Preprint
Article

This version is not peer-reviewed.

Collaborative Smart Production Supply Chains with Blockchain Based Digital Product Passports

Submitted:

20 February 2024

Posted:

21 February 2024

Read the latest preprint version here

Abstract
In recent years, the manufacturing sector has benefited from a variety of technological innovations regarding automation and utilization of artificial intelligence on the shopfloor. During the manufacturing processes of a product, a variety of meta data can be derived from each working step and considered during subsequent stages of its liefycle like shipment, utilization or recycling. With upcoming regulations decided by the European Union, manufacturers must begin to react to the demand of a comprehensive circular economies by introducing technical solutions like Digital Product Passports (DPP). By associating the specific conditions of all stages in the life of a product within a digital identity, e.g., the DPP, transparency and efficiency can be increased. The Gaia-X service landscape aims at realizing federated data infrastructures, enabling robust and transparent services while considering data sovereignty. In this work, a modular and generic multi-tenant framework for utilizing DPPs within cross-company ecosystems is presented with respect to the manufacturing sector. In applying the Secret Network-blockchain for implementing the automation of DPP management processes, premises for Gaia-X compliance and therefore strengthened trust-anchors are realized. By considering details of ecosystems, as well as most interesting security threats to the proposed architecture, a holistic view of applying DPPs in the context of smart production supply chains is shown. In presenting a simple but vivid use case of the production and compilation of car wheels, the fundamental benefits of the work on hand are underlined, once more.
Keywords: 
;  ;  ;  ;  ;  ;  ;  

1. Introduction

As part of the European Green Deal [1], regulations are being prepared for making traceable documentation of industrial and consumer goods mandatory. The aim is to facilitate the circular economy and improve overall product transparency within the European market. One intended way to achieve this goal is through mandatory digital proof of product characteristics and traceable information about the manufacturing process [2]. One of the first concrete legal requirements will be a Digital Product Passport (DPP) for automotive and industrial batteries, containing, for example, operational and performance data, a carbon footprint, maintenance and recycling information [3]. This is intended to serve as a model for implementation in other product classes of resource-intensive sectors such as construction or electronics [1]. In general, the DPP can be seen as a set of different components, which are characterized by static meta-information objects such as their fundamental design- and production procedures, as well as unique values [4]. Other key findings when considering existing systems [5] include unidirectional dataflows, as only suppliers and manufacturers create new product data. A DPP can also be interpreted as a data set that summarizes the components, materials and chemical substances, as well as information on repairability, spare parts or proper disposal regarding a specific product [5]. Current research focuses on sector-specific applications and content of DPPs instead of discussing fundamental requirements, technical architectures and integration into collaborative ecosystems [6]. In order to enable DPPs and thus strengthen the concept of an circular economy, there is a need to evaluate standards of representing product information, integrate data aggregation into business processes and enable the trustworthy exchange of collected information between trading partners. In 2020, an EU data strategy was affirmed, focusing on the regulation of two aspects in any modern digital service-landscape, e.g., services regarding the provision and processing of data, as well as trustable cloud resources [7]. In this context, the Gaia-X project aims at providing use-cases and technical concepts and architectures for Europe’s next-generation data infrastructure ecosystem with focus on enabling data sovereignty, while effectively benefiting from exploiting regulated services of the common federation.
As there are usually many different stakeholders involved in production processes, there is an obvious need of collaboratively work on the DPP throughout the supply- and manufacturing-chain. The prerequisite for this is that every participant in the value chain can trust the integrity of the information it contains. However, proposed solutions for DPPs are most often stored centrally, which naturally allows subsequent manipulation as the information is in full control of a central authority. To make DPPs more trustworthy and traceable throughout the supply chain, a methodology of tracking changes to the data they contain while being tamper-proof, is required. One way to avoid centralised storage by a single party is to use Blockchain (BC) technology. In a BC, data is stored decentral and secured end-to-end using cryptographic methods. If an attempt is made to change data retrospectively, this fraud is made transparent by the algorithms used [8]. This mechanism prevents the falsification of content as soon as it is stored in a BC. The use of a BC is therefore suitable for the collaborative documentation of product features in a supply chain. Some BC implementations, e.g. [9], enable the formalisation of functional logic on the BC through smart contracts. These are based on "if, then" logic and change the state of the BC when they are called and executed [10]. This enables custom applications within an BC ecosystem, allowing their participants to interact with each other while the data used is stored in a decentralized and tamper-proof manner. In general, the functionality of a DPP can be mapped in such logic, where the pre-defined rule-set is exploited for aggregation and retrieval of information without being subject to the control of individual participants.
The contribution of this work is multi-layered, as it is clarifying requirements on DPPs in cross-company manufacturing scenarios with increased security demands. In proposing a generic BC-based architecture for configuring such product-specific passports, the secure implementation of many use-cases is made possible. By considering the architecture’s security and discussing it’s appropriateness in the context of a carbon-footprint scenario, a holistic view of DPPs is given in the context of collaborative smart production supply chains. In this work, a concept of how a BC can be implemented for enabling traceable DPPs is worked out and discussed with respect to the manufacturing industry. In order to gain a holistic understanding of the technological requirements on a DPP, Section 2 presents work related to the approach on hand with respect to impacting security- and technology considerations in the manufacturing sector. A general discussion of enabling the concept of DPP lifecycles in the domain of smart-manufacturing is carried out in Section 4. In addition, the utilization of presented methodologies is overviewed in Section 3 with respect to a novel, secure and BC-enabled DPP implementation, as well as an potential application within the GAIA-X ecosystem. By evaluating the shown concepts and security considerations on use cases with cross-company product-lifecycles in Section 5, a holistic view on the potential of BC-enabled DPP activity is given. Finally, the work on hand is concluded and discussed with respect to an outlook of future work in Section 6.

3. Methodology of Blockchain-based DPP

The BC technology, with its decentralized nature and immutability is a key-point to development of DPPs. The inherent attributes of BC, such as transparency, traceability, and security, make it an ideal platform for managing product information across complex supply chains. However, DPPs in terms of data privacy and confidentiality, require a careful consideration of the respective BC platform used. In the context of DPPs, privacy emerges as a paramount requirement. While transparency and traceability are essential, protecting sensitive product data and proprietary information within the supply chain is equally critical. This unique requirement necessitates a BC solution that is also able to balance transparency with privacy.

3.1. Key Features Required for Implementing DPPs in Blockchain

There are several requirements for the privacy preserving BC and DPP eco-systems [25], which must be considered when planning for a specific implementation:
  • Privacy and Confidentiality: The cornerstone of any DPP system is the assurance of privacy and confidentiality. This is particularly critical for protecting sensitive data such as proprietary manufacturing processes and product compositions, which could be of high value to competitors. By ensuring data security and business confidentiality within the supply chain, DPPs can safeguard critical business information, thereby maintaining competitive advantage and trust.
  • Scalability and Efficiency: As DPP systems are expected to handle high volumes of transactions and data, scalability and efficiency become paramount. This requirement is crucial for extensive supply chains, where delays or prohibitive costs can be detrimental. The ability of the DPP system to scale efficiently ensures the smooth operation and growth of the system as the product and user bases expand, without compromising on performance or cost-effectiveness.
  • Interoperability: The diverse nature of supply chains means that DPP systems must seamlessly integrate with various existing systems and protocols used by different participants. Interoperability is key to creating a cohesive ecosystem where various stakeholders, regardless of their underlying technology platforms, can effectively interact with the DPP. This feature ensures that the DPP system can be universally adopted and utilized, enhancing its utility and reach.
  • Decentralization and Trust: The BC’s inherent feature of decentralization plays a vital role in DPP implementation. By preventing any single entity from exerting control over the DPP, a decentralized approach enhances trust among all participants. This trust is fundamental in fostering collaboration and transparency, ensuring that the DPP system is equitable and democratic.
  • Smart Contract Capability: Automation is another critical aspect, achievable through smart contract capabilities. Smart contracts allow for the automation of processes, enforcement of rules, and reduction of manual interventions and errors. In the realm of DPPs, this translates to enhanced efficiency, accuracy, and reliability of operations, making the system more resilient and responsive to the needs of its users.
  • Data Integrity and Security: Ensuring the integrity and security of DPP data is non-negotiable. The data must be accurate, consistent, and safeguarded against unauthorized access and tampering. Maintaining the credibility and reliability of DPP information is essential for all stakeholders involved, as it forms the basis of trust and decision-making within the supply chain.
  • There are sector-independent requirements on DPP systems [6], as legal obligations, e.g., the compliance with regulations like ESPR, the EU ’right to repair’ EPR or the General Data Protection Regulation GDPR. There is an obvious need for functional sustainability and security mechanisms, e.g., ensuring nonrepudiation, data verification, data sovereignity and the security of data storages. With clear semantics and standardized data schemas, the interoperability may be enabled, while the overall accessibility must be considered in policies and onboarding proceedings. In addition to availability, e.g., appropriate information availability including real-time data, the portability of DPPs in a variety of different software systems ensures wide applicability.
  • There are requirements with respect to an efficient DPP-based supply-chain management, where the identification of all required resources for a specific scenario, as well as impacting factors are gathered and ecologically friendly materials are found. Therefore, the most feasible production chain process, as well as product-delivery, services, maintenance materials, etc., must be defined.
  • There are supply-chain traceability requirements [16], which are based on events. While object-events are describing what happens to an object, as well as aggregation and transformation events, where objects are represented or combined or transaction events in which the object is involved in the process of describing ownership. Therein, data elements should includethe what, who, when, where and why of an tracebility event.

3.2. Overview of Candidate BC Platforms

Our selection process for the blockchain technology is based on [26]. They compare many platforms like Ethereum, Hyperledger Fabric, R3 Corda, Quorum, Ripple, VeChain, EOSIO, Tezos, and Stellar according to scalability, consensus, centralized, accessibility, cost and communication model. Considering the balance of the features: flexibility, enterprise-readiness, and specific industry requirements, Ethereum and Hyperledger Fabric, R3 Corda, Quorum and Secret network are selected as more versatile and adaptable choices for a wider range of industrial integration needs.
  • Ethereum: Known for its robust smart contract platform and widespread adoption [27]. Limitations include lower privacy and scalability issues.
  • Hyperledger Fabric: A permissioned BC offering higher control over transactions and data privacy [28]. Less decentralized, potentially limiting trust in a public supply chain context.
  • R3 Corda: Designed for financial services, emphasizing privacy and security [29]. May lack some flexibility needed for broader supply chain applications.
  • Secret Network: Offers encrypted data processing, balancing privacy with transparency [30]. Strong in privacy, scalability, and smart contract capabilities.
  • Quorum: A permissioned version of Ethereum, improving privacy while maintaining Ethereum’s strengths [31]. Balances privacy and decentralization, but privacy may not be as robust as Secret Network.
In Table 1, a comparative analysis of various blockchain platforms is presented, focusing on key aspects such as privacy, scalability, interoperability, decentralization, smart contract capabilities, and data integrity. Most important the consensus processes of each platform are highlighted, providing insight into the fundamental frameworks that control these systems. Ethereum (ETH) utilizes Proof of Stake (PoS) [32], a mechanism that selects validators in proportion to their holdings, thus reducing energy consumption compared to Proof of Work systems. Fabric employs Practical Byzantine Fault Tolerance (PBFT) [33], which offers efficient processing and high fault tolerance. R3 Corda operates on a Notary-Based system [34], centralizing trust to a lesser degree to ensure data integrity. Secret Network adopts Cosmos Tendermint [35], which is a Byzantine Fault Tolerant (BFT) consensus algorithm known for its speed and security. Lastly, Quorum uses Istanbul Byzantine Fault Tolerance (IBFT) [36], a variation of the Byzantine Fault Tolerance mechanism, customized for permissioned blockchain networks. These diverse mechanisms underpin the functional and operational differences of each platform, catering to varied requirements in the context of Data Privacy and Protection (DPP) implementation.
Based on the overview shown in Table, the Secret Network stands out as the most suitable BC platform for implementing DPPs, primarily due to its unique combination of privacy, scalability, and smart contract capabilities. A distinctive feature of the Secret Network is its ability to issue viewing keys that safeguard privacy by allowing only authorized users to access the content of a block. While other platforms like Ethereum and Hyperledger Fabric offer their own advantages, they fall short in critical areas such as privacy and scalability, which are essential for the effective implementation of DPPs in supply chains. The viewing key functionality further solidifies the Secret Network’s position as the premier choice for applications demanding stringent privacy controls, such as those found in supply chain scenarios.

