Please use this identifier to cite or link to this item: https://dair.nps.edu/handle/123456789/1730
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSiva C. Chaduvula
dc.contributor.authorJitesh H. Panchal
dc.contributor.authorMikhail J. Atallah
dc.date.accessioned2020-03-16T18:00:51Z-
dc.date.available2020-03-16T18:00:51Z-
dc.date.issued2019-05-13
dc.identifier.citationPublished--Unlimited Distribution
dc.identifier.urihttps://dair.nps.edu/handle/123456789/1730-
dc.descriptionAcquisition Management / Defense Acquisition Community Contributor
dc.description.abstractIn typical eProcurement processes, sensitive data such as prices, intellectual property, and customer information often flow across enterprise boundaries. Such data sharing amplifies the risk of a data breach due to exposure to the potential security flaws of prospective and current eProcurement partners. Threats of information leakage inhibit enterprises from sharing sensitive data; thus, enterprises cannot take full advantage of the eProcurement process. Existing cryptography-based data sharing protocols impose a high computational burden for maintaining data confidentiality, making them unsuitable for real-time applications such as eProcurement. With this motivation, we address the following research question: How can procurers and suppliers securely conduct their business transactions without revealing their confidential information? The proposed approach enables procurers and suppliers to perform computations while preserving their confidential data. In this paper, we show how Computing-Without-Revealing (CWR) based data sharing protocols can be used as building blocks to execute procurement auctions for standard products. A web-based platform is developed to measure the performance of the CWR protocols against competing techniques. Experimental results corroborate the efficiency of the CWR-based protocols, making them suitable for real-time applications. The application of the protocols is demonstrated for different eProcurement scenarios, including first- and second-price auctions for standard products.
dc.description.sponsorshipAcquisition Research Program
dc.languageEnglish (United States)
dc.publisherAcquisition Research Program
dc.relation.ispartofseriesAcquisition Management
dc.relation.ispartofseriesSYM-AM-19-043
dc.subjectEProcurement
dc.subjectData Breach
dc.subjectSecurity Flaws
dc.subjectCryptography Based Data
dc.subjectComputing Without Revealing CWR
dc.titleComputing Without Revealing: A Cryptographic Approach to eProcurement
dc.typeArticle
Appears in Collections:Annual Acquisition Research Symposium Proceedings & Presentations

Files in This Item:
File SizeFormat 
SYM-AM-19-043.pdf1.55 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.