Skip to main content

Customized Encryption of CAD Models for Cloud-Enabled Collaborative Product Development

  • Chapter
  • First Online:
Cybersecurity for Industry 4.0

Part of the book series: Springer Series in Advanced Manufacturing ((SSAM))

Abstract

Collaborative product development via cloud has changed the information distribution, organization and management means of traditional product design. Under this new paradigm, product information needs to be shared flexibly to meet collaborators’ requirements. Feature-based Computer Aided Design (CAD) models contain abundant intellectual property information. It is paramount to maintain the security of the sensitive information in CAD models while sharing other information of the models in cloud for effective collaboration. The developed security research works for CAD models are still far away from meeting collaboration requirements. In this chapter, an innovative customized encryption approach to support product development collaboration is presented. The approach is composed of a customized encryption algorithm for feature-based CAD models, a key based authorization algorithm for users to decrypt shared features in the models, and a customized geometric transformation algorithm for effective protection mode-based visualization of the models during collaboration. By using this approach, CAD models can be flexibly encrypted to realize the customized sharing of features used for collaboration and protection of other features of the models according to collaboration requirements. A complex case study has been used to verify and illustrate the effectiveness of the approach to industrial applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Ai QS, Liu Q, Zhou ZD et al (2009) A new digital watermarking scheme for 3D triangular mesh models. Signal Process 89:2159–2170

    Article  MATH  Google Scholar 

  • Barrera JF, Vargas C, Tebaldi M et al (2010) Chosen-plaintext attack on a joint transform correlate or encrypting system. Opt Commun 283:3917–3921

    Article  Google Scholar 

  • Belaziz M, Bouras A, Brun JM (2000) Morphological analysis for product design. Comput Aided Des 32(5–6):377–388

    Article  Google Scholar 

  • Cai XT, Li XX, He FZ et al (2012) Flexible concurrency control for legacy CAD to construct collaborative CAD environment. J Adv Mech Des Syst Manuf 3(6):324–339

    Google Scholar 

  • Cayre F, Alface PR, Schmitt F et al (2003) Application of spectral decomposition to compression and watermarking of 3D triangle mesh geometry. Signal Process 18:309–319

    Google Scholar 

  • Cera CD, Braude I, Kim T et al (2006) Hierarchical role-based viewing for multilevel information security in collaborative CAD. J Comput Inf Sci Eng 1(6):2–10

    Article  Google Scholar 

  • Chang HB, Kim KK, Kim YD (2008) The development of security system for sharing CAD drawings in u-environment. Comput Inf 5(27):731–741

    MATH  Google Scholar 

  • Chou CM, Tseng DC (2006) A public fragile watermarking scheme for 3D model authentication. Comput Aided Des 38:1154–1165

    Article  Google Scholar 

  • Chu CH, Wu PH, Hsu YC (2009) Multi-agent collaborative 3D design with geometric model at different levels of detail. Robot Comput Integr Manuf 25:334–347

    Article  Google Scholar 

  • Conway R, Maxwell W, Morgan H (1972) On the implementation of security measures in information system. Commun ACM 15(4):211–220

    Article  Google Scholar 

  • Esam E, Ben A (2011) Secret sharing approaches for 3D object encryption. Expert Syst Appl 38:13906–13911

    Google Scholar 

  • Han JH, Kim T, Cera CD et al (2003) Multi-resolution modeling in collaborative design. In: Proceedings of the eighteenth international symposium on computer and information Sciences, Antalya, Turkey

    Google Scholar 

  • Hoppe H (1996) Progressive meshes. In: Proceedings of ACM SIGGRAPH

    Google Scholar 

  • Huang Z, Liu GD, Ren Z et al (2009) A method of 3D data information encryption with virtual holography. In: Proceedings of SPIE-the international society for optical engineering 7125:71250E1–71250E7

    Google Scholar 

  • Kim S, Lee K, Hong T, et a1 (2005). An integrated approach to realize multi-resolution of B-rep model. In: Proceedings of the 2005 ACM symposium on solid and physical modeling, Cambridge, Massachusetts

    Google Scholar 

  • Lampson BW (1974) Protection. Oper Syst Rev 8(1):18–24

    Article  MATH  Google Scholar 

  • Lee JY, Lee JH, Kim H et al (2004) A cellular topology-based approach to generating progressive solid models from feature-centric models. Comput Aided Des 36(3):217–229

    Article  Google Scholar 

  • Lee SH (2005) A CAD-CAE integration approach using feature-based multi-resolution and multi-abstraction modelling techniques. Comput Aided Des 37(9):941–955

    Article  Google Scholar 

  • Lee SH, Kwon KR (2012) Robust 3D mesh model hashing based on feature object. Digit Signal Proc 22:744–759

    Article  MathSciNet  Google Scholar 

  • Leong KK, Yu KM, Lee WB (2003) A security model for distributed product data management system. Comput Ind 50:179–193

