Collaborative Supply Chain and Data Protection

Similar documents
D24.2. Business Modelling. Project number: Project acronym: PRACTICE. PRACTICE: Privacy-Preserving Computation in the Cloud.

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Optimization of Outsourcing Agreements

SAP HANA Live for SAP Business Suite. David Richert Presales Expert BI & EIM May 29, 2013

Secure Cloud Identity Wallet

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Realising the transformation programmes of major aeronautics players

Positioning Performance Testing to Cut Costs of Cloud Computing

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective

Impact of Service Oriented Architecture on ERP Implementations in Technical Education

Security of smart grid communication protocols

Staying a Step Ahead by Comprehensive Industrial MRO Outsourcing

H2020-LEIT-ICT WP Big Data PPP

Weak Spots in Enterprise Mobility Management Dennis Schröder

FUTURE REPAIR AND MAINTENANCE

<Insert Picture Here> Oracle Fusion: The New Standard for Enterprise Software

Trusted Personal Data Management A User-Centric Approach

Dokument Nr. 521.dw Ausgabe Februar 2013, Rev Seite 1 von d Seite 1 von 11

ISO 27002:2013 Version Change Summary

Information Security Services

Management-Forum Strategic MDM

Secure Data Sharing and Processing in Heterogeneous Clouds. Bojan Suzic, Graz University of Technology

Data Integrity Check using Hash Functions in Cloud environment

Outline agreements/contracts in SAP

Microsoft appreciates the opportunity to respond to the Cloud Computing Consumer Protocol: ACS Discussion Paper July 2013 (the protocol).

Project driven supply chain in complex MRO services Oracle e-business suite

Cloud Computing Standards: Overview and ITU-T positioning

Longmai Mobile PKI Solution

Cloud security architecture

Associate Prof. Dr. Victor Onomza Waziri

Supply Chain Optimization & Efficiency: Looking at what other Industries do to enable Cost Reduction

CHAPTER 1 INTRODUCTION

Oracle Open World Sep 2014 AMMROC Information Technology

Blue Fire Thames Court 1 Victoria Street Windsor SL4 1YB enquiries@bluefire-uk.com

Challenges in E Procurement Adoption in Europe

Enabling Secure, Diverse Communications for B2B and B2C Organizations

Recent Researches in Electrical Engineering

Cloud Computing Security Audit

Strategic Decisions Supported by SAP Big Data Solutions. Angélica Bedoya / Strategic Solutions GTM Mar /2014

Service Supply Chain Forum. Jon Guyett Americas Service Parts Logistics Director

The Cadence Partnership Service Definition

Secure cloud access system using JAR ABSTRACT:

Digital Advisory Services Professional Service Description Network Assessment

Specialist Cloud Services. Acumin Cloud Security Resourcing

Certified Supply Chain Management Professional VS-1204

Course Description Bachelor in Management Information Systems

Ch.1 Purchasing & Supply Chain Management

Logistics Enterprise Resource Planning in the cloud

Always Worry About Cyber Security. Always. Track 4 Session 8

Welcome to the SCM Stream. Sponsored by:

SAP Sales and Operations Planning Compare & Contrast with SAP APO. Phil Gwynne SAP UKI 2013

CS 356 Lecture 28 Internet Authentication. Spring 2013

Router and Vetting G-Cloud Service Definition

SAP Learning Hub: Learning Rooms. List of available and upcoming learning rooms as of March 2015

RUN BETTER SAP AG. All rights reserved. 1

Level 5 Diploma in Managing the Supply Chain (QCF) Qualification Specification

How Smart, Connected Products are Transforming Competition

Scope of Supply Chain Management (SCM)

Optimizing Inventory in Today s Challenging Environment Maximo Monday August 11, 2008

Brainloop Cloud Security

Process Management: Creating Supply Chain Value

STATE OF HAWAI I INFORMATION PRIVACY AND SECURITY COUNCIL

Cloud, security and the mobile enterprise: An end-to-end manageability challenge

Digital Asset Manager, Digital Curator. Cultural Informatics, Cultural/ Art ICT Manager

Understanding Participant Roles in Enterprise System Implementation

CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION. Architecture Framework Advisory Committee November 4, 2014

Cloud Federations in Contrail

Airbus PLM A350 Manufacturing Engineering strategy

Commonwealth Department of Family and Community Services. Submission to the Joint Committee of Public Accounts and Audit (JCPAA)

Chapter 5: Discussion & Conclusion

PRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser AIT Austrian Institute of Technology GmbH

SAP SCM 5.0: Learning Map for SC Design and Analytics Consultants

Cybersecurity Risk Assessment in Smart Grids

Strategic Sourcing. Increasing competitiveness and profitability with effective purchasing

Sometimes it's better to be STUCK! SAML Transportation Unit for Cryptographic Keys

