Browse > Article
http://dx.doi.org/10.7838/jsebs.2013.18.4.045

Multiple Layer File Format for Safe Collaborative Design  

Kim, Kichang (School of Information and Communication Engineering, Inha University)
Yoo, Sang Bong (School of Computer and Information Engineering, Inha University)
Publication Information
The Journal of Society for e-Business Studies / v.18, no.4, 2013 , pp. 45-65 More about this Journal
Abstract
A design file can get larger in size as the complexity of the target object increases. A large design file may reside in a large parallel computing system, such as cloud computing systems, and many designers may work concurrently on the same design file. In such a case, it is obvious that we need some kind of protection mechanism so that each user can access only the area of the file he or she is entitled to. Two approaches can be taken for this problem: one is the traditional access control mechanisms and the other encryption techniques. We take the latter approach to ensure the safety of the file even in public domain such as clouding systems, and in this paper, we suggest an encryption scheme for a file where the file is encrypted in multi-layer so that each user is allowed to access the file only at the layer for which the user has the proper access right. Each layer of the file is encrypted with different keys and these keys are exposed only to those who have the right access permit. The paper explains the necessary file format to achieve this goal and discusses the file manipulation functions to handle this new file format.
Keywords
Multiple Layer Encryption; Collaborative Design; Access Control; Object Tree; File Format;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Ausanka-Cures, R., "Methods for Access Control : Advances and Limitations," http:// www.cs.hmc.edu/~mike/public_html/ courses/security/s06/projects/ryan.pdf
2 Baek, S. I., Shin, J. Y., Kim, J. W., "Exploring the Korean Government Policies for Cloud Computing Service," The Journal of Society for e-Business Studies, Vol. 18, No. 3, pp. 1-15, 2013.   과학기술학회마을   DOI   ScienceOn
3 Bertram, S., Boniface, M. Surridge, M., Briscombe, N., Hall-May, M., "On-Demand Dynamic Security for Risk-Based secure Collaboration in Clouds," In the proceedings of Could Computing, 2010 IEEE 3rd International Conference, 2010.
4 Cera, C. D., Kim, T., Han, J. H., Regli, W. C., "Role-based viewing envelopes for information protection in collaborative modeling," Computer-Aided Design Vol. 36, pp. 873-996, 2004.   DOI   ScienceOn
5 Chadwick, D. W., Otenko, O. A., "The PE RMIS X. 509 role based privilege management infrastructure," Future Gener. Compt. Syst. Vol. 19, No. 2, pp. 277-248, 2003.   DOI   ScienceOn
6 Chen, T. Y., Chen, Y. M., Chu, H. C. "Developing a trust evaluation method between co-workders in virtual project team for enabling resource sharing and collaboration," Computers in Industry, Vol. 59, No. 6, pp. 565-579, 2008.   DOI   ScienceOn
7 Folk, M., Heber, G., Koziol, Q., Pourmal, E., Robinson, D., "An overview of the HDF5 technology suite and its applications," Proceedings of the EDBT/ICDT 2011 Workshop on Array Databases, pp. 36-47, 2011.
8 Halcrow, M. A., "eCryptfs : An Enterprise- class Cryptographic Filesystem for Linux," http://ecryptfs.sourceforge.net/ ecryptfs.pdf.
9 Hauck, S., Knol, S., "Data security for Web-based CAD," Proceedings of the 35th annual Design Automation Conference, pp. 788-793, 1998.
10 Kim, D. H., Lee, J. H., Park, Y., P., "A Study of Factors Affecting the Adoption of Cloud Computing," The Journal of Society for e-Business Studies, Vol. 17, No. 1, pp. 111-136, February 2012.   DOI   ScienceOn
11 Kuhn, D. R., Coyne, E. J., Weil, T. R., "Adding Attributes to Role-Based Access Control," Computer Vol. 43, No. 6, pp. 79-81, June 2010.
12 LK Soft Ware GmbH, www.lksoft.com
13 SCRA, STEP Application Handbook ISO 10303, North Charleston, SC, 30 2006, available at http://www.uspro.org/documents/ STEP_application_hdbk_63006_ BF.pdf.
14 STEP Tools, Inc., http://www.steptools. com/demos/.
15 Wang, G., Liu, Q., Wu, M., Guo, M., "Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers," Compters and Security Vol. 30, pp. 320-331, 2011.   DOI   ScienceOn
16 Zeng, Y., Wang, L., Deng, X., Cao, X., Khundker, N., "Secure collaboration in global design and supply chain environment : Problem analysis and literature review," Computers in Industry, Vol. 63, No. 6, Auguset pp. 545-556, 2012.   DOI   ScienceOn
17 Wang, Y., Ajoku, P. N., Brustoloni, J. C., Nnaji, B. O., "Intellectual Property Protection in Collaborative Design through Learn Information Modeling and Sharing," Journal of Computing and Information Science in Engineering, Vol. 6, pp. 149-159, 2006.   DOI   ScienceOn
18 Wong, A., Bishop, W., "intelligent multilevel regions-of-interest(ROI) document image encryption using an online learning model," proceedings of the Fourth conference on IASTED International conference, 2007.
19 Yuan, Chun., Zhu, Bin. B., Su, Ming., Wang, Xiaoming., Li, Shipeng., Zhong, Yuzhuo. "Layered Access Control for MPEG-4FGS Video," Proceedings of Image Processing, 2003.
20 http://www.nsa.gov/ia/_files/support/ Cloud_Computing_Guidance.pdf.