Abstract
In this paper, we consider a trustworthy framework for data management in a supply chain. The framework provides verifiable evidence for secure data management in each organization involved in a supply chain. It consists of three main components: black box systems that securely store digital evidence, verification services that verify the digital evidence and publish a guarantee document for data management, and a trusted directory service that manages the guarantee document. Furthermore, future directions for research are discussed in this paper. We believe the framework will improve security and trustworthiness of supply chains.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Abeyratne, S.A., Monfared, R.P.: Blockchain ready manufacturing supply chain using distributed ledger. Int. J. Res. Eng. Technol. 05(09), 1–10 (2016)
Ali, A., Mahfouz, A., Arisha, A.: Analysing supply chain resilience: integrating the constructs in a concept mapping framework via a systematic literature review. Suppl. Chain Manag.: Int. J. 22(1), 16–39 (2017)
Atallah, M.J., Elmongui, H.G., Deshpande, V., Schwarz, L.B.: Secure supply-chain protocols. In: EEE International Conference on E-Commerce, 2003, CEC 2003, pp. 293–302, June 2003. https://doi.org/10.1109/COEC.2003.1210264
Barron, S., Cho, Y.M., Hua, A., Norcross, W., Voigt, J., Haimes, Y.: Systems-based cyber security in the supply chain. In: 2016 IEEE Systems and Information Engineering Design Symposium (SIEDS), pp. 20–25, April 2016
Bhargava, B., Ranchal, R., Ben Othmane, L.: Secure information sharing in digital supply chains. In: 2013 3rd IEEE International Advance Computing Conference (IACC), pp. 1636–1640, February 2013
Boin, A., Kelle, P., Clay Whybark, D.: Resilient supply chains for extreme situations: outlining a new field of study. Int. J. Prod. Econ. 126(1), 1–6 (2010)
Brindley, C., Ritchie, B.: Supply chain risk management and performance: a guiding framework for future development. Int. J. Oper. Prod. Manag. 27(3), 303–322 (2007)
Christopher, M.: The agile supply chain: competing in volatile markets. Ind. Mark. Manage. 29(1), 37–44 (2000)
Christopher, M., Peck, H.: Building the resilient supply chain. Int. J. Logistics Manag. 15(2), 1–14 (2004)
Christopher, M., Towill, D.: An integrated model for the design of agile supply chains. Int. J. Phys. Distrib. Logistics Manag. 31(4), 235–246 (2001)
Cosic, J., Baca, M.: Do we have full control over integrity in digital evidence life cycle? In: Proceedings of the ITI 2010, 32nd International Conference on Information Technology Interfaces, pp. 429–434, June 2010
Ellison, R.J., Woody, C.: Supply-chain risk management: incorporating security into software development. In: 2010 43rd Hawaii International Conference on System Sciences, pp. 1–10, January 2010
Goranson, H.T., Goranson, T.: The Agile Virtual Enterprise: Cases, Metrics, Tools. Greenwood Publishing Group (1999)
Ivanov, D., Sokolov, B., Kaeschel, J.: A multi-structural framework for adaptive supply chain planning and operations control with structure dynamics considerations. Eur. J. Oper. Res. 200(2), 409–420 (2010)
Kiyomoto, S., Rahman, M.S., Basu, A.: On blockchain-based anonymized dataset distribution platform. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA), pp. 85–92, June 2017
Kuntze, N., Rudolph, C.: Secure digital chains of evidence. In: 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 1–8, May 2011
Leończuk, D., Ryciuk, U., Szymczak, M., Nazarko, J.: Measuring performance of adaptive supply chains. In: Kawa, A., Maryniak, A. (eds.) SMART Supply Network. E, pp. 89–110. Springer, Cham (2019). https://doi.org/10.1007/978-3-319-91668-2_5
Lu, T., Guo, X., Xu, B., Zhao, L., Peng, Y., Yang, H.: Next big thing in big data: the security of the ICT supply chain. In: 2013 International Conference on Social Computing, pp. 1066–1073, September 2013
Meixell, M.J., Norbis, M.: Assessing security risk in global supply chains. In: First International Technology Management Conference, pp. 510–515, June 2011
Meneghetti, A., Quintavalle, A.O., Sala, M., Tomasi, A.: Two-tier blockchain timestamped notarization with incremental security. CoRR abs/1902.03136 (2019). http://arxiv.org/abs/1902.03136
Ponomarov, S.Y., Holcomb, M.C.: Understanding the concept of supply chain resilience. Int. J. Logistics Manag. 20(1), 124–143 (2009)
Richter, J., Kuntze, N., Rudolph, C.: Security digital evidence. In: 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 119–130, May 2010
Ross, R., Dempsey, K., Viscuso, P., Riddle, M., Guissanie, G.: Protecting controlled unclassified information in nonfederal systems and organizations. NIST Special Publication 800–171 Revision 1 (2018)
Roy, A., Gupta, A.D., Deshmukh, S.G.: Information security in supply chains - a process framework. In: 2012 IEEE International Conference on Industrial Engineering and Engineering Management, pp. 1448–1452, December 2012
Shidong, Z., Liu, J., Sheng, Y., Xiaorui, Z.: Research and implementation of digital evidence enforcement protection program. In: 2013 6th International Conference on Intelligent Networks and Intelligent Systems (ICINIS), pp. 33–35, November 2013
Soltani, S., Seno, S.A.H.: A survey on digital evidence collection and analysis. In: 2017 7th International Conference on Computer and Knowledge Engineering (ICCKE), pp. 247–253, October 2017
Tang, C.S.: Perspectives in supply chain risk management. Int. J. Prod. Econ. 103(2), 451–488 (2006)
Tian, F.: A supply chain traceability system for food safety based on HACCP, blockchain & Internet of Things. In: 2017 International Conference on Service Systems and Service Management, pp. 1–6, June 2017
Wang, J., et al.: Toward a resilient holistic supply chain network system: concept, review and future direction. IEEE Syst. J. 10(2), 410–421 (2016)
Yusuf, Y.Y., Gunasekaran, A., Adeleye, E., Sivayoganathan, K.: Agile supply chain capabilities: determinants of competitive objectives. Eur. J. Oper. Res. 159(2), 379–392 (2004)
Zage, D., Glass, K., Colbaugh, R.: Improving supply chain security using big data. In: 2013 IEEE International Conference on Intelligence and Security Informatics, pp. 254–259, June 2013. https://doi.org/10.1109/ISI.2013.6578830
Acknowledgement
A part of this work was supported by the Cabinet Office (CAO), Cross-ministerial Strategic Innovation Promotion Program (SIP), “Cyber Physical Security for IoT Society” (funding agency: NEDO).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Kiyomoto, S., Nakano, Y., Waseda, A., Nakamura, T., Ishizaka, M., Kobayashi, Y. (2019). A Framework for Secure and Trustworthy Data Management in Supply Chain. In: Awan, I., Younas, M., Ünal, P., Aleksy, M. (eds) Mobile Web and Intelligent Information Systems. MobiWIS 2019. Lecture Notes in Computer Science(), vol 11673. Springer, Cham. https://doi.org/10.1007/978-3-030-27192-3_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-27192-3_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-27191-6
Online ISBN: 978-3-030-27192-3
eBook Packages: Computer ScienceComputer Science (R0)