Computing Without Revealing: A Cryptographic Approach to eProcurement

Download
Author
Chaduvula, Siva C.
Panchal, Jitesh H.
Atallah, Mikhail J.
Date
2019-04-30Metadata
Show full item recordAbstract
In typical eProcurement processes, sensitive data such as prices, intellectual property, and customer information often flow across enterprise boundaries. Such data sharing amplifies the risk of a data breach due to exposure to the potential security flaws of prospective and current eProcurement partners. Threats of information leakage inhibit enterprises from sharing sensitive data; thus, enterprises cannot take full advantage of the eProcurement process. Existing cryptography-based data sharing protocols impose a high computational burden for maintaining data confidentiality, making them unsuitable for real-time applications such as eProcurement. With this motivation, we address the following research question: How can procurers and suppliers securely conduct their business transactions without revealing their confidential information? The proposed approach enables procurers and suppliers to perform computations while preserving their confidential data. In this paper, we show how Computing-Without-Revealing (CWR)–based data sharing protocols can be used as building blocks to execute procurement auctions for standard products. A web-based platform is developed to measure the performance of the CWR protocols against competing techniques. Experimental results corroborate the efficiency of the CWR-based protocols, making them suitable for real-time applications. The application of the protocols is demonstrated for different eProcurement scenarios, including first- and second-price auctions for standard products.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.NPS Report Number
SYM-AM-19-043Collections
Related items
Showing items related by title, author, creator and subject.
-
Viable circumstances for financial negotiations in Pakistan contracting process
Nazir, Ejaz; Nadeem, Faisal (Monterey, California: Naval Postgraduate School, 2015-06);In Pakistan, competitive forms of procurement include only two-step sealed bidding. In the United States, negotiated procurement falls under competitive forms of procurement. Pakistan established the Pakistan Procurement ... -
Commodity Sourcing Strategies: Supply Management in Action
Rendon, Rene G. (2005-01-01); NPS-CM-05-003This research report discusses the transformation occurring in the procurement and purchasing function, specifically as it applies to developing procurement strategies and the implementation of commodity strategies as an ... -
Commodity sourcing strategies: supply management in action
Rendon, Rene G. (Monterey, California. Naval Postgraduate School, 2005-01-31); NPS-CM-05-003This research report discusses the transformation occurring in the procurement and purchasing function, specifically as it applies to developing procurement strategies and the implementation of commodity strategies as an ...