1 Secure Collaborative Planning, Forecasting, and Replenishment Vinayak Deshpande Krannert School of Management Purdue University Collaborators: Mikhail.

Slides:



Advertisements
Similar presentations
Revisiting the efficiency of malicious two party computation David Woodruff MIT.
Advertisements

Welcome and introduction Peter Bardsley auctions: theory, evidence, policy.
Dr. A. K. Dey1 Inventory Management, Supply Contracts and Risk Pooling Dr. A. K. Dey.
Contracts and Mechanism Design What Contracts Accomplish Moral Hazard Adverse Selection (if time: Signaling)
Achieving Operational Excellence: Transform the Supply Chain and Leverage Enabling Technology Achieving Operational Excellence: Transform the Supply Chain.
Yale School of Management What causes the underpricing of auctioned IPOs? Experimental Evidence Panos Patatoukas, October 2007.
E-Business Models The emphasis is on business in e-business Part 2 – B2B Adomas Svirskas Vilnius University November 2005.
Coordination in a Supply Chain Bent Steenholt Kragelund
What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.
CPS Topics in Computational Economics Instructor: Vincent Conitzer Assistant Professor of Computer Science Assistant Professor of Economics
Privacy-Preserving Trust Negotiations Mikhail Atallah Department of Computer Science Purdue University.
Supply Chain Management
Supply Chain Management
Principles of Supply Chain Management: A Balanced Approach
1 Introduction to Secure Computation Benny Pinkas HP Labs, Princeton.
Supply-Chain Management: A View of the Future Leroy B. Schwarz Krannert School of Management Purdue University Supported by e-Enterprise Center at Discovery.
Information Systems In The Enterprise
Data Confidentiality in Collaborative Computing Mikhail Atallah Department of Computer Science Purdue University.
September 2001Ch 11: Collaborative Commerce1 Collaborative Commerce  Questions answered in this chapter: –What is collaborative commerce? –What is buy-side.
Forecasting & Demand Planning
Supply Chain Coordination with Contracts
Games Computers (and Computer Scientists) Play Avi Wigderson.
William E. Kovacic, Robert C. Marshall, Leslie M. Marx, Matthew E. Raiff Forthcoming in Handbook of Procurement, edited by N. Dimitri, G. Piga and G. Spagnolo,
Introduction to Auctions David M. Pennock. Auctions: yesterday Going once, … going twice,...
Eran Hanany IDF general headquarters OR ( ) TAU Industrial Engineering dept. (2004-) Visited Northwestern U. (2 yrs), UBC (1 yrs) Main research.
Coordination in a Supply Chain
Secure Supply-Chain Collaboration (SSCC) Mike J. Atallah, Hicham G. Elmongui, Vinayak Deshpande, Leroy B. Schwarz.
Asymmetric Information
A Secure Protocol for Computing Dot-products in Clustered and Distributed Environments Ioannis Ioannidis, Ananth Grama and Mikhail Atallah Purdue University.
COPYRIGHT © 2008 Thomson South-Western, a part of The Thomson Corporation. Thomson, the Star logo, and South-Western are trademarks used herein under license.
Introduction to Operations Management Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written.
Marketing Ethics and Social Responsibility
Delivering Change in the Digital Economy: The Value of Supply Chain Collaboration in SA FMCG CGCSA Summit - September 2015 Paul Dickson.
Prediction Markets and Business Forecasts Opportunities and Challenges in the New Information Era Professor: Andrew B. Whinston McCombs School of Business.
Combinatorial Auctions By: Shai Roitman
