enabling the aviation co 2 allowance trading through
play

Enabling the Aviation CO 2 Allowance Trading Through Secure Market - PowerPoint PPT Presentation

Enabling the Aviation CO 2 Allowance Trading Through Secure Market Mechanisms Massimiliano Zanin mz@innaxis.org Secure CO 2 allowance trading :: Introduction Secure CO 2 allowance trading :: Introduction Problem: Computing without trust


  1. Enabling the Aviation CO 2 Allowance Trading Through Secure Market Mechanisms Massimiliano Zanin mz@innaxis.org

  2. Secure CO 2 allowance trading :: Introduction

  3. Secure CO 2 allowance trading :: Introduction Problem: Computing without trust Airlines benchmarking Airport slot trading CO 2 allowance trading Data mining on safety data Safety benchmarking …

  4. Secure CO 2 allowance trading :: Introduction Problem: SWIM, the solution? SWIM, information transfer enabler Based on a public-key infrastructure privacy as good as the privacy of the worst procedure implemented by the entities Back to the starting point!

  5. Secure CO 2 allowance trading :: Introduction Problem: CO 2 allowance trading Increasing air traffic = increasing CO 2 emissions Emission trading or cap and trade

  6. Secure CO 2 allowance trading :: Introduction Problem: Emission trading or cap and trade Upper limit to the amount of pollutants that can be emitted Rights to emit , to be traded in a specific market. More emissions: buy additional rights Less emissions: rights can be sold in the market Efficient emissions reduction through a market mechanism, as green companies are receiving indirect incentives.

  7. Secure CO 2 allowance trading :: Introduction Problem: Emission trading or cap and trade CO 2 emissions ∝ fuel consumption ∝ take-off weight Fairness of the trading system

  8. Secure CO 2 allowance trading :: Introduction Secure Multi-party Computation (SMC) Subfield of cryptography. Methods for parties to jointly compute a function over their inputs, while keeping these inputs private. Andrew C. Yao, 1982: the millionaire problem Andrew Chi-Chih Yao Protocols for Secure Computations . FOCS (1982): 160-164

  9. Secure CO 2 allowance trading :: Introduction Objectives: Introduce SMC into Air Transport Software Reference Framework Simulation and analysis of two Case Studies

  10. Secure CO 2 allowance trading :: Introduction CO 2 allowance trading Primary market Secondary market Seller: Industry An airline Buyers: One or more airlines Seller’s input data: Minimum price Buyers’ input data: Bid Result: Max bid, iif bid > minimum price Management of ties

  11. Secure CO 2 allowance trading :: Introduction

  12. Secure CO 2 allowance trading :: An example Secure auction Secure ranking Secure evaluation of a > b

  13. Secure CO 2 allowance trading :: An example Secure evaluation of a > b 00000047859283759201 00000057483928374627 1. Find the first non-equal digit 2. Compare them for a > b

  14. Secure CO 2 allowance trading :: An example Alice Bob P 1 P 2 Secret number: Secret number: Secret number: Secret number: [0 0 1] [0 1 0] a b

  15. Secure CO 2 allowance trading :: An example Alice Bob P 1 P 2 Secret number: Secret number: Secret number: Secret number: [0 0 1] [0 1 0] a b Shares: Shares: Shares: Shares: { [ a 3 ], [ a 2 ], [ a 1 ] } { [ b 3 ], [ b 2 ], [ b 1 ] } [0] [0] [1] [0] [1] [0]

  16. Secure CO 2 allowance trading :: An example Alice Bob P 1 P 2 Secret number: Secret number: Secret number: Secret number: [0 0 1] [0 1 0] a b Shares: Shares: Shares: Shares: { [ a 3 ], [ a 2 ], [ a 1 ] } { [ b 3 ], [ b 2 ], [ b 1 ] } [0] [0] [1] [0] [1] [0] Sharing the shares: Sharing the shares: [0] [0] [1] [0] [1] [0] [0] [1] [0] [0] [0] [1]

  17. Secure CO 2 allowance trading :: An example Alice Bob P 1 P 2 [0 0 1] [0 1 0] a b [0] [0] [1] [0] [1] [0] { [ a 3 ], [ a 2 ], [ a 1 ] } { [ b 3 ], [ b 2 ], [ b 1 ] } [0] [1] [0] [0] [0] [1] XOR of every bit: XOR of every bit: c i = [ a i ⊕ b i ] [1] [1] [0]

  18. Secure CO 2 allowance trading :: An example Alice Bob P 1 P 2 [0 0 1] [0 1 0] a b [0] [0] [1] [0] [1] [0] { [ a 3 ], [ a 2 ], [ a 1 ] } { [ b 3 ], [ b 2 ], [ b 1 ] } [0] [1] [0] [0] [0] [1] XOR of every bit: XOR of every bit: c i = [ a i ⊕ b i ] [1] [1] [0] Prefix-OR: Prefix-OR: [1] [1] [0] d i = V (j from 3 to i) c j

