Blockchain-based security and access control for BIM big data

Blockchain-based security and access control for BIM big data

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Security and Privacy for Big Data, Cloud Computing and Applications — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

We analyzed the limitation in traditional role-based only access-control mechanism. As the number of mobile users is much larger than the number of roles, naive RBAC may not be suitable in BIM situations. We thus propose a context-aware fine-grained access control, called CaAC. We describe the functions of CaAC by formal method and present several illustrations on contexts via location-CaAC and the time-aware access control. CaAC can guarantee the access control within the same role by differentiating contexts, which is more fine-grained than current role-based only access control. We also present grouping algorithms of two models. By comparing the proposed models with traditional RBAC model, we analyze the security and feasibility. As a result of analysis, we conclude that the average efficiency is improved by 2n I (2n - p - q), and the time complexity of the proposed algorithm is 0(n).

Chapter Contents:

  • 5.1 bcBIM: a blockchain-based big data model for BIM modification audit and provenance in mobile cloud
  • 5.1.1 Introduction
  • 5.1.2 Related work
  • 5.1.3 Problem formulation
  • System model
  • Adversary model
  • 5.1.4 Proposed scheme
  • Proposed basic architecture
  • 5.1.5 Example—public blockchain bcBIM
  • 5.1.6 Example—private blockchain bcBIM
  • 5.1.7 Security analysis and performance analysis
  • Security analysis
  • Performance analysis
  • 5.1.8 Conclusions
  • 5.2 CaACBIM: a context-aware access control model for BIM
  • 5.2.1 Introduction
  • 5.2.2 Related work
  • 5.2.3 Problem formulation
  • System model
  • Adversary model
  • 5.2.4 Proposed scheme
  • Context-aware access control
  • Proposed authorization rules
  • Examples: location-aware or time-aware
  • 5.2.5 Security and performance analysis
  • 5.2.6 Conclusions
  • Acknowledgment
  • Data availability statement
  • References

Inspec keywords: Big Data; building information modelling; authorisation; mobile computing

Other keywords: RBAC model; BIM big data; blockchain-based security; access control mechanism; building information modeling; time-aware access control; formal method; context-aware fine-grained access control; CaAC

Subjects: Data security; Civil and mechanical engineering computing; Ubiquitous and pervasive computing

Preview this chapter:
Zoom in

Blockchain-based security and access control for BIM big data, Page 1 of 2

| /docserver/preview/fulltext/books/pc/pbpc028e/PBPC028E_ch5-1.gif /docserver/preview/fulltext/books/pc/pbpc028e/PBPC028E_ch5-2.gif

Related content

This is a required field
Please enter a valid email address