Submitted:
22 May 2024
Posted:
23 May 2024
You are already at the latest version
Abstract
Keywords:
1. Introduction
- Our framework devises a novel chain code algorithm to ensure the system’s seamless operation. The endorsement policies are designed with real-world scenarios in mind.
- Our system uses a single key to invalidate the previous keys at once. Due to the modular approach of Hyperledger fabric, our system is much more scalable than the previously developed system.
- The concept of a token is introduced in the system for authentication purposes to mitigate the single point of failure, as the token can be re-generated if lost.
- The system ensures anonymity by adding an extra layer of security over the previously modified ring signatures. We add stealth addresses to our scheme to enhance the anonymity of both the user and the recipient.
2. Related Works
3. Proposed System
3.1. Overview of Hyperledger Fabric
3.2. Basic Architecture of the Proposed System
- CCTV security camera: Device for outputting the video feed.
- Owner: The one who owns the property. One owner can own multiple properties in multiple buildings, each with a single CCTV security camera.
- Renter: The one who rents the property and receives the CCTV security camera feed.
- Security agency: It is responsible for deploying CCTV security cameras at owners’ properties. The security agency also has a blockchain network that contains transactional information and all registered owners and renters.
- Web portal: This is the portal where the validation and authorization work takes place, both at the owner’s and renter’s end.
- SPAS-H API: It is the interface between the entities and the Hyperledger fabric network, used by the owners and renters and authenticated by the membership service.
- Keys management: The key generation platform is where the entities involved generate the key pairs. This enhances the anonymity feature of our system by incorporating multiple security layers. A single key at one time and key invalidation are important parts of the system.
- Chain code: It defines the rules that govern the transactions.
- Blockchain network: Private blockchain network based on Hyperledger fabric.
3.3. Flow of the SPAS-H Working
- 1.
- Property listing: The property owner lists all the properties with the security agency. This includes all the vacant and occupied properties, which will help the future renters choose.
- 2.
-
The process of CCTV security camera deployment and the feed commencement
- 2.1
- The security agency installs CCTV security cameras at all properties and asks the CCTV security camera to generate the key pair.
- 2.2
- The CCTV security camera generates key pairs (public and private keys) through key management, which uses symmetric key encryption.
- 2.3
- The security agency transfers the CCTV security camera public key to the owner. After generating their key pairs, the owner uses their private key to access the CCTV security camera feed. The CCTV security camera starts streaming the video feed to the owner.
- 3.
-
The process of the owner joining SPAS-H and blockchain network
- 3.1
- The security agency asks the owner to join SPAS-H and blockchain network.
- 3.2
- The owner signs up for SPAS-H and logs in using their ID and password.
- 3.3
- The owner joins the blockchain network of the security agency through a membership service provider as the certificate authority issues the certificate.
- 3.4
- The owner now bears the SPAS-H ID, blockchain address, and a certificate.
- 3.5
- The owner enters their details in the chain code and saves them in the SPAS-H database. SPAS-H maps the owner’s information against their properties.
- 4.
-
The process of the renter joining SPAS-H and blockchain network
- 4.1
- The renter signs up for SPAS-H and logs in using their ID and password.
- 4.2
- The renter can view the available properties on SPAS-H and select their preferred one.
- 4.3
- The renter joins the blockchain network of the security agency through a membership service provider as the certificate authority issues the certificate.
- 4.4
- The renter now bears the SPAS-H ID, blockchain address, and a certificate.
| Algorithm 1: CCTV security camera feed redirection to renter |
![]() |
- 5.
-
Web token generation process
- 5.1
- The renter utilizes the web portal to create a JSON Web Token.
- 5.2
- The renter enters their details in the chain code, including their blockchain address and certificate. The renter also saves the generated token on SPAS-H for the selected property.
- 6.
-
Web token authentication process
- 6.1
- SPAS-H notifies the owner about any information entered regarding their property.
- 6.2
- The property owner requests and receives the web-generated token from the potential renter through SPAS-H.
- 6.3
- The owner uses a web portal to authenticate the token and validate whether the renter is a verified renter or an adversary who wishes to harm the property. The authentication process, initiated by the renter and completed by the owner, is an added layer of security in the system and is also logically correct. If the owner generates the token, they must wait indefinitely for the renter to select their property and authenticate the token.
