Privacy-preserving aggregation in life cycle assessment

نویسندگان

  • Brandon Kuczenski
  • Cetin Sahin
  • Amr El Abbadi
چکیده

Life cycle assessment (LCA) is the standard technique used to make a quantitative evaluation about the ecological sustainability of a product or service. The life cycle inventory (LCI) data sets that provide input to LCA computations can express essential information about the operation of a process or production step. As a consequence, LCI data are often regarded as confidential and are typically concealed through aggregation with other data sets. Despite the importance of privacy protection in publishing LCA studies, the community lacks a formal framework for managing private data, and no techniques exist for performing aggregation of LCI data sets that preserve the privacy of input data. However, emerging computational techniques known as ‘‘secure multiparty computation’’ enable data contributors to jointly compute numerical results without enabling any party to determine another party’s private data. In the proposed approach, parties who agree on a shared computation model, but do not trust one another and also do not trust a common third party, can collaboratively compute a weighted average of an LCA metric without sharing their private data with any other party. First, we formulate the LCA aggregation problem as an inner product over a foreground inventory model. Then, we show how LCA aggregations can be computed as the ratio of two secure sums. The protocol is useful when preparing LCA studies involving mutually competitive firms.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

PAVS: A New Privacy-Preserving Data Aggregation Scheme for Vehicle Sensing Systems

Air pollution has become one of the most pressing environmental issues in recent years. According to a World Health Organization (WHO) report, air pollution has led to the deaths of millions of people worldwide. Accordingly, expensive and complex air-monitoring instruments have been exploited to measure air pollution. Comparatively, a vehicle sensing system (VSS), as it can be effectively used ...

متن کامل

Energy Efficient Secure & Privacy Preserving Data Aggregation for WSNs

The aim of this research work is to enhance wireless sensor network life time via reducing communication overhead. Sensor nodes have limited resources specially energy resource which is difficult or impossible to change/replace. As communication is by far the most energy consuming aspect in WSNs, one of the main goals to save energy is therefore to reduce communication overhead. Data aggregatio...

متن کامل

Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks: A Survey

Many wireless sensor network (WSN) applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node. In this paper, we explore several existing privacy-preserving data aggregation (PPDA) protocols for WSNs in order to provide some insights on their current status. For this, we evaluate the PPDA protocols on the basis of such metrics a...

متن کامل

EPSDA: Energy Efficient Privacy preserving Secure Data Aggregation for Wireless Sensor Networks

The privacy preserving data aggregation protocols in wireless sensor networks have many applications in security critical areas, since it hides individual nodes’ data from adversaries. The existing hop by hop and shuffling based privacy preserving protocols does not provide an energy efficient, accurate and secure data aggregation result in base station, due to the energy consuming decryption a...

متن کامل

Privacy-Preserving Distributed Movement Data Aggregation

We tackle the problem of obtaining general information about vehicle traffic in a city from movement data collected by individual vehicles. An important issue here is the possible violation of the privacy of the vehicle users. Movement data are sensitive because they may describe typical movement behaviors and therefore be used for re-identification of individuals in a database. We provide a pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016