skip to main content
10.1145/1456492.1456493acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
keynote

Security against the business partner

Published: 31 October 2008 Publication History

Abstract

Security research has long focused on protecting against outside attackers. This was augmented with protection against insider threats, but recently networked business is emerging. With it a new threat is emerging: security against the business partner.
A possible solution is secure multi-party computation (SMC) and we give examples of its usefulness. We show with the example of supply chain optimization that only SMC provides the necessary security guarantees.
A major challenge of SMC is its practical realization. We give a detailed study and analysis of multi-party permutation and show the relations of the different theoretical complexities in this case.
The paper concludes with a comparison of service-oriented architectures and SMC. We show several architectural differences that need to be overcome.

References

[1]
Baker, W., Hylender, D., and Valentine, A. 2008 Data Breach Investigations Report. Available at http://www.verizonbusiness.com/resources/security/databreachreport.pdf, 2008.
[2]
Ben-Or, M., Goldwasser, S., and Wigderson, A. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proceedings of the 20th annual ACM symposium on Theory of computing, 1988.
[3]
Bogetoft, P., Christensen, D., Damgard, I., Geisler, M., Jakobsen, T., Kroigaard, M., Nielsen, J., Nielsen, J., Nielsen, K., Pagter, J., Schwartzbach, M., and Toft., T. Multiparty Computation Goes Live. Available at http://eprint.iacr.org/2008/068, 2008.
[4]
Bona, M. Combinatorics of Permutations. Chapman Hall-CRC, 2004.
[5]
Camenisch, J., and Van Herreweghen, E. Design and Implementation of the idemix Anonymous Credential System. In Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002.
[6]
Clark, A., and Scarf, H. Optimal policies for a multi-echelon inventory problem. Management Science 6(4), 1960.
[7]
Cramer, R., Damgard, I., and Nielsen, J. B. Multiparty computation from threshold homomorphic encryption. In Proceedings of Eurocrypt, 2001.
[8]
Damgard, I., and Jurik, M. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. In Proceedings of 4th International Workshop on Practice and Theory in Public Key Cryptography, 2001.
[9]
Dantzig, G. B. Linear Programming and Extensions. Princeton University Press, 1963.
[10]
Deitos, R., Kerschbaum, F., Robinson, P., and Haller, J. A comprehensive security architecture for dynamic, web service based virtual organizations for businesses. Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006.
[11]
Dingledine, R., Mathewson, N., and Syverson, P. Tor: The Second Generation Onion Router. Proceedings of USENIX Security Symposium, 2004.
[12]
Goldreich, O., Micali, S., and Wigderson, A. How to play any mental game. Proceedings of the 19th annual ACM conference on Theory of computing, 1987.
[13]
IBM. IBM Anonymous Resolution Version 4.1 Technical Information. See http://ibm.com/db2/eas/, 2006.
[14]
Juric, M., Rozman, I. Brumen, B., Colnaric, M., and Hericko, M. Comparison of Performance of Web Services, WS-Security, RMI, and RMI-SSL. Journal of Systems and Software 79(5), 2006.
[15]
Kerschbaum, F. Building A Privacy-Preserving Benchmarking Enterprise System. em In Proceedings of the 11th IEEE International EDOC Conference, 2007.
[16]
Kerschbaum, F. Distance-Preserving Pseudonymization for Timestamps and Spatial Data. In Proceedings of the ACM Workshop on Privacy in the Electronic Society, 2007.
[17]
Kerschbaum, F. Practical Privacy-Preserving Benchmarking. In Proceedings of the 23rd IFIP International Information Security Conference, 2008.
[18]
Kerschbaum, F., Dahlmeier, D., Schropfer, A., and Biswas, D. An Experimental Study on the Practical Importance of Communication Complexity for Secure Multi-Party Computation Protocols. SAP Internal Technical Report, 2008.
[19]
Kerschbaum, F., Haller, J., Karabulut, Y., and Robinson, P. PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation. Proceedings of the 4th International Conference on Trust Management, 2006.
[20]
Kerschbaum, F. and Schaad, A. Privacy-Preserving Social Network Analysis for Criminal Investigations. In Proceedings of the ACM Workshop on Privacy in the Electronic Society, 2008.
[21]
Kerschbaum, F., and Vayssiere, J. Privacy-Preserving Logical Vector Clocks using Secure Computation Techniques. In Proceedings of the 13th International Conference on Parallel and Distributed Systems, 2007.
[22]
Kerschbaum, F., and Vayssiere, J. Privacy-Preserving Data Analytics as an Outsourced Service. In Proceedings of the ACM Workshop on Secure Web Services, 2008.
[23]
Li, J., and Atallah, M. J. Secure and private collaborative linear programming. In Proceedings of International Conference on Collaborative Computing, 2006.
[24]
Padmanabhan, H., and Whang, S. Information distortion in a supply chain. Management Science 43(4), 1997.
[25]
Paillier, P. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of Eurocrypt, 1999.
[26]
Pibernik, R., and Sucky, E. Centralised and decentralised supply chain planning. International Journal of Integrated Supply Management 2(1/2), 2006.
[27]
Sandhu, R., Coyne, E., Feinstein, H., and Youman, C. Role Based Access Control Models. IEEE Computer 29(2), 1996.
[28]
Toft, T. Primitives and Applications for Multi-Party Computation. PhD. Thesis of the University of Aarhus, 2007.
[29]
Yao, A. Protocols for Secure Computations. In Proceedings of the annual IEEE Symposium on Foundations of Computer Science, 1982.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SWS '08: Proceedings of the 2008 ACM workshop on Secure web services
October 2008
116 pages
ISBN:9781605582924
DOI:10.1145/1456492
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 31 October 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. secure multi-party computation
  2. secure permutation
  3. security against the business partner