3.3. Integration of Blockchain and Gaia-X

Gaia-X, envisioned as a federated data infrastructure, plays a pivotal role in enhancing trust in digital ecosystems. Its architecture, grounded in European values of transparency, openness and data sovereignty is offering a robust foundation for companies seeking to deploy DPPs. The integration of Gaia-X with the Secret Network, a BC known for its privacy-preserving features, presents a unique solution for managing digital product passports, as also depicted in Figure 1.
While the Secret Network provides a secure and private ledger for storing sensitive product data, Gaia-X ensures that the overarching data infrastructure aligns with regulatory standards and ethical guidelines, particularly relevant in the European Union’s stringent data protection landscape. In practice, a company issuing a DPP on the Secret Network would rely on Gaia-X as the framework to manage data handling processes and trust mechanisms. This model ensures that while the product data is stored securely and privately on the BC, all operations align with the broader data sovereignty principles and industry standards, fostering trust among consumers, regulators, and partners. However, this integration is not without challenges. Technical complexities in harmonizing BC technology with Gaia-X principles, scalability concerns, and maintaining a balance between transparency and privacy are critical areas to address. Ongoing collaboration between BC developers, policy makers, and industry stakeholders is essential to navigate these challenges effectively.

3.4. Proposed Architecture for Blockchian-Enabled DPP

The proposed architecture for implementing a BC-based DPP system is a confluence of advanced distributed ledger technology and Europe’s Gaia-X framework for data sovereignty as it shows in Algorithm 1, which is referencing functions described in the following Section 3.4.3. It is envisioned as a holistic, interoperable ecosystem that leverages the strengths of BC to provide a secure, transparent, and immutable record of product information, while Gaia-X acts as the custodian of trust, ensuring compliance with stringent EU regulations and standards.
Algorithm 1 Overall DPP Management Process for Creation, Storage, and Retrieval Process.
1:
Initialize blockchain and Gaia-X services
2:
Establish secure communication channels
3:
Define Security policies
4:
Call Create_DPP function as needed
5:
Call Update_DPP function as needed
6:
Call Access_DPP function as needed
7:
Call Archive_DPP function as needed
8:
while system is active do
9:
      Listen for incoming data, user credentials, and access requests
10:
    Maintain continuous security monitoring and incident response handling
11:
end while
The algorithm outlined in Algorithm 1 serves as the backbone of our blockchain-based Data Product Platform, orchestrating the initialization, management, and secure operation of both blockchain and Gaia-X services. It ensures the efficient creation, update, access, and removal of DPPs, while rigorously maintaining access control and continuous security monitoring, in compliance with the European Union’s stringent data sovereignty and privacy standards.

3.4.1. Components and Functionality

At the heart of the architecture lies the Product Information Module, a repository that encapsulates required facet of a product’s existence. Each product is endowed with a unique identifier, that paves the way for traceability throughout its lifecycle. The module is a rich tapestry of data, from the physical and technical specifics that inform about the product’s design and materials, to the usage and historical data that narrates the product’s journey from creation to consumer. This historical ledger not only enhances the product’s value through transparency but also serves as a crucial tool for assessing its longevity and maintenance needs.
Complementing the detailed history is the environmental impact assessment, a feature that quantifies the product’s ecological footprint and underlines the commitment to sustainable practices. As the product approaches the end of its utility, the module offers a blueprint for its responsible disposal, feeding into a circular economy that values reuse and recycling.

3.4.2. Integrating Gaia-X for Trust and Compliance

Integral to this architecture is the Gaia-X Trust Layer, which imbues the system with a level of regulatory compliance and data authenticity that is unmatched. It ensures that all stakeholders can fully trust the DPP data, as it adheres to the EU’s data protection and privacy standards. Moreover, Gaia-X facilitates a seamless exchange of data across different platforms and entities, embodying the vision of a unified digital single market.

