0
Research Papers

Secure Collaboration in Engineering Systems Design

[+] Author and Article Information
Shumiao Wang

Google, Inc.,
1600 Amphitheatre Pkwy,
Mountain View, CA 94043

Siddharth Bhandari

School of Technology and Computer Sciences,
Tata Institute of Fundamental Research,
Mumbai 400005, India

Siva Chaitanya Chaduvula, Karthik Ramani

School of Mechanical Engineering,
Purdue University,
West Lafayette, IN 47906

Mikhail J. Atallah

Department of Computer Science,
Purdue University,
West Lafayette, IN 47906

Jitesh H. Panchal

School of Mechanical Engineering,
Purdue University,
West Lafayette, IN 47906
e-mail: panchal@purdue.edu

1Corresponding author.

Contributed by the Design Engineering Division of ASME for publication in the JOURNAL OF COMPUTING AND INFORMATION SCIENCE IN ENGINEERING. Manuscript received September 21, 2016; final manuscript received April 20, 2017; published online June 15, 2017. Editor: Bahram Ravani.

J. Comput. Inf. Sci. Eng 17(4), 041010 (Jun 15, 2017) (11 pages) Paper No: JCISE-16-2090; doi: 10.1115/1.4036615 History: Received September 21, 2016; Revised April 20, 2017

The goal in this paper is to enable collaboration in the codesign of engineering artifacts when participants are reluctant to share their design-related confidential and proprietary information with other codesigners, even though such information is needed to analyze and validate the overall design. We demonstrate the viability of codesign by multiple entities who view the parameters of their contributions to the joint design to be confidential. In addition to satisfying this confidentiality requirement, an online codesign process must result in a design that is of the same quality as if full sharing of information had taken place between the codesigners. We present online codesign protocols that satisfy both requirements and demonstrate their practicality using a simple example of codesign of an automotive suspension system and the tires. Our protocols do not use any cryptographic primitives—they only use the kinds of mathematical operations that are currently used in single-designer situations. The participants in the online design protocols include the codesigners, and a cloud server that facilitates the process while learning nothing about the participants' confidential information or about the characteristics of the codesigned system. The only assumption made about this cloud server is that it does not collude with some participants against other participants. We do not assume that the server does not, on its own, attempt to compute as much information as it can about the confidential inputs and outputs of the codesign process: It can make a transcript of the protocol and later attempt to infer all possible information from it, so it is a feature of our protocols the cloud server can infer nothing from such a transcript.

FIGURES IN THIS ARTICLE
<>
Copyright © 2017 by ASME
Your Session has timed out. Please sign back in to continue.

