{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T14:51:01Z","timestamp":1761490261110,"version":"3.41.2"},"reference-count":18,"publisher":"ASME International","issue":"4","funder":[{"DOI":"10.13039\/100000083","name":"Directorate for Computer and Information Science and Engineering","doi-asserted-by":"publisher","award":["1329979"],"award-info":[{"award-number":["1329979"]}],"id":[{"id":"10.13039\/100000083","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["939370"],"award-info":[{"award-number":["939370"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["915436"],"award-info":[{"award-number":["915436"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000147","name":"\"Division of Civil, Mechanical and Manufacturing Innovation\"","doi-asserted-by":"publisher","award":["1265622"],"award-info":[{"award-number":["1265622"]}],"id":[{"id":"10.13039\/100000147","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100008982","name":"Qatar National Research Fund","doi-asserted-by":"publisher","award":["NA"],"award-info":[{"award-number":["NA"]}],"id":[{"id":"10.13039\/100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["asmedigitalcollection.asme.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,1]]},"abstract":"<jats:p>The goal in this paper is to enable collaboration in the codesign of engineering artifacts when participants are reluctant to share their design-related confidential and proprietary information with other codesigners, even though such information is needed to analyze and validate the overall design. We demonstrate the viability of codesign by multiple entities who view the parameters of their contributions to the joint design to be confidential. In addition to satisfying this confidentiality requirement, an online codesign process must result in a design that is of the same quality as if full sharing of information had taken place between the codesigners. We present online codesign protocols that satisfy both requirements and demonstrate their practicality using a simple example of codesign of an automotive suspension system and the tires. Our protocols do not use any cryptographic primitives\u2014they only use the kinds of mathematical operations that are currently used in single-designer situations. The participants in the online design protocols include the codesigners, and a cloud server that facilitates the process while learning nothing about the participants' confidential information or about the characteristics of the codesigned system. The only assumption made about this cloud server is that it does not collude with some participants against other participants. We do not assume that the server does not, on its own, attempt to compute as much information as it can about the confidential inputs and outputs of the codesign process: It can make a transcript of the protocol and later attempt to infer all possible information from it, so it is a feature of our protocols the cloud server can infer nothing from such a transcript.<\/jats:p>","DOI":"10.1115\/1.4036615","type":"journal-article","created":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T16:31:56Z","timestamp":1493742716000},"update-policy":"https:\/\/doi.org\/10.1115\/crossmarkpolicy-asme","source":"Crossref","is-referenced-by-count":9,"title":["Secure Collaboration in Engineering Systems Design"],"prefix":"10.1115","volume":"17","author":[{"given":"Shumiao","family":"Wang","sequence":"first","affiliation":[{"name":"Google, Inc., 1600 Amphitheatre Pkwy, Mountain View, CA 94043"}]},{"given":"Siddharth","family":"Bhandari","sequence":"additional","affiliation":[{"name":"School of Technology and Computer Sciences, Tata Institute of Fundamental Research, Mumbai 400005, India"}]},{"given":"Siva","family":"Chaitanya Chaduvula","sequence":"additional","affiliation":[{"name":"School of Mechanical Engineering, Purdue University, West Lafayette, IN 47906"}]},{"given":"Mikhail J.","family":"Atallah","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Purdue University, West Lafayette, IN 47906"}]},{"given":"Jitesh H.","family":"Panchal","sequence":"additional","affiliation":[{"name":"School of Mechanical Engineering, Purdue University, West Lafayette, IN 47906 e-mail: panchal@purdue.edu"}]},{"given":"Karthik","family":"Ramani","sequence":"additional","affiliation":[{"name":"School of Mechanical Engineering, Purdue University, West Lafayette, IN 47906"}]}],"member":"33","published-online":{"date-parts":[[2017,6,15]]},"reference":[{"key":"2019100601261130300_bib1","doi-asserted-by":"crossref","unstructured":"Horner, J., and Atwood, M. E., 2006, \u201cDesign Rationale: The Rationale and the Barriers,\u201d Fourth Nordic Conference on Human-Computer Interaction: Changing Roles, Oslo, Norway, Oct. 14\u201318, pp. 341\u2013350.","DOI":"10.1145\/1182475.1182511"},{"issue":"3","key":"2019100601261130300_bib2","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1115\/1.1521435","article-title":"A Collaborative Feature Modeling System","volume":"2","year":"2002","journal-title":"ASME J. Comput. Inf. Sci. Eng."