Reputation Systems for Supply Chains: The Challenge of Achieving Privacy Preservation
- URL: http://arxiv.org/abs/2311.01060v1
- Date: Thu, 2 Nov 2023 08:23:53 GMT
- Title: Reputation Systems for Supply Chains: The Challenge of Achieving Privacy Preservation
- Authors: Lennart Bader, Jan Pennekamp, Emildeon Thevaraj, Maria Spiß, Salil S. Kanhere, Klaus Wehrle,
- Abstract summary: This paper outlines specific challenges privacy-cautious stakeholders in volatile supply chain networks introduce.
We also give an overview of the diverse landscape of privacy-preserving reputation systems and their properties.
For future work, we identify the need of evaluating whether novel systems address the supply chain-specific privacy and confidentiality needs.
- Score: 8.957735395143498
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Consumers frequently interact with reputation systems to rate products, services, and deliveries. While past research extensively studied different conceptual approaches to realize such systems securely and privacy-preservingly, these concepts are not yet in use in business-to-business environments. In this paper, (1) we thus outline which specific challenges privacy-cautious stakeholders in volatile supply chain networks introduce, (2) give an overview of the diverse landscape of privacy-preserving reputation systems and their properties, and (3) based on well-established concepts from supply chain information systems and cryptography, we further propose an initial concept that accounts for the aforementioned challenges by utilizing fully homomorphic encryption. For future work, we identify the need of evaluating whether novel systems address the supply chain-specific privacy and confidentiality needs.
Related papers
- Generative AI-enabled Blockchain Networks: Fundamentals, Applications,
and Case Study [73.87110604150315]
Generative Artificial Intelligence (GAI) has emerged as a promising solution to address challenges of blockchain technology.
In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains.
arXiv Detail & Related papers (2024-01-28T10:46:17Z) - The Privacy Pillar -- A Conceptual Framework for Foundation Model-based Systems [10.261775049562708]
Foundation models present both significant challenges and incredible opportunities.
There is currently a lack of consensus regarding the comprehensive scope of both technical and non-technical issues that the privacy evaluation process should encompass.
This paper introduces a novel conceptual framework that integrates various responsible AI patterns from multiple perspectives.
arXiv Detail & Related papers (2023-11-13T00:44:06Z) - A Survey on Privacy of Health Data Lifecycle: A Taxonomy, Review, and Future Directions [1.3927943269211591]
We review existing work and distill 10 distinct privacy concerns occurring in a health data lifecycle.
We propose a taxonomy of techniques used for privacy preservation in healthcare.
We identify several future research directions to mitigate the security challenges for privacy preservation in health data management.
arXiv Detail & Related papers (2023-11-09T14:37:41Z) - Blockchain-enabled Data Governance for Privacy-Preserved Sharing of Confidential Data [1.6006586061577806]
We propose a blockchain-based data governance system that employs attribute-based encryption to prevent privacy leakage and credential misuse.
First, our ABE encryption system can handle multi-authority use cases while protecting identity privacy and hiding access policy.
Second, applying the Advanced Encryption Standard (AES) for data encryption makes the whole system efficient and responsive to real-world conditions.
arXiv Detail & Related papers (2023-09-08T05:01:59Z) - Advancing Differential Privacy: Where We Are Now and Future Directions for Real-World Deployment [100.1798289103163]
We present a detailed review of current practices and state-of-the-art methodologies in the field of differential privacy (DP)
Key points and high-level contents of the article were originated from the discussions from "Differential Privacy (DP): Challenges Towards the Next Frontier"
This article aims to provide a reference point for the algorithmic and design decisions within the realm of privacy, highlighting important challenges and potential research directions.
arXiv Detail & Related papers (2023-04-14T05:29:18Z) - Understanding Ethics, Privacy, and Regulations in Smart Video
Surveillance for Public Safety [2.4956060473718407]
This paper focuses on the role of design considering ethical and privacy challenges in Smart Video Surveillance (SVS) systems.
We use several Artificial Intelligence algorithms, such as object detection, single and multi camera re-identification, action recognition, and anomaly detection, to provide a basic functional system.
arXiv Detail & Related papers (2022-12-25T17:14:18Z) - Cross-Network Social User Embedding with Hybrid Differential Privacy
Guarantees [81.6471440778355]
We propose a Cross-network Social User Embedding framework, namely DP-CroSUE, to learn the comprehensive representations of users in a privacy-preserving way.
In particular, for each heterogeneous social network, we first introduce a hybrid differential privacy notion to capture the variation of privacy expectations for heterogeneous data types.
To further enhance user embeddings, a novel cross-network GCN embedding model is designed to transfer knowledge across networks through those aligned users.
arXiv Detail & Related papers (2022-09-04T06:22:37Z) - Blockchain-based Recommender Systems: Applications, Challenges and
Future Opportunities [2.979263512221363]
blockchain technology is presented as a promising strategy to promote security and privacy preservation in recommender systems.
This paper presents a holistic review of blockchain-based recommender systems covering challenges, open issues and solutions.
arXiv Detail & Related papers (2021-11-22T20:09:38Z) - Biometrics: Trust, but Verify [49.9641823975828]
Biometric recognition has exploded into a plethora of different applications around the globe.
There are a number of outstanding problems and concerns pertaining to the various sub-modules of biometric recognition systems.
arXiv Detail & Related papers (2021-05-14T03:07:25Z) - Privacy and Robustness in Federated Learning: Attacks and Defenses [74.62641494122988]
We conduct the first comprehensive survey on this topic.
Through a concise introduction to the concept of FL, and a unique taxonomy covering: 1) threat models; 2) poisoning attacks and defenses against robustness; 3) inference attacks and defenses against privacy, we provide an accessible review of this important topic.
arXiv Detail & Related papers (2020-12-07T12:11:45Z) - Trustworthy AI Inference Systems: An Industry Research View [58.000323504158054]
We provide an industry research view for approaching the design, deployment, and operation of trustworthy AI inference systems.
We highlight opportunities and challenges in AI systems using trusted execution environments.
We outline areas of further development that require the global collective attention of industry, academia, and government researchers.
arXiv Detail & Related papers (2020-08-10T23:05:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.