  19. Secure CO 2 allowance trading :: An example Alice Bob P 1 P 2 [0 0 1] [0 1 0] a b [0] [0] [1] [0] [1] [0] { [ a 3 ], [ a 2 ], [ a 1 ] } { [ b 3 ], [ b 2 ], [ b 1 ] } [0] [1] [0] [0] [0] [1] XOR of every bit: XOR of every bit: c i = [ a i ⊕ b i ] [1] [1] [0] Prefix-OR: Prefix-OR: [1] [1] [0] d i = V (j from 3 to i) c j Evolution of d: Evolution of d: [1] [0] [0] [ e i ] = [ d i - d i + 1 ]

  20. Secure CO 2 allowance trading :: An example Alice Bob P 1 P 2 [0 0 1] [0 1 0] a b [0] [0] [1] [0] [1] [0] { [ a 3 ], [ a 2 ], [ a 1 ] } { [ b 3 ], [ b 2 ], [ b 1 ] } [0] [1] [0] [0] [0] [1] [1] [1] [0] c i = [ a i ⊕ b i ] [1] [1] [0] d i = V (j from 3 to i) c j [1] [0] [0] [ e i ] = [ d i - d i + 1 ] a < b : a < b : [0 1 0] = 1 Sum ( [ e i ] x [ b i ] )

  21. Secure CO 2 allowance trading :: An example Alice Bob P 1 P 2 [0 0 1] [0 1 0] a b [0] [0] [1] [0] [1] [0] { [ a 3 ], [ a 2 ], [ a 1 ] } { [ b 3 ], [ b 2 ], [ b 1 ] } [0] [1] [0] [0] [0] [1] Detect bits that [1] [1] [0] are different in c i = [ a i ⊕ b i ] both shares [1] [1] [0] d i = V (j from 3 to i) c j [1] [0] [0] [ e i ] = [ d i - d i + 1 ] a < b : a < b : [0 1 0] = 1 Sum ( [ e i ] x [ b i ] )

  22. Secure CO 2 allowance trading :: An example Alice Bob P 1 P 2 [0 0 1] [0 1 0] a b [0] [0] [1] [0] [1] [0] { [ a 3 ], [ a 2 ], [ a 1 ] } { [ b 3 ], [ b 2 ], [ b 1 ] } [0] [1] [0] [0] [0] [1] [1] [1] [0] c i = [ a i ⊕ b i ] Detect the first bit [1] [1] [0] d i = V (j from 3 to i) c j that is different in [1] [0] [0] [ e i ] = [ d i - d i + 1 ] both shares a < b : a < b : [0 1 0] = 1 Sum ( [ e i ] x [ b i ] )

  23. Secure CO 2 allowance trading :: An example Alice Bob P 1 P 2 [0 0 1] [0 1 0] a b [0] [0] [1] [0] [1] [0] { [ a 3 ], [ a 2 ], [ a 1 ] } { [ b 3 ], [ b 2 ], [ b 1 ] } [0] [1] [0] [0] [0] [1] [1] [1] [0] c i = [ a i ⊕ b i ] [1] [1] [0] d i = V (j from 3 to i) c j [1] [0] [0] [ e i ] = [ d i - d i + 1 ] a < b : a < b : Check if b has a [0 1 0] = 1 Sum ( [ e i ] x [ b i ] ) 1 in that position

  24. Secure CO 2 allowance trading :: Conclusions No drawbacks? Of course they are… High computational cost Lots of shares should be exchanged between the parties Cost of encrypting and decrypting information

  25. Secure CO 2 allowance trading :: Conclusions Visit our demonstrator! Analysing(delay(reports( Secure#Slot#Trading# An)example)of)Secure)Mul23party)Computa2on)in)ATM) An&example&of&Secure&Mul34party&Computa3on&in&ATM& By(the(SecureDataCloud(team:(www.innaxis.org/securedatacloud( By#the#SecureDataCloud#team:#www.innaxis.org/securedatacloud# The(scenario:( The#scenario:# Crea%on(of(delay(reports(using( cleared (informa%on(coming(from( We#consider#an#airline#planning#to#operate#a#new#route#between# different( stakeholders,( securely( merged( in( order( to( achieve( two#airports.#Therefore,#at#a#strategic#level,#the#airline#firstly#tries# addi%onal(knowledge(about(causes(of(delays(and(their(evolu%on( to# buy# slots# from# both# airports,# i.e. # in# the# primary# market.# through( %me.( Several( stakeholders( collaborate( by( introducing( A>erwards,#if#this#first#step#was#not#successful,#it#may#try#to#buy#a# delay(informa%on(inside(the(system:(pilot,(airline(representa%ves,( suitable# slot# in# the# secondary# market,# i.e. # from# other# ATC( officers,( EUROCONTROL's( Network( Manager( Unit,( airport( airlines.# These# two# different# opera@ons# are# depicted# in# the# representa%ves,( and( handling( organisa%ons.( Different( types( of( picture:#in#the#upper#le>#part,#the#airline#enters#an#auc@on#in#the# analyses(will(be(performed,(including(average(delays(es%ma%on,( primary#market;#conversely,#in#the#lower#le>#part,#it#tries#to#buy# ! averages(by(causes,(and(airlines(ranking.( the#asset#from#other#airlines.# The(secure(computa%on:( The#secure#computa@on:#

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend