Skip to main content

A Framework for Secure and Trustworthy Data Management in Supply Chain

  • Conference paper
  • First Online:
Mobile Web and Intelligent Information Systems (MobiWIS 2019)

Abstract

In this paper, we consider a trustworthy framework for data management in a supply chain. The framework provides verifiable evidence for secure data management in each organization involved in a supply chain. It consists of three main components: black box systems that securely store digital evidence, verification services that verify the digital evidence and publish a guarantee document for data management, and a trusted directory service that manages the guarantee document. Furthermore, future directions for research are discussed in this paper. We believe the framework will improve security and trustworthiness of supply chains.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abeyratne, S.A., Monfared, R.P.: Blockchain ready manufacturing supply chain using distributed ledger. Int. J. Res. Eng. Technol. 05(09), 1–10 (2016)

    Article  Google Scholar 

  2. Ali, A., Mahfouz, A., Arisha, A.: Analysing supply chain resilience: integrating the constructs in a concept mapping framework via a systematic literature review. Suppl. Chain Manag.: Int. J. 22(1), 16–39 (2017)

    Article  Google Scholar 

  3. Atallah, M.J., Elmongui, H.G., Deshpande, V., Schwarz, L.B.: Secure supply-chain protocols. In: EEE International Conference on E-Commerce, 2003, CEC 2003, pp. 293–302, June 2003. https://doi.org/10.1109/COEC.2003.1210264

  4. Barron, S., Cho, Y.M., Hua, A., Norcross, W., Voigt, J., Haimes, Y.: Systems-based cyber security in the supply chain. In: 2016 IEEE Systems and Information Engineering Design Symposium (SIEDS), pp. 20–25, April 2016

    Google Scholar 

  5. Bhargava, B., Ranchal, R., Ben Othmane, L.: Secure information sharing in digital supply chains. In: 2013 3rd IEEE International Advance Computing Conference (IACC), pp. 1636–1640, February 2013

    Google Scholar 

  6. Boin, A., Kelle, P., Clay Whybark, D.: Resilient supply chains for extreme situations: outlining a new field of study. Int. J. Prod. Econ. 126(1), 1–6 (2010)

    Article  Google Scholar 

  7. Brindley, C., Ritchie, B.: Supply chain risk management and performance: a guiding framework for future development. Int. J. Oper. Prod. Manag. 27(3), 303–322 (2007)

    Article  Google Scholar 

  8. Christopher, M.: The agile supply chain: competing in volatile markets. Ind. Mark. Manage. 29(1), 37–44 (2000)

    Article  Google Scholar 

  9. Christopher, M., Peck, H.: Building the resilient supply chain. Int. J. Logistics Manag. 15(2), 1–14 (2004)

    Article  Google Scholar 

  10. Christopher, M., Towill, D.: An integrated model for the design of agile supply chains. Int. J. Phys. Distrib. Logistics Manag. 31(4), 235–246 (2001)

    Article  Google Scholar 

  11. Cosic, J., Baca, M.: Do we have full control over integrity in digital evidence life cycle? In: Proceedings of the ITI 2010, 32nd International Conference on Information Technology Interfaces, pp. 429–434, June 2010

    Google Scholar 

  12. Ellison, R.J., Woody, C.: Supply-chain risk management: incorporating security into software development. In: 2010 43rd Hawaii International Conference on System Sciences, pp. 1–10, January 2010

    Google Scholar 

  13. Goranson, H.T., Goranson, T.: The Agile Virtual Enterprise: Cases, Metrics, Tools. Greenwood Publishing Group (1999)

    Google Scholar 

  14. Ivanov, D., Sokolov, B., Kaeschel, J.: A multi-structural framework for adaptive supply chain planning and operations control with structure dynamics considerations. Eur. J. Oper. Res. 200(2), 409–420 (2010)

    Article  Google Scholar 

  15. Kiyomoto, S., Rahman, M.S., Basu, A.: On blockchain-based anonymized dataset distribution platform. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA), pp. 85–92, June 2017

    Google Scholar 

  16. Kuntze, N., Rudolph, C.: Secure digital chains of evidence. In: 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 1–8, May 2011