    Article  Google Scholar 

  • Li S, Mirhosseini M (2012) A matrix-based modularization approach for supporting secure collaboration in parametric design. Comput Ind 63:619–631

    Article  Google Scholar 

  • Li WD, Cai YL, Lu WF (2007) A 3D simplification algorithm for distributed visualization. Comput Ind 58:211–226

    Article  Google Scholar 

  • Li WD and Mehnen J (2013) Cloud manufacturing. Springer series in advanced manufacturing, Springer

    Google Scholar 

  • Naveen KN, Thomas JN (2011) Flexible optical encryption with multiple users and multiple security levels. Opt Commun 284:735–739

    Article  Google Scholar 

  • Oh S, Park S (2003) Task-role-based access control model. Inf Syst 28(6):533–562

    Article  MATH  Google Scholar 

  • Park J, Sandhu R (2004) The UCONABC usage control model. ACM Trans Inf Syst Secur 7(1):128–174

    Article  Google Scholar 

  • Peng F, Lei YZ, Long M et al (2011) A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion. Comput Aided Des 43:1018–1024

    Article  Google Scholar 

  • Qiu ZM, Wong YS, Fuh JYH et al (2004) Geomelric model simplification for distributed CAD. Comput Aided Des 36(9):809–819

    Article  Google Scholar 

  • Rajput SK, Nishchal NK (2013) Known-plaintext attack on encryption domain independent optical asymmetric crypto system. Opt Commun 309:231–235

    Article  Google Scholar 

  • Rouibah K, Ould-Ali S (2007) Dynamic data sharing and security in a collaborative product definition management system. Robot Comput Integr Manuf 23:217–233

    Article  Google Scholar 

  • Rutledge LS, Hoffman LJ (1986) A survey of issues in computer network security. Comput Secur 4(5):296–308

    Article  Google Scholar 

  • Sandhu R, Coyne E, Feinstein H (1996) Role-based access control models. IEEE Comput 29(2):38–47

    Article  Google Scholar 

  • Seo J, Song Y, Kim S et a1 (2005) Wrap-around operation for multi-resolution of B-Rep model. In: Proceedings of CAD’05

    Google Scholar 

  • Speiera C, Whippleb JM, Clossc DJ et al (2011) Global supply chain design considerations: mitigating product safety and security risks. J Oper Manag 29:721–736

    Article  Google Scholar 

  • Stevens G, Wulf V (2002) A new dimension in access control: studying maintenance engineering across organizational boundaries

    Google Scholar 

  • Su ZY, Li WQ, Kong JS et al (2013) Watermarking 3D CAPD models for topology verification. Comput Aided Des 45:1043–1052

    Article  Google Scholar 

  • Tang M, Lee M, Kim YJ (2009) Interactive Hausdorff distance computation for general polygonal models. ACM Trans Graph 28(3): Article 74

    Google Scholar 

  • Tao H, Zain JM, Ahmed MM et al (2012) A wavelet-based particle swarm optimization algorithm for digital image watermarking. Integr Comput Aided Eng 1(19):81–91

    Google Scholar 

  • Tirkel AZ, Rankin GA, vanSchyndel RM et al (1993) Electronic water mark, Sydeny, Macquarie University

    Google Scholar 

  • van der Hoeven A, ten Bosch O, van Leuken R et al (1994) A flexible access control mechanism for CAD frameworks. In: Proceedings of the conference on European design automation. Los Alamito

    Google Scholar 

  • Wang WB, Zheng GQ, Yong JH et al (2008) A numerically stable fragile watermarking scheme for authenticating 3D models. Comput Aided Des 40:634–645

    Article  Google Scholar 

  • Xiang H, Li M (2012) The research of network security mechanism based collaborative design. Adv Des Technol 421:406–409

    Google Scholar 

  • Yao KH, Shao J, Sheng GQ et al (2007) Research on a security model of data in computer supported collaborative design integrated with PDM system. In: IITA 2007: workshop on intelligent information technology application

    Google Scholar 

Download references

Acknowledgements

This work is supported by the National Science Foundation of China (Grant No. 61303215), EU FP7 Smarter project (FP7-PEOPLE-2013-IAPP-610675) and EU FP7 Cloudflow project (FP7-2013-NMP-ICT-FoF-609100).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to W. D. Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Cai, X.T., Wang, S., Lu, X., Li, W.D. (2017). Customized Encryption of CAD Models for Cloud-Enabled Collaborative Product Development. In: Thames, L., Schaefer, D. (eds) Cybersecurity for Industry 4.0. Springer Series in Advanced Manufacturing. Springer, Cham. https://doi.org/10.1007/978-3-319-50660-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-50660-9_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-50659-3

  • Online ISBN: 978-3-319-50660-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics