Computer aided design (CAD) models reflect design goals, intentions, and functions so that they are the key intellectual properties of companies. In a Cloud manufacturing environment, how to effectively protect the sensitive feature information for a model owner while enabling the owner to flexibly share the rest of the CAD model with collaborators is an important yet challenging research issue. In this paper, an innovative partial encryption approach, which is able to represent a CAD model into the granularity of sharing information in order to address various collaboration scenarios and customized requirements from the model owner and collaborators, is presented. The approach is composed of a customized encryption algorithm for a CAD model, a key based customized authorization algorithm for collaborators to decrypt shared features in the model, and a customized geometric transformation method to support the effective protection model-based visualization of the model for collaboration. With this approach, a CAD model can be flexibly encrypted to realize partial sharing of features and safe protection of the rest of the model according to collaboration requirements. Meanwhile, during encryption and decryption, the CAD model is always manifold no matter which feature is encrypted or decrypted to ensure user friendliness, model validity, and robustness of the approach. A case study is used to verify and illustrate the effectiveness of the approach. This research is a new attempt to design a content-based and customized encryption approach applicable to CAD model-based collaboration in a Cloud manufacturing environment.

References

1.
Huang
,
Q.
,
Nouri
,
H.
,
Xu
,
K.
,
Chen
,
Y.
,
Sosina
,
S.
, and
Dasgupta
,
T.
,
2014
, “
Statistical Predictive Modeling and Compensation of Geometric Deviations of Three-Dimensional Printed Products
,”
ASME J. Manuf. Sci. Eng.
,
136
(
6
), p.
061008
.10.1115/1.4028510
2.
Li
,
W. D.
, and
Mehnen
,
J.
,
2013
,
Cloud Manufacturing (Springer Series in Advanced Manufacturing)
,
Springer
,
London
.10.1007/978-1-4471-4935-4
3.
Jeong
,
N.
, and
Rosen
,
D. W.
,
2014
, “
Microstructure Feature Recognition for Materials Using Surfacelet-Based Methods for Computer-Aided Design-Material Integration
,”
ASME J. Manuf. Sci. Eng.
,
136
(
6
), p.
061021
.10.1115/1.4028621
4.
Zeng
,
Y.
,
Wang
,
L.
,
Deng
,
X.
,
Cao
,
X.
, and
Khundker
,
N.
,
2012
, “
Secure Collaboration in Global Design and Supply Chain Environment: Problem Analysis and Literature Review
,”
Comput. Ind.
,
63
(
6
), pp.
545
556
.10.1016/j.compind.2012.05.001
5.
Roohnavazfar
,
M.
,
Houshmand
,
M.
,
Nasiri-Zarandi
,
R.
, and
Mirsalim
,
M.
,
2014
, “
Using Axiomatic Design Theory for Selection of the Optimum Design Solution and Manufacturing Process Plans of a Limited Angle Torque Motor
,”
ASME J. Manuf. Sci. Eng.
,
136
(
5
), p.
051009
.10.1115/1.4027969
6.
Chang
,
Q.
,
Pan
,
C. Y.
,
Xiao
,
G. X.
, and
Biller
,
S.
,
2013
, “
Integrated Modeling of Automotive Assembly Line With Material Handling
,”
ASME J. Manuf. Sci. Eng.
,
135
(
1
), p.
011018
.10.1115/1.4023365
7.
Sambhav
,
K.
,
Tandon
,
P.
,
Kapoor
,
S. G.
, and
Dhande
,
S. G.
,
2013
, “
Mathematical Modeling of Cutting Forces in Micro Drilling
,”
ASME J. Manuf. Sci. Eng.
,
135
(
1
), p.
014501
.10.1115/1.4007955
8.
Hauck
,
S.
, and
Knol
,
S.
,
1998
, “
Data Security for Web-Based CAD
,”
Proceedings of the Design Automation Conference
, San Francisco, CA, pp.
788
793
.
9.
Lampson
,
B. W.
,
1974
, “
Protection
,”
Oper. Syst. Rev.