The Value of Information Sharing in a Two-Level Supply Chain by Lee, So and Tang Emrah Zarifoğlu
PowerPoint presentation to accompany Chopra and Meindl Supply Chain Management, 5e 1-1 Copyright ©2013 Pearson Education, Inc. publishing as Prentice Hall.
Demand Planning: Forecasting and Demand Management CHAPTER TWELVE McGraw-Hill/Irwin Copyright © 2011 by the McGraw-Hill Companies, Inc. All rights reserved.
On the Practical Feasibility of Secure Distributed Computing A Case Study Gregory Neven, Frank Piessens, Bart De Decker Dept. of Computer Science, K.U.Leuven.
Privacy-Preserving Trust Negotiations* Mikhail Atallah CERIAS and Department of Computer Sciences Purdue University * Joint work with Keith Frikken and.
INVESTIGATORS R.E. King S-C. Fang J.A. Joines H.L.W. Nuttle STUDENTS P. Yuan Y. Dai Y. Ding Industrial Engineering Textile Engineering, Chem. and Science.
INVESTIGATORS R. King S. Fang J. Joines H. Nuttle STUDENTS N. Arefi Y. Dai S. Lertworasirikul Industrial Engineering Textiles Engineering, Chem. and Science.
Privacy-Preserving Credit Checking Keith Frikken, Mikhail Atallah, and Chen Zhang Purdue University June 7, 2005.
Inventory Management and Risk Pooling (1)
Analyzing Supply Chain Performance under Different Collaborative Replenishment Strategies AIT Masters Theses Competition Wijitra Naowapadiwat Industrial.
Ch. 11 General Equilibrium and the Efficiency of Perfect Competition
Combining Supply Chain Integration with Sales & Operations Planning Mark Williams – Professional Services Consultant, Supply Chain Solutions Center – Demand.
© 2010 Institute of Information Management National Chiao Tung University Chapter 7 Incentive Mechanism Principle-Agent Problem Production with Teams Competition.
Hidden Access Control Policies with Hidden Credentials Keith Frikken, Mikhail Atallah, Jiangtao Li CERIAS and Department of Computer Sciences Purdue University.
I2 U Intelligent Supply Chain Management Course Module Twelve: Inventory Deployment.
A Supplier’s Optimal Quantity Discount Policy Under Asymmetric Information Charles J. Corbett Xavier de Groote Presented by Jing Zhou.
PowerPoint presentation to accompany Chopra and Meindl Supply Chain Management, 5e 1-1 Copyright ©2013 Pearson Education, Inc. publishing as Prentice Hall.
Main Function of SCM (Part I)
1 Secure Protocols for Supply Chain Collaboration: Capacity Allocation and Collaborative Forecasting Vinayak Deshpande Krannert School of Management Purdue.
Privacy-Preserving Data Aggregation without Secure Channel: Multivariate Polynomial Evaluation Taeho Jung 1, XuFei Mao 2, Xiang-Yang Li 1, Shao-Jie Tang.
 CHANNELS OF DISTRIBUTION  DISTRIBUTION STRATEGY  SUPPLY CHAIN MANAGEMENT/LOGISTICS Place (Distribution)
1 Block 3 Session 2 Continue.. & Session 3 Distribution systems, EDI and the organization: –Major developments over the last 30 years have been achieved.
Coordination in Supply Chain
Chapter 14Copyright ©2009 by South-Western, a division of Cengage Learning. All rights reserved 1 ECON Designed by Amy McGuire, B-books, Ltd. 14 CHAPTER.
Allocation of Support Department Costs, Common Costs, and Revenues
Lean Supply Chains: The Foundation
4 THE DIGITAL FIRM: ELECTRONIC COMMERCE & ELECTRONIC BUSINESS.
Operations Management Contemporary Concepts and Cases
Auctions and Competitive Bidding
Chapter 9 ERP & Supply Chains
Forecasting Chapter 11.
Principles of Supply Chain Management: A Balanced Approach
Achieving Fairness in Private Contract Negotiation
Chapter 14 Sourcing Decisions in a Supply Chain
Supply Chain Management
Presentation transcript:

