{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T12:52:51Z","timestamp":1753879971792,"version":"3.41.2"},"reference-count":30,"publisher":"ASME International","issue":"3","funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1329979"],"award-info":[{"award-number":["1329979"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["asmedigitalcollection.asme.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,1]]},"abstract":"<jats:p>Designers need a way to overcome information-related risks, including information leakage and misuse by their own collaborators during collaborative product realization. Existing cryptographic techniques aimed at overcoming these information-related risks are computationally expensive and impractical even for moderate problem sizes, and legal approaches such as nondisclosure agreements are not effective. The computational practicality problem is particularly pronounced for computational techniques, such as the finite element analysis (FEA). In this paper, we propose a technique that enables designers to perform simulations, such as FEA computations, without the need for revealing their information to anyone, including their design collaborators. We present a new approach, the secure finite element analysis approach, which enables designers to perform FEA without having to reveal structural\/material information to their counterparts even though the computed answer depends on all the collaborators' confidential information. We build secure finite element analysis (sFEA) using computationally efficient protocols implementing a secure codesign (SCD) framework. One of our findings is that the direct implementation of using SCD framework (termed as na\u00efve sFEA) suffers from lack of scalability. To overcome these limitations, we propose hybrid sFEA that implements performance improvement strategies. We document and discuss the experiments we conducted to determine the computational overhead imposed by both na\u00efve and hybrid sFEA. The results indicate that the computational burden imposed by hybrid sFEA makes it challenging for large-scale FEA\u2014our scheme significantly increases the problem sizes that can be handled when compared to implementations using previous algorithms and protocols, but large enough problem sizes will swamp our scheme as well (in some sense this is unavoidable because of the cubic nature of the FEA time complexity).<\/jats:p>","DOI":"10.1115\/1.4042695","type":"journal-article","created":{"date-parts":[[2019,2,4]],"date-time":"2019-02-04T07:31:33Z","timestamp":1549265493000},"update-policy":"https:\/\/doi.org\/10.1115\/crossmarkpolicy-asme","source":"Crossref","is-referenced-by-count":1,"title":["sFEA: A Secure Finite Element Analysis Technique"],"prefix":"10.1115","volume":"19","author":[{"given":"Siva C.","family":"Chaduvula","sequence":"first","affiliation":[{"name":"School of Mechanical Engineering, Purdue University, West Lafayette, IN 47907"}]},{"given":"Mikhail J.","family":"Atallah","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Purdue University, West Lafayette, IN 47907"}]},{"given":"Jitesh H.","family":"Panchal","sequence":"additional","affiliation":[{"name":"School of Mechanical Engineering, Purdue University, West Lafayette, IN 47907"}]}],"member":"33","published-online":{"date-parts":[[2019,3,18]]},"reference":[{"issue":"5","key":"2019100602272545400_bib1","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/0010-4485(95)00055-0","article-title":"Case-Based Conceptual Design Information Server for Concurrent Engineering","volume":"28","year":"1996","journal-title":"Comput.-Aided Des."},{"issue":"1\u20132","key":"2019100602272545400_bib2","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s00170-004-2262-9","article-title":"A Design Chain Collaboration Framework Using Reference Models","volume":"26","year":"2005","journal-title":"Int. J. Adv. Manuf. Technol."},{"key":"2019100602272545400_bib3","article-title":"Collaborative Product Commerce: Creating Value Across the Enterprise"},{"key":"2019100602272545400_bib4","doi-asserted-by":"publisher","DOI":"10.1115\/1.4039431","article-title":"Secure Codesign: Achieving Optimality Without Revealing","volume":"18","year":"2018","journal-title":"ASME J. Comput. Inf. Sci. Eng."