3.4.3. Blockchain: The Backbone of DPP Security

The architecture of the DPP begins with a foundational phase of system initialization. This phase involves setting up the BC environment, where the Secret Network is chosen for its advanced privacy features, crucial for handling sensitive product data. Simultaneously, integration with Gaia-X services is established, ensuring that the DPP system aligns with European data infrastructure standards, particularly focusing on data sovereignty and interoperability. This dual-setup forms the bedrock of the system, offering a balanced blend of security, privacy, and regulatory compliance.
A key component of this phase is the establishment of secure communication channels. These channels are fortified with robust encryption protocols, essential for safeguarding data transmissions within the system and preventing unauthorized access. In parallel, a security policies framework is implemented. This framework defines policies, laying the groundwork for secure and efficient interactions with the DPP system.
The architecture encapsulates four primary functions for DPP management: creation, updating, access, and removal. Each function is designed to handle specific aspects of DPP lifecycle management while ensuring data security and integrity.
The Create_DPP function is shown in Algorithm 2 and initiates the DPP lifecycle. It generates a unique product identifier for each new product, a critical feature for ensuring traceability. Product data is then encrypted using advanced encryption standards, creating a secure layer of privacy for sensitive information. This encrypted data, along with the product identifier, is incorporated into a smart contract. Before being stored on the BC, the smart contract undergoes a thorough Gaia-X compliance check, reinforcing the system’s adherence to European data standards.
Algorithm 2 Create DPP Contract.
1:
function Create_DPP(product_data)
2:
    Generate unique_product_identifier
3:
    Encrypt product_data using advanced encryption standards
4:
    Create smart_contract with product_data and unique_product_identifier
5:
    Validate smart_contract using Gaia-X compliance checks
6:
    Store smart_contract on blockchain
7:
    return unique_product_identifier
8:
end function
The Update_DPP function is shown in Algorithm 3 and allows for modifications to existing DPPs. It involves retrieving the relevant smart contract using the product’s unique identifier, verifying user credentials against security policies, and updating the product data. The updated data is re-encrypted and stored back on the BC, with all actions logged for audit purposes.
Algorithm 3 Update DPP Contract.
1:
function Update_DPP(unique_product_identifier, updated_data)
2:
    Retrieve smart_contract from blockchain using unique_product_identifier
3:
    Validate user credentials and permissions using security policies
4:
    Decrypt existing product_data from smart_contract
5:
    Merge updated_data with existing product_data
6:
    Re-encrypt merged product_data
7:
    Update smart_contract on blockchain with new product_data
8:
    Log update event and user information for audit purposes
9:
end function
The Access_DPP function is shown in Algorithm 4 and handles requests for accessing product data. It involves validating user credentials as per security policies, retrieving and decrypting the required product data from the smart contract, and providing access to the data. This function is meticulously designed to ensure compliance with Gaia-X privacy policies, maintaining the highest standard of data confidentiality.
Algorithm 4 Access Control for DPP Contract.
1:
function Access_DPP(unique_product_identifier, user_credentials)
2:
    Validate user credentials using security policies
3:
    Retrieve smart_contract from blockchain using unique_product_identifier
4:
    Decrypt product_data from smart_contract
5:
    Validate data access against Gaia-X privacy policies
6:
    Provide user with access to decrypted product_data
7:
    Log access event and user information for security monitoring
8:
end function
Lastly, the Archive_DPP function is shown in Algorithm 5 and facilitates the smart contract deletion of a DPP from the BC. It validates user credentials, retrieves the associated smart contract, and performs the invalidation of the contract in a manner compliant with data retention laws. This process is carefully logged for auditing and compliance.
Algorithm 5 Retrieval Process for DPP.
1:
function Archive_DPP(unique_product_identifier)
2:
    Validate user credentials and permissions using security policies
3:
    Retrieve smart_contract from blockchain using unique_product_identifier
4:
    Invalidate or delete smart_contract from BC
5:
    archive event and user information for audit purposes
6:
end function
This proposed system is engineered for continuous operation. It remains vigilant for incoming data, user credentials, and access requests. Depending on the nature of the incoming requests, the system dynamically calls the appropriate function, ensuring seamless management of DPPs. Integral to the architecture is a robust security monitoring system, actively detecting and responding to potential threats. This continuous monitoring, coupled with a proactive incident response mechanism, fortifies the system’s resilience and reliability.

3.5. Security Evaluation

In the proposed architecture for the BC-based DPP system, security is paramount. It is critical to evaluate the security measures to ensure the integrity, confidentiality, and availability of data within the DPP. This section discusses the security assessment conducted to gauge the robustness of the DPP architecture against potential threats and vulnerabilities identified in the threat model assessment (Table 2) and visualized in the Data Flow Diagram (Figure 2).

3.5.1. Threat Modeling and Risk Assessment

In order to gain insights in the state of the architectures security considerations, a threat model was created as an first step. This involved identifying potential threat actors, cataloging various types of threats and specific malicious behaviour, such as phishing, credential theft, policy bypass, with the aim of unauthorized access to the system’s exploitable vulnerabilities. Each identified threat was then evaluated for its likelihood and potential impact, allowing for a prioritized risk assessment. The preliminary outcome of this exercise is detailed in Table 2, which outlines the asset-specific threats, their impacts, as well as the corresponding mitigation strategies.
In Figure 2, we present a high-level Data Flow Diagram (DFD) that illustrates the interactions within the proposed architecture. The process begins with users interacting with the system, either by retrieving product information or submitting data requests. These interactions are closely monitored for security, with a focus on data access patterns and login attempts, and the information gathered is directed to the Security Monitoring system. This component aggregates data on user login attempts, policy alterations from the Security Policies, and compliance breaches from the Gaia-X framework, an external component depicted on the rightmost side of the diagram.
The DPP Management Process, connected to the blockchain, manages smart contract activities related to data privacy and security. This indicates the utilization of blockchain technology for enforcing or logging data protection regulations, thus providing a tamper-proof and verifiable record of transactions for compliance and audit purposes.
Table 2 presents an assessment of the key threats to this architecture and their respective mitigation strategies. This table categorizes each threat’s impact on various assets and outlines tailored countermeasures. A notable aspect of this approach is the emphasis on proactive security enhancement, as illustrated by the ’security by design’ principle. This is evident in strategies such as incorporating viewing keys for secure user session management and leveraging the Secret Network for the DPP Management Process. The classification of threats, such as assigning a ’Critical’ rating to phishing attacks targeting ’Users’ and smart contract vulnerabilities in ’Blockchain Operations’, reflects a comprehensive risk assessment approach. It guides the implementation of specific mitigation strategies, such as continuous threat intelligence for ’Security Monitoring’ and robust encryption methods for ’Gaia-X Service Initialization’. These strategies form a multi-layered defense framework, ensuring robust protection against both internal and external threats.

3.5.2. Security Measures and Controls

The proposed architecture incorporates a layered security approach, encompassing both technological and procedural controls high-level in Table 2. By implementing such control strategies, identified threats from the threat modeling and risk assessment phase can be countered. The most impacting aspects are overviewed in the following enumeration.
  • Encryption and Data Protection: Advanced encryption standards are employed to protect data at rest and in transit, a critical measure for maintaining the confidentiality and integrity of DPP data as it traverses networks and is stored within the blockchain.
  • Access Control Mechanisms: Utilizing Role-Based Access Control (RBAC) and fine-grained permission policies, the system ensures that only authorized users can access or modify the DPP data. Secure session management and viewing keys are dynamically managed and thoroughly audited to prevent unauthorized data exposure.
  • Smart Contract Security: Smart contracts, which enforce the business logic of the DPP on the blockchain, are rigorously tested for vulnerabilities. Smart contract audits, along with input validation and sanitization, are performed to identify and remediate security flaws.
  • Gaia-X Compliance: The Gaia-X framework incorporates a regulatory compliance layer rooted in security-by-design principles. This framework ensures adherence to European regulations by implementing stringent data protection and privacy standards, such as secure bootstrapping and regular audits to safeguard data integrity.
The security monitoring processes are designed to address the threats of inadequate detection and compliance violations, with continuous threat intelligence and automated policy enforcement ensuring the system’s resilience against evolving cybersecurity threats. Additionally, secure design with the Secret Network and encryption measures like TLS, certificate pinning, and regular certificate rotation are employed to protect against unauthorized access, data manipulation, and data interception during data transfers.

