Log in

EBSS: A secure blockchain-based sharing scheme for real estate financial credentials

  • Published:
World Wide Web Aims and scope Submit manuscript

Abstract

With the development of Internet finance, the real estate financial credentials have been extensively utilized in capital and trading markets. The extensive use of these private credentials, e.g., exchange, circulation or sharing on public clouds, can cause severe security and privacy problems. Existing security solutions for financial credentials may either introduce undesired overhead or fail to provide traceability and anonymity for data sharing. In this paper, we propose an enhanced blockchain-based secure sharing scheme for real estate financial credentials, providing the following three properties: credential confidentiality, anonymous authentication, identity tracking and transaction auditing. A comprehensive evaluation, including security analysis, efficiency analysis and simulation evaluation, is presented to show the security and feasibility of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Canada)

Instant access to the full article PDF.

Figure 1
Figure 2
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Algorithm 5
Algorithm 6
Algorithm 7
Figure 3
Figure 4

Similar content being viewed by others

Data availability

Our simulation dataset is from “Zillow”, which is a public dataset on real estate transactions. Data sets used or analyzed during the current study are available, either by direct request from the following link, i.e., https://www.zillow.com/research/data/, or from the corresponding author on necessary conditions or reasonable request only for academic research purposes.

Code availability

Source code used or analyzed during the current study is available from the corresponding author on reasonable request. The source code required to reproduce our work findings is not appropriate to share at this time as the code and data also form part of an ongoing study.

References

  1. Tabatabai Hesari, N.: Environmental and human factors of real estate transactions costs and control measures in Iran registration law. J. Encyclopedia Econ. Law 23(9), 1–20 (2017)

    Google Scholar 

  2. Ullah, F., Al-Turjman, F.: A conceptual framework for blockchain smart contract adoption to manage real estate deals in smart cities. Neural Comput. Applic. 1–22 (2021)

  3. **, B., Song, W., Zhao, K., Li, S., Wang, Z.: Cloud infrastructure and monitoring system for real estate registration. In: 2018 26Th International Conference on Geoinformatics, pp. 1–9 (2018)

  4. Chen, Y., Wang, L., Chen, X., Ranjan, R., Zomaya, A.Y., Zhou, Y., Hu, S.: Stochastic workload scheduling for uncoordinated datacenter clouds with multiple qos constraints. IEEE Trans. Cloud Comput. 8(4), 1284–1295 (2020)

    Article  Google Scholar 

  5. Shuaib, M., Alam, S., Daud, S.M.: Improving the authenticity of real estate land transaction data using blockchain-based security scheme. In: Anbar, M., Abdullah, N., Manickam, S. (eds.) Advances in Cyber Security - Second International Conference, ACes 2020, Penang, Malaysia, December 8-9, 2020. Communications in Computer and Information Science, vol. 1347, pp 3–10. Springer, Heidelberg (2020)

  6. Usmani, R.S.A., Hashem, I.A.T., Pillai, T.R., Saeed, A., Abdullahi, A.M.: Geographic information system and big spatial data: a review and challenges. Int. J. Enterp. Inf. Syst. 16(4), 101–145 (2020)

    Article  Google Scholar 

  7. Dees, K., Rahman, S.: Enhancing infrastructure security in real estate. ar**v:1512.00064 (2015)

  8. Zhang, C., Li, M., Li, Y.: Financial risk analysis of real estate bubble based on machine learning and factor analysis model. J. Intell. Fuzzy Syst. 40(4), 6493–6504 (2021)

    Article  Google Scholar 

  9. Liu, H., Chen, Y.L., Cui, N., Li, J., et al.: An effective data fusion model for detecting the risk of transmission line in smart grid. IEEE Internet of Things Journal (2021)

  10. Kalia, P., Bansal, D., Sofat, S.: A hybrid approach for preserving privacy for real estate data. Int. J. Inf. Comput. Secur. 15(4), 400–410 (2021)

    Google Scholar 

  11. Chen, Y., Chen, X., Liu, W., Zhou, Y., Zomaya, A.Y., Ranjan, R., Hu, S.: Stochastic scheduling for variation-aware virtual machine placement in a cloud computing CPS. Future Gener. Comput. Syst. 105, 779–788 (2020)

    Article  Google Scholar 

  12. Ma, X., Wang, C., Chen, X.: Trusted data sharing with flexible access control based on blockchain. Comput. Stand. Interfaces 78, 103543 (2021)

    Article  Google Scholar 

  13. Li, M., Shen, L., Huang, G.Q.: Blockchain-enabled workflow operating system for logistics resources sharing in e-commerce logistics real estate service. Comput. Ind. Eng. 135, 950–969 (2019)

    Article  Google Scholar 

  14. Chen, W., Guo, X., Chen, Z., Zheng, Z., Lu, Y.: Phishing scam detection on ethereum: Towards financial security for blockchain ecosystem. In: Bessiere, C. (ed.) Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, IJCAI 2020, pp 4506–4512. ijcai.org, Freiburg (2020)

  15. Nyaletey, E., Parizi, R.M., Zhang, Q., Choo, K.R.: Blockipfs - Blockchain-enabled interplanetary file system for forensic and trusted data traceability. In: IEEE International Conference on Blockchain, Blockchain 2019, Atlanta, GA, USA, July 14-17, 2019, pp 18–25. IEEE, New York (2019)

  16. Hong, H., Hu, B., Sun, Z.: Toward secure and accountable data transmission in narrow band internet of things based on blockchain. Int. J. Distributed Sens. Netw. 15(4), 1–10 (2019)

    Google Scholar 

  17. Harbi, Y., Aliouat, Z., Refoufi, A., Harous, S., Bentaleb, A.: Enhanced authentication and key management scheme for securing data transmission in the internet of things. Ad Hoc Netw. 94, 101948 (2019)

    Article  Google Scholar 

  18. Jia, X., He, D., Kumar, N., Choo, K.R.: Authenticated key agreement scheme for fog-driven iot healthcare system. Wirel. Netw. 25(8), 4737–4750 (2019)

    Article  Google Scholar 

  19. Fan, Q., Chen, J., Deborah, L.J., Luo, M.: A secure and efficient authentication and data sharing scheme for internet of things based on blockchain. J. Syst. Archit. 117, 102112 (2021)

    Article  Google Scholar 

  20. Mani, D., Choo, K.R., Mubarak, S.: Information security in the south australian real estate industry: a study of 40 real estate organisations. Inf. Manag. Comput. Secur. 22(1), 24–41 (2014)

    Article  Google Scholar 

  21. Karamitsos, I., Papadaki, M., Al Barghuthi, N.B., et al: Design of the blockchain smart contract: A use case for real estate. 9, 177–190 (2018)

  22. Choo, K.R., Heravi, A., Mani, D., Mubarak, S.: Employees’ intended information security behaviour in real estate organisations: A protection motivation perspective. In: 21St Americas Conference on Information Systems, AMCIS 2015, Puerto Rico, August 13-15, 2015. Association for Information Systems, New York (2015)

  23. Liu, X., Huang, H., **ao, F., Ma, Z.: A blockchain-based trust management with conditional privacy-preserving announcement scheme for vanets. 7,4101–4112 (2020)

  24. Li, Y., Huang, J., Qin, S., Wang, R.: Big data model of security sharing based on blockchain. In: 3Rd International Conference on Big Data Computing and Communications, BIGCOM 2017, Chengdu, China, August 10-11, 2017, pp 117–121. IEEE Computer Society, New York (2017)

  25. Shrestha, A.K., Vassileva, J.: Blockchain-based research data sharing framework for incentivizing the data owners. In: Chen, S., Wang, H., Zhang, L. (eds.) Blockchain - ICBC 2018 - First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings. Lecture Notes in Computer Science, vol. 10974, pp 259–266. Springer, Heidelberg (2018)

  26. Gupta, A., Rathod, J., Patel, D., Bothra, J., Shanbhag, S., Bhalerao, T.: Tokenization of real estate using blockchain technology. In: Zhou, J., Conti, M., Ahmed, C.M., Au, M.H., Batina, L., Li, Z. (eds.) Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings. Lecture Notes in Computer Science, vol. 12418, pp 77–90. Springer, Heidelberg (2020)

  27. Zhang, S., Lee, J.: A group signature and authentication scheme for blockchain-based mobile-edge computing. IEEE Internet Things J. 7(5), 4557–4565 (2020)

    Article  Google Scholar 

  28. Chen, L., Ng, S., Wang, G.: Threshold anonymous announcement in vanets. IEEE J. Sel. Areas Commun. 29(3), 605–615 (2011)

    Article  Google Scholar 

  29. Hewa, T.M., Hu, Y., Liyanage, M., Kanhare, S.S., Ylianttila, M.: Survey on blockchain-based smart contracts: Technical aspects and future research. IEEE Access 9, 87643–87662 (2021)

    Article  Google Scholar 

  30. Yaga, D., Mell, P., Roby, N., Scarfone, K.: Blockchain technology overview. ar**v:1906.11078 (2019)

  31. Sun, J., Yao, X., Wang, S., Wu, Y.: Non-repudiation storage and access control scheme of insurance data based on blockchain in IPFS. IEEE Access 8, 155145–155155 (2020)

    Article  Google Scholar 

  32. Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) Advances in Cryptology - EUROCRYPT ’91, Workshop on the Theory and Application of Of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings. Lecture Notes in Computer Science, vol. 547, pp 257–265. Springer, Heidelberg (1991)

  33. Pedersen, T.P.: Non-Interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) Advances in Cryptology - CRYPTO ’91, 11Th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings. Lecture Notes in Computer Science, vol. 576, pp 129–140. Springer, Heidelberg (1991)

  34. Zhang, L., Song, J., Pan, J.: A privacy-preserving and secure framework for opportunistic routing in dtns. IEEE Trans. Veh. Technol. 65(9), 7684–7697 (2016)

    Article  Google Scholar 

  35. Chen, Y., Fan, J., Deng, Z., Du, B., Huang, X., Gui, Q.: PR-KELM: Icing level prediction for transmission lines in smart grid. Future Gener. Comput. Syst. 102, 75–83 (2020)

    Article  Google Scholar 

  36. Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. In: Heys, H.M., Adams, C.M. (eds.) Selected Areas in Cryptography, 6Th Annual International Workshop, SAC’99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings. Lecture Notes in Computer Science, vol. 1758, pp 184–199. Springer, Heidelberg (1999)

  37. Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M.K. (ed.) Advances in Cryptology - CRYPTO 2004, 24Th Annual International Cryptologyconference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings. Lecture Notes in Computer Science, vol. 3152, pp 56–72. Springer, Heidelberg (2004)

  38. Chen, L., Morrissey, P., Smart, N.P.: Pairings in trusted computing. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1-3, 2008. Proceedings. Lecture Notes in Computer Science, vol. 5209, pp 1–17. Springer, Heidelberg (2008)

  39. Rao, F.: On the security of a variant of elgamal encryption scheme. IEEE Trans. Dependable Secur. Comput. 16(4), 725–728 (2019)

    Article  Google Scholar 

  40. Khalili, M., Dakhilalian, M., Susilo, W.: Efficient chameleon hash functions in the enhanced collision resistant model. Inf. Sci. 510, 155–164 (2020)

    Article  MathSciNet  MATH  Google Scholar 

  41. Berman, I., Degwekar, A., Rothblum, R.D., Vasudevan, P.N.: Multi-collision resistant hash functions and their applications. In: Nielsen, J.B. (ed.) Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part II. Lecture Notes in Computer Science, vol. 10821, pp 133–161. Springer, Heidelberg (2020)

  42. Metere, R., Dong, C.: Automated cryptographic analysis of the Pedersen commitment scheme. In: Rak, J., Bay, J., Kotenko, I.V., Popyack, L.J., Skormin, V.A., Szczypiorski, K. (eds.) Computer Network Security - 7Th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings. Lecture Notes in Computer Science, vol. 10446, pp 275–287. Springer (2017)

  43. Daemen, J., Rijmen, V.: The Design of Rijndael: AES - the Advanced Encryption Standard. Information Security and Cryptography. Springer, Heidelberg (2002)

    Book  MATH  Google Scholar 

  44. Park, S., Sung, S.H., Chee, S., Yoon, E., Lim, J.: On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis. In: Zheng, Y. (ed.) Advances in Cryptology - ASIACRYPT 2002, 8Th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings. Lecture Notes in Computer Science, vol. 2501, pp 176–191. Springer, Heidelberg (2002)

  45. Tsai, K., Leu, F., You, I., Chang, S., Hu, S., Park, H.: Low-power AES data encryption architecture for a lorawan. IEEE Access 7, 146348–146357 (2019)

    Article  Google Scholar 

  46. Lai, R.W.F., Ronge, V., Ruffing, T., Schröder, D., Thyagarajan, S.A.K., Wang, J.: Omniring: Scaling up private payments without trusted setup - formal foundations and constructions of ring confidential transactions with log-size proofs. IACR Cryptol. ePrint Arch. 580 (2019)

  47. Demirel, D., Lancrenon, J.: How to securely prolong the computational bindingness of pedersen commitments. IACR Cryptol. ePrint Arch. 584 (2015)

  48. Boneh, D.: The Decision Diffie-Hellman Problem. In: Buhler, J. (ed.) Algorithmic Number Theory, Third International Symposium, ANTS-III, Portland, Oregon, USA, June 21-25, 1998, Proceedings. Lecture Notes in Computer Science, vol. 1423, pp 48–63. Springer, Heidelberg (1998)

  49. Scott, M., Costigan, N., Abdulwahab, W.: Implementing cryptographic pairings on smartcards. In: Goubin, L., Matsui, M. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2006, 8Th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings. Lecture Notes in Computer Science, vol. 4249, pp 134–147. Springer, Heidelberg (2006)

  50. Zillow Group: Zillow. https://www.zillow.com/research/data/, Last accessed on 2022–5-1 (2006-2022)

  51. Nicolas, K., Wang, Y., Giakos, G.C., Wei, B., Shen, H.: Blockchain system defensive overview for double-spend and selfish mining attacks: a systematic approach. IEEE Access 9, 3838–3857 (2021)

    Article  Google Scholar 

  52. Kumar, P., Kumar, R., Gupta, G.P., Tripathi, R.: A distributed framework for detecting ddos attacks in smart contract-based blockchain-iot systems by leveraging fog computing. Trans. Emerg. Telecommun. Technol 32(6) (2021)

Download references

Acknowledgements

This work is supported in part by the National Natural Science Foundation of China under Grant 61672029 and Grant 61972366, Open Research Project of The Hubei Key Laboratory of Intelligent Geo-Information Processing.

Funding

This work is supported in part by the National Natural Science Foundation of China under Grant 61672029 and Grant 61972366, Open Research Project of The Hubei Key Laboratory of Intelligent Geo-Information Processing.

Author information

Authors and Affiliations

Authors

Contributions

In this work, each author contributed as follows: Yadi Wu is mainly with the research goals evolution, methodological designs, algorithm designs, method validation, and writing and preparation of the original manuscript; Guiyao Tie is mainly with the data collection, software implementation, data and experimental result analysis, and experimental verification, and preparation of the original manuscript; Yao Yu is mainly with the model designs, algorithm validation, formal analysis, experimental results analysis, and writing and preparation of the manuscript; Jianxin Li is in charge of methodological design, formal analysis, algorithm analysis, research activity supervision, critical revision, and writing-review and editing of the manuscript; Jun Song is in charge of research goals evolution, methodological designs, formal analysis, security analysis, research activity supervision and management, critical revision, and in-depth writing-review and editing of the manuscript.

Corresponding author

Correspondence to Jun Song.

Ethics declarations

Declarations

With regard to this submitted manuscript entitled “EBSS: A secure blockchain-based sharing scheme for real estate financial credentials”, we declare as follows:

Ethics approval

We declare that the work described in this submission is original research that has not been previously published or under consideration by other conferences or journals.

Consent for publication

All authors have agreed to publish this paper due to the original contribution prior to this submission.

Conflict of interests

(check journal-specific guidelines for which heading to use): We declare that we do not have any commercial or associative interests that represent a conflict of interest and a conflict of competing interests in relation to the work submitted.

Consent to participate

All authors have agreed to participate in this work due to the collaboration and contribution in advance of this submission.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Guiyao Tie, Yao Yu and Jianxin Li contributed equally to this work.

This article belongs to the Topical Collection: Web-based Intelligent Financial Services

Guest Editors: Hong-Ning Dai, **aohui Haoran, and Miguel Martinez

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, Y., Tie, G., Yu, Y. et al. EBSS: A secure blockchain-based sharing scheme for real estate financial credentials. World Wide Web 26, 1599–1624 (2023). https://doi.org/10.1007/s11280-022-01106-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11280-022-01106-2

Keywords

Navigation