Research Papers

Secure Codesign: Achieving Optimality Without Revealing

[+] Author and Article Information
Siva Chaitanya Chaduvula, Jitesh H. Panchal

School of Mechanical Engineering,
Purdue University,
West Lafayette, IN 47907

Mikhail J. Atallah

Computer Science,
Purdue University,
West Lafayette, IN 47907

Manuscript received March 15, 2017; final manuscript received February 20, 2018; published online March 16, 2018. Assoc. Editor: Yan Wang.

J. Comput. Inf. Sci. Eng 18(2), 021007 (Mar 16, 2018) (14 pages) Paper No: JCISE-17-1060; doi: 10.1115/1.4039431 History: Received March 15, 2017; Revised February 20, 2018

Information leakage can lead to loss of intellectual property and competitive edge. One of the primary sources of information leakage in collaborative design is sharing confidential information with collaborators, who may be also collaborating with competitors. Hiding information from collaborators is challenging in codesign because it can lead to inferior and suboptimal solutions. Therefore, there is a need for techniques that enable designers to protect confidential information from their collaborators while achieving solutions that are as good as those obtained when full information is shared. To address this need, we propose a secure codesign (SCD) framework that enables designers to achieve optimal solutions without sharing confidential information. It is built on two principles: adding/multiplying a parameter with a large random number hides the value of the parameter, and adding/multiplying a large number is orders of magnitude faster than using existing cryptographic techniques. Building on the protocols for basic arithmetic computations, developed in our earlier work, we establish protocols for higher order computations involved in design problems. The framework is demonstrated using three codesign scenarios: requirements-driven codesign, objective-driven codesign, and Nash noncooperation. We show that the proposed SCD framework enables designers to achieve optimal solutions in all three scenarios. The proposed framework is orders of magnitude faster than competing (but impractical for engineering design) cryptographic methods such as homomorphic encryption, without compromising on precision in computations. Hence, the proposed SCD framework is a practical approach for maintaining confidentiality of information during codesign.

Copyright © 2018 by ASME
Your Session has timed out. Please sign back in to continue.


