Skip to main content

Cross-Chain-Based Decentralized Identity for Mortgage Loans

  • Conference paper
  • First Online:
Knowledge Science, Engineering and Management (KSEM 2021)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 12817))

Abstract

Decentralized Identity (DID) has been deemed an ideal mechanism for identity sharing and authentication, which allows users to process control over identity information. However, the centralized storage of DID hinders further expansion due to security issues. Combining the existing blockchain technology with the DID theory has a great development prospect in terms of privacy protection and security enhancement. In order to address the identity authentication issue of collateral in financial loans, this paper proposes the Cross-chain Channel-based DID (C3-DID) model, which realizes the distributed storage of DID and allows relay-based cross-chain data exchange. We deploy the loan process and the identity verification process on consortium blockchains, separately. In addition, a permission chain channel, called peer-to-peer Matching Channel (MC), is established to accomplish cross-chain data exchange. Our security analysis indicates that the proposed model can resist multiple threats.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Assiri, B., Khan, W.Z.: Enhanced and lock-free tendermint blockchain protocol. In: 2019 IEEE International Conference on Smart Internet of Things (SmartIoT), Tianjin, China, pp. 220–226 (2019)

    Google Scholar 

  2. Chow, J.: Btc relay. btc-relay (2016)

    Google Scholar 

  3. Dai, W., Qiu, M., Qiu, L., Chen, L., Wu, A.: Who moved my data? Privacy protection in smartphones. IEEE Commun. Mag. 55(1), 20–25 (2017)

    Article  Google Scholar 

  4. Gai, K., Guo, J., Zhu, L., Yu, S.: Blockchain meets cloud computing: a survey. IEEE Commun. Surv. Tutor. 22(3), 2009–2030 (2020)

    Article  Google Scholar 

  5. Gai, K., Wu, Y., Zhu, L., Qiu, M., Shen, M.: Privacy-preserving energy trading using consortium blockchain in smart grid. IEEE Trans. Ind. Inf. 15(6), 3548–3558 (2019)

    Article  Google Scholar 

  6. Gai, K., Wu, Y., Zhu, L., Zhang, Z., Qiu, M.: Differential privacy-based blockchain for industrial internet-of-things. IEEE Trans. Ind. Inf. 16(6), 4156–4165 (2019)

    Article  Google Scholar 

  7. Gai, K., Qiu, M., Sun, X., Zhao, H.: Security and privacy issues: a survey on FinTech. In: SmartCom, pp. 236–247 (2016)

    Google Scholar 

  8. Gao, F., Zhu, L., Gai, K., Zhang, C., Liu, S.: Achieving a covert channel over an open blockchain network. IEEE Network 34(2), 6–13 (2020)

    Article  Google Scholar 

  9. Gervais, A., Karame, G.O., WĂ¼st, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, pp. 3–16 (2016)

    Google Scholar 

  10. Guo, J., Gai, K., Zhu, L., Zhang, Z.: An approach of secure two-way-pegged multi-sidechain. In: Wen, S., Zomaya, A., Yang, L.T. (eds.) ICA3PP 2019. LNCS, vol. 11945, pp. 551–564. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-38961-1_47

    Chapter  Google Scholar 

  11. Hughes, A., Sporny, M., Reed, D.: A primer for decentralized identifiers-an introduction to self-administered identifiers for curious people. (w3c credentials community group) (2019)

    Google Scholar 

  12. Laborde, R., et al.: A user-centric identity management framework based on the W3C verifiable credentials and the FIDO universal authentication framework. In: IEEE 17th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, USA, pp. 1–8 (2020)

    Google Scholar 

  13. Qiu, M., Cao, D., Su, H., Gai, K.: Data transfer minimization for financial derivative pricing using monte Carlo simulation with GPU in 5G. IEEE Int. J. Commun. Syst. 29(16), 2364–2374 (2016)

    Article  Google Scholar 

  14. Qiu, M., Gai, K., Xiong, Z.: Privacy-preserving wireless communications using bipartite matching in social big data. FGCS J. 87, 772–781 (2018)

    Article  Google Scholar 

  15. Reed, D., et al.: Decentralized identifiers (DIDs) v1. 0. Draft Community Group Report (2020)

    Google Scholar 

  16. Schrimpf, A., Drechsler, A., Dagianis, K.: Assessing identity and access management process maturity: first insights from the German financial sector. Inf. Syst. Manag. 38(2), 94–115 (2021)

    Article  Google Scholar 

  17. Shao, Z., et al.: Real-time dynamic voltage loop scheduling for multi-core embedded systems. IEEE Trans. Circuits Syst. II 54(5), 445–449 (2007)

    Article  Google Scholar 

  18. Simons, A.: Toward scalable decentralized identifier systems. Microsoft Tech Community (2019). https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Toward-scalable-decentralized-identifiersystems/ba-p/560168

  19. Tian, Z., Li, M., Qiu, M., Sun, Y., Su, S.: Block-DEF: a secure digital evidence framework using blockchain. Inf. Sci. 491, 151–165 (2019)

    Article  Google Scholar 

  20. Windley, P., Reed, D.: Sovrin: a protocol and token for self-sovereign identity and decentralized trust. Whitepaper, The Sovrin Foundation, USA (2018)

    Google Scholar 

  21. Yoon, C., Hwang, J., Cho, M., Lee, B.G.: Study on did application methods for blockchain-based traffic forensic data. Appl. Sci. 11(3), 1268 (2021)

    Article  Google Scholar 

  22. Zhang, Y., Gai, K., Qiu, M., Ding, K.: Understanding privacy-preserving techniques in digital cryptocurrencies. In: Qiu, M. (ed.) ICA3PP 2020. LNCS, vol. 12454, pp. 3–18. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-60248-2_1

    Chapter  Google Scholar 

  23. Zhu, L., Wu, Y., Gai, K., Choo, K.: Controllable and trustworthy blockchain-based cloud data management. Future Gener. Comput. Syst. 91, 527–535 (2019)

    Article  Google Scholar 

  24. Zhu, X., Badr, Y.: A survey on blockchain-based identity management systems for the internet of things. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, Canada, pp. 1568–1573 (2018)

    Google Scholar 

  25. Zyskind, G., Nathan, O., Pentland, A.: Decentralizing privacy: using blockchain to protect personal data. In: IEEE Symposium on Security and Privacy Workshops (SPW), San Jose, USA, pp. 180–184 (2015)

    Google Scholar 

Download references

Acknowledgements

This work is partially supported by National Natural Science Foundation of China (Grant No.s 61871037, 61972034), Natural Science Foundation of Shandong Province (Grant No.s ZR2019ZD10, ZR2020ZD01), Natural Science Foundation of Beijing Municipality (Grant No. 4202068), Ministry of Education - China Mobile Research Fund Project (Grant No. MCM20180401).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Keke Gai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xie, T., Zhang, Y., Gai, K., Xu, L. (2021). Cross-Chain-Based Decentralized Identity for Mortgage Loans. In: Qiu, H., Zhang, C., Fei, Z., Qiu, M., Kung, SY. (eds) Knowledge Science, Engineering and Management. KSEM 2021. Lecture Notes in Computer Science(), vol 12817. Springer, Cham. https://doi.org/10.1007/978-3-030-82153-1_51

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-82153-1_51

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-82152-4

  • Online ISBN: 978-3-030-82153-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics