Applsci 13 13339
Applsci 13 13339
Applsci 13 13339
sciences
Article
Securing Construction Workers’ Data Security and Privacy with
Blockchain Technology
Alvina Ekua Ntefua Saah 1 , Jurng-Jae Yee 2 and Jae-Ho Choi 2, *
Abstract: The construction industry, characterized by its intricate network of stakeholders and diverse
workforce, grapples with the challenge of managing information effectively. This study delves into
this issue, recognizing the universal importance of safeguarding data, particularly amid rising
concerns around unauthorized access and breaches. Aiming to harness the potential of blockchain
technology to address these challenges, this study used hypothetical biographical and safety data
of construction workers securely stored on a Hyperledger Fabric blockchain. Developed within the
Amazon Web Services (AWS) cloud platform, this blockchain infrastructure emerged as a robust
solution for enhancing data security and privacy. Anchored in the core principles of data security,
the model emerges as a potent defender against the vulnerabilities of traditional data management
systems. Beyond its immediate implications, this study exemplifies the marriage of blockchain
technology and the construction sector, and its potential for reshaping workforce management,
especially in high-risk projects and optimizing risk assessment, resource allocation, and safety
measures to mitigate work-related injuries. Practical validation through transaction testing using
Hyperledger Explorer validates the model’s feasibility and operational effectiveness, thus serving
as a blueprint for the industry’s data management. Ultimately, this research not only showcases
the promise of blockchain technology in addressing construction data security challenges but also
underscores its practical applicability through comprehensive testing, thus heralding a new era of
data management that harmonizes security and efficiency for stakeholders’ benefit.
Citation: Saah, A.E.N.; Yee, J.-J.; Choi,
J.-H. Securing Construction Workers’ Keywords: blockchain technology; Hyperledger Fabric; Amazon Web Services (AWS); construction
Data Security and Privacy with workers; privacy; safety
Blockchain Technology. Appl. Sci.
2023, 13, 13339. https://doi.org/
10.3390/app132413339
workers [5–7]. Safeguarding the privacy and security of workers’ personal information is
not only a legal and ethical obligation but also essential for maintaining trust and protecting
their rights [8]. This aligns with the work of Xu et al. [9], which highlights that privacy
protection is of utmost importance as it forms a key element in societal norms and law;
nevertheless, it is often traded away in favor of “good causes,” like security, safety, efficiency,
or productivity.
Furthermore, the construction industry has long grappled with the persistent challenge
of a shortage of skilled labor, and the workforce is rapidly aging [10–13]. These factors
further emphasize the importance of effectively managing construction workers’ personal
information. With a limited pool of skilled workers, prioritizing the protection of their
personal data becomes crucial to attract and retain talent. Construction workers invest their
time and expertise in projects and deserve the assurance that their sensitive information is
handled with the utmost care [14].
Additionally, ensuring the efficient handling of safety-related data concerning con-
struction workers is crucial for establishing a healthy work environment. This significance
arises from the fact that the construction industry, recognized for its job-related safety risks,
involves constantly changing and physically strenuous tasks of an unpredictable nature.
These tasks compel workers to execute actions in precarious and uncomfortable stances
over extended periods, leading to instances of non-lethal injuries [15–17]. These injuries can
have long-lasting consequences, leading to permanent disabilities for construction workers.
One specific type of injury is musculoskeletal disorders (WMSDs), which are often caused
by external factors, such as repetitive movements, overexertion, and awkward postures
in occupational settings. WMSDs can affect different areas of the body, such as the lower
back, upper limbs, and lower limbs, and they are associated with impairments in physical
tissues, like the joints, bones, muscles, and tendons [16,18]. By effectively managing data on
high-risk construction activities in a secure and reliable system, construction stakeholders
can make informed decisions that prioritize the safety and well-being of their workforce.
Data manipulation presents a significant risk within the construction industry due to
the intricate network of stakeholders involved in data exchange. Unsanctioned alterations
or tampering with information regarding workers’ credentials, certifications, employment
history, and safety records can lead to grave consequences. These include jeopardizing the
credibility of projects, compromising the safety of workers, and undermining trust among
stakeholders [19]. Addressing this issue is vital, as highlighted by Perera et al. [20], who
emphasize that identity theft is a widespread concern across various sectors, including
construction. Malicious individuals might exploit the personal details of construction
personnel, such as ID numbers and addresses, for fraudulent purposes. Thus, safeguarding
workers’ personal data from identity theft emerges as a critical need. Doing so not only
protects their well-being but also upholds the integrity of the construction field and fosters
a secure work environment.
While traditional data management approaches, such as centralized databases, physi-
cal safeguards, and the need-to-know principle, have had some level of efficiency, critical
challenges, including lack of transparency, susceptibility to unauthorized access, breaches,
and theft [21], necessitate a shift towards more advanced privacy management practices and
the adoption of secure and efficient digital solutions. Moreover, the increase in digitization
and data-driven processes in the construction industry have further amplified the impor-
tance of protecting workers’ personal information [22–24]. By implementing these digital
solutions, the construction industry can streamline privacy-related processes, including
consent management [25,26], handling data subject requests [27], and conducting privacy
impact assessments [28], thus resulting in improved efficiency and compliance. However,
it is vital for the construction industry to carefully select and implement these digital
solutions by considering various factors, such as data security, scalability, interoperability,
and alignment with privacy regulations.
Recognizing these challenges, this study aimed to address the problem of effectively
managing construction workers’ personal information while prioritizing their privacy and
Appl. Sci. 2023, 13, 13339 3 of 25
safety. To achieve this, this study focused on leveraging the Hyperledger Fabric blockchain
framework, which offers a permissioned and modular architecture tailored for business
networks, to develop an information management model that provides secure storage and
controlled access to workers’ data. The adoption of a private blockchain specifically built
on the Hyperledger Fabric framework was a strategic choice driven by the unique needs
and considerations of the construction industry [29]. Unlike public blockchains, private
blockchains restrict access to authorized participants, thus offering a heightened level of
control and privacy, which is imperative when dealing with sensitive information [30],
such as construction workers’ personal and safety data. The permissioned nature of
the blockchain ensures that only designated stakeholders, including project managers,
engineers, and regulatory bodies, have access to the stored information. This enhanced
control mitigates the risks associated with unauthorized access, a critical aspect when
prioritizing the privacy and security of construction workers’ data.
The integration of blockchain technology within the construction industry marks a sig-
nificant scientific advancement. The application of blockchain principles, including decen-
tralization, immutability, and transparency, offers a novel approach to address the intricate
challenges associated with information management in construction projects. According
to Politou et al. [31], the scientific underpinning of blockchain ensures a tamper-resistant
and decentralized data storage system, thus fundamentally altering the conventional land-
scape of information management. The scientific principles of data security and privacy
are integral to this study. By leveraging cryptographic techniques and a decentralized
structure, blockchain enhances the security of sensitive data in the construction sector. As
noted by Pan et al. [32], the immutable nature of blockchain ensures that once data are
recorded, they cannot be altered or manipulated, thus providing a robust foundation for
securing construction workers’ personal information. This consequently fosters trust and
collaboration among the various stakeholders in the construction industry.
ties within a renovation project to generate worker safety data, practical implementation
of GDPR-compliant biodata, and relevant safety data assessment techniques. Through
phases of experimental design, including blockchain infrastructure creation, chaincode
development, and real-world deployment on AWS, this research establishes a fundamental
change in information management practices, thereby emphasizing worker safety, privacy,
and the overall success of construction endeavors.