},{"issue":"3","key":"2019100602272545400_bib5","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1007\/s10796-015-9553-6","article-title":"Information and Knowledge Leakage in Supply Chain","volume":"18","year":"2016","journal-title":"Inf. Syst. Front."},{"key":"2019100602272545400_bib6","first-page":"313","article-title":"Information Leakage in Supply Chains","volume-title":"Handbook of Information Exchange in Supply Chain Management","year":"2017"},{"year":"2016","key":"2019100602272545400_bib7","article-title":"Samsung Will Be Apple's Top Supplier for Iphones Again in 2017"},{"issue":"9","key":"2019100602272545400_bib8","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1016\/j.cad.2003.09.014","article-title":"Role-Based Viewing Envelopes for Information Protection in Collaborative Modeling","volume":"36","year":"2004","journal-title":"Comput.-Aided Des."},{"issue":"1","key":"2019100602272545400_bib9","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1115\/1.2161226","article-title":"Hierarchical Role-Based Viewing for Multilevel Information Security in Collaborative CAD","volume":"6","year":"2006","journal-title":"ASME J. Comput. Inf. Sci. Eng."},{"key":"2019100602272545400_bib10","doi-asserted-by":"crossref","unstructured":"Paillier, P., 1999, \u201cPublic-Key Cryptosystems Based on Composite Degree Residuosity Classes,\u201d International Conference on the Theory and Applications of Cryptographic Techniques, Prague, Czech Republic, May 2\u20136, pp. 223\u2013238.","DOI":"10.1007\/3-540-48910-X_16"},{"key":"2019100602272545400_bib11","unstructured":"Gentry, C., 2009, \u201cA Fully Homomorphic Encryption Scheme,\u201d Ph.D. thesis, Stanford University, Stanford, CA.https:\/\/crypto.stanford.edu\/craig\/craig-thesis.pdf"},{"key":"2019100602272545400_bib12","doi-asserted-by":"crossref","unstructured":"Yao, A. C.-C., 1986, \u201cHow to Generate and Exchange Secrets,\u201d 27th Annual Symposium on Foundations of Computer Science, Toronto, ON, Canada, Oct. 27\u201329, pp. 162\u2013167.10.1109\/SFCS.1986.25","DOI":"10.1109\/SFCS.1986.25"},{"key":"2019100602272545400_bib13","doi-asserted-by":"publisher","DOI":"10.1115\/DETC2018-85566","article-title":"sFEA: A Lightweight, Scalable and Secure Finite Element Analysis Technique","volume-title":"ASME","year":"2018"},{"key":"2019100602272545400_bib14","unstructured":"Chang, H., Kim, K.-K., and Kim, Y., 2007, \u201cThe Research of Security System for Sharing Engineering Drawings,\u201d International Conference on Intelligent Pervasive Computing, Jeju City, South Korea, Oct. 11\u201313, pp. 319\u2013322."},{"issue":"11","key":"2019100602272545400_bib15","doi-asserted-by":"publisher","first-page":"13906","DOI":"10.1016\/j.eswa.2011.04.197","article-title":"Secret Sharing Approaches for 3D Object Encryption","volume":"38","year":"2011","journal-title":"Expert Syst. Appl."},{"issue":"4","key":"2019100602272545400_bib16","doi-asserted-by":"publisher","first-page":"2114","DOI":"10.1016\/j.eswa.2014.10.035","article-title":"A Multi-Secret Sharing Scheme for 3D Solid Objects","volume":"42","year":"2015","journal-title":"Expert Syst. Appl."},{"key":"2019100602272545400_bib17","unstructured":"Van der Hoeven, A., ten Bosch, O., van Leuken, R., and van der Wolf, P., 1994, \u201cA Flexible Access Control Mechanism for CAD Frameworks,\u201d Conference on European Design Automation, Grenoble, France, Sept. 9\u201323, pp. 188\u2013193.https:\/\/dl.acm.org\/citation.cfm?id=198239"},{"issue":"9","key":"2019100602272545400_bib18","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1016\/j.cad.2004.09.021","article-title":"A CAD\u2013CAE Integration Approach Using Feature-Based Multi-Resolution and Multi-Abstraction Modelling Techniques","volume":"37","year":"2005","journal-title":"Comput.-Aided Des."},{"issue":"5","key":"2019100602272545400_bib19","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.cose.2011.05.006","article-title":"Hierarchical Attribute-Based Encryption and Scalable User Revocation for Sharing Data in Cloud Servers","volume":"30","year":"2011","journal-title":"Comput. Secur."