1 Secure Collaborative Planning, Forecasting, and Replenishment Vinayak Deshpande Krannert School of Management Purdue University Collaborators: Mikhail Atallah, Marina Blanton, Keith Frikken, Jiangtao Li Computer Sciences, Purdue University Leroy B.Schwarz School of Management, Purdue University Research funded by NSF ITR Grant

2 The Starting Point.... “Information Asymmetry” is one of the major sources of inefficiency in Managing Supply Chains ==>Wrong Investment in Capacity ==>Misallocation of Resources ==>“Bullwhip Effect” ==>Reduced Customer Service ==>Unnecessary Additional Costs

3 Supply Chain Management Trends Collaboration between supply-chain partners to improve efficiencies Information sharing for collaborative decision making National program sponsored by VICS for establishing collaboration standards – called CPFR (Collaborative Planning, Forecasting and Replenishment)

4.... but, there are Very Good Reasons for Keeping Asymmetric Information Asymmetric Fear that Supply-Chain Partner will Take Advantage of Private Information Fear that Private Information will Leak to a Competitor

5 As a result… Reluctance to share private/proprietary info –Even when both sides would gain from sharing Consequence: Information asymmetry –Many inefficiencies

6 Is it possible to enjoy the benefits of Information-Sharing without Disclosing Private Information? Obvious Question…

7 The Future Online interactions that give the benefits of sharing, without its drawbacks –“As if” information sharing had taken place, yet without revealing one’s private/proprietary data Counterpart’s information is often needed only as partial input for computing a desired output Can two parties compute desired output without either learning the other’s input?

8 An Example: Vickrey Auction Requires computation of the second highest bid value and identity of highest bidder from all submitted bids Secure Multi-party Computation (SMC) protocols can –Compute the second highest bid without revealing the identity of the second highest bidder –Identify highest bidder without revealing his bid –Not reveal bids of any other bidders

9 Secure multiparty computation Alice has private data x, Bob has private data y, They want to jointly compute f(x,y), Only Alice (or Bob, or both) knows the result. Alice Bob x y

10 Secure multiparty computation (SMC) Literature A decades old area –Yao, Goldreich, Micali, Wigderson, … (many others) –Elegant theory –General results Circuit simulations, use oblivious transfer –General results typically impractical Recently: Protocols for specific problems –More practical

11 Mechanism Design Literature Studies how private information can be elicited from agents by providing incentives Mechanism design problem simplified through the revelation principle (principal announces a menu constructed to induce truth telling) No future or side consequences of participating in the mechanism and truthfully revealing private information Assumes that the entity implementing the mechanism is trustworthy

12 Supply Chain Literature… Has quantified the benefit of information sharing (e.g. Lee, So and Tang; Cachon and Fisher) Has modeled Supply-Chain Collaboration, e.g. collaborative forecasting (Aviv 2001, 2003) Key obstacles: companies unwilling to share sensitive information, fear of information leakage

13 We Propose to marry three distinct disciplines Secure Multi-Party Computation from CS Mechanism Design from Economics Supply-Chain Management from OM

14 Our Goal.....we are developing protocols to enable Supply-Chain Partners to Make Decisions that Cooperatively Achieve Desired System Goals without Revealing Private Information

15 A Supply Chain Problem.. Collaborative Forecasting and Planning without revealing private forecast information

16 Industry Backdrop Collaborative Planning, Forecasting, and Replenishment (CPFR), an initiative of the Voluntary Intra-Industry Collaboration Society (VICS) –buyer and supplier share inventory-status, forecast, and event-oriented information and collaboratively make replenishment decisions –pilot program between Wal-Mart and Warner-Lambert, called CFAR: ( Challenges to CPFR –fear that competitively-sensitive “private information” will be compromised –Necessary to protect “sensitive” forecast information such as sales promotions from “leaking”

17 Business Scenario A supply-chain with two players, a supplier selling to a retailer. The retailer and the supplier receive independent “signals” about future market demand –e.g., a retailer has private information about “promotions” that he may be planning to run in the future which can affect his forecast of demand; – the supplier can receive signals about overall “market trends” Incorporating these “signals” can improve forecast accuracy But.. “signal” information should be kept private

