Posted on by Achim D. Brucker, licensed under CC BY-ND 4.0.

Ensuring Confidentiality in Supply Chains

Modern supply chains of goods and services rely heavily on close collaborations between the partners within these supply chains. Consequently, there is a demand for IT systems that support collaborations between business partners, for instance, allowing for joint computations for global optimizations (in contrast to local optimizations that each partner can do on their own). Still, businesses are very reluctant to share data or connect their enterprise systems to allow for such joint computation. The topmost factor that businesses name as reason for not collaborating, is their security concern in general and, in particular, the confidentiality of business critical data.

While there are techniques (e.g., homomorphic encryption or secure multi-party computation) that allow joint computations and, at the same time, that are protecting the confidentiality of the data that flows into such a joint computation, they are not widely used. One of the main problems that prevent their adoption is their perceived performance overhead.

In our recently published journal paper [brucker.ea:confidential-supply-chains:2025], which supercedes our earlier conference version [brucker.ea:confidential-lca:2021], we address this problem by an approach that utilized the structure of supply chains by decomposing global computations into local groups, and applying secure multi-party computation within each group. This results in a scalable (resulting in a significant smaller runtime overhead than traditional approaches) and secure (i. e., protecting the confidentiality of data provided by supply chain partners) approach for joint computations within supply chains. We evaluate our approach using life-cycle assessment (LCA) as a case study. Our experiments show that, for instance, secure LCA computations even in supply chains with 15 partners are possible within less than two minutes, while traditional approaches using secure multi-party computation need more than a day.

References §

[1]
A. D. Brucker and S. Yalman, “Confidentiality enhanced life-cycle assessment,” in BPMN 2021 workshops, 2021. Author copy: http://logicalhacking.com/publications/brucker.ea-confidential-lca-2021/
[2]
A. D. Brucker and S. Yalman, “Ensuring confidentiality in supply chains with an application to life-cycle assessment,” Software: Practice and Experience (SPE), 2025, doi: 10.1002/smr.2763. Author copy: http://logicalhacking.com/publications/brucker.ea-confidential-supply-chains-2025/

Welcome to the blog of the Software Assurance & Security Research Team at the University of Exeter. We blog regularly news, tips & tricks, as well as fun facts about software assurance, reliability, security, testing, verification, hacking, and logic.

You can also follow us on Twitter: @logicalhacking.

Categories

Archive

Tags

FormalMethods Isabelle/HOL ML/AI ProgramVerification SoftwareEngineering academia ai android apidesign appsec bitcoin blockchain bpmn browser browserextensions browsersecurity bug certification chrome composition confidentiality cordova dast devops devsecops dom dsbd efsm epsrc event events extensions fixeffort floss formaldocument formalmethods formalverification funding hol-ocl hol-testgen humanfactor hybridapps iast industry internetofthings iot isabelle/hol isabelledof isabellehol isadof latex logic maintance malicous mbst mobile mobile apps modelinference modeling monads monitoring msc neuralnetwork ocl ontology opensource owasp patches pedadogy pet phd phdlife phishing policy programminglanguages protocols protocolverfication publishing reliability research safelinks safety sap sast sdlc secdevops secureprogramming security securityengineering securitytesting semantics servicecomposition skills smartcontract smartcontracts smartthings smpc softwareeinginering softwaresecurity softwaresupplychain solidity staff&positions statemachine studentproject tcb teaching test&proof test@proof testing tips&tricks tools transport tuos uk uoe upgrade usability verification vulnerabilities vulnerableapplication webinar websecurity

Search


blog whole site