2. Literature Review
2.1. Traditional Methods of Data Management
Traditional methods of data management for construction workers have long been
utilized to safeguard their personal information even before the emergence of advanced
Appl. Sci. 2023, 13, 13339 5 of 25
2.2. Advanced Privacy Management Practices and the Adoption of Secure and Efficient
Digital Solutions
In response to the limitations of traditional data management methods, the construc-
tion industry is increasingly turning to advanced management practices and adopting
secure and efficient digital solutions [3,44,45]. These practices leverage technological ad-
vancements to enhance privacy protection, data security, and compliance with privacy reg-
ulations. One key aspect is the implementation of privacy-enhancing technologies [46,47],
such as encryption [48], tokenization [49], and data anonymization [50]. These techniques
ensure that personal information is protected both during storage and transmission, thus
reducing the risk of unauthorized access or breaches.
Additionally, the use of secure digital platforms and cloud-based solutions enables
companies to centralize and manage workers’ data more efficiently and securely. This
includes various features, such as access controls, audit trails, fire walls, and user authen-
tication mechanisms, to ensure that only authorized individuals have access to personal
information [51]. Furthermore, construction companies are implementing strict data gover-
nance and data retention policies to ensure that personal information is retained only for
Appl. Sci. 2023, 13, 13339 6 of 25
as long as necessary and securely disposed of when no longer required [52]. By adhering
to these policies, companies can minimize the potential risks associated with retaining
personal information beyond its intended purpose [53].
The adoption of such digital solutions enables the construction industry to streamline
privacy-related processes, such as consent management [25,26], data subject requests [27],
and privacy impact assessments [28], thus leading to increased efficiency and compliance.
However, it is essential for construction companies to carefully select and implement
these digital solutions by considering certain factors, such as data security, scalability,
interoperability, and alignment with privacy regulations.
Thus, utilizing advanced technologies, such as blockchain, can offer potential solutions
to enhance privacy in the construction industry [3,20,54]. For example, in the realm of
securing construction workers’ data, the adoption of blockchain technology over classical
encryption methods is driven by its inherent features that address specific challenges in data
management. Blockchain, as a decentralized and distributed ledger, ensures enhanced se-
curity through its consensus mechanisms and cryptographic hashing. Classical encryption
methods, while effective, lack the transparency and immutability that blockchain provides.
The construction industry demands a system where data integrity is guaranteed and any
alteration is immediately noticeable. Blockchain’s decentralized nature ensures that there
is no single point of failure, thus reducing vulnerability to attacks [55]. Furthermore, the
transparency of the blockchain allows for secure and traceable transactions, which fosters
trust among stakeholders [56]. Classical encryption methods, although capable of securing
data, may not offer the same level of transparency and resistance to tampering [57].
Blockchain technology, with its decentralized and immutable nature [31,58,59], pro-
vides a secure and transparent platform for storing and managing data. This decentralized
approach minimizes the risks associated with centralized databases, as it requires consen-
sus among network participants (in the case of the construction industry, stakeholders) to
validate and record transactions, thus ensuring data integrity and security. Implementing
blockchain-based systems in the construction industry can foster a climate of trust and
transparency [60]. Construction workers can have confidence that their personal infor-
mation is securely stored and accessed only by authorized parties, thereby enhancing
accountability and reducing the likelihood of privacy breaches [14].
the blockchain are self-executing digital contracts that automatically fulfill predetermined
conditions [65]. By eliminating the need for traditional intermediaries, such as banks, smart
contracts enable efficient and cost-effective transactions on the blockchain [68].
Figure
Figure1.1.Data
Datastructure
structure of
of aa block
block in
in aa blockchain.
blockchain.
3. Methodology
This study proposed a blockchain system architecture designed to safeguard the
privacy and security of personal information for construction workers, particularly their
biographic and safety data. The approach involved securely storing hypothetical biodata
and safety data and managing this information using the proposed blockchain system. The
biodata of workers adhere to the European Union’s General Data Protection Regulation
3. Methodology
This study proposed a blockchain system architecture designed to safeguard the pri-
vacy and security of personal information for construction workers, particularly their bi-
ographic and safety data. The approach involved securely storing hypothetical biodata
and safety data and managing this information using the proposed blockchain system.
Appl. Sci. 2023, 13, 13339 9 of 25
The biodata of workers adhere to the European Union’s General Data Protection Regula-
tion (GDPR), including certain details, such as names, ages, addresses, identification num-
bers, qualifications, certifications, and employment records. The safety data include scores
of(GDPR),
the risk including
level basedcertain
on thedetails, suchinformation
joint angle as names, ages,
fromaddresses,
the imageidentification
process usingnumbers,
image-
qualifications, certifications, and employment records. The safety data
based motion capture technology and occupational assessments using the Rapid Entire include scores of the
risk level based on the joint angle information from the image process using
Body Assessment (REBA) observational tool [90,91] to evaluate the risk of musculoskeletal image-based
motion capture technology and occupational assessments using the Rapid Entire Body As-
disorders.
sessment (REBA)
This system observational
utilized tool [90,91]Fabric
the Hyperledger to evaluate the riskonofthe
blockchain musculoskeletal disorders.
AWS cloud platform,
This system utilized the Hyperledger Fabric blockchain on the AWS
thus ensuring decentralization and immutability. The outcome was a robust information cloud platform,
thus ensuring
management decentralization
model that enhances and immutability.
the privacy and The outcome
safety was a robust
of construction information
workers’ data.
management model that enhances the privacy and safety of construction
This model permits authorized construction stakeholders to access trustworthy and veri- workers’ data.
This model permits authorized construction stakeholders to access trustworthy
fied data, thereby enabling informed decision making that prioritizes the well-being of the and verified
data, thereby
workers. enabling
The overall informed
framework of decision making
this approach that prioritizes
is depicted in Figure the2. well-being of the
workers. The overall framework of this approach is depicted in Figure 2.
This
Thisstudy
studywaswasconducted
conductedinintwo twophases.
phases.Phase
Phase1 1involved
involvedthe theexperimental
experimentaldesigndesign
ofofthe
the proposed blockchain system and the storage of the workers’ hypotheticalbiodata
proposed blockchain system and the storage of the workers’ hypothetical biodata
and
andsafety
safetydata.
data.Phase
Phase1 1was
wascarried
carriedout
outinin4 modules.
