BIM security: A critical review and recommendations using encryption strategy and blockchain

Moumita Das, Xingyu Tao, Jack C.P. Cheng

Research output: Journal article publicationJournal articleAcademic researchpeer-review

101 Citations (Scopus)

Abstract

Security of information in collaborative BIM platforms is crucial particularly for critical projects such as that of government buildings, prisons, and power plants. Inappropriate distribution and loss of sensitive information may potentially lead to physical security threats, financial loss, and loss of trust and reputation. Therefore, this paper identifies the information security requirements of collaborative BIM platforms considering the characteristics related to data security of collaborative BIM platforms through a literature review and as a result, identifies seven components of BIM security, based on which defines three levels of BIM security. Existing cybersecurity facilitating technologies such as encryption protocols, distributed database technology, and blockchain technology are reviewed to assess applicability to BIM security. This review shows that although the technologies to support BIM security are available in research and on market, they are not customized in existing collaborative BIM platforms to support BIM security. Therefore, two conceptual frameworks are proposed – (1) an encryption strategy-based framework to facilitate secure storage and distribution of BIM and (2) a blockchain-based framework to record BIM changes in a tamper-proof ledger for the non-trusting environment of construction projects. Discussions on cost and functionality are provided, which will be further extended in the future.

Original languageEnglish
Article number103682
JournalAutomation in Construction
Volume126
DOIs
Publication statusPublished - Jun 2021

Keywords

  • BIM security
  • Blockchain
  • Collaborative BIM
  • Encryption
  • Levels of BIM security

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Civil and Structural Engineering
  • Building and Construction

Fingerprint

Dive into the research topics of 'BIM security: A critical review and recommendations using encryption strategy and blockchain'. Together they form a unique fingerprint.

Cite this