CFP last date
22 April 2024
Reseach Article

A Real Estate and Landed Property Blockchain Distributed Ledger for Elimination of Double Dealing

by Nwachukwu C. B., Onyejegbu L. N., Eke B. O.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 44
Year of Publication: 2019
Authors: Nwachukwu C. B., Onyejegbu L. N., Eke B. O.
10.5120/ijca2019918525

Nwachukwu C. B., Onyejegbu L. N., Eke B. O. . A Real Estate and Landed Property Blockchain Distributed Ledger for Elimination of Double Dealing. International Journal of Computer Applications. 181, 44 ( Mar 2019), 15-24. DOI=10.5120/ijca2019918525

@article{ 10.5120/ijca2019918525,
author = { Nwachukwu C. B., Onyejegbu L. N., Eke B. O. },
title = { A Real Estate and Landed Property Blockchain Distributed Ledger for Elimination of Double Dealing },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2019 },
volume = { 181 },
number = { 44 },
month = { Mar },
year = { 2019 },
issn = { 0975-8887 },
pages = { 15-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number44/30412-2019918525/ },
doi = { 10.5120/ijca2019918525 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:09:03.703840+05:30
%A Nwachukwu C. B.
%A Onyejegbu L. N.
%A Eke B. O.
%T A Real Estate and Landed Property Blockchain Distributed Ledger for Elimination of Double Dealing
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 44
%P 15-24
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the real estate sector of the national economy land racketeering and property double selling have risen to a higher level due to activities of malicious land agents and those that abetted their dubious activities within the government. In this paper a Blockchain of Real Estate and Landed Property transaction ledger system is developed to record property transactions in a distributed ledger that makes double dealing by the criminal land agents impossible. This will prevent the selling of properties to more than one person by land agents and double dealers and will publish transactions in a public ledger in a transparent way. The system is designed using object-oriented analysis and design methodology and the Blockchain was built directly from the cryptographic system. The result of the system development show that the system was able to produce crypto blocks which can be mined and stored in the chain to both produce the data and the reward system for the real estate industry to use in protecting itself from double dealing and from the criminals. The work is implemented using public key cryptography and Python programming language. The system will bust the real estate sector and bring to minimum the malicious activities of the land agents and their collaborators who commit crime by swindling unsuspecting land buyers and property developers of their fund by double selling and dealing on properties that does not belong to them.

References
  1. Schneier,B.(1996) “Applied Cryptography: Protocols, Algorithms, and Source Code in C”, John Wiley & Sons.
  2. Stalling, W. (2006) "Cryptography and Network Security: Principles and Practices", Prentice Hall.
  3. Malgorzata R. (2018) Incentives for Polish higher education institutions to improve real estate efficiency, Journal of Corporate Real Estate, Vol. 20 Issue: 3, pp.214-227,
  4. Satoshi N. (2008) Bitcoin: A Peer-to-Peer Electronic Cash System,https://www.bitcoin.org/bitcoin.pdf, Accessed, 2017
  5. Andreas M. A. (2017 ) Mastering Bitcoin: Programming the Open Blockchain, O'Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472.USA.
  6. Arvind N., Bonneau J., Edward F., Andrew M., Steven G. (2015) Bitcoin and Cryptocurrency Technologies, Princeton Pu Ltd, USA.
  7. Wilber, D. Q. (2015). Encrypted Devices Let Criminals Go Dark, U.S. Prosecutor Warns. Bloomberg. Retrieved on 10th June 2015 from http://www.bloomberg.com/news/articles/2015-05-06/encrypted-devices-letcriminals-go-dark-u-s-prosecutor-warns.
  8. Kshetri, N. (2010). Global Cybercrime Industry: Economic, institutional and strategic perspectives. Berlin Heidelberg: Springer Science & Business Media.
  9. Tikk, E. (2011). Ten Rules for Cyber Security, Survival: Global Politics and Strategy, 53(3), 119-132.
  10. Wadhwa, V. (2015). Quantum computing is about to overturn cybersecurity’s balance of power. The Washington Post. Retrieved on 22nd May 2015
  11. Joe G., Sidney J. H., Michael O. and Jose I. R. (2015) Protecting Intellectual Property and Trade Secrets in the United States and Beyond, FDCC Quarterly/Summer.
  12. Abdelsalam A., andUounis A. (2012) Developing a Cryptosystem for XML Documents, International Journal of Information Science, 2(5): 65-69 DOI: 10.5923/j.ijis.20120205.03
  13. Haber, S and Stornetta W. S (1997) Secure names for bit-strings, In Proceedings of the 4th ACM Conference on Computer and Communications Security, 28-35.
  14. Anderson, R. and Steven J. M. (2014) EMV: why payment systems fail. Communications of the ACM 57.6 : 24-28
  15. Zhigang, Y. (2011). Cyber Variants of Traditional Crimes and Criminal Law Responses. Social Sciences in China, 32(1), 66-79.
  16. Massias, H., Avila, X. S. and Quisquater, J. J (1999) Design of a secure timestamping service with minimal trust requirements, In 20th Symposium on Information Theory in the Benelux,
  17. Eli Dourado and Jerry Brito (2014) cryptocurrency, Palgrave Macmillan The New Palgrave Dictionary of Economics, www.dictionaryofeconomics.com, retrieved 2017
  18. Cameron S. D. B. (2015) Investigating and Prosecuting Cyber Crime: Forensic Dependencies and Barriers to Justice, International Journal of Cyber Criminology (IJCC) . 9 (1): 55–119. DOI: 10.5281/zenodo.22387
  19. Merkle, R. C. (1980) "Protocols for public key cryptosystems," In Proc. 1980 Symposium on Security and Privacy, IEEE Computer Society, 122-133, April 1980.
  20. Back, A. (2002) Hashcash - a denial of service counter-measure," http://www.hashcash.org/papers/hashcash.pdf.
  21. Bayer, D., Haber, S and Stornetta, W. S (1993) Improving the efficiency and reliability of digital time-stamping, In Sequences II: Methods in Communication, Security and Computer Science, 329-334.
  22. Haber, S and Stornetta, W. S. (1991) How to time-stamp a digital document," In Journal of Cryptology, 3(2), 99-111.
Index Terms

Computer Science
Information Sciences

Keywords

Blockchain Distributed Ledger Real-Estate Cryptography model