Privacy Preserving Products Tracking in Clustered Supply Chain

نویسندگان

  • Mehdi Khalfaoui
  • Kaoutar Elkhiyaoui
  • Refik Molva
چکیده

One of the main applications of supply chain management is product tracking. We define it as tracing the product path along the supply chain. In this paper, we propose a solution to track the product while preserving the privacy of the supply chain actors involved and the path traced. More precisely, this solution allows to identify which path a product has taken in the supply chain, without disclosing sensitive information. To allow product tracking, the product are attached to a sensor node. This latter stores a trace of the product path along the supply chain. The trace is computed using polynomial based signature techniques. We restrict the visibility of the manager of the supply chain by organizing the supply chain facilities into clusters. Also, we encrypt the path traces to ensure security against adversaries. To perform access control in the sensor nodes we use randomized Rabin scheme which is known for being efficient and lightweight. In this paper, sensor nodes are not required to perform heavy computation, which makes our solution feasible. The main achievement of this work is a cryptographic mechanism that allows to the supply chain manager to trace the supply chain entities that product went through, without disclosing the identity of those entities. Keywords-Supply Chain; Privacy; Tracking; Cluster.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Product Tracking in Supply Chain

In this paper, we propose a secure and efficient product tracking mechanism implemented using wireless sensor nodes. This mechanism aims at tracking goods, and actions performed by each actor of the supply chain, while preserving the actors’ privacy. Our solution is based on generating identifiers of the actors and their activities using AND Anti collusion codes. The identifiers are encrypted u...

متن کامل

A multi objective mixed integer programming model for design of a sustainable meat supply chain network

In the recent decades, rapid population growth has led to the significant increase in food demand. Food supply chain has always been one of the most important and challenging management issues. Product with short age, especially foodstuffs, is the most problematic challenges for supply chain management. These challenges are mainly due to the diversity in the number of these goods, the special n...

متن کامل

Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer Convenience

Radio frequency identification (RFID) technology is expected to enhance the operational efficiency of supply chain processes and customer service as well as adding digital functionality to products that were previously non-digital such as, e.g., washing machines automatically adapting to the clothes put into the machine. However, consumer response clearly shows significant concern and resistanc...

متن کامل

Security and privacy in RFID systems. (Sécurité et protection de la vie privée dans les systèmes RFID)

While RFID systems are one of the key enablers helping the prototype of pervasive computer applications, the deployment of RFID technologies also comes with new privacy and security concerns ranging from people tracking and industrial espionage to product cloning and denial of service. Cryptographic solutions to tackle these issues were in general challenged by the limited resources of RFID tag...

متن کامل

A Privacy-preserving Protocol to Improve the Quality of Location-based Services

Location-based services allow locations of users to be determined accurately and enable a new type of business opportunities. Due to characteristics of the services, an enormous amount of potentially sensitive information is required. In order to avoid unnecessary exposure of details of the underlying tracking and users’ personal information, this paper proposes a novel protocol inspired by pri...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011