首页> 外文OA文献 >Security and privacy for data mining of RFID-enabled product supply chains
【2h】

Security and privacy for data mining of RFID-enabled product supply chains

机译:RFID产品供应链数据挖掘的安全性和隐私性

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

The e-Pedigree used for verifying the authenticity of the products in RFID-enabled product supply chains plays a very important role in product anti-counterfeiting and risk management, but it is also vulnerable to malicious attacks and privacy leakage. While the radio frequency identification (RFID) technology bears merits such as automatic wireless identification without direct eye-sight contact, its security has been one of the main concerns in recent researches such as tag data tampering and cloning. Moreover, privacy leakage of the partners along the supply chains may lead to complete compromise of the whole system, and in consequence all authenticated products may be replaced by the faked ones! Quite different from other conventional databases, datasets in supply chain scenarios are temporally correlated, and every party of the system can only be semi-trusted. In this paper, a system that incorporates merits of both the secure multi-party computing and differential privacy is proposed to address the security and privacy issues, focusing on the vulnerability analysis of the data mining with distributed EPCIS datasets of e-pedigree having temporal relations from multiple range and aggregate queries in typical supply chain scenarios and the related algorithms. Theoretical analysis shows that our proposed system meets perfectly our preset design goals, while some of the other problems leave for future research.
机译:用于验证具有RFID功能的产品供应链中产品真实性的电子谱系在产品防伪和风险管理中起着非常重要的作用,但它也容易受到恶意攻击和隐私泄露的影响。尽管射频识别(RFID)技术具有无需直接目视接触即可自动进行无线识别的优点,但其安全性却一直是诸如标签数据篡改和克隆之类的最新研究的主要关注点之一。此外,合作伙伴在供应链中的隐私泄露可能导致整个系统的完全破坏,结果所有经过身份验证的产品都可能被假冒产品代替!与其他常规数据库完全不同,供应链方案中的数据集在时间上是相关的,并且系统的每一方只能是半信任的。本文针对融合安全性和隐私性的问题,提出了一种融合了安全的多方计算和差异性的优点的系统,重点研究了具有时间关系的电子谱系的分布式EPCIS数据集的数据挖掘的脆弱性分析。在典型的供应链场景中使用多个范围和汇总查询,以及相关算法。理论分析表明,我们提出的系统完全可以满足我们的预设设计目标,而其他一些问题还有待进一步研究。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号