4. Enabling Digital Product Passports in Manufacturing

This section describes how the presented DPPs in the form of an smart contract is utilised in a manufacturing supply chain. First, a supply chain process is abstracted and the participants are generically classified. It then shows how the introduced SC functionalities are used in general business cases.
In order to bring the functionality of collaborative DPPs into a BC using smart contracts, the interactions between participants in an industrial supply chain need to be abstracted. The concept developed should be applicable to all industrially manufactured goods. Since different products go through very different production processes and supply chains, a specification of defined participants (e.g. raw material supplier, component supplier and Original Equipment Manufacturer (OEM)) or domain-specific production processes limits the scope of the DPP. Thus, the concept follows a generic approach and does not consider pre-defined roles.
[37] presents a standard to categorise the two basic participants in a generic supply chain process: suppliers, which are providing goods, and customers, receiving goods after purchase. Extending this, the participants’ processes and interactions are described by the Supply-chain operations reference (SCOR) model [38]. The model extends the interaction of one buyer and one seller to an entire supply chain with an arbitrary number of trading steps and categorises not only the internal processes of organisations but also the fundamental interactions between the organisations in order to depict the activities in a functioning supply chain (Figure 3). These are [38]:
  • Source: This process describes all activities realted to the ordering and receipt of goods and services.
  • Return (Customer point of view): The customer may identify the need to return a delivered product. The identifying, the scheduling and the execution of returning goods are summarised in this process.
  • Make: This process describes all activities that add value to a product, such as the conversion of materials or the creation of a service.
  • Deliver: Every activity associated with the creation and fulfliment of customer orders are described by this process, such as scheduling, shipment or invoicing the customer.
  • Return (Supplier point of view): This process describes all activities associated with the return of formerly delivered goods.
  • Enable: This process describes management processes (e.g., regularity compliance, performance measurements).
  • Plan: “Plan” processes include all activities that contribute to planning the supply chain (e.g., balancing requirements, planning capabilities).
Since Enable and Plan relate to the management of the supply chain and have no direct influence on the product as such, the work on hand is considering the remaining activities and is focusing on the abstraction of the interactions which are related to the DPP itself.

4.1. Overview of a supply chain process

The supplier of a product is producing an asset and creates an according initial DPP representation, which is stored on the BC by executing Algorithm 2. Changes to the asset (e.g., milling, moulding, assembling) are documented in the DPP by updating the smart contract with Algorithm 3. The properties that are added to the DPP are always depending on the specific use-case (e.g., determining the carbon footprint of a product) and the corresponding regulations. There can be any number of references to other product passports in the DPP, for instance to preliminary products.
Each asset has an owner who is also referenced in the DPP. If an asset is sold, the customer is noted as the new owner of the asset by updating the smart contract, which results in a new state in the smart contract of the DPP. As the owner of the DPP, you can also always give partners certain access authorisations to the smart contract by running Algorithm 4. Figure 4 provides an overview of the participants in a supply chain process (supplier and customer) and their relationships to the DPP and the represented product. The participants’ business functions are also depicted.

4.2. Source Asset

When a new asset is created, an associated DPP is created in the form of a smart contract. The supplier creates the technical framework (e.g., the encryption) and adds required information to the smart contract by using Algorithm 2. However, if an asset has been purchased and there is only a change in ownership, there is no need of creating a new smart contract. In this case updating the smart contract by the former owner is sufficient (Algorithm 4). When invoking an existing smart contract your BC-compiler will give feedback about a positive or negative invoking process. After invoking the smart contract the new owner can then update all information inside the DPP. Another option is the linking of a purchased asset to an existing asset. In this case the DPP of the existing asset is updated with a reference to the added asset. All of these options are shown in Figure 5. It should be noted that in this sequence diagram, the supplier is the customer of a previous step.

4.3. Make Asset

During the production assets are processed in various ways. Every piece of information that is generated during the processing steps can be added to the DPP by using Algorithm 3 with respective input data (Figure 6). The write access to the smart contract lies solely with the current manufacturer. However, the information actually aggregated to the DPP depends on sector specific requirements and the demands of possible customers. When added information to the DPP the manufacturer can lookup the new changes to the smart contract.

4.4. Deliver Asset

During the sales phase, the supplier can give the customer a view access to the information of the DPP, so that the customer can obtain the greatest possible transparency about the product. This requires the submission of the customers BC credentials first. If the customer purchases the asset, he is declared as the new owner of the asset in the DPP by using Algrithm 4 and is now permitted for write access to the DPP. At this point in time, the supplier has no longer any access to newly added information. However, the supplier does not lose access to historical information in the DPP at the time of purchasing. The delivering process ends with sending the actual asset to the customer as depicted in Figure 7.

4.5. Return Asset

The customer identifies a problem with the delivered asset and sends it back to the supplier, who accepts it and confirms the return. The supplier is given back full access rights to the DPP (Algorithm 4), as depicted in Figure 8.

5. Evaluation by Cross-Company Product Life-Cycle Use Case

In the following, the discussion of a use case showcasing how a BC-based DPP can support the measures of the European Union ([1,2,3]) for the traceability of industrial supply chains is carried out. This shows the utilisation of the presented method in a practical sample case. The use case is oriented along the scenario of the DPP with basic and organisational information about the product and the manufacturer by a digital nameplate [18] to fit existing regulations (such as the CE marking) and carbon footprint information in order to promote sustainability of industrial products [21]. The product is accompanied by the DPP throughout the entire supply chain. Information of every executed step regarding these two topic areas are aggregated into the DPP enabled by the smart contract. The DPP therefor serves as consistent and tamper-proof documentation of the aggregated product information, as depicted in Figure 9.