Ulrich, K. T. , 2003, Product Design and Development, Tata McGraw-Hill Education, Boston, MA.
Agrawal, D. , 2008, “Product Data Security and Access Management,” UGS Connection Americas, Plano, TX, May 12. http://www-cad.fnal.gov/PLMWorld2008/Teamcenter%20Engineering/Product%2520Data%2520Security%2520and%2520Access%2520Management-Dilip%2520Agrawal.pdf
Vázquez, B. A. H. , 2006, When Your Contract Manufacturer Becomes Your Competitor, Harvard Business Review, Brighton, MA.
Lewis, K. , and Mistree, F. , 1997, “Modeling Interactions in Multidisciplinary Design: A Game Theoretic Approach,” AIAA J., 35(8), pp. 1387–1392. [CrossRef]
Cera, C. D. , Braude, I. , Kim, T. , Han, J. , and Regli, W. C. , 2005, “Hierarchical Role-Based Viewing for Multilevel Information Security in Collaborative CAD,” ASME J. Comput. Inf. Sci. Eng., 6(1), pp. 2–10. [CrossRef]
Wang, Y. , Ajoku, P. N. , Brustoloni, J. C. , and Nnaji, B. O. , 2006, “Intellectual Property Protection in Collaborative Design Through Lean Information Modeling and Sharing,” ASME J. Comput. Inf. Sci. Eng., 6(2), pp. 149–159. [CrossRef]
Cera, C. D. , Kim, T. , Han, J. , and Regli, W. C. , 2004, “Role-Based Viewing Envelopes for Information Protection in Collaborative Modeling,” Comput.-Aided Des., 36(9), pp. 873–886. [CrossRef]
Sweeney, L. , 2002, “Achieving k-Anonymity Privacy Protection Using Generalization and Suppression,” Int. J. Uncertainty, Fuzziness Knowl.-Based Syst., 10(5), pp. 571–588. [CrossRef]
Zhang, D. Y. , Zeng, Y. , Wang, L. , Li, H. , and Geng, Y. , 2011, “Modeling and Evaluating Information Leakage Caused by Inferences in Supply Chains,” Comput. Ind., 62(3), pp. 351–363. [CrossRef]
Mascetti, S. , Bettini, C. , Freni, D. , Wang, X. S. , and Jajodia, S. , 2009, “Privacy-Aware Proximity Based Services,” Tenth International Conference on Mobile Data Management: Systems, Services and Middleware (MDM'09), Taipei, Taiwan, May 18–20, pp. 31–40.
Panchal, J. H. , Fernandez, M. G. , Paredis, C. J. J. , Allen, J. K. , and Mistree, F. , 2007, “An Interval-Based Constraint Satisfaction (IBCS) Method for Decentralized, Collaborative Multifunctional Design,” Concurrent Eng., 15(3), pp. 309–323. [CrossRef]
Liker, J. , Sobek, D. , Ward, A. , and Cristiano, J. , 1996, “Involving Suppliers in Product Development in the United States and Japan: Evidence for Set-Based Concurrent Engineering,” IEEE Trans. Eng. Manage., 43(2), pp. 165–178. [CrossRef]
Pels, H. J. , 2006, “Federated Product Data Management in Multi-Company Projects,” Advances in Design, Springer, London, pp. 281–291. [CrossRef]
Da Yong Zhang, L. W. , and Zeng, Y. , “Secure Collaborative Product Development: A Literature Review,” International Conference on Product Life Cycle Management (PLM'08), Seoul, South Korea, July 11–13, pp. 331–340.
Domingo-Ferrer, J. , Sebé, F. , and Castella-Roca, J. , 2004, “On the Security of Noise Addition for Privacy in Statistical Databases,” International Workshop on Privacy in Statistical Databases, Barcelona, Spain, June 9–11, pp. 149–161.
Pibernik, R. , Zhang, Y. , Kerschbaum, F. , and Schröpfer, A. , 2011, “Secure Collaborative Supply Chain Planning and Inverse Optimization–The Jels Model,” Eur. J. Oper. Res., 208(1), pp. 75–85. [CrossRef]
Choi, Y. , Kim, K. , and Kim, C. , 2005, “A Design Chain Collaboration Framework Using Reference Models,” Int. J. Adv. Manuf. Technol., 26(1–2), pp. 183–190. [CrossRef]
Liu, W. , and Zeng, Y. , 2009, “Conceptual Modeling of Design Chain Management Towards Product Lifecycle Management,” Global Perspective for Competitive Enterprise, Economy and Ecology, Springer, London, pp. 137–148. [CrossRef]
Sun, X. , Zeng, Y. , and Liu, W. , 2013, “Formalization of Design Chain Management Using Environment-Based Design (EBD) Theory,” J. Intell. Manuf., 24(3), pp. 597–612.
Weber, L. , and Mayer, K. J. , 2011, “Designing Effective Contracts: Exploring the Influence of Framing and Expectations,” Acad. Manage. Rev., 36(1), pp. 53–75. [CrossRef]
Blakley, G. R. , 1979, “Safeguarding Cryptographic Keys,” National Computer Conference, New York, June 4–7, pp. 313–317.