,
8
(
1
), pp.
18
24
.10.1145/775265.775268
10.
Conway
,
R.
,
Maxwell
,
W.
, and
Morgan
,
H.
,
1972
, “
On the Implementation of Security Measures in Information System
,”
Commun. ACM
,
15
(
4
), pp.
211
220
.10.1145/361284.361287
11.
Sandhu
,
R.
,
Coyne
,
E.
, and
Feinstein
,
H.
,
1996
, “
Role-Based Access Control Models
,”
IEEE Comput.
,
29
(
2
), pp.
38
47
.10.1109/2.485845
12.
Oh
,
S.
, and
Park
,
S.
,
2003
, “
Task-Role-Based Access Control Model
,”
Inf. Syst.
,
28
(
6
), pp.
533
562
.10.1016/S0306-4379(02)00029-7
13.
Park
,
J.
, and
Sandhu
,
R.
,
2002
, “
Towards Usage Control Models: Beyond Traditional Access Control
,”
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies
,
SACMAT
, Monterey, CA, pp.
57
64
.10.1145/507711.507722
14.
Park
,
J.
, and
Sandhu
,
R.
,
2004
, “
The UCONABC Usage Control Model
,”
ACM Trans. Inf. Syst. Secur.
,
7
(
1
), pp.
128
174
.10.1145/984334.984339
15.
Van der Hoeven
,
A.
,
Ten Bosch
,
O.
,
van Leuken
,
R.
, and
van Der Wolf
,
P.
,
1994
, “
A Flexible Access Control Mechanism for CAD Frameworks
,”
Proceedings of the Conference on European Design Automation
, Los Alamitos, CA, pp.
188
193
.
16.
Stevens
,
G.
, and
Wulf
,
V.
,
2002
, “
A New Dimension in Access Control: Studying Maintenance Engineering Across Organizational Boundaries
,”
Proceedings of the ACM conference on CSCW
, pp.
196
205
.
17.
Cera
,
C. D.
,
Kim
,
T.
,
Braude
,
I.
,
Han
,
J.
, and
Regli
,
W. C.
,
2003
, “
Role-Based Viewing for Secure Collaborative Modeling
,” Drexel University, Philadelphia, PA, Technical Report No. DU-CS-03-04.
18.
Leong
,
K. K.
,
Yu
,
K. M.
, and
Lee
,
W. B.
,
2003
, “
A Security Model for Distributed Product Data Management System
,”
Comput. Ind.
,
50
(
2
), pp.
179
193
.10.1016/S0166-3615(02)00119-7
19.
Adrian
,
B.
, and
Steve
,
B.
,
1999
, “
An Access Control Framework for Multi-User Collaborative Environment
,”
Proceedings of the international ACM SIGGROUP Conference on Supporting Group Work
, pp.
140
149
.
20.
Rouibah
,
K.
, and
Ould-Ali
,
S.
,
2007
, “
Dynamic Data Sharing and Security in a Collaborative Product Definition Management System
,”
Rob. Comput. Integr. Manuf.
,
23
(
2
), pp.
217
233
.10.1016/j.rcim.2006.02.011
21.
Chang
,
H. B.
,
Kim
,
K. K.
, and
Kim
,
Y. D.
,
2007
, “
The Research of Security System for Sharing Engineering Drawings
,”
Proceedings of the IEEE Computer Society
, pp.
319
322
.
22.
Yao
,
L. H.
,
Shao
,
J.
,
Sheng
,
G. Q.
, and
Zhang
,
G. X.
,
2007
, “
Research on a Security Model of Data in Computer Supported Collaborative Design Integrated With PDM System
,”
Proceedings of the Workshop on Intelligent Information Technology Application (IITA)
, pp.
91
94
.
23.
Chang
,
H. B.
,
Kim
,
K. K.
, and
Kim
,
Y. D.
,
2008
, “
The Development of Security System for Sharing CAD Drawings in U-Environment
,”
Comput. Inf.
,
27
(
5
), pp.
731
741
.
24.
Speiera
,
C.