},{"issue":"3","key":"2019100601261130300_bib3","doi-asserted-by":"publisher","first-page":"031001","DOI":"10.1115\/1.4023917","article-title":"Emerging Design Methods and Tools in Collaborative Product Development","volume":"13","year":"2013","journal-title":"ASME J. Comput. Inf. Sci. Eng."},{"issue":"9","key":"2019100601261130300_bib4","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1016\/j.cad.2003.09.014","article-title":"Role-Based Viewing Envelopes for Information Protection in Collaborative Modeling","volume":"36","year":"2004","journal-title":"Comput.-Aided Des."},{"issue":"2","key":"2019100601261130300_bib5","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1115\/1.2190235","article-title":"Intellectual Property Protection in Collaborative Design Through Lean Information Modeling and Sharing","volume":"6","year":"2006","journal-title":"ASME J. Comput. Inf. Sci. Eng."},{"key":"2019100601261130300_bib6","doi-asserted-by":"publisher","DOI":"10.2514\/6.2000-4902","article-title":"A Federated Intelligent Product Environment","volume-title":"AIAA","year":"2000"},{"volume-title":"Crowdsourcing: Why the Power of the Crowd Is Driving the Future of Business","year":"2008","key":"2019100601261130300_bib7"},{"issue":"9","key":"2019100601261130300_bib8","doi-asserted-by":"publisher","first-page":"1529","DOI":"10.1287\/mnsc.1080.0884","article-title":"Innovation Contests, Open Innovation, and Multiagent Problem Solving","volume":"54","year":"2008","journal-title":"Manage. Sci."},{"key":"2019100601261130300_bib9","doi-asserted-by":"publisher","DOI":"10.1115\/DETC2012-70780","article-title":"Towards a Cloud-Based Design and Manufacturing Paradigm: Looking Backward, Looking Forward","volume-title":"ASME","year":"2012"},{"key":"2019100601261130300_bib10","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/978-1-4471-4935-4_8","article-title":"Designing by Services: A New Paradigm for Collaborative Product Development","volume-title":"Cloud Manufacturing","year":"2013"},{"key":"2019100601261130300_bib11","doi-asserted-by":"crossref","unstructured":"Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., and Molina, J., 2009, \u201cControlling Data in the Cloud: Outsourcing Computation Without Outsourcing Control,\u201d ACM Workshop on Cloud Computing Security (CCSW), Chicago, IL, Nov. 13, pp. 85\u201390.10.1145\/1655008.1655020","DOI":"10.1145\/1655008.1655020"},{"key":"2019100601261130300_bib12","doi-asserted-by":"crossref","unstructured":"Du, W., and Atallah, M. J., 2001, \u201cSecure Multi-Party Computation Problems and Their Applications: A Review and Open Problems,\u201d Workshop on New Security Paradigms (NSPW), Cloudcroft, NM, Sept. 10\u201313, pp. 13\u201322.10.1145\/508171.508174","DOI":"10.1145\/508172.508174"},{"key":"2019100601261130300_bib13","unstructured":"Gentry, C., 2009, \u201cA Fully Homomorphic Encryption Scheme,\u201d Ph.D. thesis, Stanford University, Stanford, CA.https:\/\/crypto.stanford.edu\/craig\/craig-thesis.pdf"},{"key":"2019100601261130300_bib14","unstructured":"Huang, Y., Evans, D., Katz, J., and Malka, L., 2011, \u201cFaster Secure Two-Party Computation Using Garbled Circuits,\u201d 20th USENIX Conference on Security (SEC), San Francisco, CA, Aug. 8\u201312.https:\/\/www.cs.umd.edu\/~jkatz\/papers\/usenix2011.pdf"},{"key":"2019100601261130300_bib15","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-319-02726-5_7","article-title":"Secure and Private Outsourcing of Shape-Based Feature Extraction","volume-title":"ICICS","year":"2013"},{"volume-title":"Simulation of Dynamic Systems With MATLAB and Simulink","year":"2011","key":"2019100601261130300_bib16"},{"volume-title":"Modern Control Engineering","key":"2019100601261130300_bib17"},{"key":"2019100601261130300_bib18","unstructured":"Rabin, M. O., 1981, \u201cHow to Exchange Secrets by Oblivious Transfer,\u201d Aiken Computation Laboratory, Cambridge, MA, Technical Report No. TR-81.https:\/\/www.iacr.org\/museum\/rabin-obt\/obtrans-eprint187.pdf"}],"container-title":["Journal of Computing and Information Science in Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/asmedigitalcollection.asme.org\/computingengineering\/article-pdf\/doi\/10.1115\/1.4036615\/5996764\/jcise_017_04_041010.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"http:\/\/asmedigitalcollection.asme.org\/computingengineering\/article-pdf\/doi\/10.1115\/1.4036615\/5996764\/jcise_017_04_041010.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,23]],"date-time":"2023-08-23T11:11:52Z","timestamp":1692789112000},"score":1,"resource":{"primary":{"URL":"https:\/\/asmedigitalcollection.asme.org\/computingengineering\/article\/doi\/10.1115\/1.4036615\/474320\/Secure-Collaboration-in-Engineering-Systems-Design"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,15]]},"references-count":18,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,12,1]]}},"URL":"https:\/\/doi.org\/10.1115\/1.4036615","relation":{},"ISSN":["1530-9827","1944-7078"],"issn-type":[{"type":"print","value":"1530-9827"},{"type":"electronic","value":"1944-7078"}],"subject":[],"published":{"date-parts":[[2017,6,15]]},"article-number":"041010"}}