DEFINING SUPPLY CHAIN VALUE AEROSPACE SUMMIT 2015 Agustin Picado, Country Manager UPS Mexico. September, 2015

ICT 7: Advanced cloud infrastructures and services. ICT 8: Boosting public sector productivity and innovation through cloud computing services

How to Solve the B2B Integration and Managed File Transfer challenge in Retail Business

Transformation. Fueling Supply Chain. Predictive analytics energizes dynamic networks. By Can A. Dogan, Frode Huse Gjendem, and Jade Rodysill

e-business in the Retail Sector Elena Gaboardi

SAP Forum Bulgaria The Cloud Built for Business. Lutz Bartsch, Chief Technologist SAP Cloud LoB October 1 st, 2014

Global Commercial Aviation Asset Management Software Market Assessment

Discover how and why file transfer is changing

Healthcare Compliance Solutions

(100% taught in English)

Enterprise Resource Planning Concepts & Approaches

The ODCA, Helix Nebula and Federated Identity Management. Mick Symonds Principal Solutions Architect Atos Managed Services NL

Managing Business Processes

Australian Government Data Centre Strategy Industry Briefing - 2 December 2010

Fundamentals of Information Systems, Fifth Edition. Chapter 1 An Introduction to Information Systems in Organizations

Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT

Knowledge Emergence Infrastructure by Convergence of Real World and IT

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

Cloud Computing. The impact for IT departments and the IT professional. by Maurice van der Woude

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

Mahler Consulting Problem Solved, Smart Solutions for your Business

Do You Have The Right Practices In Your Cyber Supply Chain Tool Box? NDIA Systems Engineering Conference October 29, 2014

Code of Practice on Electronic Invoicing in the EU

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

Transcription:

https://cpdm.unisalento.it/ http://www.dtascarl.it/ Privacy-Preserving Computation in the Cloud http://practice-project.eu/ Collaborative Supply Chain and Data Protection Antonio Zilli, antonio.zilli@unisalento.it Fabbrica Futuro, Bari, 05/10/2016 This project has received funding from the European Union s Seventh Framework Programme for research, technological development and demonstration under grant agreement no 609611

L innovazione tecnologica come fattore abilitante dello sviluppo e della crescita Antonio Zilli, antonio.zilli@unisalento.it 2

Aeronautic industry Antonio Zilli Knowledge management Social network analysis Value and supply network Secure collaboration TeSCHeT idf KITE.IT KHIRA SecuSCM PRACTICE Contatti T: 0039 0832 297981 e: antonio.zilli@unisalento.it w: https://cpdm.unisalento.it/it/portfolio-items/supply-chain-management-and-security/ (http://bit.ly/2dmcdns) Antonio Zilli, antonio.zilli@unisalento.it 4

Agenda PRACTICE project Aeronautic supply chain Process optimization requirements Data leakage risks and data protection levels Prototype application and economic benefits Conclusions Antonio Zilli, antonio.zilli@unisalento.it 5

PRACTICE project... a secure cloud framework of advanced and practical cryptographic technologies providing sophisticated security and privacy guarantees for all parties in cloud computing scenarios. PRACTICE project goals: data confidentiality and integrity (no need to trust cloud providers); computation on encrypted data (insiders cannot disclose secrets); flexible architecture and tools (seamless migration towards new platforms while gradually adding levels of protection). The PRACTICE project will: enable European customers to save costs by globally outsourcing to the cheapest providers while still maintaining guaranteed security and legal compliance; deliver a Secure Platform for Enterprise Applications and Services providing application servers and automatic tools enabling privacy-sensitive applications on the cloud; protect user data from cloud providers and other users, supporting cloud-aided secure computations by mutually distrusting parties. http://practice-project.eu/ @FP7_PRACTICE Antonio Zilli, antonio.zilli@unisalento.it 6

PRACTICE project 1 7 13 2 8 14 3 9 15 * 4 10 16 5 11 17 6 12 18 WP24: Supply chain prototype Project start: 1 st November, 2013 Project duration: 3 years Total costs: 10.465.059 Antonio Zilli, antonio.zilli@unisalento.it 7

Aeronautic new product development supply chain The supply chain is the set of actors sharing material, information and financial information within organizational units, so as to meet consumer need and as a result, enhance the entire supply chain involved. Product design information Antonio Zilli, antonio.zilli@unisalento.it 9

MRO supply chain The aeronautic aftersales supply chain has the role of keeping aircraft systems into conditions where they can perform their function. In many cases, aircrafts need to be shut down for maintenance. Airlines, airforces, other aircraft operators MRO Service provider Products, money Information, products Business relationship model Spare parts suppliers Time & material Performance based Antonio Zilli, antonio.zilli@unisalento.it 10