- 7.
-
The process of rental duration confirmation
- 7.1.
- The owner looks up SPAS-H, the information mapped against their property, and gets the renter’s SPAS-H ID. The owner maps the renter’s SPAH-H ID with the CCTV security camera ID.
- 7.2
- The owner queries the rental duration from the renter.
- 7.3
- After entering the rental duration, the renter deposits the rent and asks SPAS-H for the CCTV security camera key after generating their key pairs through key management.
- 8.
-
The process of updating ledger and adding block to the blockchain network
- 8.1
- SPAS-H sends a CCTV security camera feed redirection proposal to the endorsing peer.
- 8.2
- The endorsing peer runs the chain code to simulate the CCTV security camera redirection to the renter proposal.
- 8.3
- After executing the chain code, the endorsing peer sends the proposal response to SPAS-H.
- 8.4
- SPAS-H submits transaction to the ordering service.
- 8.5
- The ordering service generates a block of transactions and then sends the block to the committing peer.
- 8.6
- The committing peer validates each transaction, verifies the endorsement policy, and then commits the block to the blockchain. The endorsement policy for SPAS-H is described briefly below in Table 1.
- 9.
-
The process of the CCTV security camera generating new keys
- 9.1
- After the ledger has been updated, SPAS-H requests the public key from the CCTV security camera.
- 9.2
- The CCTV security camera generates new key pairs and sends the public key to SPAS-H. The old CCTV security camera key is invalidated, and the video feed to the owner is discontinued.
- 10.
-
The process of initiating the CCTV security camera feed for the renter.
- 10.1
- SPAS-H sends the CCTV security camera’s public key to the renter. The renter generates their key pairs and uses their private key to access the video feed.
- 10.2
- The CCTV security camera feed is redirected to the renter.
3.4. Maintaining Anonymity
4. Discussion and Analysis
4.1. Implementation
4.2. Transactional Analysis
4.3. Comparative Analysis
5. Conclusion
Author Contributions
Funding
Conflicts of Interest
References
- Agrawal, R.; Verma, P.; Sonanis, R.; Goel, U.; De, A.; Kondaveeti, S.A.; Shekhar, S. Continuous security in IoT using blockchain. 2018 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, 2018, pp. 6423–6427.
- Khor, J.H.; Sidorov, M.; Woon, P.Y. Public blockchains for resource-constrained IoT devices—A state-of-the-art survey. IEEE Internet of Things Journal 2021, 8, 11960–11982. [Google Scholar] [CrossRef]
- Hwang, D.; Choi, J.; Kim, K.H. Dynamic access control scheme for iot devices using blockchain. 2018 international conference on information and communication technology convergence (ICTC). IEEE, 2018, pp. 713–715.
- Xu, L.; Shah, N.; Chen, L.; Diallo, N.; Gao, Z.; Lu, Y.; Shi, W. Enabling the sharing economy: Privacy respecting contract based on public blockchain. Proceedings of the ACM workshop on blockchain, cryptocurrencies and contracts, 2017, pp. 15–21.
- Krishnan, K.N.; Jenu, R.; Joseph, T.; Silpa, M. Blockchain based security framework for IoT implementations. 2018 international CET conference on control, communication, and computing (IC4). IEEE, 2018, pp. 425–429.
- Kashif, M.; Kalkan, K. BCPriPIoT: BlockChain utilized privacy-preservation mechanism for IoT devices. 2021 Third International Conference on Blockchain Computing and Applications (BCCA). IEEE, 2021, pp. 201–209.
- Pouraghily, A.; Wolf, T. A lightweight payment verification protocol for blockchain transactions on IoT devices. 2019 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2019, pp. 617–623.
- Andrew, J.; Isravel, D.P.; Sagayam, K.M.; Bhushan, B.; Sei, Y.; Eunice, J. Blockchain for healthcare systems: Architecture, security challenges, trends and future directions. Journal of Network and Computer Applications 2023, 103633. [Google Scholar]
- Jiang, S.; Cao, J.; Wu, H.; Chen, K.; Liu, X. Privacy-preserving and efficient data sharing for blockchain-based intelligent transportation systems. Information Sciences 2023, 635, 72–85. [Google Scholar] [CrossRef]
- Alsobhi, H.A.; Alakhtar, R.A.; Ubaid, A.; Hussain, O.K.; Hussain, F.K. Blockchain-based micro-credentialing system in higher education institutions: Systematic literature review. Knowledge-Based Systems 2023, 265, 110238. [Google Scholar] [CrossRef]
- Van Saberhagen, N. CryptoNote v 2.0 2013.