,
Whippleb
,
J. M.
,
Clossc
,
D. J.
, and
Douglas Voss
,
M.
,
2011
, “
Global Supply Chain Design Considerations: Mitigating Product Safety and Security Risks
,”
J. Oper. Manage.
,
29
(
7–8
), pp.
721
736
.10.1016/j.jom.2011.06.003
25.
Xiang
,
H.
, and
Li
,
M.
,
2012
, “
The Research of Network Security Mechanism Based Collaborative Design
,”
Adv. Des. Technol.
,
421
, pp.
406
409
.
26.
Hoppe
,
H.
,
1996
, “
Progressive Meshes
,”
Proceedings of the ACM SIGGRAPH
, pp.
99
108
.
27.
Han
,
J. H.
,
Kim
,
T.
,
Cera
,
C. D.
, and
Regli
,
W. C.
,
2003
, “
Multi-Resolution Modeling in Collaborative Design
,”
Proceedings of the 18th International Symposium on Computer and Information Sciences
, Antalya, Turkey, pp.
397
404
.
28.
Qiu
,
Z. M.
,
Wong
,
Y. S.
,
Fuh
,
J. Y. H.
,
Chen
,
Y. P.
,
Zhou
,
Z. D.
,
Li
,
W. D.
, and
Lu
,
Y. Q.
,
2004
, “
Geometric Model Simplification for Distributed CAD
,”
Comput. Aided Des.
,
36
(
9
), pp.
809
819
.10.1016/j.cad.2003.09.007
29.
Li
,
W. D.
,
Cai
,
Y. L.
, and
Lu
,
W. F.
,
2007
, “
A 3D Simplification Algorithm for Distributed Visualization
,”
Comput. Ind.
,
58
(
3
), pp.
211
226
.10.1016/j.compind.2006.05.003
30.
Belaziz
,
M.
,
Bouras
,
A.
, and
Brun
,
J. M.
,
2000
, “
Morphological Analysis for Product Design
,”
Comput. Aided Des.
,
32
(
5–6
), pp.
377
388
.10.1016/S0010-4485(00)00019-1
31.
Seo
,
J.
,
Song
,
Y.
,
Kim
,
S.
,
Lee
,
K.
,
Choi
,
Y.
, and
Chae
,
S.
,
2005
, “
Wrap-Around Operation for Multi-Resolution of B-Rep Model
,”
Proceedings of CAD’05
, Vol.
2
, pp.
67
76
.
32.
Kim
,
S.
,
Lee
,
K.
,
Hong
,
T.
,
Kim
,
M.
,
Jung
,
M.
, and
Song
,
Y.
,
2005
, “
An Integrated Approach to Realize Multi-Resolution of B-Rep Model
,”
Proceedings of the ACM Symposium on Solid and Physical Modeling
, Cambridge, MA, pp.
153
162
.
33.
Lee
,
J. Y.
,
Lee
,
J. H.
,
Kim
,
H.
, and
Kim
,
H.-S.
,
2004
, “
A Cellular Topology-Based Approach to Generating Progressive Solid Models From Feature-Centric Models
,”
Comput. Aided Des.
,
36
(
3
), pp.
217
229
.10.1016/S0010-4485(03)00094-0
34.
Lee
,
S. H.
,
2005
, “
A CAD-CAE Integration Approach Using Feature-Based Multi-Resolution and Multi-Abstraction Modeling Techniques
,”
Comput. Aided Des.
,
37
(
9
), pp.
941
955
.10.1016/j.cad.2004.09.021
35.
Lee
,
S. H.
,
2005
, “
Feature-Based Multi-Resolution Modeling of Solids
,”
ACM Trans. Graphics
,
24
(
4
), pp.
1417
1441
.10.1145/1095878.1095887
36.
Cera
,
C. D.
,
Braude
,
I.
,
Kim
,
T.
,
Han
,
J. H.
, and
Regli
,
W. C.
,
2006
, “
Hierarchical Role-Based Viewing for Multilevel Information Security in Collaborative CAD
,”
ASME J. Comput. Inf. Sci. Eng.
,
6
(
1
), pp.
2
10
.10.1115/1.2161226
37.
Kim
,
T.
,
Cera
,
C. D.
,
Regli
,
W. C.
,
Choo
,
H.
, and
Han
,
J. H.
,
2006
, “
Multi-Level Modeling and Access Control for Data Sharing in Collaborative Design
,”
Adv. Eng. Inf.
,
20
(
1
), pp.
47
57
.10.1016/j.aei.2005.05.016
38.
Chu
,
C. H.
,
Chan
,
Y. H.
, and
Wu
,
P. H.
,
2008
, “
3D Streaming Based on Multi-LOD Models for Networked Collaborative Design
,”
Comput. Ind.
,
59
(
9
), pp.
863
872
.10.1016/j.compind.2008.07.006
39.
Chu
,
C. H.
,
Wu
,
P. H.
, and
Hsu
,
Y. C.
,
2009
, “
Multi-Agent Collaborative 3D Design With Geometric Model at Different Levels of Detail
,”
Rob. Comput. Integr. Manuf.
,
25
(
2
), pp.
334
347
.10.1016/j.rcim.2007.01.005
40.
Li
,
S.
, and
Mirhosseini
,
M.
,
2012
, “
A Matrix-Based Modularization Approach for Supporting Secure Collaboration in Parametric Design
,”
Comput. Ind.
,
63
(
6
), pp.
619
631
.10.1016/j.compind.2012.04.003
41.
Yu
,
Z. Q.
,
Horace
,
H. S.
, and
Kwok
,
L. F.
,
2003
, “
A Robust Watermarking Scheme for 3D Triangular Mesh Models
,”
Pattern Recognit.
,
36
(
11
), pp.
2603
2614
.10.1016/S0031-3203(03)00086-4
42.
Cayre
,
F.
,
Alface
,
P. R.
,
Schmitt
,
F.
,
Macq
,
B.
, and
Maitre
,
H.
,
2003
, “
Application of Spectral Decomposition to Compression and Watermarking of 3D Triangle Mesh Geometry
,”
Signal Process.
,
18
(
4
), pp.
309
319
.10.1016/S0923-5965(02)00147-9
43.
Newbould
,
R. D.
,
Irby
,
D. L.
,
Carothers
,
J. D.
,
Rodríguez
,
J. J.
, and
Holman
,
W. T.
,
2003
, “
Mixed Signal Design Watermarking for IP Protection
,”
Integr. Comput. Aided Eng.
,
10
(
3
), pp.
249
265
.
44.
Chou
,
C. M.
, and
Tseng
,
D. C.
,
2006
, “
A Public Fragile Watermarking Scheme for 3D Model Authentication
,”
Comput. Aided Des.
,
38
(
11
), pp.
1154
1165
.10.1016/j.cad.2006.06.009
45.
Lee
,
S. H.
, and
Kwon
,
K. R.
,
2007
, “
A Watermarking for 3D Mesh Using the Patch CEGIs
,”
Digital Signal Process.
,
17
(
2
), pp.
396
413
.10.1016/j.dsp.2005.04.014
46.
Wang
,
W. B.
,
Zheng
,
G. Q.
,
Yong
,
J. H.
, and
Gu
,
H.-J.
,
2008
, “
A Numerically Stable Fragile Watermarking Scheme for Authenticating 3D Models
,”
Comput. Aided Des.
,
40
(
5
), pp.
634
645
.10.1016/j.cad.2008.03.001
47.
Ai
,
Q. S.
,
Liu
,
Q.
,
Zhou
,
Z. D.
,
Yang
,
L.
, and
Xie
,
S. Q.
,
2009
, “
A New Digital Watermarking Scheme for 3D Triangular Mesh Models
,”
Signal Process.
,
89
(
11
), pp.
2159
2170
.10.1016/j.sigpro.2009.04.031
48.
Lee
,
S. H.
, and
Kwon
,
K. R.
,
2010
, “
CAD Drawing Watermarking Scheme
,”
Digital Signal Process.