Menezes, A. J. , Van Oorschot, P. C. , and Vanstone, S. A. , 1996, Handbook of Applied Cryptography, CRC Press, Boca Raton, FL. [CrossRef]
Chen, Y.-F. , Chan, Y.-K. , Huang, C.-C. , Tsai, M.-H. , and Chu, Y.-P. , 2007, “A Multiple-Level Visual Secret-Sharing Scheme Without Image Size Expansion,” Inf. Sci., 177(21), pp. 4696–4710. [CrossRef]
Lee, J. Y. , Lee, J.-H. , Kim, H. , and Kim, H.-S. , 2004, “A Cellular Topology-Based Approach to Generating Progressive Solid Models From Feature-Centric Models,” Comput.-Aided Des., 36(3), pp. 217–229. [CrossRef]
Lee, S. H. , 2005, “A CAD–CAE Integration Approach Using Feature-Based Multi-Resolution and Multi-Abstraction Modelling Techniques,” Comput.-Aided Des., 37(9), pp. 941–955. [CrossRef]
Cai, X. , He, F. , Li, W. , Li, X. , and Wu, Y. , 2013, “Multi-Granularity Partial Encryption Method of Cad Model,” 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD), Whistler, BC, Canada, June 27–29, pp. 23–30.
Atallah, M. , Blanton, M. , Deshpande, V. , Frikken, K. , Li, J. , and Schwarz, L. , 2006. “Secure Collaborative Planning, Forecasting, and Replenishment (Scpfr),” Multi-Echelon/Public Applications of Supply Chain Management Conference, pp. 165–180.
Wang, S. , Bhandari, S. , Chaduvula, S. C. , Atallah, M. J. , Panchal, J. H. , and Ramani, K. , 2017, “Secure Collaboration in Engineering Systems Design,” ASME J. Comput. Inf. Sci. Eng., 17(4), p. 041010. [CrossRef]
Wang, S. , Nassar, M. , Atallah, M. J. , and Malluhi, Q. M. , 2013, “Secure and Private Outsourcing of Shape-Based Feature Extraction,” International Conference on Information and Communication Systems, Beijing, China, Nov. 20–22, pp. 90–99.
Martins, J. R. , and Lambe, A. B. , 2013, “Multidisciplinary Design Optimization: A Survey of Architectures,” AIAA J., 51(9), pp. 2049–2075. [CrossRef]
Lewis, K. , and Mistree, F. , 1998, “Collaborative, Sequential, and Isolated Decisions in Design,” ASME J. Mech. Des., 120(4), pp. 643–652.
Save, M. , and Prager, W. , 1990, Structural Optimization: Volume 2: Mathematical Programming, Vol. 40, Springer Science & Business Media, New York.
Rao, S. S. , and Rao, S. , 2009, Engineering Optimization: Theory and Practice, Wiley, Hoboken, NJ. [CrossRef] [PubMed] [PubMed]
Duffin, R. J. , Peterson, E. L. , and Zener, C. , 1967, Geometric Programming: Theory and Application, Wiley, New York.
Hernandez, G. , Seepersad, C. C. , Allen, J. K. , and Mistree, F. , 2002, “A Method for Interactive Decision-Making in Collaborative, Distributed Engineering Design,” Int. J. Agile Manuf. Syst., 5(2), pp. 47–65. https://pdfs.semanticscholar.org/039c/697f153c181b681958329e665de9acc6342a.pdf
Bradie, B. , 2006, A Friendly Introduction to Numerical Analysis, Prentice Hall, Upper Saddle River, NJ.
Paillier, P. , 1999, “Public-Key Cryptosystems Based on Composite Degree Residuosity Classes,” International Conference on the Theory and Applications of Cryptographic Techniques, Prague, Czech Republic, May 2–6, pp. 223–238.


Grahic Jump Location
Fig. 1

Role-based access control

Grahic Jump Location
Fig. 2

Additive splitting of confidential information by collaborators

Grahic Jump Location
Fig. 3

Morphing of additive splits corresponding to Alice's input (v) by the collaborators before sending to the server

Grahic Jump Location
Fig. 4

Additive splitting of output computed by server and inverse morphing on the additive splits by the collaborators

Grahic Jump Location
Fig. 5

Vector inner product using SAPAS protocols

Grahic Jump Location
Fig. 7

Symmetric truss configuration

Grahic Jump Location
Fig. 8

Secure codesign framework for example discussed in Sec. 5.1

Grahic Jump Location
Fig. 9

Pictorial representation of the example considered in Sec. 5




Some tools below are only available to our subscribers or users with an online account.

Related Content

Customize your page view by dragging and repositioning the boxes below.

Related Journal Articles
Related eBook Content
Topic Collections

Sorry! You do not have access to this content. For assistance or to subscribe, please contact us:

  • TELEPHONE: 1-800-843-2763 (Toll-free in the USA)
  • EMAIL: asmedigitalcollection@asme.org
Sign In