4 modules.These
These included
includedthe theimplementation
implementation
ofofModule
Module 1, which focused on developing the blockchain using the HyperledgerFabric
1, which focused on developing the blockchain using the Hyperledger Fabric
platform
platformon onthetheAWS
AWScloudcloudprovider.
provider.Module
Module2 2encompassed
encompassedthe thedevelopment
developmentofofthe the
chaincode.
chaincode.Module Module 3 involved
3 involved thethe
creation of aof
creation server-side Application
a server-side ApplicationProgramming
Programming In-
terface (API),
Interface which
(API), whichallows
allowsclient applications
client applications to to
send
sendrequests
requests totothe server
the serverand
andreceive
receive
responses. Finally, Module 4 entailed integrating the blockchain system
responses. Finally, Module 4 entailed integrating the blockchain system onto a third-partyonto a third-party
graphic
graphicuseruser interface
interface (GUI),
(GUI),thus enabling
thus enabling easy visualization
easy visualizationof the
of data. In phase
the data. 2, the2,
In phase
results from the
the results from experimental
the experimentaldesigndesign
and management
and managementof the blockchain led to the
of the blockchain leddevel-
to the
opment of a conceptual
development information
of a conceptual management
information modelmodel
management for enhancing the privacy
for enhancing and
the privacy
safety of construction
and safety workers’
of construction personal
workers’ information
personal and its
information andpractical implementation
its practical implementation to
validate its usability
to validate and and
its usability benefits for the
benefits for construction
the constructionindustry.
industry.
breaches and unauthorized access and allowed for real-time updates and synchronized
data [93] across all relevant stakeholders, including employers, regulatory bodies, and
project managers. Smart contracts or chaincodes are implemented to automate key pro-
cesses related to construction workers’ management, such as verifying trade type or skills,
certifications, high-risk-level workers, and tracking training programs.
Figure 3 below shows the system structure for the proposed Hyperledger Fabric
blockchain developed on AWS. The system structure was organized into five (5) layers to
among relevant
facilitate parties. The
the functioning ofGossip protocol facilitated
the blockchain network. peer-to-peer
The layeredcommunication and
structure can be described
data synchronization in the network. It efficiently disseminated information through in-
from bottom to top as follows:
terconnected peers, thus ensuring scalability and efficient communication.
AWS Infrastructure Layer: This layer served as the foundational layer for the proposed
blockchain system, and it was built using Amazon Web Services (AWS). It established a
cloud computing platform for setting up and managing the network. This layer utilized
various AWS components, like virtual machines, storage services, and networking resources.
To ensure scalability, Auto Scaling was implemented, which dynamically adjusted resources
as per demand. AWS’s Elastic Cloud Compute (EC2) provided virtual servers for running
applications. This infrastructure was created in the Asia Sydney AWS region on a Virtual
Private Cloud (VPC) network to ensure network isolation and security for the blockchain
network. An EC2 instance on the Ubuntu platform was set up within this network to
establish a secure environment. This infrastructure configuration was designed to support
the secure and efficient functioning of the blockchain system.
Hyperledger Fabric Layer: This layer implemented the Hyperledger Fabric protocol,
which is designed for secure and efficient permissioned networks. This layer consisted of
various components, including 2 organizations, 1 Orderer node, 2 Peer nodes, 1 Certificate
Authority (CA), a Membership service provider (MSP), the Channel, a Gossip, a LevelDB
storage library, and blocks. In this blockchain framework, organizations represented stake-
holders with authorized access, such as project managers, engineers, regulators, etc. Peer
nodes were crucial for network maintenance, storing copies of the blockchain, participating
in consensus, validating and sharing transactions, and upholding decentralization. These
peers communicated to verify and synchronize data, thus ensuring the reliability of the
distributed ledger.
The Orderer node maintained transaction sequencing and consistency. It organized
transactions into blocks, thus maintaining their chronological order and integrity. By broad-
casting these blocks to peers, the Orderer enabled consensus on transaction validity and
ensured a synchronized view of the blockchain across the network. Certificate Authorities
(CAs) played a crucial role in establishing trust and verifying the identities of network
participants. They issued digital certificates that linked public keys to specific identities,
thus enabling authentication and secure communication. CAs managed certificates, verified
identities, and ensured secure interactions and transactions, thereby enhancing network
security and trust. Channels enabled secure and confidential communication and transac-
tions between specific stakeholders. Private channels ensured data privacy and compliance
with regulations, thus facilitating secure information exchange among relevant parties.
The Gossip protocol facilitated peer-to-peer communication and data synchronization in
the network. It efficiently disseminated information through interconnected peers, thus
ensuring scalability and efficient communication.
LevelDB, an open-source key-value storage library, was used to store and retrieve
blockchain data efficiently. It provided a simple key-value data model, allowing users
to insert, retrieve, and delete data based on unique keys. Blocks represented collec-
tions of transactions organized sequentially and added to the blockchain. They formed
the fundamental units of the blockchain, encapsulating multiple transactions within a
single entity.
Integration Layer: The integration layer facilitated the integration of the blockchain net-
work with external systems and services. It included APIs, which were tested successfully
in Postman (an API platform), a middleware, and connectors that enabled communication
and data exchange between the blockchain network and other external applications. This
layer ensured seamless integration and interoperability between the blockchain network
and existing infrastructure.
Application Layer: The application layer was made up of business-specific applica-
tions and chaincode developed with Java version 11.10.18. Java was chosen for its broad
adoption and versatility, thus streamlining the implementation process and ensuring the
flexibility of the chaincode. The chaincode was built to be highly secure, deterministic, and
transactional. It served as the foundation for the construction workers’ information manage-
ment system, offering various functions. These included adding workers’ biodata and safety
information, retrieving data, and making updates to details like qualifications, certifications,
Appl. Sci. 2023, 13, 13339 12 of 25
and work history. These features were customized to cater to the construction industry’s
specific requirements.
Representation layer: The representation layer was a vital part of the proposed
blockchain application’s user interface. It included the Controller, User Interface (UI),
and Hyperledger Explorer. The Controller acted as a link between the UI and the appli-
cation’s logic, facilitating communication and coordination. The UI offered a graphical
or command-line way for users to engage with the blockchain app, such as submitting
transactions and accessing ledger data. The Hyperledger Explorer, a visualization tool, gave
a comprehensive overview of the blockchain network, displaying block, transaction, and
participant details. This layer was crucial for stakeholders to interact with the blockchain
effectively while ensuring user-friendliness and transparency.
Table
Step1.2:Hyperledger Fabric
Installing and components.
configuring the Hyperledger Fabric components
The AWS infrastructure
Container ID was set up, followed by the installation and configuration
Names
of Hyperledger Fabric components. This involved deploying peers, orderers, and cer-
76f609623b6e dev-peer0.org2.example.com-construction-chaincode
tificate authorities on AWS, each with specific configurations. The network’s structure,
5fcc2dcfae2c dev-peer0.org1.example.com-construction-chaincode
2b0446d09f92 dev-peer0.org2.example.com-basic
89cadb858e55 dev-peer0.org1.example.com-basic
e7a5f020a84f cli
Appl. Sci. 2023, 13, 13339 13 of 25
peer roles, orderer nodes, MSP, and CA infrastructure were established meticulously to
meet the network’s needs. These components facilitated decentralized consensus, secure
transactions, and identity management, thus ensuring the privacy and security of worker
data. The proper deployment and configuration led to the creation of a robust and efficient
Hyperledger Fabric blockchain system, with detailed information provided in Table 1.
Container ID Names
76f609623b6e dev-peer0.org2.example.com-construction-chaincode
5fcc2dcfae2c dev-peer0.org1.example.com-construction-chaincode
2b0446d09f92 dev-peer0.org2.example.com-basic
89cadb858e55 dev-peer0.org1.example.com-basic
e7a5f020a84f cli
3fc7a199eaa1 Peer0.org2.example.com
859c95e237d8 Peer0.org.example.com
442b5b213879 couchdb0
d1d9090efa1f couchdb1
66abe5c9301c orderer.example.com
d453f4b69751 ca_orderer
c8b1ea1a7c9b ca_org2
817296bd5f4a ca_org1
dev = fabric-dev-servers; org = organization; cli = fabric-tools; ca = certificate authority.
