Scalability and Security of Blockchain-Empowered Metaverse: A Survey

被引:0
作者
Huang, Huawei [1 ]
Yin, Zhaokang [2 ]
Yang, Qinglin [3 ]
Li, Taotao [2 ]
Luo, Xiaofei [2 ]
Zhou, Lu [4 ]
Zheng, Zibin [2 ]
机构
[1] Sun Yat sen Univ, Guangzhou 510275, Peoples R China
[2] Sun Yat Sen Univ, Sch Software Engn, Guangzhou, Peoples R China
[3] Guangzhou Univ Huangpu, Cyberspace Inst Adv Technol, Guangzhou 511370, Peoples R China
[4] Nanjing Univ Aeronaut & Astronaut, Nanjing 210016, Peoples R China
来源
IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY | 2024年 / 5卷
基金
国家重点研发计划;
关键词
Blockchain; bitcoin; metaverse; ethereum; security; scalability;
D O I
10.1109/OJCS.2024.3468445
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Metaverse brings unlimited space and tremendous potential since it is an integrated application of multiple fundamental technologies such as artificial intelligence, blockchain, networking, Internet of Things, and interactivity. During those building blocks of metaverse, blockchain is a type of technology operated by a group of individual participants and known for its immutability feature. The massive adoption of blockchain has been severely prevented by various security and scalability issues in blockchain-based applications due to the inherent characteristics of this technology. To accelerate the massive adoption of blockchain, many previous studies have been carried out to address the security and scalability issues. This article reviews blockchain-related publications collected from four major security conferences (i.e., NDSS, CCS, S&P, and USENIX Security) published in the past three years. Through this overview, we disclose the security and scalability issues of mainstream blockchains such as Bitcoin and Ethereum. Our study aims to help researchers better understand the bottleneck of blockchain-empowered metaverse, and how to address user requirements for security and scalability from the perspective of blockchains.
引用
收藏
页码:648 / 659
页数:12
相关论文
共 63 条
  • [1] Apple.com, 2024, Apple vision pro unlocks new opportunities for health app developers
  • [2] Sleepy Channels: Bi-directional Payment Channels without Watchtowers
    Aumayr, Lukas
    Thyagarajan, Sri AravindaKrishnan
    Malavolta, Giulio
    Moreno-Sanchez, Pedro
    Maffei, Matteo
    [J]. PROCEEDINGS OF THE 2022 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2022, 2022, : 179 - 192
  • [3] Thora: Atomic and Privacy-Preserving Multi-Channel Updates
    Aumayr, Lukas
    Abbaszadeh, Kasra
    Maffei, Matteo
    [J]. PROCEEDINGS OF THE 2022 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2022, 2022, : 165 - 178
  • [4] Bhat A., 2023, P NETW DISTR SYST SE, P1
  • [5] Practical byzantine fault tolerance and proactive recovery
    Castro, M
    Liskov, B
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04): : 398 - 461
  • [6] Tyr: Finding Consensus Failure Bugs in Blockchain System with Behaviour Divergent Model
    Chen, Yuanliang
    Ma, Fuchen
    Zhou, Yuanhang
    Jiang, Yu
    Chen, Ting
    Sun, Jiaguang
    [J]. 2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 2517 - 2532
  • [7] Chen Z., 2022, 2022 IEEE INT C BIG, P2950, DOI DOI 10.1109/BIGDATA55660.2022.10021112
  • [8] SoK: Distributed Randomness Beacons
    Choi, Kevin
    Manoj, Aathira
    Bonneau, Joseph
    [J]. 2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 75 - 92
  • [9] Crain T, 2021, P IEEE S SECUR PRIV, P466, DOI 10.1109/SP40001.2021.00087
  • [10] Esgin MF, 2022, P IEEE S SECUR PRIV, P1281, DOI [10.1109/SP46214.2022.00033, 10.1109/SP46214.2022.9833655]