Blockchain-based Methods for Securing OpenBIM Models and Workflows for Collaborative Project Management

From Design Computation
(Redirected from CBC.2022.WGWC2555)
Jump to: navigation, search
CBC-Logo.png
CBC 2022 presentation by Moumita Das. https://doi.org/10.47330/CBC.2022.WGWC2555 | Watch Left | Left


CBC2022 S5-2 M-Das.png


Abstract

Collaboration through sharing project information with different groups of people such as designers, managers, and other stakeholders is key to BIM solutions. However, due to the interdisciplinary nature, multiple-data contributors/users, and decentralized project organizational structure of AEC (Architectural, Engineering, and Construction), security is a concern in collaborative BIM platforms. For example, BIM models contain sensitive information such as intellectual property, cost, and client information which requires protection from unauthorized access and malicious attempts of stealing and manipulation. This is particularly important in collaborative BIM platforms where multiple data owners are required to share BIM information for collaboration while still protecting the sensitive parts of the shared information. Therefore, a method to facilitate BIM security in collaborative environments is much desired. The existing methods for securing BIM models mainly consist of encrypting entire BIM models in a file-based manner using encryption protocols such as AES which undoubtedly provides security but adversely affects the functional properties of BIM models. Therefore, blockchain technologies supported by other technologies such as encryption is deployed to facilitate a method to enforce data confidentiality and data integrity (the integrity of data and workflows) via collaborative openBIM. The proposed method ensures that the IFC models are protected while maintaining their functionality for analysis purposes such as clash detection and cost estimation. The methodology consists of three parts – (1) a method to partition sensitive information from OpenBIM (IFC) models in such a way that their functionality is retained in a secure format, (2) a method to manage encrypted IFC data through searchable encryption, and (3) a re-encryption based for customized access control. The proposed method is deployed using IfcOpenShell and Hyperledger fabric and tested with an example scenario.

Keywords

BIM, Blockchain, IFC Encryption, Data Confidentiality, Data Integrity.