5.1. Exemplary Application of the DPP

To illustrate the use case, an example asset is the production of a car wheel. In this scenario, a company is receiving a tyre and a rim for further assembling a car wheel. However, the rim must first pass through a further processing step. In the first step, the company receives the supplies and invokes the existing DPP smart contracts as the new owner. The company now has full control over newly added information on the supplier parts. In addition, the company creates the new smart contract of the future wheel and adds general information of the digital nameplate, as illustrated in Figure 10.
The further manufacturing step is then carried out on the rim. The company documents additional C O 2 equivalents generated by the manufacturing step in the existing smart contract of the rim. After the assembly of the processed rim and the tyre, the company adds information on the carbon footprint to the DPP smart contract of the wheel. The existing smart contracts are also referenced, as the new wheel consists of these two parts, as illustrated in Figure 11.
Finally, the finished wheel is packaged and shipped to the customer. The carbon footprint caused by the transport of the asset is also added to the DPP. The customer of the wheel is entered as the new owner of the smart contract after the purchase, as illustrated in Figure 12. The manufacturing company has now handed over control of the DPP and cannot make any subsequent changes. However, all information entered can be clearly traced back to it through the documentation on the BC. This ensures that even if the customer makes subsequent changes, it is clear who added this information over time. The asset and its information regarding the nameplate and carbon footprint can be clearly traced using this method.

5.2. Evaluation

This section critically evaluates the proposed Blockchain (BC)-based Digital Product Passport (DPP) system, particularly focusing on its application to the car wheel supply chain. The evaluation will consider the system’s problem-solving functionality, architectural merits, and security aspects, specifically in the context of the Wheel-DPP scenario.

5.2.1. Elegance of Technology Combinations

In the Wheel-DPP scenario, the integration of secret network technology with the Gaia-X framework demonstrates a sophisticated blend of decentralization, transparency, and immutability of BC. This is particularly relevant in the seamless tracking and validation of digital nameplates and carbon footprints of car wheel components. Smart contracts automate and enforce data access and usage policies, ensuring integrity and compliance throughout the car wheel’s lifecycle, from sourcing to delivery.

5.2.2. Resource Consumption

Resource consumption is a critical factor in the evaluation of distributed system’s feasibility or appropriateness. The DPP architecture is designed for efficiency, utilizing on-chain and off-chain data storage to balance the cost with performance. The on-chain components are minimized to essential transactional data, thereby reducing the bloat and associated costs of BC operation, while the off-chain components are secured via cryptographic guarantees, maintaining integrity with lower resource consumption. In addition, there is commonly only an occasional need of interaction with the DPP ecosystem, as also depicted in Figure 1.

5.2.3. Generic & Extensible Architecture

The architecture of the DPP system is both generic and extensible, capable of adapting to various industrial sectors and use-cases without the need for significant redesign. In addition, a standardized interface is provided for DPP management, while allowing for custom smart contracts and extensions to cater to domain-specific requirements. This flexibility ensures that the system can evolve alongside technological advancements and changing regulatory landscapes.

5.2.4. Gaia-X Conformity

The adherence to Gaia-X standards is particularly significant in the Wheel-DPP scenario. It ensures that data privacy and security are maintained throughout the car wheel’s supply chain. The system’s transparency, portability, and interoperability principles align with Gaia-X, ensuring that each step, from sourcing to delivery, adheres to European data sovereignty standards.

5.2.5. Threat Surface Minimization

In the Wheel-DPP scenario, the threat surface is significantly reduced through the implementation of privacy-preserving designs and the inherent security features of BC. Continuous verification of transactions and the elimination of single points of failure are vital in protecting against unauthorized access and data breaches, especially in the complex interactions involving multiple stakeholders in the car wheel supply chain. Regular audits and security assessments ensure the robustness of smart contracts and the overall system against vulnerabilities. A critical aspect of this scenario is the immutable nature of BC. This immutability is instrumental in reducing risks related to data tampering and fraud. Once information about a product’s digital nameplate or carbon footprint is logged into the DPP, altering this information without detection becomes virtually impossible. This feature is not just a technical marvel but a fundamental aspect in fostering a culture of accountability and transparency in supply chains. Conclusion and Future Outlook

6. Conclusion and Future Work

In this work, a BC-enabled architecture for designing scenarios across multiple industrial sectors was discussed in the face of prevailing EU regulations, which make the utilization of so-called DPPs mandatory for specific products in the near future. Special attention was given to the monitoring and operation of collaborative smart production supply chains with respect to the different life-cycle stages of a product, enabling traceability and accountability. Based on the vivid and real-world use-case of digital nameplates and carbon footprints in the industrial sector, possible content and parameters of DPPs were illustrated on the basis of the proposed architecture. The adoption of BC-based DPPs in industrial supply chains, as exemplified by the car wheel supply chain scenario, aligns effectively with the EU’s objectives for sustainable and traceable supply chains. It is to be noted that the approach on hand is content-agnostic and therefore enables manufacturers with the freedom to decide on the content of an DPP, as it is assumed that product and industry-specific requirements and regulations are known by the respective organizations. Once a participant in the supply chain has entered information to the system, future attempts to overwrite this information, as for example the product specifications of a supplier, are mitigated by the tamper-resistant nature of the BC technology. As security-related DPP requirements [6] like non-repudiation, data verification, data sovereignty and secure data storage can also be fulfilled by existing BC frameworks, application within the proposed architecture is no coincidence. The utilized Secret Network BC technology not only provides smart contract functionality, scalability and ensuring of data integrity, but also enables assigning custom access authorisations by making so-called viewing keys available to an allowed party. In addition to the presented benefits of BC within the approach on hand, this technology can enable a collaborative ecosystem in which information is exchanged and processed via theDPP in a secure, trustworthy and straight-forward manner while being conform with Gaia-X procedures.
With respect to DPP systems, there are many gaps identified [6] which are tackled by design decisions in the work on hand, as for example the energy and resource utilization of DPP systems or their level of data privacy.
Looking forward, the continual evolution of BC technology and its integration with other emerging technologies will be pivotal in addressing the dynamic needs of industrial supply chains and regulatory frameworks. In terms of interoperability, the system may potentially benefit from a utilization of AAS as information model for exchanging the DPP data.
In conclusion, the proposed DPP system presents a robust solution that meets the specified requirements of resource efficiency, architectural soundness, and security compliance. The architecure’s design addresses current and emerging threats more effectively than traditional systems, offering a forward-looking approach to digital product passport management in line with Gaia-X standards. A detailed long-term study of real-world use-cases utilizing this implementation still remains to be done.

