A Survey of Privacy-Aware Supply Chain Collaboration: From Theory to Applications

@article{Hong2014ASO,
  title={A Survey of Privacy-Aware Supply Chain Collaboration: From Theory to Applications},
  author={Yuan Hong and Jaideep Vaidya and Shengbin Wang},
  journal={J. Inf. Syst.},
  year={2014},
  volume={28},
  pages={243-268}
}
ABSTRACT: In the contemporary information era, the ubiquitous collection of data from different parties frequently accommodates significant mutual benefits to the involved participants. However, data is a double-bladed sword. Inappropriate access or use of data by the recipients may pose serious privacy issues that explicitly harm the data owners. In the past decade, swiftly increasing privacy concerns arise in many business processes such as supply chain management. How to protect the private… 

Figures and Tables from this paper

Managing the Tension between Trust and Confidentiality in Mobile Supply Chains

This research investigates the tension between trust and confidentiality in Mobile Supply Chains (MSCs), where a production asset that is owned by one of the partners is outsourced to another partner

Valuing Personal Data to Foster Privacy: A Thought Experiment and Opportunities for Research

To understand data properly and to improve privacy protection, data must be valued, and the paper elaborates on major impediments to the valuation of data, as well as advantages of overcoming these impediments.

Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure

This paper proposes a secure and efficient protocol for multiple participants to formulate and solve the traveling salesman problem TSP, a fundamental combinatorial optimization problem with applications in diverse fields such as planning, logistics and production.

Data Anonymization and its Effect on Personal Privacy

To replicate the data companies and academic institutions collect, I will randomly simulate the information and discuss what methods are currently being used to anonymize data and why it is important to minimize the risk of linkage and leakage.

Forecasting with Visibility Using Privacy Preserving Federated Learning

In the fluctuating and unstable supply chain environment, accurate demand forecasting is especially important. To improve the prediction accuracy, one possible way is to improve supply chain

Reasons and Strategies for Privacy Features in Tracking and Tracing Systems—A Systematic Literature Review

This work identifies and evaluates the techniques used with regard to employee privacy in industrial tracking and tracing systems to reveal new privacy preserving techniques that are currently underrepresented, therefore enabling new research opportunities in the industrial community.

Privacy Preserving and Collusion Resistant Energy Sharing

This paper proposes a privacy preserving scheme for all the microgrids which can securely implement their energy sharing against both semi-honest and colluding adversaries and includes two secure communication protocols that can ensure quantified privacy leakage and handle collusions.

Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility

This paper proposes a sanitization framework that enables different parties to collaboratively generate search logs with boosted utility while satisfying differential privacy, and presents an efficient protocol -Collaborative sEarch Log Sanitization (CELS) to meet both privacy requirements.

From Horizontal Collaboration To The Physical Internet – A Case Study From Austria

The growing global flow of goods, the increasing problem of traffic congestion and the inefficiencies associated with distribution and logistics or the discerning consumers’ high standards for

AccessChain: An Access Control Framework to Protect Data Access in Blockchain Enabled Supply Chain

Experimental results illustrate that high throughput can be achieved in a large-scale request environment while maintaining data privacy and sustaining a scalable network.

References

SHOWING 1-10 OF 107 REFERENCES

Secure supply-chain protocols

This work proposes secure supply- chain collaboration (SSCC) protocols that enable supply-chain partners to cooperatively achieve desired system-wide goals without revealing the private information of any of the parties, even though the jointly computed decisions require the information of all the parties.

Confidentiality and Information Sharing in Supply Chain Coordination

It is shown that a higher degree of confidentiality makes the manufacturer worse off, the retailers better off, and the whole supply chain better off and that confidentiality of information sharing does not affect the inventory cost if the manufacturer has an option of making to stock.

An Approach to Securely Identifying Beneficial Collaboration in Decentralized Logistics Systems

This paper presents an algorithm that finds opportunities to swap loads without revealing any information except the loads swapped, along with proofs of the security of the protocol and applies it to an empirical data set from a large transportation company and presents results that suggest significant opportunities to improve efficiency through Pareto improving swaps.

Outsourcing Manufacturing: Secure Price‐Masking Mechanisms for Purchasing Component Parts

This paper develops and tests a privacy-preserving business process that supports the selection of a contract manufacturer by an original equipment manufacturer (OEM), and the determination of

Secure Multi-party Collaboration Systems in Supply Chain Management

This paper uses a real supply chain application to show the demand for secure multi-party collaboration systems and some participants can be very concerned with the privacy of their participation.

k-Anonymity: A Model for Protecting Privacy

  • L. Sweeney
  • Computer Science
    Int. J. Uncertain. Fuzziness Knowl. Based Syst.
  • 2002
The solution provided in this paper includes a formal protection model named k-anonymity and a set of accompanying policies for deployment and examines re-identification attacks that can be realized on releases that adhere to k- anonymity unless accompanying policies are respected.

The Economic Incentives for Sharing Security Information

It is found that security technology investments and security information sharing act as "strategic complements" in equilibrium and suggest that information sharing is more valuable when product substitutability is higher, implying that such sharing alliances yield greater benefits in more competitive industries.

Information Sharing in a Long-Term Supply Chain Relationship: The Role of Customer Review Strategy

It is shown that a more efficient, truth-sharing outcome can emerge as an equilibrium from a long-term relationship, in this equilibrium, forecast information is transmitted truthfully and trusted by the supplier, who in turn allocates the system-optimal capacity.

Secure and Private Collaborative Linear Programming

  • Jiangtao LiM. Atallah
  • Computer Science
    2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing
  • 2006
An efficient protocol for solving linear programming problems in the honest-but-curious model, such that neither party reveals anything about their private input to the other party (other than what can be inferred from the result).
...