Secure Collaborative Planning, Forecasting, and Replenishment

39
1 Secure Collaborative Planning, Forecasting, and Replenishment Vinayak Deshpande Krannert School of Management Purdue University Collaborators: Mikhail Atallah, Marina Blanton, Keith Frikken, Jiangtao Li Computer Sciences, Purdue University Leroy B.Schwarz School of Management, Purdue University Research funded by NSF ITR Grant

description

Secure Collaborative Planning, Forecasting, and Replenishment. Vinayak Deshpande Krannert School of Management Purdue University Collaborators: Mikhail Atallah , Marina Blanton, Keith Frikken, Jiangtao Li Computer Sciences, Purdue University Leroy B.Schwarz - PowerPoint PPT Presentation

Transcript of Secure Collaborative Planning, Forecasting, and Replenishment

Page 1: Secure Collaborative Planning, Forecasting, and Replenishment

1

Secure Collaborative Planning, Forecasting, and Replenishment

Vinayak Deshpande

Krannert School of ManagementPurdue University

Collaborators:

Mikhail Atallah, Marina Blanton, Keith Frikken, Jiangtao Li

Computer Sciences, Purdue University

Leroy B.Schwarz

School of Management, Purdue University

Research funded by NSF ITR Grant

Page 2: Secure Collaborative Planning, Forecasting, and Replenishment

2

The Starting Point....

“Information Asymmetry” is one of the major sources of inefficiency in Managing Supply Chains

==> Wrong Investment in Capacity

==> Misallocation of Resources

==> “Bullwhip Effect”

==> Reduced Customer Service

==> Unnecessary Additional Costs

Page 3: Secure Collaborative Planning, Forecasting, and Replenishment

3

Supply Chain Management Trends

• Collaboration between supply-chain partners to improve efficiencies

• Information sharing for collaborative decision making

• National program sponsored by VICS for establishing collaboration standards – called CPFR (Collaborative Planning, Forecasting and Replenishment)

Page 4: Secure Collaborative Planning, Forecasting, and Replenishment

4

.... but, there are Very Good Reasons for Keeping Asymmetric Information

Asymmetric

• Fear that Supply-Chain Partner will Take Advantage of Private Information

• Fear that Private Information will Leak to a Competitor

Page 5: Secure Collaborative Planning, Forecasting, and Replenishment

5

As a result…

• Reluctance to share private/proprietary info– Even when both sides would gain from sharing

• Consequence: Information asymmetry– Many inefficiencies

Page 6: Secure Collaborative Planning, Forecasting, and Replenishment

6

Is it possible to enjoy the benefits of Information-Sharing without Disclosing Private Information?

Obvious Question…

Page 7: Secure Collaborative Planning, Forecasting, and Replenishment

7

The Future

• Online interactions that give the benefits of sharing, without its drawbacks– “As if” information sharing had taken place, yet without

revealing one’s private/proprietary data

• Counterpart’s information is often needed only as partial input for computing a desired output

• Can two parties compute desired output without either learning the other’s input?

Page 8: Secure Collaborative Planning, Forecasting, and Replenishment

8

An Example: Vickrey Auction

• Requires computation of the second highest bid value and identity of highest bidder from all submitted bids

• Secure Multi-party Computation (SMC) protocols can– Compute the second highest bid without revealing the

identity of the second highest bidder

– Identify highest bidder without revealing his bid

– Not reveal bids of any other bidders

Page 9: Secure Collaborative Planning, Forecasting, and Replenishment

9

Secure multiparty computation

• Alice has private data x,• Bob has private data y,• They want to jointly compute f(x,y),• Only Alice (or Bob, or both) knows the result.

Alice Bob

x y

Page 10: Secure Collaborative Planning, Forecasting, and Replenishment

10

Secure multiparty computation (SMC) Literature

• A decades old area– Yao, Goldreich, Micali, Wigderson, … (many others)

– Elegant theory

– General results • Circuit simulations, use oblivious transfer

– General results typically impractical

• Recently: Protocols for specific problems– More practical

Page 11: Secure Collaborative Planning, Forecasting, and Replenishment

11

Mechanism Design Literature

• Studies how private information can be elicited from agents by providing incentives

• Mechanism design problem simplified through the revelation principle (principal announces a menu constructed to induce truth telling)

• No future or side consequences of participating in the mechanism and truthfully revealing private information

