0
Special Section Articles

Customized Encryption of Computer Aided Design Models for Collaboration in Cloud Manufacturing Environment

[+] Author and Article Information
Xiantao Cai

Assistant Professor
School of Computer Science and Technology,
Wuhan University,
Wuhan 430072, China
e-mail: caixantao@whu.edu.cn

Weidong Li

Professor
Faculty of Engineering and Computing,
Coventry University,
Coventry CV1 5FB, UK
e-mail: weidong.li@coventry.ac.uk

Fazhi He

Professor
School of Computer Science and Technology,
Wuhan University,
Wuhan 430072, China
e-mail: fzhe@whu.edu.cn

Xiaoxia Li

Faculty of Engineering and Computing,
Coventry University,
Coventry CV1 5FB, UK
e-mail: xiaoxia.li@coventry.ac.uk

Contributed by the Manufacturing Engineering Division of ASME for publication in the JOURNAL OF MANUFACTURING SCIENCE AND ENGINEERING. Manuscript received October 28, 2014; final manuscript received April 28, 2015; published online July 8, 2015. Assoc. Editor: Lihui Wang.

J. Manuf. Sci. Eng 137(4), 040905 (Aug 01, 2015) (10 pages) Paper No: MANU-14-1556; doi: 10.1115/1.4030592 History: Received October 28, 2014; Revised April 28, 2015; Online July 08, 2015

Computer aided design (CAD) models reflect design goals, intentions, and functions so that they are the key intellectual properties of companies. In a Cloud manufacturing environment, how to effectively protect the sensitive feature information for a model owner while enabling the owner to flexibly share the rest of the CAD model with collaborators is an important yet challenging research issue. In this paper, an innovative partial encryption approach, which is able to represent a CAD model into the granularity of sharing information in order to address various collaboration scenarios and customized requirements from the model owner and collaborators, is presented. The approach is composed of a customized encryption algorithm for a CAD model, a key based customized authorization algorithm for collaborators to decrypt shared features in the model, and a customized geometric transformation method to support the effective protection model-based visualization of the model for collaboration. With this approach, a CAD model can be flexibly encrypted to realize partial sharing of features and safe protection of the rest of the model according to collaboration requirements. Meanwhile, during encryption and decryption, the CAD model is always manifold no matter which feature is encrypted or decrypted to ensure user friendliness, model validity, and robustness of the approach. A case study is used to verify and illustrate the effectiveness of the approach. This research is a new attempt to design a content-based and customized encryption approach applicable to CAD model-based collaboration in a Cloud manufacturing environment.

FIGURES IN THIS ARTICLE
<>
Copyright © 2015 by ASME
Your Session has timed out. Please sign back in to continue.

