Encryption based partial sharing of CAD models

Model security for collaborative product development ina networked environment (or called networked manufacturing, grid manufacturing, and cloud manufacturing) is an important and also challenging research issue. An encryption based partial sharing approach for CAD models has been developed and presented in this paper. First, a random invertible decimal matrix to support the encryption approach is proposed, with which parts of a CAD model can be selected flexibly by the model owner for encrypting by different keys; Second, in order to guarantee the security, a dual-key mode and a key based authorization mechanism are proposed. Based on the model, different levels of security are achieved based on different key spaces, and the key based authorization mechanism is used for the model owner to control the partial access of the CAD model flexibly.

[1]  王豐堅,et al.  一個在工作流程系統管理系統中基於Task-Role-Based Access Control Model的代理程序框架 , 2007 .

[2]  J. Koenderink Q… , 2014, Les noms officiels des communes de Wallonie, de Bruxelles-Capitale et de la communaute germanophone.

[3]  A. Tirkel,et al.  Electronic water mark , 1993 .

[4]  Din-Chang Tseng,et al.  A public fragile watermarking scheme for 3D model authentication , 2006, Comput. Aided Des..

[5]  Zhiyong Su,et al.  Watermarking 3D CAPD models for topology verification , 2013, Comput. Aided Des..

[6]  Hugues Hoppe,et al.  Progressive meshes , 1996, SIGGRAPH.

[7]  Jaehong Park,et al.  The UCONABC usage control model , 2004, TSEC.

[8]  Jing Wang,et al.  A wavelet-based particle swarm optimization algorithm for digital image watermarking , 2012, Integr. Comput. Aided Eng..

[9]  Jian Shao,et al.  Research on a Security Model of Data in Computer Supported Collaborative Design Integrated with PDM System , 2007, Workshop on Intelligent Information Technology Application (IITA 2007).

[10]  A. Ben Hamza,et al.  Secret sharing approaches for 3D object encryption , 2011, Expert Syst. Appl..

[11]  Pieter van der Wolf,et al.  A flexible access control mechanism for CAD frameworks , 1994, EURO-DAC '94.

[12]  Steve Benford,et al.  An access control framework for multi-user collaborative environments , 1999, GROUP.

[13]  Weiming Shen,et al.  Collaborative conceptual design - state of the art and future trends , 2002, Comput. Aided Des..

[14]  Zhong Ren,et al.  A method of 3D data information encryption with virtual holography , 2009, International Workshop on Information Data Storage and International Symposium on Optical Storage.

[15]  Sang Hun Lee Feature-based multiresolution modeling of solids , 2005, TOGS.

[16]  Ming Li,et al.  The Research of Network Security Mechanism Based Collaborative Design , 2011 .

[17]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[18]  Mincheol Kim,et al.  An integrated approach to realize multi-resolution of B-rep model , 2005, SPM '05.

[19]  Jaehong Park,et al.  Towards usage control models: beyond traditional access control , 2002, SACMAT '02.

[20]  Kyu-Yeul Lee,et al.  Feature-based multi-resolution modeling of solids using history-based Boolean operations — Part I: Theory of history-based boolean operations — , 2005 .

[21]  A. Marucheck,et al.  Product safety and security in the global supply chain: Issues, challenges and research opportunities , 2011 .

[22]  Mahmoud Houshmand,et al.  A collaborative and integrated platform to support distributed manufacturing system using a service-oriented approach based on cloud computing paradigm , 2013 .

[23]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[24]  Yuan Cheng,et al.  A group Undo/Redo method in 3D collaborative modeling systems with performance evaluation , 2013, J. Netw. Comput. Appl..

[25]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[26]  Jae Yeol Lee,et al.  A cellular topology-based approach to generating progressive solid models from feature-centric models , 2004, Comput. Aided Des..

[27]  Naveen K. Nishchal,et al.  Flexible optical encryption with multiple users and multiple security levels , 2011 .

[28]  Benedict G. E. Wiedemann Protection? , 1998, Science.

[29]  JungHyun Han,et al.  Role-Based Viewing for Secure Collaborative Modeling , 2003 .

[30]  Yong Zeng,et al.  Secure collaboration in global design and supply chain environment: Problem analysis and literature review , 2012, Comput. Ind..

[31]  Ki-Ryong Kwon,et al.  A watermarking for 3D mesh using the patch CEGIs , 2007, Digit. Signal Process..