},{"issue":"1","key":"2019100602272545400_bib20","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1177\/1063293X13510010","article-title":"Collaborative Design by Sharing Multiple-Level Encryption Files","volume":"22","year":"2014","journal-title":"Concurrent Eng."},{"issue":"1","key":"2019100602272545400_bib21","doi-asserted-by":"publisher","first-page":"011008","DOI":"10.1115\/1.4034131","article-title":"Embedding X.509 Digital Certificates in Three-Dimensional Models for Authentication, Authorization, and Traceability of Product Data","volume":"17","year":"2017","journal-title":"ASME J. Comput. Inf. Sci. Eng."},{"issue":"4","key":"2019100602272545400_bib22","doi-asserted-by":"publisher","first-page":"040802","DOI":"10.1115\/1.4040341","article-title":"Security in Cyber-Enabled Design and Manufacturing: A Survey","volume":"18","year":"2018","journal-title":"ASME J. Comput. Inf. Sci. Eng."},{"key":"2019100602272545400_bib23","unstructured":"Xue, H., and Li, J., 2005, \u201cA Method for Information Protection in Collaborative Assembly Design,\u201d Ninth International Conference on Computer Aided Design and Computer Graphics (CAD-CG), Hong Kong, China, Dec. 7\u201310, p. 6.10.1109\/CAD-CG.2005.7"},{"journal-title":"J. Syst. Simul.","article-title":"Research on the Technologies of Multi-Users Modeling and Cooperation in Distributed Virtual Assembly System","year":"2008","key":"2019100602272545400_bib24"},{"issue":"3","key":"2019100602272545400_bib25","doi-asserted-by":"publisher","first-page":"243","DOI":"10.3233\/ICA-150487","article-title":"Encryption Based Partial Sharing of CAD Models","volume":"22","year":"2015","journal-title":"Integr. Comput.-Aided Eng."},{"issue":"4","key":"2019100602272545400_bib26","doi-asserted-by":"publisher","first-page":"041010","DOI":"10.1115\/1.4036615","article-title":"Secure Collaboration in Engineering Systems Design","volume":"17","year":"2017","journal-title":"ASME J. Comput. Inf. Sci. Eng."},{"year":"2018","key":"2019100602272545400_bib27","article-title":"Computing Without Revealing: A Cryptographic Approach to eProcurement"},{"issue":"6","key":"2019100602272545400_bib28","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/s10207-012-0177-2","article-title":"High-Performance Secure Multi-Party Computation for Data Mining Applications","volume":"11","year":"2012","journal-title":"Int. J. Inf. Security"},{"issue":"3","key":"2019100602272545400_bib29","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/j.compind.2010.10.002","article-title":"Modeling and Evaluating Information Leakage Caused by Inferences in Supply Chains","volume":"62","year":"2011","journal-title":"Comput. Ind."},{"key":"2019100602272545400_bib30","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1016\/j.aei.2018.04.004","article-title":"Strategic Information Revelation in Collaborative Design","volume":"36","year":"2018","journal-title":"Adv. Eng. Inf."}],"container-title":["Journal of Computing and Information Science in Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/asmedigitalcollection.asme.org\/computingengineering\/article-pdf\/doi\/10.1115\/1.4042695\/6390697\/jcise_019_03_031004.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"http:\/\/asmedigitalcollection.asme.org\/computingengineering\/article-pdf\/doi\/10.1115\/1.4042695\/6390697\/jcise_019_03_031004.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,6]],"date-time":"2019-10-06T06:27:38Z","timestamp":1570343258000},"score":1,"resource":{"primary":{"URL":"https:\/\/asmedigitalcollection.asme.org\/computingengineering\/article\/doi\/10.1115\/1.4042695\/726236\/sFEA-A-Secure-Finite-Element-Analysis-Technique"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,18]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,9,1]]}},"URL":"https:\/\/doi.org\/10.1115\/1.4042695","relation":{},"ISSN":["1530-9827","1944-7078"],"issn-type":[{"type":"print","value":"1530-9827"},{"type":"electronic","value":"1944-7078"}],"subject":[],"published":{"date-parts":[[2019,3,18]]},"article-number":"031004"}}