MSiT-BIM — Multi-Stake Holder IoT Applications Using Secured Identifier Systems Applied in the BIM Domain
Team: Peter Kirstein (University College London).
Using current BIM Standards, we will show how specific classes of deployments systems can be designed using a secured Identifier System (SIS) to pass IFC files of a complex object, such as a whole building, between partners in the Supply Chain.
The SIS which will be used as a vehicle has many properties of direct value to this class of problem. These will be utilised and their value shown in the work: The mechanism will ensure integrity, authorisation and confidentiality to constrain the operations of the suppliers. Another important aspect of this approach for the design process is that the SIS allows access to other repositories of suppliers which give descriptions of their components. The SIS is based on secured Digital Object Identifiers (DOIs) which refer to physical objects, process or data. Beyond the design and deployment phase, the mechanisms allow multiple IOT applications to be developed for sets of object. Both the objects themselves and the applications can belong to different entities, with all the interactions controlled through security and ownership metadata.
While the mechanisms and the SIS vehicle used are generic, and not specific to the BIM domain, this project will be restricted to IoT applications in the BIM domain. In order to ensure meaningful results in a short period, we will use an existing SIS (the HANDLE System), which has many properties well suited to this work. The components of this system are already part of ITU standardisation for Object Identifiers, and is operated by a non-profit international foundation. The system is operational, with world-wide Internet access. Like the DNS, it is a fully distributed system; like the DNS, it has central access and security control down to a certain level, and then complete autonomy below it. It has provision for secured Identifiers, Secured Attributes, and arbitrary templates for the attributes.
- Parser from IFC data structure into SIS database for large-scale automated population, with security additions. Security labelling with relevant security and authorisation data, will constrain access to the SIS database.
- As a result of early discussions with interested parties, the IFC data structure will be extended to include relevant security labelling with minimal complexity.
- IFC files without the appropriately labelled information will be passed t oother Stakeholders. Methods will be developed to allow the appropriate information from the SIS databases to be added to the IFC files – the labelling ensuring the authorised access..
- Information will be presented on the Governance in this domain when some activity is company specific, some customer specific, some industry domain specific, and some IOT User specific.
- Early Presentations on resolution of problems from ownership of data in multi-stakeholder situations, where multiple applications run over deployments – and how the solutions might be enforced.
- Impact of the above on Standards – including contribution to BIM Level-3.