References

Huang, Q., Nouri, H., Xu, K., Chen, Y., Sosina, S., and Dasgupta, T., 2014, “Statistical Predictive Modeling and Compensation of Geometric Deviations of Three-Dimensional Printed Products,” ASME J. Manuf. Sci. Eng., 136(6), p. 061008. [CrossRef]
Li, W. D., and Mehnen, J., 2013, Cloud Manufacturing (Springer Series in Advanced Manufacturing), Springer, London. [CrossRef]
Jeong, N., and Rosen, D. W., 2014, “Microstructure Feature Recognition for Materials Using Surfacelet-Based Methods for Computer-Aided Design-Material Integration,” ASME J. Manuf. Sci. Eng., 136(6), p. 061021. [CrossRef]
Zeng, Y., Wang, L., Deng, X., Cao, X., and Khundker, N., 2012, “Secure Collaboration in Global Design and Supply Chain Environment: Problem Analysis and Literature Review,” Comput. Ind., 63(6), pp. 545–556. [CrossRef]
Roohnavazfar, M., Houshmand, M., Nasiri-Zarandi, R., and Mirsalim, M., 2014, “Using Axiomatic Design Theory for Selection of the Optimum Design Solution and Manufacturing Process Plans of a Limited Angle Torque Motor,” ASME J. Manuf. Sci. Eng., 136(5), p. 051009. [CrossRef]
Chang, Q., Pan, C. Y., Xiao, G. X., and Biller, S., 2013, “Integrated Modeling of Automotive Assembly Line With Material Handling,” ASME J. Manuf. Sci. Eng., 135(1), p. 011018. [CrossRef]
Sambhav, K., Tandon, P., Kapoor, S. G., and Dhande, S. G., 2013, “Mathematical Modeling of Cutting Forces in Micro Drilling,” ASME J. Manuf. Sci. Eng., 135(1), p. 014501. [CrossRef]
Hauck, S., and Knol, S., 1998, “Data Security for Web-Based CAD,” Proceedings of the Design Automation Conference, San Francisco, CA, pp. 788–793.
Lampson, B. W., 1974, “Protection,” Oper. Syst. Rev., 8(1), pp. 18–24. [CrossRef]
Conway, R., Maxwell, W., and Morgan, H., 1972, “On the Implementation of Security Measures in Information System,” Commun. ACM, 15(4), pp. 211–220. [CrossRef]
Sandhu, R., Coyne, E., and Feinstein, H., 1996, “Role-Based Access Control Models,” IEEE Comput., 29(2), pp. 38–47. [CrossRef]
Oh, S., and Park, S., 2003, “Task-Role-Based Access Control Model,” Inf. Syst., 28(6), pp. 533–562. [CrossRef]
Park, J., and Sandhu, R., 2002, “Towards Usage Control Models: Beyond Traditional Access Control,” Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, SACMAT, Monterey, CA, pp. 57–64. [CrossRef]
Park, J., and Sandhu, R., 2004, “The UCONABC Usage Control Model,” ACM Trans. Inf. Syst. Secur., 7(1), pp. 128–174. [CrossRef]
Van der Hoeven, A., Ten Bosch, O., van Leuken, R., and van Der Wolf, P., 1994, “A Flexible Access Control Mechanism for CAD Frameworks,” Proceedings of the Conference on European Design Automation, Los Alamitos, CA, pp. 188–193.
Stevens, G., and Wulf, V., 2002, “A New Dimension in Access Control: Studying Maintenance Engineering Across Organizational Boundaries,” Proceedings of the ACM conference on CSCW, pp. 196–205.
Cera, C. D., Kim, T., Braude, I., Han, J., and Regli, W. C., 2003, “Role-Based Viewing for Secure Collaborative Modeling,” Drexel University, Philadelphia, PA, Technical Report No. DU-CS-03-04.
Leong, K. K., Yu, K. M., and Lee, W. B., 2003, “A Security Model for Distributed Product Data Management System,” Comput. Ind., 50(2), pp. 179–193. [CrossRef]
Adrian, B., and Steve, B., 1999, “An Access Control Framework for Multi-User Collaborative Environment,” Proceedings of the international ACM SIGGROUP Conference on Supporting Group Work, pp. 140–149.
Rouibah, K., and Ould-Ali, S., 2007, “Dynamic Data Sharing and Security in a Collaborative Product Definition Management System,” Rob. Comput. Integr. Manuf., 23(2), pp. 217–233. [CrossRef]
Chang, H. B., Kim, K. K., and Kim, Y. D., 2007, “The Research of Security System for Sharing Engineering Drawings,” Proceedings of the IEEE Computer Society, pp. 319–322.
Yao, L. H., Shao, J., Sheng, G. Q., and Zhang, G. X., 2007, “Research on a Security Model of Data in Computer Supported Collaborative Design Integrated With PDM System,” Proceedings of the Workshop on Intelligent Information Technology Application (IITA), pp. 91–94.
Chang, H. B., Kim, K. K., and Kim, Y. D., 2008, “The Development of Security System for Sharing CAD Drawings in U-Environment,” Comput. Inf., 27(5), pp. 731–741.
Speiera, C., Whippleb, J. M., Clossc, D. J., and Douglas Voss, M., 2011, “Global Supply Chain Design Considerations: Mitigating Product Safety and Security Risks,” J. Oper. Manage., 29(7–8), pp. 721–736. [CrossRef]
Xiang, H., and Li, M., 2012, “The Research of Network Security Mechanism Based Collaborative Design,” Adv. Des. Technol., 421, pp. 406–409.
Hoppe, H., 1996, “Progressive Meshes,” Proceedings of the ACM SIGGRAPH, pp. 99–108.
Han, J. H., Kim, T., Cera, C. D., and Regli, W. C., 2003, “Multi-Resolution Modeling in Collaborative Design,” Proceedings of the 18th International Symposium on Computer and Information Sciences, Antalya, Turkey, pp. 397–404.
Qiu, Z. M., Wong, Y. S., Fuh, J. Y. H., Chen, Y. P., Zhou, Z. D., Li, W. D., and Lu, Y. Q., 2004, “Geometric Model Simplification for Distributed CAD,” Comput. Aided Des., 36(9), pp. 809–819. [CrossRef]
Li, W. D., Cai, Y. L., and Lu, W. F., 2007, “A 3D Simplification Algorithm for Distributed Visualization,” Comput. Ind., 58(3), pp. 211–226. [CrossRef]
Belaziz, M., Bouras, A., and Brun, J. M., 2000, “Morphological Analysis for Product Design,” Comput. Aided Des., 32(5–6), pp. 377–388. [CrossRef]
