Multiple Layer File Format for Safe Collaborative Design

Kichang Kim, Sang Bong Yoo

Abstract


A design file can get larger in size as the complexity of the target object increases. A large design file may reside in a large parallel computing system, such as cloud computing systems, and many designers may work concurrently on the same design file. In such a case, it is obvious that we need some kind of protection mechanism so that each user can access only the area of the file he or she is entitled to. Two approaches can be taken for this problem: one is the traditional access control mechanisms and the other encryption techniques. We take the latter approach to ensure the safety of the file even in public domain such as clouding systems, and in this paper, we suggest an encryption scheme for a file where the file is encrypted in multi-layer so that each user is allowed to access the file only at the layer for which the user has the proper access right. Each layer of the file is encrypted with different keys and these keys are exposed only to those who have the right access permit. The paper explains the necessary file format to achieve this goal and discusses the file manipulation functions to handle this new file format.


Full Text:

PDF

References


Ausanka-Cures, R., “Methods for Access Control:Advances and Limitations,” http:// www.cs.hmc.edu/~mike/public_html/ courses/security/s06/projects/ryan.pdf

Baek, S. I., Shin, J. Y., Kim, J. W., “Exploring the Korean Government Po- licies for Cloud Computing Service,” The Journal of Society for e-Business St- udies, Vol. 18, No. 3, pp. 1-15, 2013.

Bertram, S., Boniface, M. Surridge, M., Briscombe, N., Hall-May, M., “On-Demand Dynamic Security for Risk-Based secure Collaboration in Clouds,” In the proceedings of Could Computing, 2010 IEEE 3rd International Conference, 2010.

Cera, C. D., Kim, T., Han, J. H., Regli, W. C., “Role-based viewing envelopes for information protection in collaborative modeling,” Computer-Aided Design Vol. 36, pp. 873-996, 2004.

Chadwick, D. W., Otenko, O. A., “The PE RMIS X. 509 role based privilege ma- nagement infrastructure,” Future Gener. Compt. Syst. Vol. 19, No. 2, pp. 277-248, 2003.

Chen, T. Y., Chen, Y. M., Chu, H. C. “De- veloping a trust evaluation method between co-workders in virtual project team for enabling resource sharing and collaboration,” Computers in Industry, Vol. 59, No. 6, pp. 565-579, 2008.

Folk, M., Heber, G., Koziol, Q., Pourmal, E., Robinson, D., “An overview of the HDF5 technology suite and its applications,” Proceedings of the EDBT/ICDT 2011 Workshop on Array Databases, pp. 36-47, 2011.

Halcrow, M. A., “eCryptfs : An Enter- prise-class Cryptographic Filesystem for Linux,”http://ecryptfs.sourceforge.net/ ecryptfs.pdf.

Hauck, S., Knol, S., “Data security for Web-based CAD,” Proceedings of the 35th annual Design Automation Con- ference, pp. 788-793, 1998.

Kim, D. H., Lee, J. H., Park, Y., P., “A Study of Factors Affecting the Adoption of Cloud Computing,” The Journal of Society for e-Business Studies, Vol. 17, No. 1, pp. 111-136, February 2012.

Kuhn, D. R., Coyne, E. J., Weil, T. R., “Adding Attributes to Role-Based Access Control,” Computer Vol. 43, No. 6, pp. 79-81, June 2010.

LK Soft Ware GmbH, www.lksoft.com

SCRA, STEP Application Handbook ISO 10303, North Charleston, SC, 30 2006, available at http://www.uspro.org/documents/STEP_application_hdbk_63006_ BF.pdf.

STEP Tools, Inc., http://www.steptools. com/demos/.

Wang, G., Liu, Q., Wu, M., Guo, M., “Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers,” Compters and Security Vol. 30, pp. 320-331, 2011.

Wang, Y., Ajoku, P. N., Brustoloni, J. C., Nnaji, B. O., “Intellectual Property Pro- tection in Collaborative Design through Learn Information Modeling and Sha- ring,” Journal of Computing and Infor- mation Science in Engineering, Vol. 6, pp. 149-159, 2006.

Wong, A., Bishop, W., “intelligent multi- level regions-of-interest(ROI) document image encryption using an online learning model,” proceedings of the Fourth conference on IASTED International conference, 2007.

Yuan, Chun., Zhu, Bin. B., Su, Ming., Wang, Xiaoming., Li, Shipeng., Zhong, Yuzhuo. “Layered Access Control for MPEG-4FGS Video,” Proceedings of Image Processing, 2003.

Zeng, Y., Wang, L., Deng, X., Cao, X., Khundker, N., “Secure collaboration in global design and supply chain environment : Problem analysis and literature review,” Computers in Industry, Vol. 63, No. 6, Auguset pp. 545-556, 2012.

http://www.nsa.gov/ia/_files/support/Cloud_Computing_Guidance.pdf.


Refbacks

  • There are currently no refbacks.