[32]  Scott Hauck,et al.  Data security for Web-based CAD , 1998, Proceedings 1998 Design and Automation Conference. 35th DAC. (Cat. No.98CH36175).

[33]  Ki-Ryong Kwon,et al.  Robust 3D mesh model hashing based on feature object , 2012, Digit. Signal Process..

[34]  Simon Li,et al.  A matrix-based modularization approach for supporting secure collaboration in parametric design , 2012, Comput. Ind..

[35]  Andrew Z. Tirkel,et al.  Image and watermark registration , 1998, Signal Process..

[36]  Fazhi He,et al.  A method for topological entity matching in the integration of heterogeneous CAD systems , 2013, Integr. Comput. Aided Eng..

[37]  Kamel Rouibah,et al.  Dynamic data sharing and security in a collaborative product definition management system , 2007 .

[38]  S. Q. Xie,et al.  A new digital watermarking scheme for 3D triangular mesh models , 2009, Signal Process..

[39]  Fei Peng,et al.  A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion , 2011, Comput. Aided Des..

[40]  Volker Wulf,et al.  A new dimension in access control: studying maintenance engineering across organizational boundaries , 2002, CSCW '02.

[41]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[42]  Chih-Hsing Chu,et al.  Multi-agent collaborative 3D design with geometric model at different levels of detail , 2009 .

[43]  Abdelaziz Bouras,et al.  Morphological analysis for product design , 2000, Comput. Aided Des..

[45]  Horace Ho-Shing Ip,et al.  A robust watermarking scheme for 3D triangular mesh models , 2003, Pattern Recognit..

[46]  Hyunseung Choo,et al.  Multi-Level modeling and access control for data sharing in collaborative design , 2006, Adv. Eng. Informatics.

[47]  W. B. Lee,et al.  A security model for distributed product data management system , 2003, Comput. Ind..

[48]  Shao Jian,et al.  Research on a Security Model of Data in Computer Supported Collaborative Design Integrated with PDM System , 2007 .

[49]  Henri Maître,et al.  Application of spectral decomposition to compression and watermarking of 3D triangle mesh geometry , 2003, Signal Process. Image Commun..

[50]  Y.S. Wong,et al.  Geometric model simplification for distributed CAD , 2004, Comput. Aided Des..

[51]  William L. Maxwell,et al.  On the implementation of security measures in information systems , 1972, CACM.

[52]  Sang Hun Lee,et al.  A CAD-CAE integration approach using feature-based multi-resolution and multi-abstraction modelling techniques , 2005, Comput. Aided Des..

[53]  Hangbae Chang,et al.  The Research of Security System for Sharing Engineering Drawings , 2007, The 2007 International Conference on Intelligent Pervasive Computing (IPC 2007).

[54]  H. Chang,et al.  The Development of Security System for Sharing CAD Drawings in u-Environment , 2008, Comput. Informatics.

[55]  Jeffrey J. Rodríguez,et al.  Mixed signal design watermarking for IP protection , 2003, Integr. Comput. Aided Eng..

[56]  Chih-Hsing Chu,et al.  3D streaming based on multi-LOD models for networked collaborative design , 2008, Comput. Ind..

[57]  Lance J. Hoffman,et al.  A survey of issues in computer network security , 1986, Comput. Secur..

[58]  Wen Feng Lu,et al.  A 3D simplification algorithm for distributed visualization , 2007, Comput. Ind..

[59]  JungHyun Han,et al.  Hierarchical Role-Based Viewing for Multilevel Information Security in Collaborative CAD , 2006, J. Comput. Inf. Sci. Eng..

[60]  Judith M. Whipple,et al.  Global supply chain design considerations: Mitigating product safety and security risks , 2011 .

[61]  Ki-Ryong Kwon,et al.  CAD drawing watermarking scheme , 2010, Digit. Signal Process..

[62]  Christopher M. Schlick,et al.  Modelling and simulation of the task scheduling behavior in collaborative product development process , 2013, Integr. Comput. Aided Eng..

[63]  JungHyun Han,et al.  Multi-resolution Modeling in Collaborative Design , 2003, ISCIS.

[64]  John B. Shoven,et al.  I , Edinburgh Medical and Surgical Journal.

[65]  Jun-Hai Yong,et al.  A numerically stable fragile watermarking scheme for authenticating 3D models , 2008, Comput. Aided Des..