Algorithm 2 described the safety data of the workers. The algorithm represented a
Java class called “SpreadingMortar”, which served as a data structure to store information
related to risk assessments of the tilers during mortar spreading. The class contained
various properties, such as “id”, “numberOfFrames”, “neckAngle”, etc., which represented
different aspects of the worker’s posture and movements when spreading the mortar, and
properties like “rebaScore” and “levelOfMSDRisk” to indicate the calculated risk score
and the level of work-related musculoskeletal disorder risk associated with the worker’s
activities. The class also provided getter and setter methods for accessing and modifying
these properties.
The integration, as
The integration, as shown
shown in Figure 5,
in Figure 5, confirms
confirms that
that the
the Hyperledger
Hyperledger components
components
were successfully running. Furthermore, the results shown in Figure 6 display
were successfully running. Furthermore, the results shown in Figure 6 display the the fabric
fabric
components,
components, including
Appl. Sci. 2023, 13, x FOR PEER REVIEW includingthe
thecontainer IDs,
container status,
IDs, ports,
status, names,
ports, andand
names, commands, which
commands, sug-
16which
of 26
gest thatthat
suggest the the
Hyperledger Fabric
Hyperledger blockchain
Fabric developed
blockchain waswas
developed running successfully.
running successfully.
In
In Figure
Figure 7,
7, the APIs tested
the APIs tested on
onPOSTMAN
POSTMANrevealed
revealedthe
thetransaction
transactionstatus
statustoto
bebe true,
true, as
as the transactions for construction workers’ personal information and risk assessment
the transactions for construction workers’ personal information and risk assessment data
data
werewere carried
carried out added
out and and added
to thetoblockchain
the blockchain successfully.
successfully.
Figure 6. Fabric components of the proposed blockchain.
Appl. Sci. 2023, 13, 13339 In Figure 7, the APIs tested on POSTMAN revealed the transaction status to be true,16 of 25
as the transactions for construction workers’ personal information and risk assessment
data were carried out and added to the blockchain successfully.
4.1.1. A Conceptual Blockchain-Based Model for Enhancing the Privacy and Safety of
Construction Workers’ Personal Information
The results from the experimental design led to the development of a robust infor-
mation management blockchain model aimed at enhancing the privacy and safety of
construction workers (Figure 8). The model functions because (i) it allows pertinent stake-
holders, such as the Human resource manager, project manager, contractor, health and
safety officer, regulatory bodies, inspector, and certification body, to register as members
of the network to endorse the construction workers’ data; (ii) construction workers’ bio-
data and safety data are stored and require the participants in (i) to sign and endorse
the information digitally, and the governance of the network is established based on the
consensus and consent of all of the stakeholders; (iii) every time information is requested
by a permitted stakeholder, the smart contract (chaincode) converts it into a transaction and
sends it to the ordering service through which transactions are packed into blocks; in this
way, the transactions are then secured cryptographically before being added to a blockchain
system to create an immutable chain of records; (iv) to further enhance the security of
the information during the endorsement process, the proposed model uses a consensus
algorithm to ensure complete protection of the privacy of the data; and (v) each participant
(stakeholder) on the blockchain sets up a copy of the ledger to keep track of the endorsed
transaction information, and the smart contract can retrieve the stored transactions from
the ledgers whenever requested by the stakeholders.
Figure
Figure 8. A8.blockchain-based
A blockchain-based model
model for enhancing
for enhancing the privacy
the privacy and safety
and safety of construction
of construction workers’
workers’
information. (i) Membership registration; (ii) Information management; (iii) Ordering
information. (i) Membership registration; (ii) Information management; (iii) Ordering Service; Service; (iv)
Consensus mechanism; (v) Decentralized ledger of construction workers’ biodata and safety
(iv) Consensus mechanism; (v) Decentralized ledger of construction workers’ biodata and safety data. data.
scenario, a total of five blocks, each containing a set of transactions, were generated. These
transactions represented various interactions related to the management of construction
workers’ data. The involvement of three nodes in the network underlines the decentralized
nature of the Hyperledger Fabric blockchain, where multiple stakeholders collaboratively
maintain the integrity of the network and validate transactions. Furthermore, the presence
Appl. Sci. 2023, 13, x FOR PEER REVIEW
of one chaincode emphasized the smart contract’s role in governing the rules and logic 19 offor
26
managing data on the blockchain.
4.1.3.This
Security Details of the
comprehensive Conceptual
testing Blockchain
phase not Developed
only ensured on AWS robustness of the
the technical
blockchain systemprovides
This section but alsoademonstrated
detailed overviewits applicability in a real-world
of the rigorous construction
security measures inte-
context. The blockchain system exhibited its capability to securely manage
grated into the conceptual blockchain hosted on the Amazon Web Services (AWS) plat- and provide
access to authenticated
form. Four and verified
specialized security groupsconstruction workers’ information.
(sg-08f3f412cb81a7901, The successful
sg-0f83feae57f50dfdd, sg-
visualization of transactions
053f91c3d59af2214, using Hyperledger
and sg-03462527444c032a7) Explorer
were showcased
meticulously the transparency
implemented to gov-
and tamper-resistant
ern network access tonature
specificof instances.
the data stored. The outcomes
Functioning as virtualoffirewalls,
this testing contribute
these security
significantly
groups offerto the advancement
heightened controlof blockchain
over technology
communication within the
channels, constructionin
as represented industry,
Figure
empowering stakeholders with informed decision making capabilities, enhancing
10. Each security group is customized to fortify the overall resilience of the blockchain safety
measures, and streamlining workforce management practices.
network, thus addressing stringent security requirements and mitigating the risks associ-
ated with unauthorized access.
4.1.3. Security Details of the Conceptual Blockchain Developed on AWS
This section provides a detailed overview of the rigorous security measures inte-
grated into the conceptual blockchain hosted on the Amazon Web Services (AWS) plat-
form. Four specialized security groups (sg-08f3f412cb81a7901, sg-0f83feae57f50dfdd, sg-
053f91c3d59af2214, and sg-03462527444c032a7) were meticulously implemented to govern
network access to specific instances. Functioning as virtual firewalls, these security groups
offer heightened control over communication channels, as represented in Figure 10. Each
security group is customized to fortify the overall resilience of the blockchain network,
thus addressing stringent security requirements and mitigating the risks associated with
unauthorized access.
form. Four specialized security groups (sg-08f3f412cb81a7901, sg-0f83feae57f50dfdd
053f91c3d59af2214, and sg-03462527444c032a7) were meticulously implemented to
ern network access to specific instances. Functioning as virtual firewalls, these sec
groups offer heightened control over communication channels, as represented in Fi
Appl. Sci. 2023, 13, 13339
10. Each security group is customized to fortify the overall resilience19 of the blockc
of 25
network, thus addressing stringent security requirements and mitigating the risks as
ated with unauthorized access.