• Assumes that the entity implementing the mechanism is trustworthy

Page 12: Secure Collaborative Planning, Forecasting, and Replenishment

12

Supply Chain Literature…

• Has quantified the benefit of information sharing (e.g. Lee, So and Tang; Cachon and Fisher)

• Has modeled Supply-Chain Collaboration, e.g. collaborative forecasting (Aviv 2001, 2003)

• Key obstacles: companies unwilling to share sensitive information, fear of information leakage

Page 13: Secure Collaborative Planning, Forecasting, and Replenishment

13

We Propose to

marry three distinct disciplines

• Secure Multi-Party Computation from CS

• Mechanism Design from Economics

• Supply-Chain Management from OM

Page 14: Secure Collaborative Planning, Forecasting, and Replenishment

14

Our Goal..

...we are developing protocols to enable Supply-Chain Partners to

Make Decisions that Cooperatively Achieve Desired System Goals without Revealing

Private Information

Page 15: Secure Collaborative Planning, Forecasting, and Replenishment

15

A Supply Chain Problem..

• Collaborative Forecasting and Planning without revealing private forecast information

Page 16: Secure Collaborative Planning, Forecasting, and Replenishment

16

Industry Backdrop

• Collaborative Planning, Forecasting, and Replenishment (CPFR), an initiative of the Voluntary Intra-Industry Collaboration Society (VICS)– buyer and supplier share inventory-status, forecast, and

event-oriented information and collaboratively make replenishment decisions

– pilot program between Wal-Mart and Warner-Lambert, called CFAR: (www.cpfr.org)

• Challenges to CPFR– fear that competitively-sensitive “private information”

will be compromised– Necessary to protect “sensitive” forecast information

such as sales promotions from “leaking”

Page 17: Secure Collaborative Planning, Forecasting, and Replenishment

17

Business Scenario

• A supply-chain with two players, a supplier selling to a retailer.

• The retailer and the supplier receive independent “signals” about future market demand– e.g., a retailer has private information about “promotions”

that he may be planning to run in the future which can affect his forecast of demand;

– the supplier can receive signals about overall “market trends”

• Incorporating these “signals” can improve forecast accuracy

• But.. “signal” information should be kept private

Page 18: Secure Collaborative Planning, Forecasting, and Replenishment

18

Demand Model

, ,1 1

T Tr s

t r t i s t i ti i

d

• dt – demand in period t (observed by the retailer only)

• t,ir – Retailer’s signal about period t observed in period t-i

(private information to the retailer)

• t,is –Supplier’s signal about period t observed in period t-i

(private information to the supplier)

• , r , s – unknown parameters to be estimated from past observations

Page 19: Secure Collaborative Planning, Forecasting, and Replenishment

19

Forecasting Process

• In each period t, estimate , r , s by regressing the observations dt versus the observed signals t,i

r and t,i

s

• For the forecast horizon (T periods) construct the forecast using the following equation:

, , 1,...,

T Tr s

j r sj i j ii j t i j t

d j t t T

Page 20: Secure Collaborative Planning, Forecasting, and Replenishment

20

Collaborative Inventory Planning Policy

Page 21: Secure Collaborative Planning, Forecasting, and Replenishment

21

Secure Protocols Example: Average Salary

Page 22: Secure Collaborative Planning, Forecasting, and Replenishment

22

Secure Protocols Building Blocks:

• Hiding numbers by additively splitting values

-x= xs + xr, Supplier has xs, while retailer has xr

- Modular arithmetic (xs+xr) mod N =x hides x in a information theoretic sense

Secure addition and subtraction

Homomorphic Encryption ( E(X) E(Y)=E(X+Y) )

Secure Split Multiplication

Secure Split Division

Secure Scalar Product

Secure Matrix Multiplication

Page 23: Secure Collaborative Planning, Forecasting, and Replenishment

23

Advanced Building Blocks:• Secure Matrix Inversion

-Matrix A is split such that As+Ar = A.