,
20
(
5
), pp.
1379
1399
.10.1016/j.dsp.2010.01.003
49.
Peng
,
F.
,
Lei
,
Y. Z.
,
Long
,
M.
, and
Sun
,
X.-M.
,
2011
, “
A Reversible Watermarking Scheme for Two-Dimensional CAD Engineering Graphics Based on Improved Difference Expansion
,”
Comput. Aided Des.
,
43
(
8
), pp.
1018
1024
.10.1016/j.cad.2011.03.011
50.
Lee
,
S. H.
, and
Kwon
,
K. R.
,
2012
, “
Robust 3D Mesh Model Hashing Based on Feature Object
,”
Digital Signal Process.
,
22
(5), pp.
744
759
.10.1016/j.dsp.2012.04.015
51.
Su
,
Z. Y.
,
Li
,
W. Q.
,
Kong
,
J. S.
,
Dai
,
Y.
, and
Tang
,
W.
,
2013
, “
Watermarking 3D CAPD Models for Topology Verification
,”
Comput. Aided Des.
,
45
(
7
), pp.
1042
1052
.10.1016/j.cad.2013.04.001
52.
Naveen
,
K. N.
, and
Thomas
,
J. N.
,
2011
, “
Flexible Optical Encryption With Multiple Users and Multiple Security Levels
,”
Opt. Commun.
,
284
(
3
), pp.
735
739
.10.1016/j.optcom.2010.09.065
53.
Shannon
,
C. E.
,
1949
, “
Communication Theory of Secrecy Systems
,”
Bell Syst. Tech. J.
,
28
(
4
), pp.
656
715
.10.1002/j.1538-7305.1949.tb00928.x
54.
Diffie
,
W.
, and
Hellman
,
M. E.
,
1976
, “
New Directions in Cryptography
,”
IEEE Trans. Inf. Theory
,
22
(
6
), pp.
644
655
.10.1109/TIT.1976.1055638
55.
Rajput
,
S. K.
, and
Nishchal
,
N. K.
,
2013
, “
Known-Plaintext Attack on Encryption Domain Independent Optical Asymmetric Crypto System
,”
Opt. Commun.
,
309
, pp.
231
235
.10.1016/j.optcom.2013.06.036
56.
Barrera
,
J. F.
,
Vargas
,
C.
,
Tebaldi
,
M.
, and
Torroba
,
R.
,
2010
, “
Chosen-Plaintext Attack on a Joint Transform Correlate or Encrypting System
,”
Opt. Commun.
,
283
(
20
), pp.
3917
3921
.10.1016/j.optcom.2010.06.009
57.
Tang
,
M.
,
Lee
,
M.
, and
Kim
,
Y. J.
,
2009
, “
Interactive Hausdorff Distance Computation for General Polygonal Models
,”
ACM Trans. Graphics
,
28
(
3
).10.1145/1531326.1531380
58.
Chen
,
X. D.
,
Ma
,
W. Y.
,
Xu
,
G.
, and
Paul
,
J.-C.
,
2010
, “
Computing the Hausdorff Distance Between Two B-Spline Curves
,”
Comput. Aided Des.
,
42
(
12
), pp.
1197
1206
.10.1016/j.cad.2010.06.009
59.
Jing
,
S. X.
,
He
,
F. Z.
,
Han
,
S. H.
,
Li
,
X. X.
, and
Cai
,
X. T.
,
2009
, “
A Method for Topological Entity Correspondence in a Replicated Collaborative CAD System
,”
Comput. Ind.
,
60
(
7
), pp.
467
475
.10.1016/j.compind.2009.02.005
60.
Li
,
X. X.
,
He
,
F. Z.
,
Cai
,
X. T.
,
Zhang
,
D.
, and
Chen
,
Y.
,
2013
, “
A Method for Topological Entity Matching in the Integration of Heterogeneous CAD Systems
,”
Integr. Comput. Aided Eng.
,
20
(
1
), pp.
15
30
.
You do not currently have access to this content.