An approach to securely identifying beneficial collaboration in decentralized logistics systems

被引:24
作者
Clifton, Chris [1 ]
Iyer, Ananth [2 ]
Cho, Richard [3 ]
Jiang, Wei [1 ]
Kantarcioglu, Murat [4 ]
Vaidya, Jaideep [5 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[2] Purdue Univ, Krannert Sch Management, W Lafayette, IN 47907 USA
[3] Univ New Brunswick, Fac Business, St John, NB E2L 4L5, Canada
[4] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75083 USA
[5] Rutgers State Univ, Management Sci & Informat Syst Dept, Newark, NJ 07102 USA
关键词
collaboration; routing; cryptography; space-filling curve; incentive compatible; algorithm;
D O I
10.1287/msom.1070.0167
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
The problem of sharing manufacturing, inventory, or capacity to improve performance is applicable in many decentralized operational contexts. However, the solution of such problems commonly requires an intermediary or a broker to manage information security concerns of individual participants. Our goal is to examine use of cryptographic techniques to attain the same result without the use of a broker. To illustrate this approach, we focus on a problem faced by independent trucking companies that have separate pick-up and delivery tasks and wish to identify potential efficiency-en-hancing task swaps while limiting the information they must reveal to identify these swaps. We present an algorithm that finds opportunities to swap loads without revealing any information except the loads swapped, along with proofs of the security of the protocol. We also show that it is incentive compatible for each company to correctly follow the protocol as well as provide their true data. We apply this algorithm to an empirical data set from a large transportation company and present results that suggest significant opportunities to improve efficiency through Pareto improving swaps. This paper thus uses cryptographic arguments in an operations management problem context to show how an algorithm can be proven incentive compatible as well as demonstrate the potential value of its use on an empirical data set.
引用
收藏
页码:108 / 125
页数:18
相关论文
共 21 条
[1]  
Aggarwal G, 2004, LECT NOTES COMPUT SC, V3027, P40
[2]   Secure supply-chain protocols [J].
Atallah, MJ ;
Elmongui, HG ;
Deshpande, V ;
Schwarz, LB .
IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE, 2003, :293-302
[3]  
BANDLER J, 2003, WALL STREET J 0220, pA1
[4]  
Bartholdi J. J. III, 1982, Operations Research Letters, V1, P121, DOI 10.1016/0167-6377(82)90012-8
[5]  
BARTHOLDI JJ, 1988, MANAGE SCI, V34, P157
[6]  
BARTHOLDI JJ, 2006, SOME COMBINATORIAL A
[7]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[8]  
DODIS YS, 2000, ADV CRYPTOLOGY CRYPT
[9]  
Goldreich O., 2004, FDN CRYPTOGRAPHY, DOI DOI 10.1017/CBO9780511721656
[10]  
Goldreich Oded, 1987, STOC, DOI DOI 10.1145/28395.28420