- Output supplier learns Bs, retailer learns Br; Bs+Br = B

• Secure Binary Search

• Secure Comparison

-Supplier has X, Retailer has Y,

- Output reveals if X<Y, without revealing X to retailer and Y to supplier

Page 24: Secure Collaborative Planning, Forecasting, and Replenishment

24

Secure Multiple Linear Regression Protocol

Page 25: Secure Collaborative Planning, Forecasting, and Replenishment

25

Secure Process for Forecasting and Inventory Planning

Page 26: Secure Collaborative Planning, Forecasting, and Replenishment

26

Step 1: Input cost parameters

1Rh 0.5Sh

19Rp 15Sp

Retailer Supplier

Page 27: Secure Collaborative Planning, Forecasting, and Replenishment

27

Retailer Supplier

16.80td

7RtOH

Step 2: Input demand and inventory information

1,1 0.83Rt

0RtBO

22RtIT

13StOH

0StBO

19StIT

2,2 0.58Rt

3,3 0.88Rt

4,4 0.29Rt

1,1 1.84St

2,2 0.81St

3,3 0.69St

4,4 0.18St

Page 28: Secure Collaborative Planning, Forecasting, and Replenishment

28

Retailer Supplier

Step 2(con’t): Regression

Supplier

ˆ 14.997

ˆ 0.996R

ˆ 0.996S

Page 29: Secure Collaborative Planning, Forecasting, and Replenishment

29

Step 3: Leadtime demand forecast

Overall

,[ , ] 47.46Rt t t L

,[ , ] 5.02St t t L

,[ , ] 79.35R St t t L L

SupplierRetailer

,[ ] 8.28R St t L L

Page 30: Secure Collaborative Planning, Forecasting, and Replenishment

30

Step 4: Determine base-stock levels

Overall

* 57.30Ry

* 67Sy

SupplierRetailer

Page 31: Secure Collaborative Planning, Forecasting, and Replenishment

31

Step 5: Determine order quantities

28.30Rtq

44Stq

SupplierRetailer

44Stq

28.30Rtq

Page 32: Secure Collaborative Planning, Forecasting, and Replenishment

32

Protocol Implementation Issues:

Protocols are verifiable

• The Logic of the Protocol is Auditable– Logic of Source Code Can be Audited

• Outputs Can be Tested– Outputs Can be Verified Given Known Inputs

Page 33: Secure Collaborative Planning, Forecasting, and Replenishment

33

Protocol Implementation Issues:

Other Advantages

• Valuable even in Trusted e.g. (intra-corporate) interactions– “Defense in depth” ! – Systems are hacked into, break-ins occur,

viruses occur, spy-ware, bad insiders, etc– Liability Decreased

• “Don’t send me your data even if you trust me”

• Impact on Litigation and Insurance Rates

Page 34: Secure Collaborative Planning, Forecasting, and Replenishment

34

We Have Only Just Begun...

• Tough Issues to Deal with:– SMC Complexities; e.g.,

• How to Deal with Collusion• Computational Complexity (e.g., simultaneity)

– Supply-Chain Modeling Complexities; e.g.• Contracting/Incentive Issues

– SSCC Complexities; e.g., • Inverse Optimization

• Bob’s Objective is fB(xA, xB); Alice’s is fA((xA, xB)

Page 35: Secure Collaborative Planning, Forecasting, and Replenishment

35

Future Work

• Protocols for other supply-chain applications– Price-Masking

– Bullwhip Scenarios

– Capacity Allocation

• Protocol implementation issues– Collusion by a subset of parties

– Intrusion detection

– Incentive issues and mechanism design

Page 36: Secure Collaborative Planning, Forecasting, and Replenishment

36

Questions?...

Page 37: Secure Collaborative Planning, Forecasting, and Replenishment

37

Secure Regression

Page 38: Secure Collaborative Planning, Forecasting, and Replenishment

38

Secure 3x3 Matrix Inverse Protocol

Page 39: Secure Collaborative Planning, Forecasting, and Replenishment

39

Secure Demand Forecasting ProtocolInput: The supplier knows the j,i

s and the retailer knows the j,ir , for all j,

i such that j = t + 1, ..., t + T and i = j − t, ..., T. The parameters , r , s are available in additively split form.

Output: Both supplier and retailer learn the forecast dj for all j = t + 1, ..., t + T.

Protocol Steps: 1. For each j {t + 1, ..., t + T}, the supplier computes vj

s = j,i

s. This is a “local” computation, as the supplier has all the j,i

s values. The retailer similarly computes vj

r = j,i

r for all j {t + 1, ..., t + T}.2. For each j {t + 1, ..., t + T}, the supplier and retailer run a split

multiplication protocol twice, once to compute wrj = rvr

j and once to compute ws

j = svsj (both in split fashion).

3. For each j {t + 1, ..., t + T}, the supplier and retailer run a split addition protocol to compute µ+ wr

j+ wsj, which is equal to dj . They

exchange their shares of each dj so they both learn its value.