Privacy Preserving Coordinated Inventory Replenishment Policies in a Multi-Stage Supply Chain

Article Preview

Abstract:

Most of the CRE solutions either assume existence of a central planner who has all the information about the system, or assume that each participant of the computation shares all of his information with other participants. These solutions, however, are problematic when the data is sensitive and the participants are reluctant to share their private, proprietary information. The development and deployment of privacy preserving coordinating model in supply chain based on common replenishment epoch could allow supply chain collaborations to take place without revealing any participant's data to the others, reaping the benefits of collaboration while avoiding the drawbacks. In this paper, secure multi-party computation protocols are applied in the problem of a multi-stage supply chain, where the objective is to find a CRE policy for each facility in the system such that the total average ordering and inventory-related cost of the entire system is minimized.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 219-220)

Pages:

1545-1549

Citation:

Online since:

March 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] S Viswanathan , Piplani R. Coordinating supply chain inventory through common replenishment epochs [ J ] .European Journal of Operational Research, 129 (2) : 277 - 286, (2001).

DOI: 10.1016/s0377-2217(00)00225-3

Google Scholar

[2] Ajay K. Mishra. Selective discount for supplier-retailer coordination using common replenish- ment epochs [J].European Journal Of Operational Research,153(3):7512-7561,(2004).

DOI: 10.1016/s0377-2217(02)00811-1

Google Scholar

[3] LiuYong-sheng. On Inventory Coordination Policy in Supply Chain [J]. Chinese Journal of Management Science,12(2):49-54, 2004. (In Chinese).

Google Scholar

[4] LiuYong-sheng. On Supply Chain Coordination Policy under Elastic Demand [J]. Industrial engineering journal, 6(4) :31-35, 2003. (In Chinese).

Google Scholar

[5] Cao Zong-hong. Coordination and Optimization Model under Stochastic Demand in Supply Chain [J], college mathematics, 23 (2):74~79, 2007. (In Chinese).

Google Scholar

[6] JI Shou-fen. Coordinating model and simulation in lot to lot supply chain based on common replenishment epoc [J]. Computer Integrated Manufacturing Systems, 14(3):482-486, (2008).

Google Scholar

[7] Goyal, S.K., Gupta, Y.P. Integrated inventory models: The retailer–vendor coordination. European Journal of Operational Research 41, 261–269, (1989).

DOI: 10.1016/0377-2217(89)90247-6

Google Scholar

[8] Munson, C.L., Rosenblatt, M.J. Theories and realities of quantity discounts: An exploratory study. Production and Operations Management 7 (4), 352–369, (1998).

DOI: 10.1111/j.1937-5956.1998.tb00129.x

Google Scholar

[9] Lee, H., S. Whang. Information sharing in a supply chain. Int. J. Tech. Management 20(3), p.373– 387, (2000).

Google Scholar

[10] Porter, M.E. (1985) Competitive Advantage, Free Press, New York, (1985).

Google Scholar

[11] Moutaz Khouja.Optimizing inventory decisions in a multi-stage multi-customer supply chain[J]. Transportation Research, 39 (2003) : 193–208.

DOI: 10.1016/s1366-5545(02)00036-4

Google Scholar

[12] Du W L. A study of several specific secure two party computation problems [D]. USA: Purdue University, (2001).

Google Scholar

[13] Atallah M J. Elmongui H G, Deshpande V, et al. Secure supply chain protocols [C]. IEEE International Conference on Electronic Commerce. California, USA: 293-302, (2003).

DOI: 10.1109/coec.2003.1210264

Google Scholar

[14] Luo Wen Jun, Li Xiang. A study of secure multi-party statistical analysis [C]//Proceedings of the 2003 International Conference on Computer Networks and Mobile Computing. Shanghai, China: 377-383, (2003).

DOI: 10.1109/iccnmc.2003.1243074

Google Scholar