DOI QR코드

DOI QR Code

Multiple Layer File Format for Safe Collaborative Design

안전한 협업 디자인 작업을 위한 다중 레이어 파일 포맷

  • Kim, Kichang (School of Information and Communication Engineering, Inha University) ;
  • Yoo, Sang Bong (School of Computer and Information Engineering, Inha University)
  • Received : 2013.02.14
  • Accepted : 2013.10.11
  • Published : 2013.11.30

Abstract

A design file can get larger in size as the complexity of the target object increases. A large design file may reside in a large parallel computing system, such as cloud computing systems, and many designers may work concurrently on the same design file. In such a case, it is obvious that we need some kind of protection mechanism so that each user can access only the area of the file he or she is entitled to. Two approaches can be taken for this problem: one is the traditional access control mechanisms and the other encryption techniques. We take the latter approach to ensure the safety of the file even in public domain such as clouding systems, and in this paper, we suggest an encryption scheme for a file where the file is encrypted in multi-layer so that each user is allowed to access the file only at the layer for which the user has the proper access right. Each layer of the file is encrypted with different keys and these keys are exposed only to those who have the right access permit. The paper explains the necessary file format to achieve this goal and discusses the file manipulation functions to handle this new file format.

타겟 오브젝트의 복잡도가 높아질수록 디자인 파일의 사이즈도 커질 것이다. 이러한 큰 파일은 클라우드 시스템 같은 거대한 병렬 저장 시스템에 저장되고 수많은 디자이너들이 동시에 이 파일에 접속하여 디자인 작업을 수행하게 될 것이다. 이러한 경우 필연적으로 각 사용자가 정해진 파일 내 위치에서만 작업하도록 하는 제어 장치가 필요하게 될 것이다. 이 제어 장치에는 두 가지 접근 방법이 가능하다. 하나는 Role-Based Access Control(RBAC) 등의 전통적인 접근 제어 방법이고 다른 하나는 암호화 방법이다. 본 논문은 두 번째 방법을 택하되 파일이 각 레이어에 따라 다르게 암호화 되어 각 사용자가 자신의 레이어에서만 작업을 할 수 있도록 하는 기법을 제안하고 있다. 파일의 각 레이어의 키 역시 그 레이어를 접근할 수 있는 사용자만 복호화할 수 있는 형태로 암호화되어 저장된다. 본 논문은 이러한 목표를 이루기 위한 파일 포맷을 제시하며 그 파일을 다룰 수 있는 API 함수를 제시하고 설명한다.

Keywords

References

  1. Ausanka-Cures, R., "Methods for Access Control : Advances and Limitations," http:// www.cs.hmc.edu/~mike/public_html/ courses/security/s06/projects/ryan.pdf
  2. Baek, S. I., Shin, J. Y., Kim, J. W., "Exploring the Korean Government Policies for Cloud Computing Service," The Journal of Society for e-Business Studies, Vol. 18, No. 3, pp. 1-15, 2013. https://doi.org/10.7838/jsebs.2013.18.3.001
  3. Bertram, S., Boniface, M. Surridge, M., Briscombe, N., Hall-May, M., "On-Demand Dynamic Security for Risk-Based secure Collaboration in Clouds," In the proceedings of Could Computing, 2010 IEEE 3rd International Conference, 2010.
  4. Cera, C. D., Kim, T., Han, J. H., Regli, W. C., "Role-based viewing envelopes for information protection in collaborative modeling," Computer-Aided Design Vol. 36, pp. 873-996, 2004. https://doi.org/10.1016/j.cad.2003.09.014
  5. Chadwick, D. W., Otenko, O. A., "The PE RMIS X. 509 role based privilege management infrastructure," Future Gener. Compt. Syst. Vol. 19, No. 2, pp. 277-248, 2003. https://doi.org/10.1016/S0167-739X(02)00153-X
  6. Chen, T. Y., Chen, Y. M., Chu, H. C. "Developing a trust evaluation method between co-workders in virtual project team for enabling resource sharing and collaboration," Computers in Industry, Vol. 59, No. 6, pp. 565-579, 2008. https://doi.org/10.1016/j.compind.2008.01.001
  7. Folk, M., Heber, G., Koziol, Q., Pourmal, E., Robinson, D., "An overview of the HDF5 technology suite and its applications," Proceedings of the EDBT/ICDT 2011 Workshop on Array Databases, pp. 36-47, 2011.
  8. Halcrow, M. A., "eCryptfs : An Enterprise- class Cryptographic Filesystem for Linux," http://ecryptfs.sourceforge.net/ ecryptfs.pdf.
  9. Hauck, S., Knol, S., "Data security for Web-based CAD," Proceedings of the 35th annual Design Automation Conference, pp. 788-793, 1998.
  10. Kim, D. H., Lee, J. H., Park, Y., P., "A Study of Factors Affecting the Adoption of Cloud Computing," The Journal of Society for e-Business Studies, Vol. 17, No. 1, pp. 111-136, February 2012. https://doi.org/10.7838/jsebs.2012.17.1.111
  11. Kuhn, D. R., Coyne, E. J., Weil, T. R., "Adding Attributes to Role-Based Access Control," Computer Vol. 43, No. 6, pp. 79-81, June 2010.
  12. LK Soft Ware GmbH, www.lksoft.com
  13. SCRA, STEP Application Handbook ISO 10303, North Charleston, SC, 30 2006, available at http://www.uspro.org/documents/ STEP_application_hdbk_63006_ BF.pdf.
  14. STEP Tools, Inc., http://www.steptools. com/demos/.
  15. Wang, G., Liu, Q., Wu, M., Guo, M., "Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers," Compters and Security Vol. 30, pp. 320-331, 2011. https://doi.org/10.1016/j.cose.2011.05.006
  16. Wang, Y., Ajoku, P. N., Brustoloni, J. C., Nnaji, B. O., "Intellectual Property Protection in Collaborative Design through Learn Information Modeling and Sharing," Journal of Computing and Information Science in Engineering, Vol. 6, pp. 149-159, 2006. https://doi.org/10.1115/1.2190235
  17. Wong, A., Bishop, W., "intelligent multilevel regions-of-interest(ROI) document image encryption using an online learning model," proceedings of the Fourth conference on IASTED International conference, 2007.
  18. Yuan, Chun., Zhu, Bin. B., Su, Ming., Wang, Xiaoming., Li, Shipeng., Zhong, Yuzhuo. "Layered Access Control for MPEG-4FGS Video," Proceedings of Image Processing, 2003.
  19. Zeng, Y., Wang, L., Deng, X., Cao, X., Khundker, N., "Secure collaboration in global design and supply chain environment : Problem analysis and literature review," Computers in Industry, Vol. 63, No. 6, Auguset pp. 545-556, 2012. https://doi.org/10.1016/j.compind.2012.05.001
  20. http://www.nsa.gov/ia/_files/support/ Cloud_Computing_Guidance.pdf.