CaACBIM: A Context-aware Access Control Model for BIM

被引:11
|
作者
Zheng, Rongyue [1 ]
Jiang, Jianlin [1 ]
Hao, Xiaohan [2 ]
Ren, Wei [2 ]
Xiong, Feng [3 ]
Zhu, Tianqing [2 ,4 ]
机构
[1] Ningbo Univ, Fac Architecture Civil Engn & Environm, Ningbo 315211, Zhejiang, Peoples R China
[2] China Univ Geosci, Sch Comp Sci, Wuhan 430074, Hubei, Peoples R China
[3] Zhongnan Univ Econ & Law, Sch Business Adm, Wuhan 430073, Hubei, Peoples R China
[4] Univ Technol Sydney, Sch Software, Ultimo, NSW 2007, Australia
基金
国家重点研发计划;
关键词
access control; BIM; construction automation; mobile cloud; FRAMEWORK; STANDARD; PRIVACY;
D O I
10.3390/info10020047
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A building information model (BIM) is of upmost importance with a full life-time cycle in architecture engineering and construction industry. Smart construction relies on BIM to manipulate information flow, data flow, and management flow. Currently, BIM has been explored mainly for information construction and utilization, but there exist few works concerning information security, e. g., audits of critical models and exposure of sensitive models. Moreover, few BIM systems have been proposed to make use of new computing paradigms, such as mobile cloud computing, blockchain and Internet of Things. In this paper, we propose a Context-aware Access Control (CaAC) model for BIM systems on mobile cloud architectures. BIM data can be confidentially accessed according to contexts in a fine-grained manner. We describe functions of CaAC formally by illustrating location-aware access control and time-aware access control. CaAC model can outperform role-based access control for preventing BIM data leakage by distinguishing contexts. In addition, grouping algorithms are also presented for flexibility, in which basic model (user grouping based on user role permissions) and advanced model (user grouping based on user requests) are differentiated. Compared with the traditional role-based access control model, security and feasibility of CaAC are remarkably improved by distinguishing an identical role with multiple contexts. The average efficiency is improved by 2n/(2n-p-q), and time complexity is O(n)
引用
收藏
页数:15
相关论文
共 50 条
  • [1] The Application of the Context-Aware Access Control Model
    Zhang, Chao
    Jin, Zhengping
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 2670 - 2674
  • [2] A Context-Aware Access Control Model for Pervasive Environments
    Al-Rwais, Sumayah
    Al-Muhtadi, Jalal
    [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 425 - +
  • [3] Context-Aware Access Control Model for Cloud Computing
    Zhou, Zhenji
    Wu, Lifa
    Hong, Zheng
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2013, 6 (06): : 1 - 12
  • [4] A Context-aware Access Control Model for Pervasive Environments
    Al-Rwais, Sumayah
    Al-Muhtadi, Jalal
    [J]. IETE TECHNICAL REVIEW, 2010, 27 (05) : 371 - 379
  • [5] Context-aware provisional access control
    Masoumzadeh, Amir Reza
    Amini, Morteza
    Jalili, Rasool
    [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2006, 4332 : 132 - +
  • [6] A context-aware access control model for pervasive computing environments
    Emami, Sareh Sadat
    Amini, Morteza
    Zokaei, Saadan
    [J]. 2007 INTERNATIONAL CONFERENCE ON INTELLIGENT PERVASIVE COMPUTING, PROCEEDINGS, 2007, : 51 - +
  • [7] Context-Aware Risk Attribute Access Control
    Li, Binyong
    Yang, Fan
    Zhang, Shaowei
    [J]. MATHEMATICS, 2024, 12 (16)
  • [8] A Policy Model and Framework for Context-Aware Access Control to Information Resources
    Kayes, A. S. M.
    Han, Jun
    Rahayu, Wenny
    Dillon, Tharam
    Islam, Md. Saiful
    Colman, Alan
    [J]. COMPUTER JOURNAL, 2019, 62 (05): : 670 - 705
  • [9] A Study on Automated Context-aware Access Control Model Using Ontology
    Jang, Bokman
    Jang, Hyokyung
    Choi, Euiin
    [J]. ADVANCED COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, 2010, 74 : 179 - 186
  • [10] Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment
    Zhang, Rui
    Giunchiglia, Fausto
    Crispo, Bruno
    Song, Lingyang
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2010, 55 (01) : 5 - 17