Figure
Figure 10. Security 10. Security
groups groups
developed developedblockchain.
on developed on developed blockchain.
Figure
Figure 11
11 provides
provides aa snapshot
snapshot ofof the
the database
database housing
housing the
the comprehensive
comprehensive data data of
of
construction workers securely stored on the blockchain. It confirms the database’s
construction workers securely stored on the blockchain. It confirms the database’s availabil- availa-
bility status,
ity status, highlighting
highlighting theintegration
the active active integration of group
of the security the security group sg-
sg-08f3f412cb81a7901
08f3f412cb81a7901 by rds-ec2-1.
by rds-ec2-1. The “Publicly The “Publicly
accessible” accessible”
parameter status isparameter status
set as “No,” is setsignifies
which as “No,”a
which
secure,signifies a secure, non-publicly-accessible
non-publicly-accessible blockchain
blockchain environment. environment.
This configurationThis configura-a
establishes
tion
robustestablishes a robust defense
defense mechanism, mechanism,the
thus safeguarding thus safeguarding
blockchain againstthe blockchain external
unauthorized against
unauthorized external access and aligning with the stringent security standards
access and aligning with the stringent security standards embedded in the AWS ecosystem. embed-
ded
This in the AWSunderscores
depiction ecosystem. the
Thisstringent
depictionsecurity
underscores the stringent
protocols security
meticulously protocols
implemented
meticulously implemented
within our AWS-hosted within our
blockchain, thusAWS-hosted
ensuring theblockchain, thus ensuring
confidentiality the confi-
and integrity of the
dentiality and integrity
stored construction of the
worker stored construction worker data.
data.
Figure
Figure 11.
11. Database
Database snapshot
snapshot and
and security
security status.
status.
These robust security measures are pivotal in addressing concerns related to data
vulnerability, identity theft, and misuse. By systematically controlling access to critical
information stored on the blockchain, these security configurations act as a bulwark
against unauthorized entry. This deliberate emphasis on security aligns with industry best
Appl. Sci. 2023, 13, 13339 20 of 25
These robust security measures are pivotal in addressing concerns related to data
vulnerability, identity theft, and misuse. By systematically controlling access to critical
information stored on the blockchain, these security configurations act as a bulwark against
unauthorized entry. This deliberate emphasis on security aligns with industry best prac-
tices, thus aiming to create a blockchain environment resilient to external threats and
unauthorized access and ensuring the integrity and confidentiality of the stored data.
4.2. Discussion
The development of the conceptual blockchain model for information management
presents a significant improvement in addressing the privacy and safety concerns sur-
rounding construction workers’ personal information. The model establishes a secure and
transparent process for registering and endorsing construction workers’ data.
The process involves the storage of construction workers’ biodata and safety data,
and it requires digital signatures and endorsements from authorized participants, thus
restricting access to unauthorized personnels and thereby controlling the vital challenges
of data manipulation and breach, as highlighted in [19–21]. The governance structure
ensures that each participant’s input is valued and authenticated. When information is
requested, the smart contract converts it into a transaction, sending it through the ordering
service to be included in blocks, which are then cryptographically secured and added to
the blockchain. This creates an immutable chain of records, safeguarding the integrity and
privacy of the data.
To reinforce information security during the endorsement, the model incorporates a
consensus algorithm, which provides a robust layer of protection and ensures the privacy
of workers’ information, thus addressing the identified threats, such as identity theft. The
model functions as a comprehensive information management platform and complies
with the European Union’s GDPR. It secures sensitive worker information, including
biodata and safety data, through encryption and decentralized control. This directly
responds to the identified threat of unauthorized access and breaches. The transparency
achieved through blockchain ensures auditable data management, thus fostering trust and
collaboration among stakeholders, which provides solutions for the shortcomings of the
traditional approaches.
Furthermore, one of the key challenges emphasized is the need for digital solutions
that accommodate the diverse nature of construction projects globally. The geographical
applicability of the proposed blockchain model is a critical consideration. Developed
within the Asia Sydney AWS region, scalability and adaptability to different regions are
fundamental aspects of this study. By examining the unique regional variations in con-
struction practices and data protection regulations, the model aims to be a global solution.
Understanding the global trends in the construction industry is crucial for ensuring the
applicability of innovative solutions across diverse geographical contexts. Referencing
global trends in the construction industry, it becomes evident that this study aligns with the
challenges faced by construction projects on a global scale. The need for standardized yet
flexible solutions that can accommodate regional variations underscores the geographical
relevance of this study.
5. Conclusions
The primary objective of this study was to leverage the potential of blockchain technol-
ogy to fortify data security, with a focus on the biographical and safety data of construction
workers. The developed solution, a robust Hyperledger Fabric blockchain deployed on the
AWS platform, was successfully implemented as a feasible solution to the vulnerabilities of
the traditional data management systems. Beyond addressing immediate concerns of data
security, this study points towards the promise of the blockchain model in significantly
optimizing risk assessment, resource allocation, and enhanced safety measures, especially
in high-risk construction projects.
Appl. Sci. 2023, 13, 13339 21 of 25
Practical validation through transaction testing using Hyperledger Explorer has af-
firmed the feasibility and operational effectiveness of the proposed model. This validation
serves as a blueprint for the industry’s data management practices, especially in construc-
tion workers’ personal information management, thus providing a tangible pathway for
stakeholders to enhance security without compromising efficiency.
This study assumes pivotal significance as it not only addresses immediate challenges
of data breaches, identity theft, and misuse but also pioneers a fundamental change in
how the construction industry approaches decision making, data security, privacy, and
industry innovation.
1. Informed decision making for high-risk activities: By storing safety data, especially
work-related musculoskeletal disorder (WMSD) risk assessments, on the blockchain,
construction stakeholders gain access to verified and authenticated information. This
empowers them to make informed decisions related to workforce management dur-
ing high-risk construction tasks. Comprehensive safety data facilitate effective risk
assessment, optimal resource allocation, and the assignment of skilled workers to spe-
cific high-risk activities. This proactive approach enhances safety measures, reduces
accidents, and ensures the well-being of construction personnel.
2. Enhanced data security and privacy: Storing workers’ biographic data on the blockchain
enhances security and privacy compared to centralized systems. The blockchain’s
decentralized architecture distributes data across multiple nodes, making unautho-
rized manipulation challenging. Cryptographic techniques further safeguard sensitive
information, ensuring its confidentiality. This heightened data security fosters trust
between construction stakeholders and workers, assuring them that their information
is handled with the utmost security.
3. Promotion of Industry Innovation and Trust: The successful implementation of
blockchain within the construction sector sets a precedent for technological inno-
vation. Demonstrating the practical application of blockchain in enhancing data
security and privacy inspires confidence among stakeholders. This newfound trust
encourages further adoption of advanced technologies to modernize construction
practices, driving industry-wide innovation and fostering a culture of continuous
improvement.
6.2. Recommendations
To optimize the adoption and effectiveness of the Hyperledger Fabric blockchain for
construction workers’ data management, the following recommendations are proposed.
(1) Continuous Monitoring and Auditing: Ensuring compliance with data protection
regulations and preemptively identifying vulnerabilities require consistent monitoring
and auditing of the blockchain system. Regular updates and patches should be swiftly
applied to mitigate potential security risks, thus creating a robust environment for
data management.
