About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Mobile and Ubiquitous Systems: Computing, Networking and Services. 20th EAI International Conference, MobiQuitous 2023, Melbourne, VIC, Australia, November 14–17, 2023, Proceedings, Part I

Research Article

Reputation Systems for Supply Chains: The Challenge of Achieving Privacy Preservation

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-63989-0_24,
        author={Lennart Bader and Jan Pennekamp and Emildeon Thevaraj and Maria Spi\`{a} and Salil S. Kanhere and Klaus Wehrle},
        title={Reputation Systems for Supply Chains: The Challenge of Achieving Privacy Preservation},
        proceedings={Mobile and Ubiquitous Systems: Computing, Networking and Services. 20th EAI International Conference, MobiQuitous 2023, Melbourne, VIC, Australia, November 14--17, 2023, Proceedings, Part I},
        proceedings_a={MOBIQUITOUS},
        year={2024},
        month={7},
        keywords={SCM confidentiality anonymity voter votee FHE},
        doi={10.1007/978-3-031-63989-0_24}
    }
    
  • Lennart Bader
    Jan Pennekamp
    Emildeon Thevaraj
    Maria Spiß
    Salil S. Kanhere
    Klaus Wehrle
    Year: 2024
    Reputation Systems for Supply Chains: The Challenge of Achieving Privacy Preservation
    MOBIQUITOUS
    Springer
    DOI: 10.1007/978-3-031-63989-0_24
Lennart Bader1, Jan Pennekamp2,*, Emildeon Thevaraj2, Maria Spiß, Salil S. Kanhere3, Klaus Wehrle2
  • 1: Cyber Analysis and Defense
  • 2: Communication and Distributed Systems
  • 3: School of Computer Science and Engineering, University of New South Wales
*Contact email: jan.pennekamp@comsys.rwth-aachen.de

Abstract

Consumers frequently interact with reputation systems to rate products, services, and deliveries. While past research extensively studied different conceptual approaches to realize such systems securely and privacy-preservingly, these concepts are not yet in use in business-to-business environments. In this paper, (1) we thus outline which specific challenges privacy-cautious stakeholders in volatile supply chain networks introduce, (2) give an overview of the diverse landscape of privacy-preserving reputation systems and their properties, and (3) based on well-established concepts from supply chain information systems and cryptography, we further propose an initial concept that accounts for the aforementioned challenges by utilizing fully homomorphic encryption. For future work, we identify the need of evaluating whether novel systems address the supply chain-specific privacy and confidentiality needs.

Keywords
SCM confidentiality anonymity voter votee FHE
Published
2024-07-19
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-63989-0_24
Copyright © 2023–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL