A Survey on the Privacy-Preserving Applications of Secure Transformation in Collaborative Supply Chains

Bachelor Thesis (2021)
Author(s)

A.A. Ştefan (TU Delft - Electrical Engineering, Mathematics and Computer Science)

Contributor(s)

Z. Erkin – Mentor (TU Delft - Cyber Security)

Tianyu Li – Mentor (TU Delft - Cyber Security)

K. Hildebrandt – Coach (TU Delft - Computer Graphics and Visualisation)

Faculty
Electrical Engineering, Mathematics and Computer Science
Copyright
© 2021 Andrei Ştefan
More Info
expand_more
Publication Year
2021
Language
English
Copyright
© 2021 Andrei Ştefan
Graduation Date
01-07-2021
Awarding Institution
Delft University of Technology
Project
CSE3000 Research Project
Programme
Computer Science and Engineering
Faculty
Electrical Engineering, Mathematics and Computer Science
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Collaboration is a key technique in modern supply chains, both for building trust with other companies, but also for reducing costs or maximizing profits. It is an approach which provides all involved parties with benefits that they could not possibly achieve on their own. Collaboration, however, requires abundant information, including proprietary information which the owners might not want to disclose publicly. This leads to the main privacy concern, namely ensuring the privacy of proprietary information, since access to this information can mean a competitive advantage in the market. Several techniques which enable collaboration while preserving privacy have been developed over time, including secure transformation, which is a non-cryptographic approach. The main focus of this paper is studying this technique and its recent developments, along with the feasibility of using it to preserve privacy in supply chains, through a literature review. Secure transformation is still somewhat in its infancy, with much theoretical research being conducted, yet the technique still not being employed in practice. Therefore, reviewing the research done is the most suitable approach to answering the question of how secure transformation applications can preserve privacy in collaborative supply chains. The main result of this research is that secure transformation is a double-edged sword which promises effective computation for certain collaborative problems, with the downside of having weaker security guarantees compared to cryptographic approaches.

Files

Final_paper_1.pdf
(pdf | 0.232 Mb)
License info not available