(2) Real-world Testing and Iterative Enhancement: Real-world testing and pilot implemen-
tation of the blockchain platform in construction projects are essential. This approach
Appl. Sci. 2023, 13, 13339 22 of 25
References
1. Alaloul, W.S.; Liew, M.S.; Zawawi, N.A.W.A.; Kennedy, I.B. Industrial Revolution 4.0 in the construction industry: Challenges
and opportunities for stakeholders. Ain Shams Eng. J. 2020, 11, 225–230. [CrossRef]
2. World Economic Forum. Shaping the Future of Construction a Breakthrough in Mindset and Technology; World Economic Forum:
Cologny, Switzerland, 2016.
3. Chen, J.; Lv, Z.; Song, H. Design of personnel big data management system based on blockchain. Future Gener. Comput. Syst. 2019,
101, 1122–1129. [CrossRef]
4. Gruschka, N.; Mavroeidis, V.; Vishi, K.; Jensen, M. Privacy issues and data protection in big data: A case study analysis under
GDPR. In Proceedings of the IEEE International Conference on Big Data (Big Data), Seattle, WA, USA, 10–13 December 2018;
pp. 5027–5033.
5. Monahan, T. Identity theft vulnerability: Neoliberal governance through crime construction. Theor. Criminol. 2009, 13, 155–176.
[CrossRef]
6. Wang, W.; Yuan, Y.; Archer, N. A contextual framework for combating identity theft. IEEE Secur. Priv. 2006, 4, 30–38. [CrossRef]
7. Smith, A.D.; Lias, A.R. Identity theft and e-fraud as critical CRM concerns. Int. J. Enterp. Inf. Syst. (IJEIS) 2005, 1, 17–36. [CrossRef]
8. Tikkinen-Piri, C.; Rohunen, A.; Markkula, J. EU General Data Protection Regulation: Changes and implications for personal data
collecting companies. Comput. Law Secur. Rev. 2018, 34, 134–153. [CrossRef]
9. Xu, J.; Lu, W.; Wu, L.; Lou, J.; Li, X. Balancing privacy and occupational safety and health in construction: A blockchain-enabled
P-OSH deployment framework. Saf. Sci. 2022, 154, 105860. [CrossRef]
Appl. Sci. 2023, 13, 13339 23 of 25
10. Gamil, Y.; Alhagar, A. The impact of pandemic crisis on the survival of construction industry: A case of COVID-19. Mediterr. J.
Soc. Sci. 2020, 11, 122. [CrossRef]
11. Olanrewaju, A.; Tan, S.Y.; Kwan, L.F. Roles of communication on performance of the construction sector. Procedia Eng. 2017, 196,
763–770. [CrossRef]
12. Ho, P.H. Labour and skill shortages in Hong Kong’s construction industry. Eng. Constr. Archit. Manag. 2016, 23, 533–550.
[CrossRef]
13. Olsen, D.; Tatum, M.; Defnall, C. How industrial contractors are handling skilled labor shortages in the United States. In
Proceedings of the 48th ASC Annual International Conference Proceedings, Birmingham, UK, 11–14 April 2012.
14. Kerrest, F. Commentary: How Blockchain Could Put an End to Identity Theft. Fortune. 2018. Available online: http://fortune.
com/2018/04/20/blockchain-technology-identity-theft-dataprivacy-protection/ (accessed on 27 September 2018).
15. Antwi-Afari, M.F.; Li, H.; Edwards, D.J.; Pärn, E.A.; Seo, J.; Wong, A.Y.L. Biomechanical analysis of risk factors for work-related
musculoskeletal disorders during repetitive lifting task in construction workers. Autom. Constr. 2017, 83, 41–47. [CrossRef]
16. Antwi-Afari, M.F.; Li, H.; Yu, Y.; Kong, L. Wearable insole pressure system for automated detection and classification of awkward
working postures in construction workers. Autom. Constr. 2018, 96, 433–441. [CrossRef]
17. Boschman, J.S.; van der Molen, H.F.; Sluiter, J.K.; Frings-Dresen, M.H. Musculoskeletal disorders among construction workers: A
one-year follow-up study. BMC Musculoskelet. Disord. 2012, 13, 196. [CrossRef] [PubMed]
18. Valero, E.; Sivanathan, A.; Bosché, F.; Abdel-Wahab, M. Analysis of construction trade worker body motions using a wearable
and wireless motion sensor network. Autom. Constr. 2017, 83, 48–55. [CrossRef]
19. Cheng, S.; Daub, M.; Domeyer, A.; Lundqvist, M. Using Blockchain to Improve Data Management in the Public Sector; McKinsey
Digital: Kolkata, India, 2017.
20. Perera, S.; Nanayakkara, S.; Rodrigo, M.N.N.; Senaratne, S.; Weinand, R. Blockchain technology: Is it hype or real in the
construction industry? J. Ind. Inf. Integr. 2020, 17, 100125. [CrossRef]
21. Heilig, L.; Voß, S. A holistic framework for security and privacy management in cloud-based smart ports. In Proceedings of
the 15th International Conference on Computer and IT Applications in the Maritime Industries-COMPIT ‘16, Lecce, Italy, 9–11
May 2016.
22. Nikmehr, B.; Hosseini, M.R.; Martek, I.; Zavadskas, E.K.; Antucheviciene, J. Digitalization as a strategic means of achieving
sustainable efficiencies in construction management: A critical review. Sustainability 2021, 13, 5040. [CrossRef]
23. Klinc, R.; Turk, Ž. Construction 4.0–digital transformation of one of the oldest industries. Econ. Bus. Rev. 2019, 21, 4. [CrossRef]
24. Gourévitch, A.; Fæste, L.; Baltassis, E.; Marx, J. Data-Driven Transformation. BCG Perspect. 2017, 5, 8.
25. Bonnici, C.J.; Coles-Kemp, L. Principled electronic consent management: A preliminary research framework. In Proceedings of
the 2010 International Conference on Emerging Security Technologies, Canterbury, UK, 6–7 September 2010; pp. 119–123.
26. Li, H.; Lu, M.; Hsu, S.C.; Gray, M.; Huang, T. Proactive behavior-based safety management for construction safety improvement.
Saf. Sci. 2015, 75, 107–117. [CrossRef]
27. Boniface, C.; Fouad, I.; Bielova, N.; Lauradoux, C.; Santos, C. Security analysis of subject access request procedures: How to
authenticate data subjects safely when they request for their data. In Privacy Technologies and Policy: 7th Annual Privacy Forum,
APF 2019, Rome, Italy, 13–14 June 2019; Springer International Publishing: Berlin/Heidelberg, Germany, 2019; Proceedings 7;
pp. 182–209.
28. Oetzel, M.C.; Spiekermann, S. A systematic methodology for privacy impact assessments: A design science approach. Eur. J. Inf.
Syst. 2014, 23, 126–150. [CrossRef]
29. Yang, R.; Wakefield, R.; Lyu, S.; Jayasuriya, S.; Han, F.; Yi, X.; Yang, T.; Amarasinghe, G.; Chen, S. Public and private blockchain in
construction business process and information integration. Autom. Constr. 2020, 118, 103276. [CrossRef]
30. Makhdoom, I.; Zhou, I.; Abolhasan, M.; Lipman, J.; Ni, W. PrivySharing: A blockchain-based framework for privacy-preserving
and secure data sharing in smart cities. Comput. Secur. 2020, 88, 101653. [CrossRef]
31. Politou, E.; Casino, F.; Alepis, E.; Patsakis, C. Blockchain mutability: Challenges and proposed solutions. IEEE Trans. Emerg. Top.
