Secure Collaborative Planning, Forecasting, and Replenishment (SCPFR)

Secure Collaborative Planning, Forecasting, and Replenishment (SCPFR)

Secure Collaborative Planning, Forecasting, and Replenishment (SCPFR) Mikhail Atallah* · Marina Blanton* · Vinayak Deshpande** Keith Frikken* · Jiangtao Li* · Leroy B. Schwarz** * Department of Computer Sciences ** Krannert School of Management Purdue University West Lafayette, IN 47907 May 30, 2005 Extended Abstract 1. Introduction It is well known that information-sharing about inventory levels, sales, order-status, demand forecasts, production/delivery schedules, etc. can dramatically improveme supply-chain per- formance. Lee and Whang (2000) describe several real-world examples. The reason for this improvement, of course, isn’t information-sharing, per se, but, rather, because shared infor- mation improves decision-making. However, despite its well-known benefits, many companies are averse to sharing their so-called “private” information, fearful that their partner(s) or competitor(s) will take advantage of it. Secure Multi-Party Computation (SMC) provides a framework for supply-chain partners to make collaborative forecasts and/or collaborative decisions without disclosing private in- formation to one another; and, most important, without the aid of a “trusted third party”. SMC accomplishes this through the use of so-called protocols. An SMC protocol involves theoretically-secure hiding of private information (e.g., encryption), transmission, and pro- cessing of hidden private data. Since private information is never available in its original form (e.g., if encryption is used to hide the data, it is never decrypted), any attempt to hack or misuse private information is literally impossible. In our research, we apply SMC protocols to facilitate collaborative forecasting and inventory-replenishment decisions between a single supplier and a single retailer. The model is an extension of Clark and Scarf (1960). The business process is CPFR: Collaborative Plan- 1 ning, Forecasting, and Replenishment. Hence, the acronym “SCPFR” for Secure CPFR. 1.1 Overview/Summary This research describes privacy-preserving protocols for collaborative forecasting and inven- tory planning. The business scenario is a 2-stage, serial (supplier-retailer) supply chain facing periodic stochastic retailer demand. Our model is based on that of Clark and Scarf (1960) except customer demand is nonstationary. More specifically, during each time period, the retailer experiences customer demand generated by a state-dependent linear process. The only inventory available to satisfy this demand is the retailer’s on-hand inventory at the be- ginning of that time period (after receiving any orders due for delivery that period). Excess customer demand is backordered, and all retailer end-of-period backorders incur a penalty cost of $pR/unit. Retailer end-of-period inventory is charged a holding cost of $hR/unit. At the beginning of each time period, after receiving any units delivered that time period, but before demand occurs, the retailer has the opportunity to place an order on the supplier. In our analytical model, negative orders (i.e., instantaneous returns) are permitted without penalty, as they are in other models of nonstationary demand. There is no fixed order cost. If the supplier’s inventory is inadequate to fill the retailer’s order entirely, the supplier will ship only a partial order, backordering the remainder until its own inventory is adequate to fill it. The supplier-to-retailer delivery leadtime is a fixed LR periods. The supplier incurs an inventory-holding cost of $hS /unit on its end-of-period inventory each period (hS <hR). In addition, the supplier incurs a backorder-penalty cost of $pS /unit on customer backorders at the retailer. Like the retailer, the supplier can place an order (or make an instant, costless return) at the beginning of each period. The supplier’s source of supply is infinite. The leadtime on supplier orders is a fixed LS periods. The privacy concerns of each company are as follows: Each company has private informa- tion (e.g. signals) with respect to future retail-customer demand. Each company’s private information would improve the collaborative forecast, but neither company desires to disclose that information to its partner. Each company also has private information (e.g., retailer’s inventory-holding cost, manufacturer’s production cost), which, if centralized, could lead to a “coordinated” (i.e., first-best) decision, but both companies desire to maintain its privacy, too. Under the collaborative policy our incentive-compatible SCPFR protocols determine a collaborative forecast of future customer demand, and, based on these, the target base-stocks 2 of both partners that will minimize supply-chain expected cost. Based on these, and their private inventory status, the retailer and supplier are then instructed how much to order. The contributions of this research are as follows: 1) First to address privacy and incentive- compatibility issues in CPFR. 2) First to demonstrate that information-sharing isn’t nec- essary to achieve collaboration in a supply-chain. In particular, we: (a) demonstrate that forecasting and inventory-replenishment can be done collaboratively without disclosing the private information of either the supplier or retailer; and (b) construct inventive compati- ble mechanisms for collaborative forecasting. 3) Demonstrate that it is difficult/impossible for either party to determine the private information of its partner using its own private information and the orders it is instructed to make by the SCPFR protocols. This is an important practical consideration; i.e., why use SMC techniques if participants can compute their partners’ private inputs 4) Demonstrate the benefits of SCPFR using simulation. 5) Provide practical SMC protocols. That is, given their privacy-preserving nature, certain sim- ple mathematical processes become very complex. Each table look-up, for example, if done in a secure manner, has complexity proportional to the size of the table. We reformulate such processes to make them more computationally efficient. 2. A Model of Collaborative Forecasting and Planning We examine a supply-chain with two players, a supplier selling to a retailer. Our assumptions are the same as those of Clark and Scarf except that, in our model, customer demand in period t, dt, is realized from a state-dependent linear process, as described below. The retailer observes demand over time and uses these observations to forecast customer future demand. These forecasts are then used by the retailer to place replenishment orders to the supplier. The retailer and the supplier also receive independent “signals” about market demand in the future. For example, a retailer has private information about “promotions” that he may be planning to run in the future which can affect his forecast of demand. Similarly, the supplier can receive signals about overall “market trends” which can influence future demand for the product. In the collaborative scenario, a joint forecast is created by incorporating past observations of demand as well the retailer’s and supplier’s signals about future demand. As a result, the forecast accuracy of the demand process improves. The primary goal of our research is to provide protocols such that this forecasting and inventory planning can be conducted 3 in a “secure” fashion, i.e., the protocols would preserve the privacy of each participants private information. Thus the collaborative forecast should be computed without actually revealing the retailer’s past observations of demand and his signals about future demand to the supplier, and without revealing the supplier’s signals to the retailer. In the next sub-sections we present a mathematical framework of the secure collaborative forecasting. 2.1 Demand Model and Forecasting Process We assume that the demand follows a linear process given by the following equation: T T r s dt = µ + θr X δt,i + θs X δt,i + t i=1 i=1 j Here Dt denotes the demand realization in period t, while δt,i indicates the signal observed r by player j about period t demand in period t − i. For example, δt,i may represent the impact of promotion that the retailer plans to run in period t as measured in period t − i. s Similarly, δt,i may represent the impact of new product introductions by the supplier in period t as estimated in period t − i. Our demand model is similar to the one proposed by Aviv (2002), except that we do not capture intertemporal correlation between demands in consecutive periods. As in Aviv (2002), we further assume that the signals and the error r s term are normally distributed, i.e., δt,i ∼ N(0,σr,i),δt,i ∼ N(0,σs,i),t ∼ N(0,σ0). The key difference between our model and Aviv’s is that information is split between the retailer and the supplier. Thus, in each period t the retailer observes the demand, dt, and r demand signals up to T periods in future, δj,j−t,j = t +1,...,t+ T , but these observations are not known to the supplier. Similarly, in each period t, the supplier observes signals about s demand up to T periods in future, δj,j−t,j = t +1,...,t+ T , but these observations are not known to the retailer. As a result, the parameters of the demand process, i.e., µ, θr, and θs are not known either to the supplier or the retailer. In the collaborative forecasting scenario, the forecast is based on both the retailer’s and supplier’s observations. Hence the forecasting is now determined as follows: r ˆr ˆs 1. In each period t, estimateµ ˆ , θ , and θ by regressing the observations dt versus the r s observed signals δt,i and δt,i. 2. For the forecast horizon (T periods) construct the forecast using the following equation: 4 T T ˆ r ˆr r ˆs s dj =ˆµ + θ X δj,i + θ X δj,i,j= t +1, ..., t + T (1) i=j−t i=j−t ˆ where dj is the forecast of the mean demand in period j.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    7 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us