Qualifiers

  • Keynote

Conference

CCS08
Sponsor:

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2017)Context-Aware Verifiable Cloud ComputingIEEE Access10.1109/ACCESS.2017.26668395(2211-2227)Online publication date: 2017
  • (2016)A Privacy-Sensitive Collaborative Approach to Business Process DevelopmentE-Business and Telecommunications10.1007/978-3-319-30222-5_15(318-342)Online publication date: 1-Mar-2016
  • (2014)A survey on trust management for Internet of ThingsJournal of Network and Computer Applications10.1016/j.jnca.2014.01.01442(120-134)Online publication date: Jun-2014
  • (2013)Towards Privacy-Friendly Transparency Services in Inter-organizational Business ProcessesProceedings of the 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops10.1109/COMPSACW.2013.27(200-205)Online publication date: 22-Jul-2013
  • (2013)Secure Product Tracking in Supply ChainInformation Security and Cryptology10.1007/978-3-642-38519-3_22(351-370)Online publication date: 2013
  • (2011)MARV - Data Level Confidentiality Protection in BPEL-Based Web Service Compositions2011 Conference on Network and Information Systems Security10.1109/SAR-SSI.2011.5931365(1-8)Online publication date: May-2011
  • (2011)DEAL: A Heuristic Approach for Collaborative Planning in Detailed SchedulingSupply Chain Coordination under Uncertainty10.1007/978-3-642-19257-9_18(457-481)Online publication date: 30-May-2011
  • (2009)Improving Practical Performance on Secure and Private Collaborative Linear ProgrammingProceedings of the 2009 20th International Workshop on Database and Expert Systems Application10.1109/DEXA.2009.32(122-126)Online publication date: 31-Aug-2009
  • (2009)Parallelizing secure linear programmingConcurrency and Computation: Practice and Experience10.1002/cpe.142421:10(1321-1350)Online publication date: 24-Apr-2009
  • (undefined)The Cloud: Understanding the Security, Privacy and Trust ChallengesSSRN Electronic Journal10.2139/ssrn.2141970

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media