Comput. 2019, 9, 1972–1986. [CrossRef]
32. Pan, X.; Zhong, B.; Sheng, D.; Yuan, X.; Wang, Y. Blockchain and deep learning technologies for construction equipment security
information management. Autom. Constr. 2022, 136, 104186. [CrossRef]
33. Kim, K.H.; Kim, K.S.; Kim, D.S.; Jang, S.J.; Hong, K.H.; Yoo, S.-W. Characteristics of Work-related Musculoskeletal Disorders in
Korea and Their Work-relatedness Evaluation. J. Korean Med. Sci. 2010, 25, S77–S86. [CrossRef]
34. Dong, X.S.; Betit, E.; Dale, A.M.; Barlet, G.; Wei, Q. Trends of Musculoskeletal Disorders and Interventions in the Construction
Industry. 2019. Available online: https://stacks.cdc.gov/view/cdc/86273 (accessed on 16 October 2023).
35. Khando, K.; Gao, S.; Islam, S.M.; Salman, A. Enhancing employees information security awareness in private and public
organisations: A systematic literature review. Comput. Secur. 2021, 106, 102267. [CrossRef]
36. Tapscott, D.; Tapscott, A. How blockchain will change organizations. MIT Sloan Manag. Rev. 2017, 58, 10.
37. Kobsa, A. Privacy-enhanced personalization. Commun. ACM 2007, 50, 24–33. [CrossRef]
38. Cranor, L.F. Necessary but not sufficient: Standardized mechanisms for privacy notice and choice. J. Telecomm. High Tech. L. 2012,
10, 273.
39. Johnson, V.R. Cybersecurity, Identity Theft, and the Limits of Tort Liability. South Carol. Law Rev. 2005, 57, 255.
40. Ahmad, S. Green human resource management: Policies and practices. Cogent Bus. Manag. 2015, 2, 1030817. [CrossRef]
Appl. Sci. 2023, 13, 13339 24 of 25
41. Clough, R.H.; Sears, G.A.; Sears, S.K.; Segner, R.O.; Rounds, J.L. Construction Contracting: A Practical Guide to Company Management;
John Wiley & Sons: Hoboken, NJ, USA, 2015.
42. Siegel, K.M. Protecting the Most Valuable Corporate Asset: Electronic Data, Identity Theft, Personal Information, and the Role of
Data Security in the Information Age. Penn. St. L. Rev. 2006, 111, 779.
43. Al-Zaben, N.; Onik, M.M.H.; Yang, J.; Lee, N.Y.; Kim, C.S. General data protection regulation complied blockchain architecture for
personally identifiable information management. In Proceedings of the 2018 International Conference on Computing, Electronics
& Communications Engineering (iCCECE), Southend, UK, 16–17 August 2018; pp. 77–82.
44. Yi, X.; Wu, J. Research on safety management of construction engineering personnel under “big data+ artificial intelligence”.
Open J. Bus. Manag. 2020, 8, 1059–1075. [CrossRef]
45. Chanal, P.M.; Kakkasageri, M.S. Security and privacy in IOT: A survey. Wirel. Pers. Commun. 2020, 115, 1667–1693. [CrossRef]
46. Safa, N.S.; Mitchell, F.; Maple, C.; Azad, M.A.; Dabbagh, M. Privacy Enhancing Technologies (PETs) for connected vehicles in
smart cities. Trans. Emerg. Telecommun. Technol. 2022, 33, e4173. [CrossRef]
47. Curzon, J.; Almehmadi, A.; El-Khatib, K. A survey of privacy enhancing technologies for smart cities. Pervasive Mob. Comput.
2019, 55, 76–95. [CrossRef]
48. Bhanot, R.; Hans, R. A review and comparative analysis of various encryption algorithms. Int. J. Secur. Its Appl. 2015, 9, 289–306.
[CrossRef]
49. Cachin, C.; Camenisch, J.; Freire-Stögbuchner, E.; Lehmann, A. Updatable tokenization: Formal definitions and provably secure
constructions. In Financial Cryptography and Data Security: 21st International Conference, FC 2017, Sliema, Malta, 3–7 April 2017,
Revised Selected Papers; Springer International Publishing: Cham, Switzerland, 2017; pp. 59–75.
50. Murthy, S.; Bakar, A.A.; Rahim, F.A.; Ramli, R. A comparative study of data anonymization techniques. In Proceedings of the
2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and
Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), Washington, DC, USA, 27–29 May
2019; pp. 306–309.
51. David, A.; Zarli, A.; Mirarchi, C.; Naville, N.; Perissich, L. DigiPLACE: Towards a reference architecture framework for digital
platforms in the EU construction sector. In ECPPM 2021–eWork and eBusiness in Architecture, Engineering and Construction; CRC
Press: Boca Raton, FL, USA, 2021; pp. 511–518.
52. Smallwood, R.F. Information Governance: Concepts, Strategies and Best Practices; John Wiley & Sons: Hoboken, NJ, USA, 2019.
53. Voss, W.G. Cross-border data flows, the GDPR, and data governance. Wash. Int. Law J. 2019, 29, 485. [CrossRef]
54. Kuperberg, M. Blockchain-Based Identity Management: A Survey from the enterprise and ecosystem perspective. IEEE Trans.
Eng. Manag. 2020, 67, 1008–1027. [CrossRef]
55. Swan, M. Blockchain: Blueprint for a New Economy; O’Reilly Media, Inc.: Sebastopol, CA, USA, 2015.
56. Mougayar, W. The Business Blockchain: Promise, Practice, and Application of the Next Internet Technology; John Wiley & Sons: Hoboken,
NJ, USA, 2016.
57. Shabir, M.Y.; Iqbal, A.; Mahmood, Z.; Ghafoor, A. Analysis of classical encryption techniques in cloud computing. Tsinghua Sci.
Technol. 2016, 21, 102–113. [CrossRef]
58. Wu, H.; Zhang, P.; Li, H.; Zhong, B.; Fung, I.W.; Lee, Y.Y.R. Blockchain Technology in the Construction Industry: Current Status,
Challenges, and Future Directions. J. Constr. Eng. Manag. 2022, 148, 03122007. [CrossRef]
59. Monrat, A.A.; Schelén, O.; Andersson, K. A survey of blockchain from the perspectives of applications, challenges, and
opportunities. IEEE Access 2019, 7, 117134–117151. [CrossRef]
60. Lu, W.; Wu, L.; Zhao, R. Rebuilding trust in the construction industry: A blockchain-based deployment framework. Int. J. Constr.
Manag. 2023, 23, 1405–1416. [CrossRef]
61. Nakamoto, S. Bitcoin v0. 1 Released. The Mail Archive, 9. 2009. Available online: https://www.mail-archive.com/cryptography@
metzdowd.com/msg10142.html (accessed on 15 May 2023).