Seo, J., Song, Y., Kim, S., Lee, K., Choi, Y., and Chae, S., 2005, “Wrap-Around Operation for Multi-Resolution of B-Rep Model,” Proceedings of CAD’05, Vol. 2, pp. 67–76.
Kim, S., Lee, K., Hong, T., Kim, M., Jung, M., and Song, Y., 2005, “An Integrated Approach to Realize Multi-Resolution of B-Rep Model,” Proceedings of the ACM Symposium on Solid and Physical Modeling, Cambridge, MA, pp. 153–162.
Lee, J. Y., Lee, J. H., Kim, H., and Kim, H.-S., 2004, “A Cellular Topology-Based Approach to Generating Progressive Solid Models From Feature-Centric Models,” Comput. Aided Des., 36(3), pp. 217–229. [CrossRef]
Lee, S. H., 2005, “A CAD-CAE Integration Approach Using Feature-Based Multi-Resolution and Multi-Abstraction Modeling Techniques,” Comput. Aided Des., 37(9), pp. 941–955. [CrossRef]
Lee, S. H., 2005, “Feature-Based Multi-Resolution Modeling of Solids,” ACM Trans. Graphics, 24(4), pp. 1417–1441. [CrossRef]
Cera, C. D., Braude, I., Kim, T., Han, J. H., and Regli, W. C., 2006, “Hierarchical Role-Based Viewing for Multilevel Information Security in Collaborative CAD,” ASME J. Comput. Inf. Sci. Eng., 6(1), pp. 2–10. [CrossRef]
Kim, T., Cera, C. D., Regli, W. C., Choo, H., and Han, J. H., 2006, “Multi-Level Modeling and Access Control for Data Sharing in Collaborative Design,” Adv. Eng. Inf., 20(1), pp. 47–57. [CrossRef]
Chu, C. H., Chan, Y. H., and Wu, P. H., 2008, “3D Streaming Based on Multi-LOD Models for Networked Collaborative Design,” Comput. Ind., 59(9), pp. 863–872. [CrossRef]
Chu, C. H., Wu, P. H., and Hsu, Y. C., 2009, “Multi-Agent Collaborative 3D Design With Geometric Model at Different Levels of Detail,” Rob. Comput. Integr. Manuf., 25(2), pp. 334–347. [CrossRef]
Li, S., and Mirhosseini, M., 2012, “A Matrix-Based Modularization Approach for Supporting Secure Collaboration in Parametric Design,” Comput. Ind., 63(6), pp. 619–631. [CrossRef]
Yu, Z. Q., Horace, H. S., and Kwok, L. F., 2003, “A Robust Watermarking Scheme for 3D Triangular Mesh Models,” Pattern Recognit., 36(11), pp. 2603–2614. [CrossRef]
Cayre, F., Alface, P. R., Schmitt, F., Macq, B., and Maitre, H., 2003, “Application of Spectral Decomposition to Compression and Watermarking of 3D Triangle Mesh Geometry,” Signal Process., 18(4), pp. 309–319. [CrossRef]
Newbould, R. D., Irby, D. L., Carothers, J. D., Rodríguez, J. J., and Holman, W. T., 2003, “Mixed Signal Design Watermarking for IP Protection,” Integr. Comput. Aided Eng., 10(3), pp. 249–265.
Chou, C. M., and Tseng, D. C., 2006, “A Public Fragile Watermarking Scheme for 3D Model Authentication,” Comput. Aided Des., 38(11), pp. 1154–1165. [CrossRef]
Lee, S. H., and Kwon, K. R., 2007, “A Watermarking for 3D Mesh Using the Patch CEGIs,” Digital Signal Process., 17(2), pp. 396–413. [CrossRef]
Wang, W. B., Zheng, G. Q., Yong, J. H., and Gu, H.-J., 2008, “A Numerically Stable Fragile Watermarking Scheme for Authenticating 3D Models,” Comput. Aided Des., 40(5), pp. 634–645. [CrossRef]
Ai, Q. S., Liu, Q., Zhou, Z. D., Yang, L., and Xie, S. Q., 2009, “A New Digital Watermarking Scheme for 3D Triangular Mesh Models,” Signal Process., 89(11), pp. 2159–2170. [CrossRef]
Lee, S. H., and Kwon, K. R., 2010, “CAD Drawing Watermarking Scheme,” Digital Signal Process., 20(5), pp. 1379–1399. [CrossRef]
Peng, F., Lei, Y. Z., Long, M., and Sun, X.-M., 2011, “A Reversible Watermarking Scheme for Two-Dimensional CAD Engineering Graphics Based on Improved Difference Expansion,” Comput. Aided Des., 43(8), pp. 1018–1024. [CrossRef]
Lee, S. H., and Kwon, K. R., 2012, “Robust 3D Mesh Model Hashing Based on Feature Object,” Digital Signal Process., 22(5), pp. 744–759. [CrossRef]
Su, Z. Y., Li, W. Q., Kong, J. S., Dai, Y., and Tang, W., 2013, “Watermarking 3D CAPD Models for Topology Verification,” Comput. Aided Des., 45(7), pp. 1042–1052. [CrossRef]
Naveen, K. N., and Thomas, J. N., 2011, “Flexible Optical Encryption With Multiple Users and Multiple Security Levels,” Opt. Commun., 284(3), pp. 735–739. [CrossRef]
Shannon, C. E., 1949, “Communication Theory of Secrecy Systems,” Bell Syst. Tech. J., 28(4), pp. 656–715. [CrossRef]
Diffie, W., and Hellman, M. E., 1976, “New Directions in Cryptography,” IEEE Trans. Inf. Theory, 22(6), pp. 644–655. [CrossRef]
Rajput, S. K., and Nishchal, N. K., 2013, “Known-Plaintext Attack on Encryption Domain Independent Optical Asymmetric Crypto System,” Opt. Commun., 309, pp. 231–235. [CrossRef]
Barrera, J. F., Vargas, C., Tebaldi, M., and Torroba, R., 2010, “Chosen-Plaintext Attack on a Joint Transform Correlate or Encrypting System,” Opt. Commun., 283(20), pp. 3917–3921. [CrossRef]
Tang, M., Lee, M., and Kim, Y. J., 2009, “Interactive Hausdorff Distance Computation for General Polygonal Models,” ACM Trans. Graphics, 28(3). [CrossRef]
Chen, X. D., Ma, W. Y., Xu, G., and Paul, J.-C., 2010, “Computing the Hausdorff Distance Between Two B-Spline Curves,” Comput. Aided Des., 42(12), pp. 1197–1206. [CrossRef]
Jing, S. X., He, F. Z., Han, S. H., Li, X. X., and Cai, X. T., 2009, “A Method for Topological Entity Correspondence in a Replicated Collaborative CAD System,” Comput. Ind., 60(7), pp. 467–475. [CrossRef]
Li, X. X., He, F. Z., Cai, X. T., Zhang, D., and Chen, Y., 2013, “A Method for Topological Entity Matching in the Integration of Heterogeneous CAD Systems,” Integr. Comput. Aided Eng., 20(1), pp. 15–30.