    Google Scholar 

  17. Leończuk, D., Ryciuk, U., Szymczak, M., Nazarko, J.: Measuring performance of adaptive supply chains. In: Kawa, A., Maryniak, A. (eds.) SMART Supply Network. E, pp. 89–110. Springer, Cham (2019). https://doi.org/10.1007/978-3-319-91668-2_5

    Chapter  Google Scholar 

  18. Lu, T., Guo, X., Xu, B., Zhao, L., Peng, Y., Yang, H.: Next big thing in big data: the security of the ICT supply chain. In: 2013 International Conference on Social Computing, pp. 1066–1073, September 2013

    Google Scholar 

  19. Meixell, M.J., Norbis, M.: Assessing security risk in global supply chains. In: First International Technology Management Conference, pp. 510–515, June 2011

    Google Scholar 

  20. Meneghetti, A., Quintavalle, A.O., Sala, M., Tomasi, A.: Two-tier blockchain timestamped notarization with incremental security. CoRR abs/1902.03136 (2019). http://arxiv.org/abs/1902.03136

  21. Ponomarov, S.Y., Holcomb, M.C.: Understanding the concept of supply chain resilience. Int. J. Logistics Manag. 20(1), 124–143 (2009)

    Article  Google Scholar 

  22. Richter, J., Kuntze, N., Rudolph, C.: Security digital evidence. In: 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 119–130, May 2010

    Google Scholar 

  23. Ross, R., Dempsey, K., Viscuso, P., Riddle, M., Guissanie, G.: Protecting controlled unclassified information in nonfederal systems and organizations. NIST Special Publication 800–171 Revision 1 (2018)

    Google Scholar 

  24. Roy, A., Gupta, A.D., Deshmukh, S.G.: Information security in supply chains - a process framework. In: 2012 IEEE International Conference on Industrial Engineering and Engineering Management, pp. 1448–1452, December 2012

    Google Scholar 

  25. Shidong, Z., Liu, J., Sheng, Y., Xiaorui, Z.: Research and implementation of digital evidence enforcement protection program. In: 2013 6th International Conference on Intelligent Networks and Intelligent Systems (ICINIS), pp. 33–35, November 2013

    Google Scholar 

  26. Soltani, S., Seno, S.A.H.: A survey on digital evidence collection and analysis. In: 2017 7th International Conference on Computer and Knowledge Engineering (ICCKE), pp. 247–253, October 2017

    Google Scholar 

  27. Tang, C.S.: Perspectives in supply chain risk management. Int. J. Prod. Econ. 103(2), 451–488 (2006)

    Article  Google Scholar 

  28. Tian, F.: A supply chain traceability system for food safety based on HACCP, blockchain & Internet of Things. In: 2017 International Conference on Service Systems and Service Management, pp. 1–6, June 2017

    Google Scholar 

  29. Wang, J., et al.: Toward a resilient holistic supply chain network system: concept, review and future direction. IEEE Syst. J. 10(2), 410–421 (2016)

    Article  Google Scholar 

  30. Yusuf, Y.Y., Gunasekaran, A., Adeleye, E., Sivayoganathan, K.: Agile supply chain capabilities: determinants of competitive objectives. Eur. J. Oper. Res. 159(2), 379–392 (2004)

    Article  Google Scholar 

  31. Zage, D., Glass, K., Colbaugh, R.: Improving supply chain security using big data. In: 2013 IEEE International Conference on Intelligence and Security Informatics, pp. 254–259, June 2013. https://doi.org/10.1109/ISI.2013.6578830

Download references

Acknowledgement

A part of this work was supported by the Cabinet Office (CAO), Cross-ministerial Strategic Innovation Promotion Program (SIP), “Cyber Physical Security for IoT Society” (funding agency: NEDO).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shinsaku Kiyomoto .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kiyomoto, S., Nakano, Y., Waseda, A., Nakamura, T., Ishizaka, M., Kobayashi, Y. (2019). A Framework for Secure and Trustworthy Data Management in Supply Chain. In: Awan, I., Younas, M., Ünal, P., Aleksy, M. (eds) Mobile Web and Intelligent Information Systems. MobiWIS 2019. Lecture Notes in Computer Science(), vol 11673. Springer, Cham. https://doi.org/10.1007/978-3-030-27192-3_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-27192-3_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-27191-6

  • Online ISBN: 978-3-030-27192-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics