SECURE COLLABORATION IN ENGINEERING SYSTEMS DESIGN

被引:0
|
作者
Wang, Shumiao [1 ]
Bhandari, Siddharth [1 ]
Atallah, Mikhail [1 ]
Panchal, Jitesh H. [1 ]
Ramani, Karthik [1 ]
机构
[1] Purdue Univ, W Lafayette, IN 47907 USA
关键词
Co-design; privacy preserving; secure collaboration; engineering design; simulation;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The goal in this paper is to enable collaboration in the co-design of engineering artifacts when participants are reluctant to share their design-related confidential and proprietary information with other co-designers, even though such information is needed to analyze and validate the overall design. We demonstrate the practicality of co-design by multiple entities who view the parameters of their contributions to the joint design to be confidential. In addition to satisfying this confidentiality requirement, an online co-design process must result in a design that is of the same quality as if full sharing of information had taken place between the co-designers. We present online co-design protocols that satisfy both requirements, and demonstrate their practicality using a simple example of co-design of an automotive suspension system and the tires. Our protocols do not use any cryptographic primitives they only use the kinds of mathematical operations that are currently used in single-designer situations. The participants in the online design protocols include the co-designers, and a cloud server that facilitates the process while learning nothing about the participants' confidential information or about the characteristics of the co-designed system. The only assumption made about this cloud server is that it does not collude with some participants against other participants. We do not' assume that the server does not, on its own, attempt to compute as much information as it can about the confidential inputs and outputs of the co-design process: It can make a transcript of the protocol and later attempt to infer all possible information from it, so it is a feature of our protocols the cloud server can infer nothing from such a transcript.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Secure Collaboration in Engineering Systems Design
    Wang, Shumiao
    Bhandari, Siddharth
    Chaduvula, Siva Chaitanya
    Atallah, Mikhail J.
    Panchal, Jitesh H.
    Ramani, Karthik
    [J]. JOURNAL OF COMPUTING AND INFORMATION SCIENCE IN ENGINEERING, 2017, 17 (04)
  • [2] Analysis of Systems Security Engineering Design Principles for the Development of Secure and Resilient Systems
    Beach, Paul M.
    Mailloux, Logan O.
    Langhals, Brent T.
    Mills, Robert F.
    [J]. IEEE ACCESS, 2019, 7 : 101741 - 101757
  • [3] Specification of secure distributed collaboration systems
    Tripathi, AR
    Ahmed, T
    Kumar, R
    [J]. ISADS 2003: SIXTH INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS, PROCEEDINGS, 2003, : 149 - 156
  • [4] Secure Design of Engineering Software Tools in Industrial Automation and Control Systems
    Hristova, Ana
    Obermeier, Sebastian
    Schlegel, Roman
    [J]. 2013 11TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2013, : 695 - 700
  • [5] SoSPa: A System of Security Design Patterns for Systematically Engineering Secure Systems
    Nguyen, Phu H.
    Yskout, Koen
    Heyman, Thomas
    Klein, Jacques
    Scandariato, Riccardo
    Le Traon, Yves
    [J]. 2015 ACM/IEEE 18TH INTERNATIONAL CONFERENCE ON MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS (MODELS), 2015, : 246 - 255
  • [6] Special Issue on the Design and Engineering of Cryptographic Solutions for Secure Information Systems
    Elci, Atilla
    Pieprzyk, Josef
    Orgun, Mehmet A.
    Chefranov, Alexander
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (01) : 33 - 35
  • [7] Special issue on the Design and Engineering of Cryptographic Solutions for Secure Information Systems
    Elci, Atilla
    Pieprzyk, Josef
    Orgun, Mehmet A.
    Chefranov, Alexander
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (04) : e1 - e2
  • [8] Engineering Secure Systems Introduction
    Irvine, Cynthia E.
    Rao, J. R.
    [J]. IEEE SECURITY & PRIVACY, 2011, 9 (01) : 18 - 21
  • [9] Secure collaboration in design and supply chain management
    Zeng, Yong
    Wang, Lingyu
    [J]. COMPUTERS IN INDUSTRY, 2012, 63 (06) : 543 - 544
  • [10] SECURE SYSTEMS DESIGN
    Van Doorn, Leendert
    [J]. 2014 IEEE HOT CHIPS 26 SYMPOSIUM (HCS), 2014,