Author Contributions

Conceptualization, F.S. and M.N. and P.R.; methodology, F.S. and M.N. and P.R.; validation,F.S. and M.N. and P.R.; formal analysis, F.S. and M.N. and P.R. and C.R.; investigation, F.S. and M.N. and P.R.; writing—original draft preparation, F.S. and M.N. and P.R.; writing—review and editing, F.S. and M.N. and P.R. and C.R.; visualization, F.S. and M.N. and P.R.; supervision, C.R. and A.L. and O.R.; project administration, C.R.; funding acquisition, C.R.; Data curation, N/A; Resources, N/A; Software, N/A, All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Federal Ministry of Education and Research (BMBF) under reference number COSMIC-X 02J21D144, and supervised by Projektträger Karlsruhe (PTKA).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not Applicable

Acknowledgments

The authors would like to thank all project partners of COSMIC-X. In Addition, the authors acknowledge comments by Samed Ajdinović from the ISW on parts of this work.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. European Commission. The European Green Deal: Communication from the Commission to the European Parliament, the European Council, the Council, the European Economic and Social Committee and the Committee of the Regions, 11.12.2019.
  2. European Commission. A new Circular Economy Action Plan: For a cleaner and more competitive Europe: Communication from the Commission to the European Parliament, the European Council, the Council, the European Economic and Social Committee and the Committee of the Regions, 2020.
  3. European Parlament and EU Council. REGULATION (EU) 2023/1542 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 12 July 2023 concerning batteries and waste batteries, amending Directive 2008/98/EC and Regulation (EU) 2019/1020 and repealing Directive 2006/66/EC, 12.07.2023.
  4. Donetskaya, J.V.; Gatchin, Y.A. Development of requirements for the content of a digital passport and design solutions. In Proceedings of the Journal of Physics: Conference Series. IOP Publishing, 2021, Vol. 1828, p. 012102. [CrossRef]
  5. Adisorn, T.; Tholen, L.; Götz, T. Towards a digital product passport fit for contributing to a circular economy. Energies 2021, 14, 2289. [Google Scholar] [CrossRef]
  6. Jansen, M.; Meisen, T.; Plociennik, C.; Berg, H.; Pomp, A.; Windholz, W. Stop Guessing in the Dark: Identified Requirements for Digital Product Passport Systems in: Systems 11, 123, 2023. [CrossRef]
  7. Braud, A.; Fromentoux, G.; Radier, B.; Le Grand, O. The road to European digital sovereignty with Gaia-X and IDSA. IEEE network 2021, 35, 4–5. [Google Scholar] [CrossRef]
  8. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System, 2008.
  9. Buterin, V. Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform, 2014.
  10. Introduction to smart contracts, 31.07.2023.
  11. Stratmann, L.; Hoeborn, G.; Pahl, C.; Schuh, G. Classification of product data for a Digital Product Passport in the manufacturing industry. 2023. [Google Scholar] [CrossRef]
  12. Jansen, M.; Gerstenberger, B.; Bitter-Krahe, J.; Berg, H.; Sebestyén, J.; Schneider, J. Current approaches to the digital product passport for a circular economy; Wuppertal Institute for Climate, Environment and Energy, 2022.
  13. Voulgaridis, K.; Lagkas, T.; Angelopoulos, C.M.; Boulogeorgos, A.A.A.; Argyriou, V.; Sarigiannidis, P. Digital product passports as enablers of digital circular economy: a framework based on technological perspective. Authorea Preprints 2023. [Google Scholar] [CrossRef]
  14. ZVEI Recommendation: "The Digital Nameplate" - CONSISTENT, SUSTAINABLE, FUTURE-PROOF, NETWORKED, 2020. https://www.zvei.org/en/press-media/publications/zvei-recommendation-the-digital-nameplate; accessed 01-01-2024.
  15. Ye, X.; Xu, W.; Liu, J.; Zhong, Y.; Liu, Q.; Zhou, Z.; Song, W.S.; Hong, S.H. Implementing Digital Twin and Asset Administration Shell Models for a Simulated Sorting Production System. IFAC-PapersOnLine 2023, 56, 11880–11887. [Google Scholar] [CrossRef]
  16. Künster, N.; Dietrich, F.; Palm, D. Opportunities And Challenges Of The Asset Administration Shell For Holistic Traceability In Supply Chain Management. 02 2023. [CrossRef]
  17. European Parlament and EU Council. DIRECTIVE 2006/42/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 May 2006 on machinery, and amending Directive 95/16/EC (recast), 17.05.2006.
  18. Digital Nameplate for Industrial Equipment: Submodel Template of the Asset Administration Shell: Specification IDTA 02006-2-0.
  19. Garrels, K.; Grüner, S.; Schönfeld, M.; Jänicke, L.; Lamboley, P.; Martinez, B.; Gayko, J.; Holst, J.C.; Käbisch, S.; Klasen, W.; et al. ZVEI-Show-Case PCF@Control Cabinet: Product Carbon Footprint Calculation of a Control Cabinet using the Asset Administration Shell: White Paper, Mai 2022.
  20. ECLASS, e.V. . Einführung in den Standard. https://eclass.eu/eclass-standard/einfuehrung, 2024.
  21. IDTA Carbon Footprint: Working Draft.
  22. Ruf, P.; Stodt, J.; Reich, C. Security Threats of a Blockchain-Based Platform for Industry Ecosystems in the Cloud. In Proceedings of the 2021 Fifth World Conference on Smart Trends in Systems Security and Sustainability (WorldS4); 2021; pp. 192–199. [Google Scholar] [CrossRef]
  23. Makrakis, G.M.; Kolias, C.; Kambourakis, G.; Rieger, C.; Benjamin, J. Industrial and critical infrastructure security: Technical analysis of real-life security incidents. Ieee Access 2021, 9, 165295–165325. [Google Scholar] [CrossRef]
  24. Stodt, F.; Reich, C. A Review on Digital Wallets and Federated Service for Future of Cloud Services Identity Management. 06 2023.