18 Demand Model d t – demand in period t (observed by the retailer only)  t,i r – Retailer’s signal about period t observed in period t-i (private information to the retailer)  t,i s –Supplier’s signal about period t observed in period t-i (private information to the supplier) ,  r,  s – unknown parameters to be estimated from past observations

19 Forecasting Process In each period t, estimate ,  r,  s by regressing the observations d t versus the observed signals  t,i r and  t,i s For the forecast horizon (T periods) construct the forecast using the following equation:

20 Collaborative Inventory Planning Policy

21 Secure Protocols Example: Average Salary

22 Secure Protocols Building Blocks: Hiding numbers by additively splitting values -x= x s + x r, Supplier has x s, while retailer has x r - Modular arithmetic (x s +x r ) mod N =x hides x in a information theoretic sense ·Secure addition and subtraction · Homomorphic Encryption ( E(X) E(Y)=E(X+Y) ) · Secure Split Multiplication · Secure Split Division · Secure Scalar Product · Secure Matrix Multiplication

23 Advanced Building Blocks: Secure Matrix Inversion -Matrix A is split such that A s +A r = A. - Output supplier learns B s, retailer learns B r ; B s +B r = B Secure Binary Search Secure Comparison -Supplier has X, Retailer has Y, - Output reveals if X<Y, without revealing X to retailer and Y to supplier

24 Secure Multiple Linear Regression Protocol

25 Secure Process for Forecasting and Inventory Planning

26 Step 1: Input cost parameters RetailerSupplier

27 RetailerSupplier Step 2: Input demand and inventory information

28 RetailerSupplier Step 2(con’t): Regression Supplier

29 Step 3: Leadtime demand forecast OverallSupplierRetailer

30 Step 4: Determine base-stock levels OverallSupplierRetailer

31 Step 5: Determine order quantities SupplierRetailer

32 Protocol Implementation Issues: Protocols are verifiable The Logic of the Protocol is Auditable –Logic of Source Code Can be Audited Outputs Can be Tested –Outputs Can be Verified Given Known Inputs

33 Protocol Implementation Issues: Other Advantages Valuable even in Trusted e.g. (intra- corporate) interactions –“Defense in depth” ! –Systems are hacked into, break-ins occur, viruses occur, spy-ware, bad insiders, etc –Liability Decreased “Don’t send me your data even if you trust me” Impact on Litigation and Insurance Rates

34 We Have Only Just Begun... Tough Issues to Deal with: –SMC Complexities; e.g., How to Deal with Collusion Computational Complexity (e.g., simultaneity) –Supply-Chain Modeling Complexities; e.g. Contracting/Incentive Issues –SSCC Complexities; e.g., Inverse Optimization Bob’s Objective is f B (x A, x B ); Alice’s is f A ((x A, x B )

35 Future Work Protocols for other supply-chain applications –Price-Masking –Bullwhip Scenarios –Capacity Allocation Protocol implementation issues –Collusion by a subset of parties –Intrusion detection –Incentive issues and mechanism design

36 Questions?...

37 Secure Regression

38 Secure 3x3 Matrix Inverse Protocol

39 Secure Demand Forecasting Protocol Input: The supplier knows the  j,i s and the retailer knows the  j,i r, for all j, i such that j = t + 1,..., t + T and i = j − t,..., T. The parameters ,  r,  s are available in additively split form. Output: Both supplier and retailer learn the forecast d j for all j = t + 1,..., t + T. Protocol Steps: 1. For each j  {t + 1,..., t + T}, the supplier computes v j s =     j,i s. This is a “local” computation, as the supplier has all the  j,i s values. The retailer similarly computes v j r =     j,i r for all j  {t + 1,..., t + T}. 2. For each j  {t + 1,..., t + T}, the supplier and retailer run a split multiplication protocol twice, once to compute w r j =  r v r j and once to compute w s j =  s v s j (both in split fashion). 3. For each j  {t + 1,..., t + T}, the supplier and retailer run a split addition protocol to compute µ+ w r j + w s j, which is equal to d j. They exchange their shares of each d j so they both learn its value.