Abstract
In modern manufacturing environments, new technologies are introduced that bring machines, analytics and people closer together. As a consequence, a rise in productivity, flexibility and efficiency is expected. However, these technologies raise new privacy concerns as well. We look at AssiEff, a tool to reduce the energy consumption of production systems, analyse its privacy issues and requirements regarding authentication and propose two approaches in order to address these issues. The first approach is based on anonymous credentials; the second follows an organisational approach. Both approaches are evaluated in regards to security-, privacy- and economic-aspects. In the end, we draw the conclusion that although anonymous credentials fulfil all security and privacy requirements, the organisational approach is the more appropriate solution in most scenarios. Costs are low and the privacy of the employees is protected sufficiently.
Keywords
Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Evans, P.C., Annunziata, M.: Industrial Internet: Pushing the Boundaries of Minds and Machines (November 26, 2012)
Gerlach, S.: »KAPAFLEXCY« Für die Industrie 4.0, IAO-News, no. Dezember 2012 / Januar 2013, p. 3 (2012)
Schmid, C.: Energieeffizienz in Unternehmen. vdf Hochschulverlag AG, Zürich (2004)
Laufs, U., Schneider, P., Zibuschka, J.: Design of a system for energy-efficient production in SMEs. In: ICPR 2011 - Conference Proceedings (2011)
Wilke, T.: Apple gewinnt Big Brother Award 2013 für, besonders dreiste Form von Videoüberwachung, GIZMODO (April 14, 2013)
Ziegler, P.-M.: Datenschutzverletzungen: Lidl fällt als Wiederholungstäter auf, heise online (March 26, 2008)
Ariss, S.S.: Computer monitoring: benefits and pitfalls facing management. Information and Management (2001)
Cavoukian, A.: Privacy by Design ...Take the Challenge. Information and Privacy Commissioner Ontario Canada (2009)
Hevner, A.R., March, S.T., Park, J., Ram, S.: Design Science in Information System Research. MIS Quarterly 28(1), 75–105 (2004)
Lasprogata, G., King, N.J., Pillay, S.: Regulation of Electronig Employee Monitoring: Identifying Fundamental Principles of Employee Privacy through a Comparative Study of Data Privacy Legislation in the European Union, United States and Canada, Standford Technology Law Review, vol. 4 (2004)
Alder, G.S., Noel, T.W., Ambrose, M.L.: Clarifying the effects of Internet monitoring on job attitudes: The mediating role of employee trust. Information and Management (2006)
Lucke, D., Westkämper, E., Eissele, M., Ertl., T., Siemoneit, O.: Privacy-Preserving Self-Localization Techniques in Next Generation Manufacturing. presented at the 10th Intl. Conf. on Control, Automation, Robotics and Vision, Hanoi, Vietnam (2008)
Camenisch, J., Lysyanskaya, A.: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation (2001)
Camenisch, J., Herreweghen, E.V.: Design and Implementation of the idemix Anonymous Credential System. presented at the CCS, Washington, DC, USA (2002)
Roßnagel, H., Zibuschka, J., Hinz, O., Muntermann, J.: Users’ Willingness to Pay for Web Identity Management Systems. European Journal of Information Systems (2014)
The European Commission, Ed., Study on the economic benefits of privacy‐enhancing technologies (PETs) (July 2010)
Laufs, U., Zibuschka, J., Schneider, P.: Decision support for energy efficient produciton in SME, Mobility in a globalised world, pp. 135–144. University of Bamberg Press (2012)
Poonyapak, P., McDill, J.M.J., Hayes, M.J.D.: Improving Robot Efficiency to Reduce Energy Consumption (2007)
Bolay, S., Grajetzky, C., Hüwels, H., Andrea, K., Lechner, S.: Faktenpapier Strompreise in Deutschland (2012)
Chaum, D.: Security without identication: Transaction systems to make big brother obsolete. Communications of the ACM 28(10), 1030–1044 (1985)
Bichsel, P., Camenisch, J., Groß, T., Shoup, V.: Anonymous credentials on a standard java card. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, IL, USA, pp. 600–610 (2009)
Rami, U., Hunger, A.: Vertrauen als Legimitation für die Betriebsarbeit, Industrielle Beziehung, no. Jahrgang 18, Heft 3, 167–189 (2011)
Carayannis, E.G., Turner, E.: Innovation diffusion and technology acceptance: The case of PKI technology, vol. technovation (2005)
VeriSgin, Ed., White Paper: Total Costs of Ownership for Public Key Infrastructure (2005)
Hans-Böckler-Stiftung, Ed., Betriebsräte in mittelständischen Unternehmen weithin akzeptiert, Böcklerimpuls, no. 16/2007 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 IFIP International Federation for Information Processing
About this paper
Cite this paper
Müller, M.C. (2014). Preserving Privacy in Production. In: Hansen, M., Hoepman, JH., Leenes, R., Whitehouse, D. (eds) Privacy and Identity Management for Emerging Services and Technologies. Privacy and Identity 2013. IFIP Advances in Information and Communication Technology, vol 421. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55137-6_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-55137-6_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-55136-9
Online ISBN: 978-3-642-55137-6
eBook Packages: Computer ScienceComputer Science (R0)