MRO performances Dataset related to the JT8 engine About 1000 MRO events Service planning # Repair Events: 973 Mean (PT): 17,4 Median (PT): 10 St. Deviation (PT): 28 MRO TAT # Events: 1038 Mean (TAT): 143,03 Median (TAT): 131 St. Deviation (TAT): 80,98 the main barriers to the fulfilment of the business objectives of MRO companies are component delays during procurement and repair. 41% of the surveyed companies answered that they have to deal with this delays. Remenyi, C., Staudacher, S., 2011. MRO: Organisation der Produktion sowie von Produktionsplanung und steuerung. Wt Werkstattstechnikonline2011(4), 242 248. Antonio Zilli, antonio.zilli@unisalento.it 11

Data MRO supply chain: optimization To improve effectiveness and efficiency of inventory management policy, more accurate demand forecasts and service plans are required Data Data Products, money Information, products Data Antonio Zilli, antonio.zilli@unisalento.it 12

Demand forecasting and service planning MRO Service Provider Contract data (SLA and penalties) Service plan Inventory status Service status Engine operators Engine health status (Data gathered by onboard sensors) Cloud Planning System Business data Production plan Inventory status Production status Suppliers Antonio Zilli, antonio.zilli@unisalento.it 13

Survey on cloud application diffusion Sample: ICT, Supply chain Results: 1. The cloud diffusion is obstacled by security issues; 2. The main source of threat is the cloud service provider; 3. Insiders are a concern, but not the main one; 4. Certification is the main source of trust; 5. No data protection when data are shared with partners. Secure Computation technology satisfies these requirements Antonio Zilli, antonio.zilli@unisalento.it 14

Data leakage risks Data leakage risks depend on leaked data, business role of owner and business role of leakage recipient Cloud service provider (admin) is part of the risks model Airline/Air force data MRO SP data Supplier data Airline/Air Force Competitive advantage Bargaining power Bargaining power on MRO SP Same sc Bargaining power / Bargaining power MRO SP Other sc Bargaining power Competitive advantage Competitive advantage on other MRO SP + Bargaining power Supplier Components MRO SP manufacturer Bargaining Bargaining power power Competitive advantage Bargaining + power Bargaining power Competitive advantage Competitive advantage + Bargaining power Admin Lost profit Lost profit Lost profit Antonio Zilli, antonio.zilli@unisalento.it 15

Data protection level measurement Sample: IT, Supply chain dept People are asked to evaluate how much critical is if suppliers, competitors and customers access selected types of data, Individual evaluations are combined, public information and business historical relationships are taken in consideration too CONFIDENTIAL DATA PROTECTION LEVEL (scale: 0-75) Usage condition of the engines fleet 51,3 MRO process data 57 Production plans and the inventory status of spare parts suppliers 55 Antonio Zilli, antonio.zilli@unisalento.it 16

Prototype application Prototype architectural design Secure Computation Technology: sharing without disclosing SAP HANA database system Collaborative forecast demand: 1. Engine owners provide encrypted engine health status data; 2. Secure Cloud SCM computes on encrypted inputs of several engine owners, decryption keys are not required: data are never revealed, (specific computation algorithms were developed); 3. Application computes how many parts repairs and replacements are expected in a future time window; Prototype performance: Evaluation time in the order of seconds Antonio Zilli, antonio.zilli@unisalento.it 17

Benefit assessment simulation* 1 - Input: the inventory setting model (order costs, unit costs, penalty costs, lead times, ) and the demand process (mean and std. dev of demand, ) for a certain product 2 - Simulation (in 100 runs) of the costs over 24 periods (standard VS improved forecasts) 3 - Output: Where are the quick wins? What is the range of cost reduction we can expect? Methodology design and development *Simplified engine composition is considered, realistic part properties are used Antonio Zilli, antonio.zilli@unisalento.it 18

Methodology for securing supply chain collaboration (on cloud applications) 1. Design novel collaborative inter-organizational processes 2. Identify involved data 3. Evaluate data leakage risks (on a owner/receiver perspective) 4. Measure data protection level (wrt all possible receivers) 5. Develop secure cloud application 6. Assess application functionalities 7. Assess security performances Result: a secure cloud supply chain management system implementing collaborative forecasting functionalities able to improve performance of the aeronautic MRO service supply chain by both increasing service level agreement and reducing service (inventory) costs For more information: www.practice-project.eu Antonio Zilli, antonio.zilli@unisalento.it 19

Conclusions Supply chain wide collaboration and cloud application diffusion are obstacled by confidential data protection needs Novel technologies (cloud + secure computation) provide higher security performances Process-customized algorithms and protocols are required Firms are required to model supply chain collaborative processes with respect to their business models Firms are required to measure data confidentiality and data protection level with respect to all type of partners Process models and data protection levels are mandatory input of any secure cloud supply chain system Antonio Zilli, antonio.zilli@unisalento.it 20