62. Saah, A.E.N.; Choi, J.H. Blockchain technology in the AEC industry: Scientometric analysis of research activities. J. Build. Eng.
2023, 72, 106609. [CrossRef]
63. Casino, F.; Dasaklis, T.K.; Patsakis, C. A systematic literature review of blockchain-based applications: Current status, classification
and open issues. Telemat. Inform. 2019, 36, 55–81. [CrossRef]
64. Lee, D.; Lee, S.H.; Masoud, N.; Krishnan, M.S.; Li, V.C. Integrated digital twin and blockchain framework to support accountable
information sharing in construction projects. Autom. Constr. 2021, 127, 103688. [CrossRef]
65. Penzes, B.; KirNup, A.; Gage, C.; Dravai, T.; Colmer, M. Blockchain Technology in the Construction Industry: Digital Transformation for
High Productivity; Institution of Civil Engineers (ICE): London, UK, 2018.
66. Gupta, M. Blockchain for Dummies; John Wiley & Sons, Inc.: Hoboken, NJ, USA, 2019.
67. Li, J.; Kassem, M. Applications of distributed ledger technology (DLT) and Blockchain-enabled smart contracts in construction.
Autom. Constr. 2021, 132, 103955. [CrossRef]
68. Giancaspro, M. Is a ‘smart contract’ really a smart idea? Insights from a legal perspective. Comput. Law Secur. Rep. 2017, 33,
825–835. [CrossRef]
69. Rahardja, U.; Hidayanto, A.N.; Lutfiani, N.; Febiani, D.A.; Aini, Q. Immutability of Distributed Hash Model on Blockchain Node
Storage. Sci. J. Inform. 2021, 8, 137–143. [CrossRef]
Appl. Sci. 2023, 13, 13339 25 of 25
70. Nanayakkara, S.; Perera, S.; Bandara, D.; Weerasuriya, T.; Ayoub, J. Blockchain technology and its potential for the construction
industry. In Proceedings of the AUBEA Conference 2019, Noosa, QLD, Australia, 6–8 November 2019; pp. 662–672.
71. Wiatt, R.G. From the mainframe to the blockchain. Strateg. Financ. 2019, 100, 26–35.
72. Yaqoob, I.; Salah, K.; Jayaraman, R.; Al-Hammadi, Y. Blockchain for healthcare data management: Opportunities, challenges, and
future recommendations. Neural Comput. Appl. 2022, 34, 11475–11490. [CrossRef]
73. Shah, T.; Jani, S. Applications of Blockchain Technology in Banking & Finance; Parul CUniversity: Vadodara, India, 2018.
74. Liu, H.; Han, S.; Zhu, Z. Blockchain technology toward smart construction: Review and future directions. J. Constr. Eng. Manag.
2023, 149, 03123002. [CrossRef]
75. Wu, L.; Lu, W.; Zhao, R.; Xu, J.; Li, X.; Xue, F. Using blockchain to improve information sharing accuracy in the onsite assembly of
modular construction. J. Manag. Eng. 2022, 38, 04022014. [CrossRef]
76. Sheth, H.; Dattani, J. Overview of blockchain technology. Asian J. Converg. Technol. (AJCT) 2019. [CrossRef]
77. Guegan, D. Public Blockchain versus Private Blockhain. 2017. Available online: https://shs.hal.science/halshs-01524440
/document (accessed on 16 October 2023).
78. Androulaki, E.; Barger, A.; Bortnikov, V.; Cachin, C.; Christidis, K.; De Caro, A.; Yellick, J. Hyperledger fabric: A distributed
operating system for permissioned blockchains. In Proceedings of the 13th EuroSys Conference 2018, Porto, Portugal, 23–26 April
2018; pp. 1–15.
79. Baliga, A.; Subhod, I.; Kamat, P.; Chatterjee, S. Performance evaluation of the quorum blockchain platform. arXiv 2018,
arXiv:1809.03421.
80. Mohanty, D. R3 Corda for Architects and Developers: With Case Studies in Finance, Insurance, Healthcare, Travel, Telecom, and Agriculture;
Apress: New York, NY, USA, 2019.
81. Mostarda, L.; Pinna, A.; Sestili, D.; Tonelli, R. Performance Analysis of a BESU Permissioned Blockchain. In International Conference
on Advanced Information Networking and Applications; Springer International Publishing: Cham, Switzerland, 2023; pp. 279–291.
82. Panda, S.K.; Daliyet, S.P.; Lokre, S.S.; Naman, V. Distributed Ledger Technology in the Construction Industry Using Corda. In The
New Advanced Society: Artificial Intelligence and Industrial Internet of Things Paradigm; Scrivener Publishing LLC.: Austin, TX, USA,
2022; pp. 15–41.
83. Zhong, B.; Wu, H.; Ding, L.; Luo, H.; Luo, Y.; Pan, X. Hyperledger fabric-based consortium blockchain for construction quality
information management. Front. Eng. Manag. 2020, 7, 512–527. [CrossRef]
84. Read, C.L. The Genesis Block. In The Bitcoin Dilemma: Weighing the Economic and Environmental Costs and Benefits; Springer
International Publishing: Cham, Switzerland, 2022; pp. 29–36.
85. Di Pierro, M. What is the blockchain? Comput. Sci. Eng. 2017, 19, 92–95. [CrossRef]
86. Donet Donet, J.A.; Pérez-Sola, C.; Herrera-Joancomartí, J. The bitcoin P2P network. In Financial Cryptography and Data Security:
FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, 7 March 2014; Revised Selected Papers 18; Springer:
Berlin/Heidelberg, Germany, 2014; pp. 87–102.
87. MacKenzie, D. Pick a nonce and try a hash. Lond. Rev. Books 2019, 41, 35–38.
88. De Ocáriz Borde, H.S. An Overview of Trees in Blockchain Technology: Merkle Trees and Merkle Patricia Tries. 2022. Available
online: https://www.researchgate.net/publication/358740207_An_Overview_of_Trees_in_Blockchain_Technology_Merkle_
Trees_and_Merkle_Patricia_Tries (accessed on 16 October 2023).
89. Jing, N.; Liu, Q.; Sugumaran, V. A blockchain-based code copyright management system. Inf. Process. Manag. 2021, 58, 102518.
[CrossRef]
90. Purnomo, H.; Apsari, A.E. REBA analysis for construction workers in Indonesia. J. Built Environ. Technol. Eng. 2016, 1, 104–110.
91. Supanich, W.; Kulkarineetham, S.; Sukphokha, P.; Wisarnsart, P. Machine Learning-Based Exercise Posture Recognition System
Using MediaPipe Pose Estimation Framework. In Proceedings of the 9th International Conference on Advanced Computing and
Communication Systems (ICACCS), Coimbatore, India, 17–18 March 2023; Volume 1, pp. 2003–2007.
92. Guo, L.; Xie, H.; Li, Y. Data encryption based blockchain and privacy preserving mechanisms towards big data. J. Vis. Commun.
Image Represent. 2020, 70, 102741. [CrossRef]
93. Karia, J.; Sundararajan, M.; Raghavan, G.S. Distributed Ledger Systems to Improve Data Synchronization in Enterprise Pro-
cesses. In Proceedings of the IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics
(DISCOVER), Nitte, India, 19–20 November 2021; pp. 41–45.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.