- Pan, Q.; Wu, J.; Bashir, A.K.; Li, J.; Vashisht, S.; Nawaz, R. Blockchain and AI enabled configurable reflection resource allocation for IRS-aided coexisting drone-terrestrial networks. IEEE Wireless Communications 2022, 29, 46–54. [Google Scholar] [CrossRef]
- Lin, X.; Wu, J.; Mumtaz, S.; Garg, S.; Li, J.; Guizani, M. Blockchain-based on-demand computing resource trading in IoV-assisted smart city. IEEE Transactions on Emerging Topics in Computing 2020, 9, 1373–1385. [Google Scholar] [CrossRef]
- Saquib, N.; Bakir, F.; Krintz, C.; Wolski, R. A Resource-Efficient Smart Contract for Privacy Preserving Smart Home Systems. 2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI). IEEE, 2021, pp. 532–539.
- Klaokliang, N.; Teawtim, P.; Aimtongkham, P.; So-In, C.; Niruntasukrat, A. A novel IoT authorization architecture on hyperledger fabric with optimal consensus using genetic algorithm. 2018 Seventh ICT International Student Project Conference (ICT-ISPC). IEEE, 2018, pp. 1–5.
- Banoun, N.; Diarra, N. Authentication of Mobile IoT Devices using HyperLedger Fabric Blockchain. 2021 Eighth International Conference on Software Defined Systems (SDS). IEEE, 2021, pp. 1–6.
- Khatri, S.; al Sulbi, K.; Attaallah, A.; Ansari, M.T.J.; Agrawal, A.; Kumar, R. Enhancing Healthcare Management during COVID-19: A Patient-Centric Architectural Framework Enabled by Hyperledger Fabric Blockchain. Information 2023, 14, 425. [Google Scholar] [CrossRef]
- Sujihelen, L.; others. An efficient chain code for access control in hyper ledger fabric healthcare system. e-Prime-Advances in Electrical Engineering, Electronics and Energy 2023, 5, 100204. [Google Scholar]
- Attia, O.; Khoufi, I.; Laouiti, A.; Adjih, C. An IoT-blockchain architecture based on hyperledger framework for health care monitoring application. NTMS 2019-10th IFIP International Conference on New Technologies, Mobility and Security. IEEE Computer Society, 2019, pp. 1–5.
- Khan, P.W.; Byun, Y.C.; Park, N. A data verification system for CCTV surveillance cameras using blockchain technology in smart cities. Electronics 2020, 9, 484. [Google Scholar] [CrossRef]
- Moolikagedara, K.; Nguyen, M.; Yan, W.Q.; Li, X.J. Video Blockchain: A Decentralized Approach for Secure and Sustainable Networks with Distributed Video Footage from Vehicle-Mounted Cameras in Smart Cities. Electronics 2023, 12, 3621. [Google Scholar] [CrossRef]
- Kim, D.; Ihm, S.Y.; Son, Y. Two-level blockchain system for digital crime evidence management. Sensors 2021, 21, 3051. [Google Scholar] [CrossRef]
- Mahmood, A.; Khan, A.; Anjum, A.; Maple, C.; Jeon, G. An efficient and privacy-preserving blockchain-based secure data aggregation in smart grids. Sustainable Energy Technologies and Assessments 2023, 60, 103414. [Google Scholar] [CrossRef]
- Santoso, N.; Javaid, H. Improving Energy Efficiency of Permissioned Blockchains Using FPGAs. 2022 IEEE 28th International Conference on Parallel and Distributed Systems (ICPADS). IEEE, 2023, pp. 177–184.
- M. Zein, R.; Twinomurinzi, H. Information Sharing in Land Registration Using Hyperledger Fabric Blockchain. Blockchains 2024, 2, 107–133. [Google Scholar] [CrossRef]
- Proença, A.S.; Dias, T.R.; Correia, M.P. Blockchain Based Residential Smart Rent. arXiv preprint 2024, arXiv:2402.05737. [Google Scholar]
- Singh, S.; Singh, A.; Verma, S.; Dwivedi, R.K. Designing a Blockchain-Enabled Methodology for Secure Online Voting System. 2023 International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT). IEEE, 2023, pp. 178–184.
