Skip navigation

Security and privacy for data mining of RFID-enabled product supply chains

Security and privacy for data mining of RFID-enabled product supply chains

Yao, Xiaoming, Du, Wencai, Zhou, Xiaoyi and Ma, Jixin (2016) Security and privacy for data mining of RFID-enabled product supply chains. In: IEEE International Conference on Science and Information Conference (SAI 2016). IEEE, pp. 1037-1046. ISBN 978-1-4673-8460-5 (doi:10.1109/SAI.2016.7556106)

[thumbnail of Author Accepted Manuscript]
Preview
PDF (Author Accepted Manuscript)
17009 MA_Security_&_Privacy_for_Data_Mining_2016.pdf - Accepted Version

Download (678kB) | Preview

Abstract

The e-Pedigree used for verifying the authenticity of the products in RFID-enabled product supply chains plays a very important role in product anti-counterfeiting and risk management, but it is also vulnerable to malicious attacks and privacy leakage. While the radio frequency identification (RFID) technology bears merits such as automatic wireless identification without direct eye-sight contact, its security has been one of the main concerns in recent researches such as tag data tampering and cloning. Moreover, privacy leakage of the partners along the supply chains may lead to complete compromise of the whole system, and in consequence all authenticated products may be replaced by the faked ones! Quite different from other conventional databases, datasets in supply chain scenarios are temporally correlated, and every party of the system can only be semi-trusted. In this paper, a system that incorporates merits of both the secure multi-party computing and differential privacy is proposed to address the security and privacy issues, focusing on the vulnerability analysis of the data mining with distributed EPCIS datasets of e-pedigree having temporal relations from multiple range and aggregate queries in typical supply chain scenarios and the related algorithms. Theoretical analysis shows that our proposed system meets perfectly our preset design goals, while some of the other problems leave for future research.

Item Type: Conference Proceedings
Title of Proceedings: IEEE International Conference on Science and Information Conference (SAI 2016)
Additional Information: 2016 SAI Computing Conference was held from 13-15 July 2016, London, UK.
Uncontrolled Keywords: Supply Chain, e-Pedigree, Multiparty Security, Anti-counterfeiting, Differential Privacy, Temporal Relation
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Faculty / School / Research Centre / Research Group: Faculty of Engineering & Science > School of Computing & Mathematical Sciences (CMS)
Faculty of Engineering & Science
Last Modified: 04 Mar 2022 13:07
URI: http://gala.gre.ac.uk/id/eprint/17009

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics