From: From bricks to bytes: Verifiable data for decarbonizing the building sector
ID | Challenge | Meta- Requirement | BEEMS Architecture (cf. Figure 3) | Related Literature |
---|---|---|---|---|
C1 | Efficient data processing and usage protocols | MR1 | 1st layer: Data collection, storage and further processing from heterogenous data sources through numerous APIs. | Arnesano et al. 2018; Hilpert et al. 2013; Hoang et al. 2017; Melville and Whisnant 2014; Tranberg et al. 2019; Zampou et al. 2022 |
C2 | Inconsistent data quality and granularity and lack of emission data | MR1 | 1st layer: incorporation of Emission data and standardization of multiple external data sources. | Hilpert et al. 2013; Silpa et al. 2020; Sjödin and Grönkvist 2004; Tranberg et al. 2019; Zampou et al. 2022 |
C3 | Limited data sharing and interoperability among different systems | MR1; MR2 | 3rd layer: BEEMS workflow engine incorporates data from individual (existing) system components. | Gräuler et al. 2013; Hilpert et al. 2013; Hoang et al. 2017; Zampou et al. 2022 |
C4 | Insufficient automation in data processing and systems operations | MR2 | 1st– 4th layer: Automated data and operations flow. | Gräuler et al. 2013; Hilpert et al. 2013; Hoang et al. 2017; Melville and Whisnant 2014; Zampou et al. 2022 |
C5 | Lack of traceability and verifiability of processed data and calculations | MR1 | 1st– 4th layer: transparent and traceable data collection and display to selected stakeholder groups (4th layer). | Gräuler et al. 2013; Kranz et al. 2021; Melville and Whisnant 2014; Tranberg et al. 2019; Zampou et al. 2022 |
C6 | Missing trust in the systems operations and reliable data processing | MR3 | 1st layer: Data storage envisaged to leverage advanced technological solutions to verify and protect sourced data. | |
C7 | Vulnerability to unauthorized data use and system compromise | MR3 | BEEMs as closed system with permissioned access for external parties | Albizri 2020; Goebel et al. 2014; Hannan et al. 2018; Zampou et al. 2022 |
C8 | Missing robust privacy-preserving measures and protocols | MR3 | 1st layer (sourced data) and 4th layer (stakeholder-interaction): data and privacy preserving measures. | |
C9 | Limited usability of the system for involved stakeholders | MR2 | 4th layer: Stakeholder specific and adjustable user platforms. | Albizri 2020; Corbett 2013; Hilpert et al. 2013; Kranz et al. 2021 |
C10 | Lack of modifiable system components | MR2 | 1st– 4th layer: modular and layered BEEMS core architecture. |