skip to main content
10.1145/3640310.3674086acmconferencesArticle/Chapter ViewAbstractPublication PagesmodelsConference Proceedingsconference-collections
research-article
Open access

Model Everything but with Intellectual Property Protection - The Deltachain Approach

Published: 22 September 2024 Publication History

Abstract

Many organizations are involved in the development of complex systems, e.g., cyber-physical systems. Organizations work collaboratively to describe these systems, using models, which are developed using multiple languages and tools. The models may contain intellectual property that must be protected from other parties, including other contributors. To enable the ongoing exchange of models and to ensure intellectual property protection, our new idea is to use encrypted deltas, i.e., arbitrary changes made to a model. These encrypted deltas are stored on a chain, which we call Deltachain. Encryption enables free exchange of the Deltachain, e.g., on third-party commercial file storage servers. Collaborators involved in the development of the model can access the encrypted Deltachain, decrypt the parts to which they have access, and then work with those decrypted parts which are created by applying the deltas. Subsequently, the collaborators can encrypt their deltas to the model parts and append the encrypted deltas to the Deltachain. Our vision is the use of this Deltachain by collaborating organizations as a single source of truth.

References

[1]
Daniel Adkins, Archita Agarwal, Seny Kamara, and Tarik Moataz. 2020. Encrypted blockchain databases. In Proceedings of the 2nd ACM Conference on Advances in Financial Technologies. Association for Computing Machinery, New York, NY, USA, 241--254.
[2]
Kousar Aslam, Yu Chen, Muhammad Butt, and Ivano Malavolta. 2023. Cross-platform real-time collaborative modeling: An architecture and a prototype implementation via emf. cloud. IEEE Access (2023).
[3]
Colin Atkinson, Dietmar Stoll, and Philipp Bostan. 2008. Orthographic software modeling: a practical approach to view-based development. In International Conference on Evaluation of Novel Approaches to Software Engineering. Springer Berlin Heidelberg, Heidelberg, Germany, 206--219.
[4]
Francesco Basciani, Alfonso Pierantonio, Ludovico Iovino, et al. 2015. Model repositories: Will they become reality? A position statement. In MODELS (satellite events), Vol. 1563. CEUR-WS, Aachen, 37--42.
[5]
Lorenzo Bettini, Davide Di Ruscio, Ludovico Iovino, and Alfonso Pierantonio. 2017. Edelta: An Approach for Defining and Applying Reusable Metamodel Refactorings. In MODELS (satellite events). CEUR-WS, Aachen, 71--80.
[6]
XT Cai, Sheng Wang, Xin Lu, and WD Li. 2017. An encryption approach for product assembly models. Advanced Engineering Informatics 33 (2017), 374--387.
[7]
Istvan David, Kousar Aslam, Ivano Malavolta, and Patricia Lago. 2023. Collaborative Model-Driven Software Engineering---A systematic survey of practices and needs in industry. Journal of Systems and Software 199 (2023).
[8]
Istvan David and Eugene Syriani. 2023. Real-time collaborative multi-level modeling by conflict-free replicated data types. Software and Systems Modeling 22, 4 (2023), 1131--1150.
[9]
Istvan David, Hans Vangheluwe, and Eugene Syriani. 2023. Model consistency as a heuristic for eventual correctness. Journal of Computer Languages 76 (2023).
[10]
Csaba Debreceni, Gábor Bergmann, István Ráth, and Dániel Varró. 2018. Secure views for collaborative modeling. IEEE Software 35, 6 (2018), 32--38.
[11]
Csaba Debreceni, Gábor Bergmann, István Ráth, and Dániel Varró. 2019. Enforcing fine-grained access control for secure collaborative modelling using bidirectional transformations. Software & Systems Modeling 18 (2019), 1737--1769.
[12]
George A Gionis, Christoph Schroth, and Till Janner. 2011. Advancing interoperability for agile cross-organisational collaboration: a rule-based approach. In Interoperability in Digital Public Services and Administration: Bridging E-Government and E-Business. IGI Global, Hershey, PA, USA, 238--253.
[13]
Amer A Hijazi, Srinath Perera, Ali M Al-Ashwal, and Rodrigo Neves Calheiros. 2019. Enabling a single source of truth through BIM and blockchain integration. In International Conference on Innovation, Technology, Enterprise and Entrepreneurship (ICITEE). Applied Science University Bahrain, Bahrain, 385--393.
[14]
Heiko Klare, Max E Kramer, Michael Langhammer, Dominik Werle, Erik Burger, and Ralf Reussner. 2021. Enabling consistency in view-based system development---the vitruvius approach. Journal of Systems and Software 171 (2021).
