A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem

被引:0
|
作者
Cimato, Stelvio [2 ]
Gianini, Gabriele [1 ,2 ]
Sepehri, Maryam [2 ]
Asal, Rasool [1 ]
Damiani, Ernesto [1 ,2 ]
机构
[1] Khalifa Univ Sci & Technol, EBTIC, POB 127788, Abu Dhabi, U Arab Emirates
[2] Univ Milan, Comp Sci Dept, Via Celoria 18, I-20133 Milan, MI, Italy
基金
欧盟地平线“2020”;
关键词
Airline Cargo; Overbooking and cancellation; Proxy re-encryption; Inspection Games; PROXY RE-ENCRYPTION; SEARCHES;
D O I
10.1016/j.jisa.2020.102462
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to keep in good long-term relationships with their main customers, Airline Cargo companies do not impose any fee for last minute cancellations of shipments. As a result, customers can book the same shipment on several cargo companies. Cargo companies try to balance cancellations by a corresponding volume of overbooking. However, the considerable uncertainty in the number of cancellations does not allow to fine-tune the optimal overbooking level, causing losses. In this work, we show how the deployment of cryptographic techniques, enabling the computation on private information of customers and companies data can improve the overall service chain, allowing for striking and enforcing better agreements. We propose a query system based on proxy re-encryption and show how the relevant information can be extracted, still preserving the privacy of customers' data. Furthermore, we provide a Game Theoretic model of the use case scenario and show that it allows a more accurate estimate of the cancellation rates. This supports the reduction of the uncertainty and allows to better tune the overbooking level. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] DDOS Mitigation Cloud-Based Service
    Guenane, Fouad
    Nogueira, Michele
    Serhrouchni, Ahmed
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1363 - 1368
  • [2] A New Approach to the Cloud-Based Heterogeneous MapReduce Placement Problem
    Xu, Xiaoyong
    Tang, Maolin
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2016, 9 (06) : 862 - 871
  • [3] Hybrid Cryptographic Access Control for Cloud-Based EHR Systems
    Premarathne, Uthpala
    Abuadbba, Alsharif
    Alabdulatif, Abdulatif
    Khalil, Ibrahim
    Tari, Zahir
    Zomaya, Albert
    Buyya, Rajkumar
    [J]. IEEE CLOUD COMPUTING, 2016, 3 (04): : 58 - 64
  • [4] A risk averse approach to the capacity allocation problem in the airline cargo industry
    Wada, Masato
    Delgado, Felipe
    Pagnoncelli, Bernardo K.
    [J]. JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2017, 68 (06) : 643 - 651
  • [5] A Secure Cloud-Based IDPS Using Cryptographic Traces and Revocation Protocol
    Idrissi, Hind
    Ennahbaoui, Mohammed
    El Hajji, Said
    Souidi, El Mamoun
    [J]. CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017, 2017, 10194 : 365 - 382
  • [6] A Cloud-Based Approach to Spectrum Monitoring
    Cooklev, Todor
    Darabi, James
    McIntosh, Charles
    Mosaheb, Mahdis
    [J]. IEEE INSTRUMENTATION & MEASUREMENT MAGAZINE, 2015, 18 (02) : 33 - 37
  • [7] A cloud-based approach for WEEE remanufacturing
    Wang, Lihui
    Wang, Xi Vincent
    Gao, Liang
    Vancza, Jozsef
    [J]. CIRP ANNALS-MANUFACTURING TECHNOLOGY, 2014, 63 (01) : 409 - 412
  • [8] Tool Selection: A Cloud-Based Approach
    Singh, Chirpreet
    Shao, Qun
    Lu, Yuqian
    Xu, Xun
    Ye, Xinfeng
    [J]. FRONTIER AND INNOVATION IN FUTURE COMPUTING AND COMMUNICATIONS, 2014, 301 : 237 - 245
  • [9] Time-Domain Attribute-Based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach
    Yang, Kan
    Liu, Zhen
    Jia, Xiaohua
    Shen, Xuemin Sherman
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2016, 18 (05) : 940 - 950
  • [10] From Cloud Manufacturing to Cloud Remanufacturing: a Cloud-based Approach for WEEE
    Wang, Xi Vincent
    Wang, Lihui
    Gao, Liang
    [J]. 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2013, : 399 - 406