Citation: Hui Deng, Yiwen Xu, Xiaoyao Li, Yichuan Deng, Jiarui Lin. Research on Data Security of Engineering Information Sharing Mechanism Based on GDPR Principle. Journal of Information Technologyin Civil Engineering and Architecture, 2022, 14(6): 69-74. doi: 10.16670/j.cnki.cn11-5823/tu.2022.06.12
2022, 14(6): 69-74. doi: 10.16670/j.cnki.cn11-5823/tu.2022.06.12
Research on Data Security of Engineering Information Sharing Mechanism Based on GDPR Principle
1. | School of Civil Engineering and Transportation, South China University of Technology, Guangzhou 510641, China |
2. | Department of Civil Engineering, Tsinghua University, Beijing 100084, China |
With the increasing scale and complexity of engineering projects, the application of Building Information Modeling (BIM) continues to deepen, and the Information volume stored by the engineering Information carrier represented by BIM model in each stage of the whole life cycle of construction projects gradually expands. The project information sharing not only improves the efficiency of the project construction, but also causes the practitioners to pay attention to the data security problem. The General Data Protection Regulation (GDPR) issued by the EU is the most extensive, demanding and punishing law in the field of Data security at present, setting a new international benchmark in the field of data and information protection. BIM model, as a single data source of engineering, has similarities with GDPR principle no matter in terms of data information scope or information security principle. Therefore, on the basis of studying the current BIM standards and specifications in China, the security requirements of software and platform and user usage protocols, this paper makes a comparative analysis of the BIM and GDPR data processing principles respectively to study their suitability. Analyze the reference significance of GDPR data processing principle to solve the problems in the field of engineering information security; Finally, some suggestions are put forward for data information security protection in the process of engineering information sharing.
[1] |
赵峰, 刘刚. 基于BIM和激光扫描点云技术的智能安装系统的研究及开发[J]. 土木建筑工程信息技术, 2021, 13(4): 23-29. |
[2] |
汪再军, 周迎. 基于BIM的建设工程竣工数字化交付研究[J]. 土木建筑工程信息技术, 2021, 13(4): 13-22. |
[3] |
美国国家BIM标准第一版第一部分: United States National Building Information Modeling Standard, Version1-Part 1[R]. National Institute of Building Sciences. |
[4] | |
[5] |
Olatunji O. A preliminary review on the legal implications of BIM and model ownership[J]. Journal of Information Technology in Construction, 2011, 16: 687-698. |
[6] |
张建平, 李丁, 林佳瑞, 等. BIM在工程施工中的应用[J]. 施工技术, 2012, 41(16): 10-17. |
[7] |
Das M, Tao X, Cheng J C P. BIM security: A critical review and recommendations using encryption strategy and blockchain[J]. Automation in construction, 2021, 126: 103682.doi: 10.1016/j.autcon.2021.103682 |
[8] |
Singh V, Gu N, Wang X. A theoretical framework of a BIM-based multi-disciplinary collaboration platform[J]. Automation in construction, 2011, 20(2): 134-144.doi: 10.1016/j.autcon.2010.09.011 |
[9] |
Afsari K, Eastman C M, Shelden D R. Cloud-based BIM data transmission: current status and challenges[C]//ISARC. Proceedings of the International Symposium on Automation and Robotics in Construction. IAARC Publications, 2016, 33: 1. |
[10] |
Parn E A, Edwards D. Cyber threats confronting the digital built environment: Common data environment vulnerabilities and block chain deterrence[J]. Engineering, Construction and Architectural Management, 2019. |
[11] |
Zhang J, Liu Q, Hu Z, et al. A multi-server information-sharing environment for cross-party collaboration on a private cloud[J]. Automation in Construction, 2017, 81: 180-195. |
[12] |
Badertscher C, Matt C, Maurer U. Strengthening access control encryption[C]//International Conference on the Theory and Application of Cryptology and Information Security. Springer, Cham, 2017, 502-532. |
[13] |
Kassem M, Iqbal N, Kelly G, et al. Building information modelling: protocols for collaborative design processes[J]. Journal of Information Technology in Construction, 2014, 19: 126-149. |
[14] |
Zhao T, Wei L, Zhang C. Attribute-based encryption scheme based on SIFF[C]//2016 IEEE International Conference on Communications(ICC). IEEE, 2016, 1-6. |
[15] |
Skandhakumar N, Reid J, Salim F, et al. A policy model for access control using building information models[J]. International Journal of Critical Infrastructure Protection, 2018, 23: 1-10. |
[16] |
Afsari K, Eastman C M, Shelden D R. Cloud-based BIM data transmission: current status and challenges[C]//ISARC. Proceedings of the International Symposium on Automation and Robotics in Construction. IAARC Publications, 2016, 33: 1. |
[17] |
Li J, Greenwood D, Kassem M. Blockchain in the built environment and construction industry: A systematic review, conceptual models and practical use cases[J]. Automation in Construction, 2019, 102: 288-307. |
[18] |
Zheng R, Jiang J, Hao X, et al. bcBIM: A blockchain-based big data model for BIM modification audit and provenance in mobile cloud[J]. Mathematical Problems in Engineering, 2019, 2019. |
[19] |
尚虎平, 朱昭娜. 走向基本公共服务的公民信息权保护——来自欧盟《一般数据保护条例》的启示[J]. 中国高校社会科学, 2020(01): 117-123+158-159. |
[20] | |
[21] |
陈珂, 陈强健, 杜鹏. 国产BIM建模软件发展的思考: 基于PCA的影响因素研究[J]. 土木建筑工程信息技术, 2021, 13(4): 6-12. |
[22] |
Metrics
- PDF Downloads(21)
- Abstract views(1812)
- HTML views(1199)