[15]
Maximilian Koegel and Jonas Helming. 2010. EMFStore: a model repository for EMF models. In Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering-Volume 2. Association for Computing Machinery, New York, NY, USA, 307--308.
[16]
Salvador Martínez, Sebastien Gerard, and Jordi Cabot. 2019. On the need for intellectual property protection in model-driven co-engineering processes. In Exploring Modeling Methods for Systems Analysis and Development (EMMSAD). Springer, 169--177.
[17]
Henry Muccini, Jan Bosch, and André van der Hoek. 2018. Collaborative modeling in software engineering. IEEE Software 35, 6 (2018), 20--24.
[18]
Thor Myklebust, Tor Stålhane, and Sinuo Wu. 2020. Agile safety case for vehicle trial operations. In Probabilistic Safety Assessment and Management.
[19]
Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Decentralized business review (2008).
[20]
Ina Schaefer, Lorenzo Bettini, Viviana Bono, Ferruccio Damiani, and Nico Tanzarella. 2010. Delta-oriented programming of software product lines. In Software Product Lines: Going Beyond: 14th International Conference, SPLC 2010, Jeju Island, South Korea, September 13-17, 2010. Proceedings 14. Springer, 77--91.
[21]
Alan T Sherman, Farid Javani, Haibin Zhang, and Enis Golaszewski. 2019. On the origins and variations of blockchain technologies. IEEE Security & Privacy 17, 1 (2019), 72--77.
[22]
Claudine A Soosay, Paul W Hyland, and Mario Ferrer. 2008. Supply chain collaboration: capabilities for continuous innovation. Supply chain management: An international journal 13, 2 (2008), 160--169.
[23]
Thomas Stahl, Markus Völter, and Krzysztof Czarnecki. 2006. Model-driven software development: technology, engineering, management. John Wiley & Sons, Inc., Hoboken, NJ, United States.
[24]
Soyoung Sung, Yanghoon Kim, and Hangbae Chang. 2018. Improving collaboration between large and small-medium enterprises in automobile production. Enterprise Information Systems 12, 1 (2018), 19--35.
[25]
Ali Sunyaev. 2020. Distributed ledger technology. Internet computing: Principles of distributed systems and emerging internet-based technologies (2020), 265--299.
[26]
Thomas Weber and Sebastian Weber. 2024. Towards a Single Source of Truth with a Freely Shareable Deltachain. In 2024 IEEE 21st International Conference on Software Architecture Companion (ICSA-C). IEEE. in press.
[27]
Jan Willem Wittler, Timur Saglam, and Thomas Kühn. 2023. Evaluating model differencing for the consistency preservation of state-based views. Journal of Object Technology 22 (2023), 1--14.
[28]
Wenhan Xu, Hui Ma, Zishuai Song, Jianhao Li, and Rui Zhang. 2023. Gringotts: An Encrypted Version Control System with Less Trust on Servers. IEEE Transactions on Dependable and Secure Computing (2023).
[29]
Alfa Yohannis, Dimitris Kolovos, and Fiona Polack. 2017. Turning models inside out. In CEUR Workshop Proceedings 1403. The University of York, York, 430--434.
[30]
Nazatul Nurlisa Zolkifli, Amir Ngah, and Aziz Deraman. 2018. Version control system: A review. Procedia Computer Science 135 (2018), 408--415.

Cited By

View all
  • (2024)Consistency Management for Security Annotations for Continuous VerificationProceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems10.1145/3652620.3687821(1096-1105)Online publication date: 22-Sep-2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MODELS '24: Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems
September 2024
311 pages
ISBN:9798400705045
DOI:10.1145/3640310
This work is licensed under a Creative Commons Attribution International 4.0 License.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 September 2024

Check for updates

Badges

Author Tags

  1. Applied Cryptography
  2. Collaborative Software Engineering
  3. Cross-Organisational Collaboration
  4. Data Structures
  5. Deltachain
  6. Model-Driven Engineering

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

MODELS '24
Sponsor:

Acceptance Rates

MODELS '24 Paper Acceptance Rate 26 of 124 submissions, 21%;
Overall Acceptance Rate 144 of 506 submissions, 28%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)143
  • Downloads (Last 6 weeks)36
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Consistency Management for Security Annotations for Continuous VerificationProceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems10.1145/3652620.3687821(1096-1105)Online publication date: 22-Sep-2024

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media