Figures

Grahic Jump Location
Fig. 1

A typical collaborative scenario with different levels of encryption granularity of a CAD model

Grahic Jump Location
Fig. 2

An example of the DLG: (a) the feature tree, (b) the CAD model, and (c) the DLG

Grahic Jump Location
Fig. 3

The transformation of the feature f (a) the initial feature f and (b) the Hausdorff distance changing according to α

Grahic Jump Location
Fig. 4

The encryption procedure of a CAD model

Grahic Jump Location
Fig. 5

The initial model M0 and its DLG: (a) the model M0 and its feature tree and (b) the DLG of M0

Grahic Jump Location
Fig. 6

(a) M0 is encrypted to M1 and the shape comparison between M0 and M1

Grahic Jump Location
Fig. 7

Key-based authorization of M1

Grahic Jump Location
Fig. 8

The secure sharing of the propeller part

Tables

Errata

Discussions

Some tools below are only available to our subscribers or users with an online account.

Related Content

Customize your page view by dragging and repositioning the boxes below.

Related Journal Articles
Related eBook Content
Topic Collections

Sorry! You do not have access to this content. For assistance or to subscribe, please contact us:

  • TELEPHONE: 1-800-843-2763 (Toll-free in the USA)
  • EMAIL: asmedigitalcollection@asme.org
Sign In