Affiliation:
1. University at Albany, SUNY
2. Rutgers, The State University of New Jersey
3. North Carolina A&T State University
Abstract
ABSTRACT
In the contemporary information era, the ubiquitous collection of data from different parties frequently accommodates significant mutual benefits to the involved participants. However, data is a double-bladed sword. Inappropriate access or use of data by the recipients may pose serious privacy issues that explicitly harm the data owners. In the past decade, swiftly increasing privacy concerns arise in many business processes such as supply chain management. How to protect the private information of different participants in the supply chain has become a key multidisciplinary research problem in information systems, production and operations management, computer science, and mathematics. Specifically, in the real world, manufacturers, distributors, and retailers commonly collaborate with each other to cater to the demands of supplying and marketing. In their traditional cooperation, all the parties completely share their proprietary information so as to jointly optimize their operations (e.g., maximize their profit or minimize their cost). Now, they realize that completely sharing such information would bring considerable negative impact to themselves. For overcoming this, some recent research results begin to make the following ideal occasion possible—all the participants collaboratively solve a realistic problem without revealing any private proprietary information to each other.
In this paper, we primarily review the literature on the applications of privacy-preserving techniques to supply chain collaboration among multiple parties. We first identify various private proprietary information required in the supply chain collaboration, and discuss several potential privacy-preserving techniques. Then, we review the relevant research results from theory to applications. Since intensive collaboration in modern supply chains opens even more opportunities in both academia and industry, we finally outline the future research trend and the potential challenges in this promising area.
Publisher
American Accounting Association
Subject
Management of Technology and Innovation,Information Systems and Management,Human-Computer Interaction,Accounting,Information Systems,Software,Management Information Systems
Reference104 articles.
1. Privacy-preserving data mining;Agrawal;Proceedings of the ACM SIGMOD Conference on Management of Data,2000
2. Secure supply-chain protocols;Atallah;Proceedings of the 2003 IEEE International Conference on E-Commerce,2003
3. Secure supply-chain collaboration;Atallah,2004
4. Efficient correlated action selection;Atallah;Proceedings of Financial Cryptography,2006
5. Local optimization of global objectives: Competitive distributed deadlock resolution and resource allocation;Awerbuch;Proceedings of IEEE Symposium on Foundations of Computer Science,1994
Cited by
23 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献