- Chovancová, E.; Chovanec, M.; Ádám, N.; Hurtuk, J. Online voting management system based on Blockchain. 2023 IEEE 27th International Conference on Intelligent Engineering Systems (INES). IEEE, 2023, pp. 000169–000174.
- Tang, B.; Tan, M.; Liu, M.; Liu, Z.; Tian, W. A Privacy Protection Method of Blockchain-Based E-Voting Using Homomorphic Encryption and Order-Preserving Encryption. 2023 5th International Conference on Artificial Intelligence and Computer Applications (ICAICA). IEEE, 2023, pp. 86–90.
- Islam, M.N.; Kundu, S. Preserving IoT privacy in sharing economy via smart contract. 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE, 2018, pp. 296–297.
- Li, X.; Mei, Y.; Gong, J.; Xiang, F.; Sun, Z. A blockchain privacy protection scheme based on ring signature. IEEE Access 2020, 8, 76765–76772. [Google Scholar] [CrossRef]
- Long, Y.; Chen, Y.; Ren, W.; Dou, H.; Xiong, N.N. Depet: A decentralized privacy-preserving energy trading scheme for vehicular energy network via blockchain and k-anonymity. Ieee Access 2020, 8, 192587–192596. [Google Scholar] [CrossRef]
- Jeong, Y.; Hwang, D.; Kim, K.H. Blockchain-based management of video surveillance systems. 2019 International Conference on Information Networking (ICOIN). IEEE, 2019, pp. 465–468.
- Yadav, P.; Sharma, S.; Muzumdar, A.; Modi, C.; Vyjayanthi, C. Designing a Trustworthy and Secured House Rental System using Blockchain and Smart Contracts. 2022 IEEE 19th India Council International Conference (INDICON). IEEE, 2022, pp. 1–6.
- Loreti, P.; Bracciale, L.; Raso, E.; Bianchi, G.; Sanseverino, E.R.; Gallo, P. Privacy and Transparency in Blockchain-based Smart Grid Operations. IEEE Access 2023. [Google Scholar] [CrossRef]
- Saad, M.; Bhutta, M.R.; Kim, J.; Chung, T.S. A Framework for Enhancing Privacy and Anonymity in Blockchain-Enabled IoT Devices. Computers, Materials & Continua 2024, 78. [Google Scholar]
- Bender, A.; Katz, J.; Morselli, R. Ring signatures: Stronger definitions, and constructions without random oracles. Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings 3. Springer, 2006, pp. 60–79.
- Okamoto, T.; Tso, R.; Yamaguchi, M.; Okamoto, E. A k-out-of-n Ring Signature with Flexible Participation for Signers. Cryptology ePrint Archive 2018. [Google Scholar]
- Courtois, N.T.; Mercer, R. Stealth address and key management techniques in blockchain systems. ICISSP 2017-Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017, pp. 559–566.
- Yu, G. Blockchain stealth address schemes. Cryptology ePrint Archive 2020. [Google Scholar]













| Configuration | A building of two floors |
| Each floor has three houses | |
| Peer nodes | floor1 house1 (f1h1), floor1 house2 (f1h2), floor1 house3 (f1h3) |
| floor2 house1 (f2h1), floor2 house2 (f2h2), floor3 house3 (f2h3) | |
| Orderer node | Orderer |
| Endorsement Policy | 3/3 from the same floor and 2/3 from other floor |
| Consider a property selected on floor 1 | |
| The endorsement policy will be: | |
| [(f1h1.f1h2.f1h3). | |
| ((f2h1.f2h2)|(f2h1.f2h3)|(f2h2.f2h3))] |
| Categories | BVM | Smart Grids | SPAS | SPAS-H |
|---|---|---|---|---|
| Privacy | achieved | achieved | achieved | achieved |
| Anonymity | partially achieved | partially achieved | achieved | achieved |
| Authentication | no | no | use of temp id | use of web token |
| Smart Contract | yes | yes | yes | yes |
| Key Usage | re-used | re-used | always new | always new |
| Confidentiality | low | low | low | high |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
