Table 1: Public Procurement Evaluated Analytics.
Analytic Description Result
Late deliveries (%) Percentage of over-due time deliveries 32.80 %
Late payments (%) Percentage of over-due time payments 17.47 %
Small purchase order (%) Percentage of Purchase Orders below 100C 65.75 %
Late deliveries impact (%) Impact of late deliveries penalties on suppliers’ total budget spent 0.36 %
Late payments impact (%) Impact of late payments penalties on city’s total budget spent 19.45%
uation of analytics over encrypted data. However, we
significantly enhance the adherence to regulations and
contractual security obligations. Our prototype en-
ables city of Antibes to decrease by 5% their late pay-
ment penalties.
This work paves the way to further ML-based pro-
cessing for prescriptive and predictive analytics. We
foresee the deployment of analytics capabilities for
both recommendations on the best course of actions
at run-time and predictions on the future of evolution
of those cross-organization collaborations.
ACKNOWLEDGEMENTS
This research has been conducted in the scope of the
PROPOLIS(Propolis, 2023) project, jointly funded by
ANR and BMBF.
REFERENCES
Bhatotia, P., Kohlweiss, M., Martinico, L., and Tselekounis,
Y. (2021). Steel: composable hardware-based stateful
and randomised functional encryption. In IACR In-
ternational Conference on Public-Key Cryptography,
pages 709–736. Springer.
Boneh, D., Sahai, A., and Waters, B. (2011). Functional en-
cryption: Definitions and challenges. Theory of Cryp-
tography Conference, pages 253–273.
Consensys. Quorum. https://consensys.net/quorum/.
EU Commission (2016). General Data Protection Regula-
tion (GDPR). https://eur-lex.europa.eu/legal-content/
EN/TXT/?uri=CELEX:32016R0679.
Evans, D., Kolesnikov, V., Rosulek, M., et al. (2018). A
pragmatic introduction to secure multi-party compu-
tation. Foundations and Trends® in Privacy and Se-
curity, 2(2-3):70–246.
Fei, S., Yan, Z., Ding, W., and Xie, H. (2021). Security
vulnerabilities of sgx and countermeasures: A survey.
ACM Computing Surveys (CSUR).
Fisch, B., Vinayagamurthy, D., Boneh, D., and Gorbunov,
S. (2017). Iron: functional encryption using intel
sgx. In Proceedings of the 2017 ACM SIGSAC Con-
ference on Computer and Communications Security,
pages 765–782.
Intel (2021). Intel Software Guard Exten-
sions. https://www.intel.com/content/
www/ architecture-and-technology/
software-guard-extensions.html.
Kim, T. (2019). Sgx security. https://sgx101.gitbook.io/
sgx101/sgx-security.
Microsoft (2023). Confidential Computing - Azure
Solutions. https://azure.microsoft.com/en-
us/solutions/confidential-compute/#overview.
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic
cash system. Bitcoin.org.
OpenEnclave (2022). Attestation sample OpenEnclave
SDK. https://github.com/openenclave/openenclave/
blob/ master/samples/attestation/README.md.
OpenEnclave (2023). OpenEnclave SDK.
https://github.com/openenclave/openenclave.
Propolis (2023). PROPOLIS. https://propolis-project.eu/.
Sabt, M., Achemlal, M., and Bouabdallah, A. (2015).
Trusted execution environment: What it is, and what
it is not. In 2015 IEEE Trustcom/BigDataSE/ISPA,
volume 1, pages 57–64.
SSLab Georgia Tech (2023). Intel Attestation Proto-
col. https://sgx101.gitbook.io/sgx101/sgx-bootstrap/
attestation.
The Linux Foundation (2023). Hyperledger.
https://www.hyperledger.org/.
TIPC Working group (2015). TIPC Protocol Specification.
http://www.tipc.io/protocol.html.
US Congress (1996). Health Insurance Portability
and Accountability Act (HIPAA). https://www.
hhs.gov/hipaa/for-professionals/special-topics/
hipaa-administrative-simplification-regulations.
Van Blarkom, G., Borking, J. J., and Olk, J. E. (2003).
Handbook of privacy and privacy-enhancing technolo-
gies. Privacy Incorporated Software Agent (PISA)
Consortium, The Hague, 198:14.
Viand, A., Jattke, P., and Hithnawi, A. (2021). Sok:
Fully homomorphic encryption compilers. In 2021
IEEE Symposium on Security and Privacy (SP), pages
1092–1108. IEEE.
Security for Next-Gen Analytics for Cross-Organisation Collaboration
609