skip to main content
10.1145/1741866.1741884acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Privacy-preserving computation of benchmarks on item-level data using RFID

Published: 22 March 2010 Publication History

Abstract

Currently, companies are about to optimize their internal processes by monitoring items they handle with Radio Frequency Identification (RFID). However, there is a risk that sensitive information is disclosed when sharing RFID data with other companies. Therefore, companies are unwilling to share RFID data. At first glance, Secure Multi-Party Computation (SMC) might reconciliate data sharing with the privacy concerns. However, SMC requires the collaboration of all parties involved in a protocol. This prevents using SMC for many applications based on item-level RFID data collected in supply chains, since some parties may be competitors or have conflicting interests. We present protocols for securely and privately computing item-level metrics using only existing communication links (e.g., messages stored on RFID tags) and an oblivious third party. This enables optimizing the supply chain using novel item-level metrics without compromising sensitive information.

References

[1]
A. Ben-David, N. Nisan, and B. Pinkas. FairplayMP: A System for Secure Multi-Party Computation. Proceedings of the 15th ACM Conference on Computer and Communications Security, 2008.
[2]
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. Proceedings of the 20th annual ACM symposium on Theory of computing, 1988.
[3]
P. Bogetoft, D. Christensen, I. Damgard, M. Geisler, T. Jakobsen, M. Kroigaard, J. Nielsen, J. Nielsen, K. Nielsen, J. Pagter, M. Schwartzbach, T. Toft. Secure Multiparty Computation Goes Live. Proceedings of the 13th International Conference on Financial Cryptography and Data Security, 2009.
[4]
S. Chopra, and M. Sodhi. Looking for the Bang from the RFID Buck. Supply Chain Management Review. Available at http://www.scmr.com/article/CA6444375.html, 2007.
[5]
I. Damgard, and Y. Ishai. Constant-Round Multiparty Computation Using a Black-Box Psuedorandom Generator. Proceedings of Crypto, 2005.
[6]
J. Garay, and R. Ostrovsky. Almost-Everywhere Secure Computation. Proceedings of Eurocrypt, 2008.
[7]
O. Goldreich. Secure Multi-party Computation. Available at www.wisdom.weizmann.ac.il/Üoded/pp.html, 2002.
[8]
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. Proceedings of the 19th ACM Symposium on Theory of Computing, 1987.
[9]
W. Hedgepeth. RFID Metrics. CRC Press, 2007.
[10]
F. Kerschbaum. Practical Privacy-Preserving Benchmarking. Proceedings of the 23rd IFIP International Information Security Conference, 2008.
[11]
F. Kerschbaum. Adapting Privacy-Preserving Computation to the Service Provider Model. Proceedings of the International Conference on Information Privacy, Security, Risk and Trust, 2009.
[12]
F. Kerschbaum, D. Dahlmeier, A. Schröpfer, and D. Biswas. On the Practical Importance of Communication Complexity for Secure Multi-Party Computation Protocols. Proceedings of the 24th ACM Symposium on Applied Computing, 2009.
[13]
C. Kuerschner, F. Thiesse, and E. Fleisch. An analysis of data-on-tag concepts in manufacturing. Proceedings of the 3rd Konferenz Ubiquitäre und Mobile Informations systeme, 2008.
[14]
Y. Lindell, B. Pinkas, and N. Smart. Implementing two-party computation efficiently with security against malicious adversaries. Proceedings of the 6th Conference on Security and Cryptography for Networks, 2008.
[15]
D. Naccache, and J. Stern. A New Public-Key Cryptosystem Based on Higher Residues. Proceedings of the ACM Conference on Computer and Communications Security, 1998.
[16]
M. Naor, B. Pinkas and R. Sumner. Privacy Preserving Auctions and Mechanism Design. Proceedings of the 1st ACM Conference on Electronic Commerce, 1999.
[17]
M. Naor, and B. Pinkas. Efficient Oblivious Transfer Protocols. Proceedings of the Symposium on Data Structures and Algorithms, 2001.
[18]
P. Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. Proceedings of EUROCRYPT, 1999.
[19]
B. Santos, and L. Smith. RFID in the Supply Chain: Panacea or Pandora's Box? Communications of the ACM 51(10), 2008.
[20]
S. Sarma, D. Brock, and D. Engels. Radio frequency identification and the electronic product code. IEEE Micro 21(6), 2001.
[21]
A. Yao. Protocols for Secure Computations. Proceedings of the IEEE Symposium on Foundations of Computer Science, 1982.

Cited By

View all
  • (2023)Designing Secure and Privacy-Preserving Information Systems for Industry BenchmarkingAdvanced Information Systems Engineering10.1007/978-3-031-34560-9_29(489-505)Online publication date: 8-Jun-2023
  • (2018)Information sharing in supply chains: a review of risks and opportunities using the systematic literature network analysis (SLNA)Supply Chain Management: An International Journal10.1108/SCM-01-2018-0003Online publication date: 31-Dec-2018
  • (2017)Selective access for supply chain management in the cloud2017 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS.2017.8228710(476-482)Online publication date: Oct-2017
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WiSec '10: Proceedings of the third ACM conference on Wireless network security
March 2010
186 pages
ISBN:9781605589237
DOI:10.1145/1741866
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 March 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. rfid
  2. secure multi-party computation
  3. supply chain metrics

Qualifiers

  • Research-article

Conference

WISEC '10
Sponsor:
WISEC '10: Third ACM Conference on Wireless Network Security
March 22 - 24, 2010
New Jersey, Hoboken, USA

Acceptance Rates

Overall Acceptance Rate 98 of 338 submissions, 29%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Designing Secure and Privacy-Preserving Information Systems for Industry BenchmarkingAdvanced Information Systems Engineering10.1007/978-3-031-34560-9_29(489-505)Online publication date: 8-Jun-2023
  • (2018)Information sharing in supply chains: a review of risks and opportunities using the systematic literature network analysis (SLNA)Supply Chain Management: An International Journal10.1108/SCM-01-2018-0003Online publication date: 31-Dec-2018
  • (2017)Selective access for supply chain management in the cloud2017 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS.2017.8228710(476-482)Online publication date: Oct-2017
  • (2014)A survey on trust management for Internet of ThingsJournal of Network and Computer Applications10.1016/j.jnca.2014.01.01442(120-134)Online publication date: Jun-2014
  • (2013)A Client Privacy Preserving Discovery Service SchemeProceedings of the 2013 27th International Conference on Advanced Information Networking and Applications Workshops10.1109/WAINA.2013.9(935-940)Online publication date: 25-Mar-2013
  • (2012)PPS: Privacy-preserving statistics using RFID tags2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)10.1109/WoWMoM.2012.6263773(1-6)Online publication date: Jun-2012
  • (2012)Notice of Removal A client privacy preserving discovery service scheme2012 International Conference on Computer Systems and Industrial Informatics10.1109/ICCSII.2012.6454610(1-6)Online publication date: Dec-2012
  • (2011)Securely disseminating RFID eventsProceedings of the 5th ACM international conference on Distributed event-based system10.1145/2002259.2002302(327-334)Online publication date: 11-Jul-2011
  • (2011)Secure Sharing of Item-Level Data in the CloudProceedings of the 2011 IEEE 4th International Conference on Cloud Computing10.1109/CLOUD.2011.78(756-757)Online publication date: 4-Jul-2011
  • (2010)Privacy-preserving multi-objective evolutionary algorithmsProceedings of the 11th international conference on Parallel problem solving from nature: Part II10.5555/1887255.1887261(41-50)Online publication date: 11-Sep-2010
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media