  25. Zhang, R.; Xue, R.; Liu, L. Security and privacy on blockchain. ACM Computing Surveys (CSUR) 2019, 52, 1–34. [Google Scholar] [CrossRef]
  26. Lashkari, B.; Musilek, P. A comprehensive review of blockchain consensus mechanisms. IEEE Access 2021, 9, 43620–43652. [Google Scholar] [CrossRef]
  27. Buterin, V. Ethereum: platform review. Opportunities and Challenges for Private and Consortium Blockchains 2016, 45. [Google Scholar]
  28. Nasir, Q.; Qasse, I.A.; Abu Talib, M.; Nassif, A.B.; et al. Performance analysis of hyperledger fabric platforms. Security and Communication Networks 2018, 2018. [Google Scholar] [CrossRef]
  29. Valenta, M.; Sandner, P. Comparison of ethereum, hyperledger fabric and corda. Frankfurt School Blockchain Center 2017, 8, 1–8. [Google Scholar]
  30. Woetzel, C. Secret network: A privacy-preserving secret contract & decentralized application platform 2016.
  31. Baliga, A.; Subhod, I.; Kamat, P.; Chatterjee, S. Performance evaluation of the quorum blockchain platform. arXiv preprint arXiv:1809.03421 2018.
  32. Thin, W.Y.M.M.; Dong, N.; Bai, G.; Dong, J.S. Formal analysis of a proof-of-stake blockchain. In Proceedings of the 2018 23rd International Conference on Engineering of Complex Computer Systems (ICECCS). IEEE; 2018; pp. 197–200. [Google Scholar] [CrossRef]
  33. Yu, G.; Wu, B.; Niu, X. Improved blockchain consensus mechanism based on PBFT algorithm. In Proceedings of the 2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC). IEEE; 2020; pp. 14–21. [Google Scholar] [CrossRef]
  34. Xiong, A.; Liu, G.; Zhu, Q.; Jing, A.; Loke, S.W. A notary group-based cross-chain mechanism. Digital Communications and Networks 2022, 8, 1059–1067. [Google Scholar] [CrossRef]
  35. Kwon, J.; Buchman, E. Cosmos whitepaper. A Netw. Distrib. Ledgers 2019, 27. [Google Scholar]
  36. Moniz, H. The Istanbul BFT consensus algorithm. arXiv preprint arXiv:2002.03613 2020.
  37. DIN Deutsches Institut für Normung e.V.. DIN EN ISO 9000 - Qualitätsmanagementsysteme: Grundlagen und Begriffe, Nov 2015.
  38. Council, A.S.C. APICS Supply Chain Operations Reference Model: SCOR Version 12.0, 2017.
Figure 1. High-level depiction of the Proposed DPP Management Architecture using the Secret Network.
Figure 1. High-level depiction of the Proposed DPP Management Architecture using the Secret Network.
Preprints 99392 g001
Figure 2. High-Level depiction of Data Flows in the proposed Architecture.
Figure 2. High-Level depiction of Data Flows in the proposed Architecture.
Preprints 99392 g002
Figure 3. Fundamental Supply Chain Processes of SCOR.
Figure 3. Fundamental Supply Chain Processes of SCOR.
Preprints 99392 g003
Figure 4. UML Class Diagram of Entities related to a DPP.
Figure 4. UML Class Diagram of Entities related to a DPP.
Preprints 99392 g004
Figure 5. Sequence Diagram of Sourcing an Asset.
Figure 5. Sequence Diagram of Sourcing an Asset.
Preprints 99392 g005
Figure 6. Sequence Diagram of Making an Asset.
Figure 6. Sequence Diagram of Making an Asset.
Preprints 99392 g006
Figure 7. Sequence Diagram of Delivering an Asset.
Figure 7. Sequence Diagram of Delivering an Asset.
Preprints 99392 g007
Figure 8. Sequence Diagram of Returning an Asset.
Figure 8. Sequence Diagram of Returning an Asset.
Preprints 99392 g008
Figure 9. Overview over the life cycle product data aggregation to the DPP.
Figure 9. Overview over the life cycle product data aggregation to the DPP.
Preprints 99392 g009
Figure 10. Sourcing of a car wheel supply chain process with information flow to the DPPs.
Figure 10. Sourcing of a car wheel supply chain process with information flow to the DPPs.
Preprints 99392 g010
Figure 11. Making of a car wheel supply chain process with information flow to the DPPs.
Figure 11. Making of a car wheel supply chain process with information flow to the DPPs.
Preprints 99392 g011
Figure 12. Delivering of a car wheel supply chain process with information flow to the DPPs.
Figure 12. Delivering of a car wheel supply chain process with information flow to the DPPs.
Preprints 99392 g012
Table 1. Comparative Analysis of Blockchain Platforms for DPP Implementation.
Table 1. Comparative Analysis of Blockchain Platforms for DPP Implementation.
Feature/Blockchain ETH Fabric R3 Corda Secret Net. Quorum
Privacy & Confidentiality × -
Scalability & Efficiency × ×
Interoperability
Decentralization & Trust × ×
Smart Contract Capability
Data Integrity & Security
Consensus Mechanism PoS PBFT Notary-Based BFT IBFT
Table 2. Threat Model Assessment and Mitigation Strategies.
Table 2. Threat Model Assessment and Mitigation Strategies.
Asset Name Threat Type Impact Mitigation Strategies
Users Phishing, Credential theft Critical Secure session management, security by design with viewing key
Security Policies Policy Bypass, Misconfiguration High Least privilege, Regular access reviews, Automated policy enforcement
DPP Management Process Unauthorized Access, Data Manipulation Critical security by design with Secret Network
Gaia-X Service Initialization unauthorized access during setup High Secure bootstrapping, Encryption at rest and in transit
Blockchain Operations Smart Contract Vulnerabilities Critical Smart contract audits, Input validation and sanitization
Security Monitoring Inadequate Detection Critical Continuous threat intelligence
Data Transfers MITM Attacks, Data Interception High TLS, Certificate pinning, Regular certificate rotation
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2026 MDPI (Basel, Switzerland) unless otherwise stated