Enterprises operate in a global economy with their operations dispersed across internal processes and external partners. Product Lifecycle Management (PLM) systems play a significant role in modern product development and management. There are multiple stages in product lifecycle that streamline by sharing data among PLM entities. Shared data may contain highly sensitive information such as trade secrets, intellectual property, private organizational or personal information. In large enterprise systems, it is difficult to understand and track data dissemination. Data sharing across global partners complicates and magnifies the problem further. The effect of shared data being leaked is one of the key risks. Existing approaches ensure security within the domain of an organization and don’t address protection in a decentralized environment. We propose an approach for secure data dissemination using the Active Bundle scheme. This approach enables organizations to securely share information in their PLM steps and protects it throughout the product lifecycle.


PLM active bundle data dissemination security privacy 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ameri, F., Dutta, D.: Product lifecycle management: closing the knowledge loops. Computer-Aided Design & Applications 2(5), 577–590 (2005)CrossRefGoogle Scholar
  2. 2.
    Atallah, M.J., Elmongui, H.G., Deshpande, V., Schwarz, L.B.: Secure supply-chain protocols. In: IEEE International Conference on E- Commerce, pp. 293–302 (2003)Google Scholar
  3. 3.
  4. 4.
  5. 5.
    Carr, J.: Strategies and Issues: Thwarting Insider Attacks. Network Magazine (2002)Google Scholar
  6. 6.
    Cappelli, D., Moore, A., Trzeciak, R., Shimeall, T.J.: Common Sense Guide to Prevention and Detection of Insider Threats, V. 3.1. Carnegie Mellon University (2009)Google Scholar
  7. 7.
    Woerner, J., Woern, H.: Distributed and secure co-operative engineering in virtual plant production. In: Advanced Production Management Systems: Conference on Collaborative Systems for Production Management, pp. 175–187 (2002)Google Scholar
  8. 8.
    Pels, H.: Federated Product Data Management in Multi-company Projects. Advances in Design, 281–291 (2006)Google Scholar
  9. 9.
    Leong, K.K., Yu, K.M., Lee, W.B.: A security model for distributed product data management system. Computers in Industry 50(2), 179–193 (2003)CrossRefGoogle Scholar
  10. 10.
    Rouibah, K., Ould-Ali, S.: Dynamic data sharing and security in a collaborative product definition management system. Robotics and Computer-Integrated Manufacturing 23(2), 217–233 (2007)CrossRefGoogle Scholar
  11. 11.
    Cera, C.D., Kim, T., Han, J., Regli, W.C.: Role-based viewing envelopes for information protection in collaborative modeling. Computer-Aided Design 36(9), 873–886 (2004)CrossRefGoogle Scholar
  12. 12.
    Brustoloni, J.C., Nnaji, B.O.: Intellectual property protection in collaborative design through lean information modeling and sharing. Journal of Computing and Information Science in Engineering 6, 149 (2006)CrossRefGoogle Scholar
  13. 13.
    Iyer, A.V., Ye, J.: Assessing the value of information sharing in a promotional retail environment. Manufacturing & Service Operations Management 2(2), 128–143 (2000)CrossRefGoogle Scholar
  14. 14.
    Cachon, G.P., Fisher, M.: Supply chain inventory management and the value of shared information. Management Science 46(8), 1032–1048 (2000)CrossRefzbMATHGoogle Scholar
  15. 15.
    Browne, N., Crespigny, M., Reavis, J., Roemer, K., Samani, R.: Business Assurance for the 21st Century: Navigating the Information Assurance landscape. Information Security Forum (2011)Google Scholar
  16. 16.
    Ben Othmane, L., Lilien, L.: Protecting Privacy of Sensitive Data Dissemination Using Active Bundles. In: World Congress on Privacy, Security, Trust and the Management of e-Business, pp. 202–213 (2009)Google Scholar
  17. 17.
    Ben Othmane, L.: Active Bundles for Protecting Confidentiality of Sensitive Data Throughout Their Lifecycle. Ph.D. Thesis, Western Michigan University (2010)Google Scholar
  18. 18.
    Ranchal, R., Bhargava, B., Ben Othmane, L., Lilien, L., Kim, A., Kang, M., Linderman, M.: Protection of identity information in cloud computing without trusted third party. In: 29th IEEE Symposium on Reliable Distributed Systems (2010)Google Scholar
  19. 19.
    Geambasu, R., Kohno, T., Levy, A., Levy, H.M.: Vanish: Increasing data privacy with self-destructing data. In: 18th USENIX Security Symposium, p. 56 (2009)Google Scholar
  20. 20.
    Bhargava, B., Angin, P., Ranchal, R., Sivakumar, R., Linderman, M., Sinclair, A.: A trust based approach for secure data dissemination in a mobile peer-to-peer network of AVs. International Journal of Next-generation Computing 3(1) (2012)Google Scholar
  21. 21.
    Shamir, A.: How to Share a Secret. Communications of the ACM 22(11), 612–613 (1979)MathSciNetCrossRefzbMATHGoogle Scholar
  22. 22.
    Heffner, K., Collberg, C.: The Obfuscation Executive. Information Security 3225, 428–440 (2004)Google Scholar

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2013

Authors and Affiliations

  • Rohit Ranchal
    • 1
  • Bharat Bhargava
    • 1
  1. 1.Computer Sciences and CERIASPurdue UniversityWest LafayetteUSA

Personalised recommendations