References

Horner, J. , and Atwood, M. E. , 2006, “ Design Rationale: The Rationale and the Barriers,” Fourth Nordic Conference on Human-Computer Interaction: Changing Roles, Oslo, Norway, Oct. 14–18, pp. 341–350.
Bidarra, R. , van den Berg, E. , and Bronsvoort, W. F. , 2002, “ A Collaborative Feature Modeling System,” ASME J. Comput. Inf. Sci. Eng., 2(3), pp. 192–198. [CrossRef]
Red, E. , French, D. , Jensen, G. , Walker, S. S. , and Madsen, P. , 2013, “ Emerging Design Methods and Tools in Collaborative Product Development,” ASME J. Comput. Inf. Sci. Eng., 13(3), p. 031001. [CrossRef]
Cera, C. D. , Kim, T. , Han, J. , and Regli, W. C. , 2004, “ Role-Based Viewing Envelopes for Information Protection in Collaborative Modeling,” Comput.-Aided Des., 36(9), pp. 873–886. [CrossRef]
Wang, Y. , Ajoku, P. N. , Brustoloni, J. C. , and Nnaji, B. O. , 2006, “ Intellectual Property Protection in Collaborative Design Through Lean Information Modeling and Sharing,” ASME J. Comput. Inf. Sci. Eng., 6(2), pp. 149–159. [CrossRef]
Roehl, G. P. , Kolonay, G. R. , Irani, G. R. , Sobolewski, G. M. , Kao, G. K. , and Bailey, G. M. , 2000, “ A Federated Intelligent Product Environment,” AIAA Paper No. 2000-4902.
Howe, J. , 2008, Crowdsourcing: Why the Power of the Crowd Is Driving the Future of Business, Crown Business, New York.
Terwiesch, C. , and Xu, Y. , 2008, “ Innovation Contests, Open Innovation, and Multiagent Problem Solving,” Manage. Sci., 54(9), pp. 1529–1543. [CrossRef]
Wu, D. , Thames, J. L. , Rosen, D. W. , and Schaefer, D. , 2012, “ Towards a Cloud-Based Design and Manufacturing Paradigm: Looking Backward, Looking Forward,” ASME Paper No. DETC2012-70780.
Wang, H. , and Zhang, H. , 2013, “ Designing by Services: A New Paradigm for Collaborative Product Development,” Cloud Manufacturing (Springer Series in Advanced Manufacturing), W. Li and J. Mehnen , eds., Springer, London, pp. 165–192.
Chow, R. , Golle, P. , Jakobsson, M. , Shi, E. , Staddon, J. , Masuoka, R. , and Molina, J. , 2009, “ Controlling Data in the Cloud: Outsourcing Computation Without Outsourcing Control,” ACM Workshop on Cloud Computing Security (CCSW), Chicago, IL, Nov. 13, pp. 85–90.
Du, W. , and Atallah, M. J. , 2001, “ Secure Multi-Party Computation Problems and Their Applications: A Review and Open Problems,” Workshop on New Security Paradigms (NSPW), Cloudcroft, NM, Sept. 10–13, pp. 13–22.
Gentry, C. , 2009, “ A Fully Homomorphic Encryption Scheme,” Ph.D. thesis, Stanford University, Stanford, CA.
Huang, Y. , Evans, D. , Katz, J. , and Malka, L. , 2011, “ Faster Secure Two-Party Computation Using Garbled Circuits,” 20th USENIX Conference on Security (SEC), San Francisco, CA, Aug. 8–12.
Wang, S. , Nassar, M. , Atallah, M. J. , and Malluhi, Q. M. , 2013, “ Secure and Private Outsourcing of Shape-Based Feature Extraction,” International Conference on Information and Communications Security (ICICS), Singapore, Nov. 29–Dec. 2, pp. 90–99.
Klee, H. , and Allen, R. , 2011, Simulation of Dynamic Systems With MATLAB and Simulink, CRC Press, Boca Raton, FL.
Ogata, K. , 1970, Modern Control Engineering (Instrumentation and Controls Series), Prentice Hall, Upper Saddle River, NJ.
Rabin, M. O. , 1981, “ How to Exchange Secrets by Oblivious Transfer,” Aiken Computation Laboratory, Cambridge, MA, Technical Report No. TR-81.

Figures

Grahic Jump Location
Fig. 2

Collaborative half-car suspension system model

Grahic Jump Location
Fig. 3

High-level overview of the protocol

Grahic Jump Location
Fig. 4

Flow of the addition and subtraction protocol (ASP)

Grahic Jump Location
Fig. 5

Flow of the multiplication protocol

Grahic Jump Location
Fig. 6

Flow of the division protocol

Grahic Jump Location
Fig. 7

Flow of logarithm protocol

Grahic Jump Location
Fig. 11

Flow of the GT0 protocol

Grahic Jump Location
Fig. 12

Flow of the EW0 protocol

Grahic Jump Location
Fig. 13

Implementation steps

Tables

Errata

Discussions

Some tools below are only available to our subscribers or users with an online account.

Related Content

Customize your page view by dragging and repositioning the boxes below.

Related Journal Articles
Related eBook Content
Topic Collections

Sorry! You do not have access to this content. For assistance or to subscribe, please contact us:

  • TELEPHONE: 1-800-843-2763 (Toll-free in the USA)
  • EMAIL: asmedigitalcollection@asme.org
Sign In