Parametric and adaptive encryption of feature-based computer-aided design models for cloud-based collaboration

When a Computer Aided Design (CAD) model is shared in cloud for collaboration, it is a challenge to encrypt the confidential design features of the model for effective knowledge protection. This paper presents a novel encryption approach, which is based on geometric transformation encryption mechanisms on feature-based CAD models in supporting cloud-enabled collaboration. The innovation of the approach is centered on an Enhanced Encryption Transformation Matrix (EETM), which is characterized parametric, randomized and self-adaptive for feature encryption. Controllable parameters for transforming features in terms of zoom and deformation are defined in the EETM to facilitate users to conduct encryption transformation flexibly. A random probability mechanism is embedded into the parameters of the EETM in order to guarantee the security of the encrypted model. Furthermore, the parameters in the EETM are further enhanced to be self-adaptive to ensure the geometric validity of the encrypted model. The approach has been validated via a number of complex models to demonstrate the applicability and effectiveness for industrial applications.

[1]  H. Chang,et al.  The Development of Security System for Sharing CAD Drawings in u-Environment , 2008, Comput. Informatics.

[2]  Jeffrey J. Rodríguez,et al.  Mixed signal design watermarking for IP protection , 2003, Integr. Comput. Aided Eng..

[3]  Yuki Mano,et al.  Development of a New Testing Machine for Torque/Clamp Force Testing for Threaded Fasteners in Accordance with ISO 16047 , 2009 .

[4]  JungHyun Han,et al.  Hierarchical Role-Based Viewing for Multilevel Information Security in Collaborative CAD , 2006, J. Comput. Inf. Sci. Eng..

[5]  Jaehong Park,et al.  The UCONABC usage control model , 2004, TSEC.

[6]  Judith M. Whipple,et al.  Global supply chain design considerations: Mitigating product safety and security risks , 2011 .

[7]  A. Ben Hamza,et al.  Secret sharing approaches for 3D object encryption , 2011, Expert Syst. Appl..

[8]  Shao Jian,et al.  Research on a Security Model of Data in Computer Supported Collaborative Design Integrated with PDM System , 2007 .

[9]  Pieter van der Wolf,et al.  A flexible access control mechanism for CAD frameworks , 1994, EURO-DAC '94.

[10]  Xiao Chen,et al.  Flexible Concurrency Control for Legacy CAD to Construct Collaborative CAD Environment , 2012 .

[11]  W. D. Li,et al.  Encryption based partial sharing of CAD models , 2015, Integr. Comput. Aided Eng..

[12]  Naveen K. Nishchal,et al.  Known-plaintext attack on encryption domain independent optical asymmetric cryptosystem , 2013 .

[13]  W. B. Lee,et al.  A security model for distributed product data management system , 2003, Comput. Ind..

[14]  Ming Li,et al.  The Research of Network Security Mechanism Based Collaborative Design , 2011 .

[15]  ShenWeiming,et al.  An integrated feature-based dynamic control system for on-line machining, inspection and monitoring , 2015 .

[16]  Fazhi He,et al.  Customized Encryption of Computer Aided Design Models for Collaboration in Cloud Manufacturing Environment , 2015 .

[17]  William L. Maxwell,et al.  On the implementation of security measures in information systems , 1972, CACM.

[18]  Sang Hun Lee Feature-based multiresolution modeling of solids , 2005, TOGS.

[19]  Chih-Hsing Chu,et al.  Multi-agent collaborative 3D design with geometric model at different levels of detail , 2009 .

[20]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[21]  Myrian Tebaldi,et al.  Chosen-plaintext attack on a joint transform correlator encrypting system , 2010 .

[22]  Weiming Shen,et al.  An integrated feature-based dynamic control system for on-line machining, inspection and monitoring , 2015, Integr. Comput. Aided Eng..

[23]  Christopher M. Schlick,et al.  Modelling and simulation of the task scheduling behavior in collaborative product development process , 2013, Integr. Comput. Aided Eng..

[24]  Volker Wulf,et al.  A new dimension in access control: studying maintenance engineering across organizational boundaries , 2002, CSCW '02.

[25]  Benedict G. E. Wiedemann Protection? , 1998, Science.

[26]  Kirk Sattley Letters to the editor: corrections to Sattley paper in January communications , 1961, CACM.

[27]  Salmiah Ahmad,et al.  Modelling and simulation of double-link scenario in a two-wheeled wheelchair , 2014, Integr. Comput. Aided Eng..

[28]  Jian Shao,et al.  Research on a Security Model of Data in Computer Supported Collaborative Design Integrated with PDM System , 2007, Workshop on Intelligent Information Technology Application (IITA 2007).

[29]  Jing Wang,et al.  A wavelet-based particle swarm optimization algorithm for digital image watermarking , 2012, Integr. Comput. Aided Eng..

[30]  Steve Benford,et al.  An access control framework for multi-user collaborative environments , 1999, GROUP.

[31]  Yong Zeng,et al.  Secure collaboration in global design and supply chain environment: Problem analysis and literature review , 2012, Comput. Ind..

[32]  Thies Wittig,et al.  Real-time expert systems for industrial control , 1995 .

[33]  Simon Li,et al.  A matrix-based modularization approach for supporting secure collaboration in parametric design , 2012, Comput. Ind..

[34]  Kamel Rouibah,et al.  Dynamic data sharing and security in a collaborative product definition management system , 2007 .

[35]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[36]  Zhong Ren,et al.  A method of 3D data information encryption with virtual holography , 2009, International Workshop on Information Data Storage and International Symposium on Optical Storage.

[37]  Naveen K. Nishchal,et al.  Flexible optical encryption with multiple users and multiple security levels , 2011 .

[38]  JungHyun Han,et al.  Role-Based Viewing for Secure Collaborative Modeling , 2003 .

[39]  Kunwoo Lee,et al.  Feature-based Multi-resolution and Multi-abstraction Non-manifold Modeling System to Provide Integrated Environment for Design and Analysis of Injection Molding Products , 2005 .

[40]  Hangbae Chang,et al.  The Research of Security System for Sharing Engineering Drawings , 2007, The 2007 International Conference on Intelligent Pervasive Computing (IPC 2007).