (2016). https://doi.org/10.1093/imaman/dpw004

  7. Asim, M., Yautsiukhin, A., Brucker, A.D., Baker, T., Shi, Q., Lempereur, B.: Security policy monitoring of BPMN-based service compositions. J. Softw. Evol. Proc. 30(1) (2018). https://doi.org/10.1002/smr.1944

  8. Belluccini, S., Nicola, R.D., Dumas, M., Pullonen, P., Re, B., Tiezzi, F.: Verification of privacy-enhanced collaborations. In: FormaliSE. ACM (2020). https://doi.org/10.1145/3372020.3391553

  9. Brucker, A.D., Hang, I.: Secure and compliant implementation of business process-driven systems. In: La Rosa, M., Soffer, P. (eds.) BPM 2012. LNBIP, vol. 132, pp. 662–674. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-36285-9_66

    Chapter  Google Scholar 

  10. Brucker, A.D., Hang, I., Lückemeyer, G., Ruparel, R.: SecureBPMN: modeling and enforcing access control requirements in business processes. In: Atluri, V., Vaidya, J., Kern, A., Kantarcioglu, M. (eds.) SACMAT. ACM (2012). https://doi.org/10.1145/2295136.2295160

  11. Camilleri, M.A.: Corporate sustainability and responsibility: creating value for business, society and the environment. Asian J. Sustain. Soc. Responsib. 2(1), 59–74 (2017). https://doi.org/10.1186/s41180-017-0016-5

    Article  Google Scholar 

  12. Ciancimino, E., Cannella, S., Bruccoleri, M., Framinan, J.M.: On the bullwhip avoidance phase: the synchronised supply chain. Eur. J. Oper. Res. 221(1) (2012). https://doi.org/10.1016/j.ejor.2012.02.039

  13. Evans, D., Kolesnikov, V., Rosulek, M.: A pragmatic introduction to secure multi-party computation. Found. Trends Priv. Secur. 2(2–3) (2018). https://doi.org/10.1561/3300000019

  14. Hauschild, M.Z., Rosenbaum, R.K., Olsen, S.I. (eds.): Life Cycle Assessment. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-56475-3

    Book  Google Scholar 

  15. Heijungs, R., Suh, S.: The Computational Structure of Life Cycle Assessment. Eco-Efficiency in Industry and Science. Springer, Heidelberg (2002)

    Google Scholar 

  16. Hong, Y., Vaidya, J., Wang, S.: A survey of privacy-aware supply chain collaboration. Inf. Syst. 28(1) (2014). https://doi.org/10.2308/isys-50692

  17. Hotz, L., von Riegen, S., Pokahr, A., Braubach, L., Schwinghammer, T.: Monitoring BPMN-processes with rules in a distributed environment. In: Aït-Kaci, H., Hu, Y., Nalepa, G.J., Palmirani, M., Roman, D. (eds.) RuleML2012, CEUR, vol. 874. CEUR-WS.org (2012)

    Google Scholar 

  18. Huong Tran, T.T., Childerhouse, P., Deakins, E.: Supply chain information sharing: challenges and risk mitigation strategies. J. Manuf. Technol. Manag. 27(8) (2016). https://doi.org/10.1108/JMTM-03-2016-0033

  19. Ibn-Mohammed, T., et al.: Integrated hybrid life cycle assessment and supply chain environmental profile evaluations of lead-based (lead zirconate titanate) versus lead-free (potassium sodium niobate) piezoelectric ceramics. Energy Environ. Sci. 9 (2016). https://doi.org/10.1039/c6ee02429g

  20. Irshad, H., Shafiq, B., Vaidya, J., Bashir, M.A., Shamail, S., Adam, N.R.: Preserving privacy in collaborative business process composition. In: Obaidat, M.S., Lorenz, P., Samarati, P. (eds.) SECRYPT. SciTePress (2015). https://doi.org/10.5220/0005567801120123

  21. Kerschbaum, F.: Secure and sustainable benchmarking in clouds - a multi-party cloud application with an untrusted service provider. Bus. Inf. Syst. Eng. 3(3) (2011). https://doi.org/10.1007/s12599-011-0153-9

  22. Kuczenski, B., Sahin, C., El Abbadi, A.: Privacy-preserving aggregation in life cycle assessment. Environ. Syst. Decis. 37(1), 13–21 (2016). https://doi.org/10.1007/s10669-016-9620-7

    Article  Google Scholar 

  23. Labda, W., Mehandjiev, N., Sampaio, P.: Modeling of privacy-aware business processes in BPMN to protect personal data. In: Cho, Y., Shin, S.Y., Kim, S., Hung, C., Hong, J. (eds.) SAC. ACM (2014). https://doi.org/10.1145/2554850.2555014

  24. Li, L., Zhang, H.: Confidentiality and information sharing in supply chain coordination. Manag. Sci. 54(8) (2008). https://doi.org/10.1287/mnsc.1070.0851

  25. Parida, V., Wincent, J.: Why and how to compete through sustainability: a review and outline of trends influencing firm and network-level transformation. Int. Entrep. Manag. J. 15(1), 1–19 (2019). https://doi.org/10.1007/s11365-019-00558-9

    Article  Google Scholar 

  26. Sahin, C., Kuczenski, B., Egecioglu, Ö., Abbadi, A.E.: Towards practical privacy-preserving life cycle assessment computations. In: Ahn, G., Pretschner, A., Ghinita, G. (eds.) CODAS. ACM (2017). https://doi.org/10.1145/3029806.3029845

  27. Salnitri, M., Dalpiaz, F., Giorgini, P.: Designing secure business processes with SecBPMN. Softw. Syst. Model. 16(3), 737–757 (2015). https://doi.org/10.1007/s10270-015-0499-4

    Article  Google Scholar 

  28. Schwarzbach, B., Glöckner, M., Makarov, S., Franczyk, B., Ludwig, A.: Privacy preserving BPMS for collaborative BPaaS. In: Ganzha, M., Maciaszek, L.A., Paprzycki, M. (eds.) FedCSIS, ACSIS, vol. 11 (2017). https://doi.org/10.15439/2017F330

  29. Shostack, A.: Threat Modeling: Designing for Security. Wiley, Hoboken (2014)

    Google Scholar 

  30. Toots, A., et al.: Business process privacy analysis in pleak. In: Hähnle, R., van der Aalst, W. (eds.) FASE 2019. LNCS, vol. 11424, pp. 306–312. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-16722-6_18

    Chapter  Google Scholar 

  31. Tran, T.T.H., Childerhouse, P., Deakins, E.: Supply chain information sharing: challenges and risk mitigation strategies. J. Manuf. Technol. Manag. 27(8) (2016). https://doi.org/10.1108/JMTM-03-2016-0033

Download references

Acknowledgements

This work was partially funded by the Turkish Ministry of National Education.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sakine Yalman .

Editor information

Editors and Affiliations

Ethics declarations

Availability

Our prototype is available at https://git.logicalhacking.com/PrivacyPreservingLCA/ConfidentialLCA under an Apache license (SPDX-License-Identifier: Apache-2.0).

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Brucker, A.D., Yalman, S. (2022). Confidentiality Enhanced Life-Cycle Assessment. In: Marrella, A., Weber, B. (eds) Business Process Management Workshops. BPM 2021. Lecture Notes in Business Information Processing, vol 436. Springer, Cham. https://doi.org/10.1007/978-3-030-94343-1_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-94343-1_33

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-94342-4

  • Online ISBN: 978-3-030-94343-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics