Posted on by Achim D. Brucker, licensed under CC BY-ND 4.0.

Confidentiality Enhanced Life-Cycle Assessment

The environmental impact of products is an important factor in buying decisions of customers, and it is also an increasing concern of lawmakers. Hence, companies are interested in determining the ecological footprint of their products. Life-cycle assessment (LCA) is a standardized method for computing the ecological footprint of a product.

Today, LCA is usually not computed in real-time and neither is LCA using actual sensor data: in contrast it is computed “offline” using “historic” values based on exemplary measurements. With the rise of the Internet of Things (IoT), LCA computations can be based on actual production processes. While an LCA based on actual sensor data is desirable from an ecological perspective, it also can reveal trade secrets, e.g., details about production processes or business relationships.

In our SPBP paper [1], we present an approach, using secure multi-party computation, to enable the confidential data sharing required for an LCA computation using sensor data.

Our prototype is available at https://git.logicalhacking.com/PrivacyPreservingLCA/ConfidentialLCA under an Apache license (SPDX-License-Identifier: Apache-2.0).

References

[1]
A. D. Brucker and S. Yalman, Confidentiality enhanced life-cycle assessment,” in BPMN 2021 workshops, 2021.

Welcome to the blog of the Software Assurance & Security Research Team at the University of Exeter. We blog regularly news, tips & tricks, as well as fun facts about software assurance, reliability, security, testing, verification, hacking, and logic.

You can also follow us on Twitter: @logicalhacking.

Categories

Archive

Tags

academia ai android apidesign appsec bitcoin blockchain bpmn browser browserextensions browsersecurity bug certification chrome composition cordova dast devops devsecops dom dsbd efsm epsrc event extensions fixeffort floss formaldocument formalmethods funding hol-ocl hol-testgen humanfactor hybridapps iast industry internetofthings iot isabelle/hol isabelledof isadof latex logic maintance malicous mbst mobile mobile apps modelinference modeling monads monitoring msc ocl ontology opensource owasp patches pet phd phdlife phishing policy protocols publishing reliability research safelinks safety sap sast sdlc secdevops secureprogramming security securityengineering securitytesting semantics servicecomposition skills smartcontract smartthings softwareeinginering softwaresecurity softwaresupplychain solidity staff&positions statemachine studentproject tcb test&proof testing tips&tricks tools transport tuos uk uoe upgrade usability verification vulnerabilities vulnerableapplication webinar websecurity

Search


blog whole site