Information leakage can lead to loss of intellectual property and competitive edge. One of the primary sources of information leakage in collaborative design is sharing confidential information with collaborators, who may be also collaborating with competitors. Hiding information from collaborators is challenging in codesign because it can lead to inferior and suboptimal solutions. Therefore, there is a need for techniques that enable designers to protect confidential information from their collaborators while achieving solutions that are as good as those obtained when full information is shared. To address this need, we propose a secure codesign (SCD) framework that enables designers to achieve optimal solutions without sharing confidential information. It is built on two principles: adding/multiplying a parameter with a large random number hides the value of the parameter, and adding/multiplying a large number is orders of magnitude faster than using existing cryptographic techniques. Building on the protocols for basic arithmetic computations, developed in our earlier work, we establish protocols for higher order computations involved in design problems. The framework is demonstrated using three codesign scenarios: requirements-driven codesign, objective-driven codesign, and Nash noncooperation. We show that the proposed SCD framework enables designers to achieve optimal solutions in all three scenarios. The proposed framework is orders of magnitude faster than competing (but impractical for engineering design) cryptographic methods such as homomorphic encryption, without compromising on precision in computations. Hence, the proposed SCD framework is a practical approach for maintaining confidentiality of information during codesign.

References

1.
Ulrich
,
K. T.
,
2003
,
Product Design and Development
,
Tata McGraw-Hill Education
, Boston, MA.
2.
Agrawal
,
D.
,
2008
, “Product Data Security and Access Management,”
UGS Connection Americas
, Plano, TX, May 12.http://www-cad.fnal.gov/PLMWorld2008/Teamcenter%20Engineering/Product%2520Data%2520Security%2520and%2520Access%2520Management-Dilip%2520Agrawal.pdf
3.
Vázquez
,
B. A. H.
,
2006
,
When Your Contract Manufacturer Becomes Your Competitor
,
Harvard Business Review
, Brighton, MA.
4.
Lewis
,
K.
, and
Mistree
,
F.
,
1997
, “
Modeling Interactions in Multidisciplinary Design: A Game Theoretic Approach
,”
AIAA J.
,
35
(
8
), pp.
1387
1392
.
5.
Cera
,
C. D.
,
Braude
,
I.
,
Kim
,
T.
,
Han
,
J.
, and
Regli
,
W. C.
,
2005
, “
Hierarchical Role-Based Viewing for Multilevel Information Security in Collaborative CAD
,”
ASME J. Comput. Inf. Sci. Eng.
,
6
(
1
), pp.
2
10
.
6.
Wang
,
Y.
,
Ajoku
,
P. N.
,
Brustoloni
,
J. C.
, and
Nnaji
,
B. O.
,
2006
, “
Intellectual Property Protection in Collaborative Design Through Lean Information Modeling and Sharing
,”
ASME J. Comput. Inf. Sci. Eng.
,
6
(
2
), pp.
149
159
.
7.
Cera
,
C. D.
,
Kim
,
T.
,
Han
,
J.
, and
Regli
,
W. C.
,
2004
, “
Role-Based Viewing Envelopes for Information Protection in Collaborative Modeling
,”
Comput.-Aided Des.
,
36
(
9
), pp.
873
886
.
8.
Sweeney
,
L.
,
2002
, “
Achieving k-Anonymity Privacy Protection Using Generalization and Suppression
,”
Int. J. Uncertainty, Fuzziness Knowl.-Based Syst.
,
10
(
5
), pp.
571
588
.
9.
Zhang
,
D. Y.
,
Zeng
,
Y.
,
Wang
,
L.
,
Li
,
H.
, and
Geng
,
Y.
,
2011
, “
Modeling and Evaluating Information Leakage Caused by Inferences in Supply Chains
,”
Comput. Ind.
,
62
(
3
), pp.
351
363
.
10.
Mascetti
,
S.
,
Bettini
,
C.
,
Freni
,
D.
,
Wang
,
X. S.
, and
Jajodia
,
S.
,
2009
, “
Privacy-Aware Proximity Based Services
,”
Tenth International Conference on Mobile Data Management: Systems, Services and Middleware
(
MDM'09
), Taipei, Taiwan, May 18–20, pp.
31
40
.
11.
Panchal
,
J. H.
,
Fernandez
,
M. G.
,
Paredis
,
C. J. J.
,
Allen
,
J. K.
, and
Mistree
,
F.
,
2007
, “
An Interval-Based Constraint Satisfaction (IBCS) Method for Decentralized, Collaborative Multifunctional Design
,”
Concurrent Eng.
,
15
(
3
), pp.
309
323
.
12.
Liker
,
J.
,
Sobek
,
D.
,
Ward
,
A.
, and
Cristiano
,
J.
,
1996
, “
Involving Suppliers in Product Development in the United States and Japan: Evidence for Set-Based Concurrent Engineering
,”
IEEE Trans. Eng. Manage.
,
43
(
2
), pp.
165
178
.
13.
Pels
,
H. J.
,
2006
, “
Federated Product Data Management in Multi-Company Projects
,”
Advances in Design
,
Springer
, London, pp.
281
291
.
14.
Da Yong Zhang
,
L. W.
, and
Zeng
,
Y.
, “Secure Collaborative Product Development: A Literature Review,” International Conference on Product Life Cycle Management (PLM'08), Seoul, South Korea, July 11–13, pp. 331–340.
15.
Domingo-Ferrer
,
J.
,
Sebé
,
F.
, and
Castella-Roca
,
J.
,
2004
, “
On the Security of Noise Addition for Privacy in Statistical Databases
,”
International Workshop on Privacy in Statistical Databases
, Barcelona, Spain, June 9–11, pp.
149
161
.
16.
Pibernik
,
R.
,
Zhang
,
Y.
,
Kerschbaum
,
F.
, and
Schröpfer
,
A.
,
2011
, “
Secure Collaborative Supply Chain Planning and Inverse Optimization–The Jels Model
,”
Eur. J. Oper. Res.
,
208
(
1
), pp.
75
85
.
17.
Choi
,
Y.
,
Kim
,
K.
, and
Kim
,
C.
,
2005
, “
A Design Chain Collaboration Framework Using Reference Models
,”
Int. J. Adv. Manuf. Technol.
,
26
(
1–2
), pp.
183
190
.
18.
Liu
,
W.
, and
Zeng
,
Y.
,
2009
, “
Conceptual Modeling of Design Chain Management Towards Product Lifecycle Management
,”
Global Perspective for Competitive Enterprise, Economy and Ecology
, Springer, London, pp.
137
148
.
19.
Sun
,
X.
,
Zeng
,
Y.
, and
Liu
,
W.
,
2013
, “
Formalization of Design Chain Management Using Environment-Based Design (EBD) Theory
,”
J. Intell. Manuf.
,
24
(3), pp. 597–612.
20.
Weber
,
L.
, and
Mayer
,
K. J.
,
2011
, “
Designing Effective Contracts: Exploring the Influence of Framing and Expectations
,”
Acad. Manage. Rev.
,
36
(
1
), pp.
53
75
.
21.
Blakley
,
G. R.
,
1979
, “
Safeguarding Cryptographic Keys
,”
National Computer Conference
, New York, June 4–7, pp.
313
317
.
22.
Menezes
,
A. J.
,
Van Oorschot
,
P. C.
, and
Vanstone
,
S. A.
,
1996
,
Handbook of Applied Cryptography
,
CRC Press
, Boca Raton, FL.
23.
Chen
,
Y.-F.
,
Chan
,
Y.-K.
,
Huang
,
C.-C.
,
Tsai
,
M.-H.
, and
Chu
,
Y.-P.
,
2007
, “
A Multiple-Level Visual Secret-Sharing Scheme Without Image Size Expansion
,”
Inf. Sci.
,
177
(
21
), pp.
4696
4710
.
24.
Lee
,
J. Y.
,
Lee
,
J.-H.
,
Kim
,
H.
, and
Kim
,
H.-S.
,
2004
, “
A Cellular Topology-Based Approach to Generating Progressive Solid Models From Feature-Centric Models
,”
Comput.-Aided Des.
,
36
(
3
), pp.
217
229
.
25.
Lee
,
S. H.
,
2005
, “
A CAD–CAE Integration Approach Using Feature-Based Multi-Resolution and Multi-Abstraction Modelling Techniques
,”
Comput.-Aided Des.
,
37
(
9
), pp.
941
955
.
26.
Cai
,
X.
,
He
,
F.
,
Li
,
W.
,
Li
,
X.
, and
Wu
,
Y.
,
2013
, “
Multi-Granularity Partial Encryption Method of Cad Model
,”
17th International Conference on Computer Supported Cooperative Work in Design
(
CSCWD
), Whistler, BC, Canada, June 27–29, pp.
23
30
.
27.
Atallah
,
M.
,
Blanton
,
M.
,
Deshpande
,
V.
,
Frikken
,
K.
,
Li
,
J.
, and
Schwarz
,
L.
, 2006. “
Secure Collaborative Planning, Forecasting, and Replenishment (Scpfr)
,”
Multi-Echelon/Public Applications of Supply Chain Management Conference
, pp. 165–180.
28.
Wang
,
S.
,
Bhandari
,
S.
,
Chaduvula
,
S. C.
,
Atallah
,
M. J.
,
Panchal
,
J. H.
, and
Ramani
,
K.
,
2017
, “
Secure Collaboration in Engineering Systems Design
,”
ASME J. Comput. Inf. Sci. Eng.
,
17
(
4
), p.
041010
.
29.
Wang
,
S.
,
Nassar
,
M.
,
Atallah
,
M. J.
, and
Malluhi
,
Q. M.
,
2013
, “
Secure and Private Outsourcing of Shape-Based Feature Extraction
,”
International Conference on Information and Communication Systems
, Beijing, China, Nov. 20–22, pp.
90
99
.
30.
Martins
,
J. R.
, and
Lambe
,
A. B.
,
2013
, “
Multidisciplinary Design Optimization: A Survey of Architectures
,”
AIAA J.
,
51
(
9
), pp.
2049
2075
.
31.
Lewis, K., and Mistree, F., 1998, “
Collaborative, Sequential, and Isolated Decisions in Design
,”
ASME J. Mech. Des.
,
120
(4), pp. 643–652.
32.
Save
,
M.
, and
Prager
,
W.
,
1990
,
Structural Optimization: Volume 2: Mathematical Programming
, Vol.
40
,
Springer Science & Business Media
, New York.
33.
Rao
,
S. S.
, and
Rao
,
S.
,
2009
,
Engineering Optimization: Theory and Practice
,
Wiley
, Hoboken, NJ.
34.
Duffin
,
R. J.
,
Peterson
,
E. L.
, and
Zener
,
C.
,
1967
,
Geometric Programming: Theory and Application
,
Wiley
,
New York
.
35.
Hernandez
,
G.
,
Seepersad
,
C. C.
,
Allen
,
J. K.
, and
Mistree
,
F.
,
2002
, “
A Method for Interactive Decision-Making in Collaborative, Distributed Engineering Design
,”
Int. J. Agile Manuf. Syst.
,
5
(
2
), pp.
47
65
.https://pdfs.semanticscholar.org/039c/697f153c181b681958329e665de9acc6342a.pdf
36.
Bradie
,
B.
,
2006
,
A Friendly Introduction to Numerical Analysis
,
Prentice Hall
, Upper Saddle River,
NJ
.
37.
Paillier
,
P.
,
1999
, “
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
,”
International Conference on the Theory and Applications of Cryptographic Techniques
, Prague, Czech Republic, May 2–6, pp.
223
238
.
You do not currently have access to this content.