A trustless architecture of blockchain-enabled metaverse

被引:41
作者
Xu, Minghui [1 ]
Guo, Yihao [1 ]
Hu, Qin [2 ]
Xiong, Zehui [3 ]
Yu, Dongxiao [1 ]
Cheng, Xiuzhen [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Qingdao 266237, Peoples R China
[2] Indiana Univ Purdue Univ Indianapolis, Dept Comp & Informat Sci, Indianapolis, IN USA
[3] Singapore Univ Technol & Design, Informat Syst Technol & Design Pillar, Singapore, Singapore
来源
HIGH-CONFIDENCE COMPUTING | 2023年 / 3卷 / 01期
关键词
Metaverse; Blockchain; Edge computing; Trust; TRENDS;
D O I
10.1016/j.hcc.2022.100088
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Metaverse has rekindled human beings' desire to further break space-time barriers by fusing the virtual and real worlds. However, security and privacy threats hinder us from building a utopia. A metaverse embraces various techniques, while at the same time inheriting their pitfalls and thus exposing large attack surfaces. Blockchain, proposed in 2008, was regarded as a key building block of metaverses. it enables transparent and trusted computing environments using tamper-resistant decentralized ledgers. Currently, blockchain supports Decentralized Finance (DeFi) and Non-fungible Tokens (NFT) for metaverses. How-ever, the power of a blockchain has not been sufficiently exploited. In this article, we propose a novel trustless architecture of blockchain-enabled metaverse, aiming to provide efficient resource integration and allocation by consolidating hardware and software components. To realize our design objectives, we provide an On-Demand Trusted Computing Environment (OTCE) technique based on local trust evaluation. Specifically, the architecture adopts a hypergraph to represent a metaverse, in which each hyper -edge links a group of users with certain relationship. Then the trust level of each user group can be evaluated based on graph analytics techniques. Based on the trust value, each group can determine its security plan on demand, free from interference by irrelevant nodes. Besides, OTCEs enable large-scale and flexible application environments (sandboxes) while preserving a strong security guarantee.(c) 2022 The Author(s). Published by Elsevier B.V. on behalf of Shandong University. This is an open access article under the CC BY-NC-ND license ( http://creativecommons.org/licenses/by-nc-nd/4.0/ )
引用
收藏
页数:7
相关论文
共 41 条
[1]   A Vademecum on Blockchain Technologies: When, Which, and How [J].
Belotti, Marianna ;
Bozic, Nikola ;
Pujolle, Guy ;
Secci, Stefano .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) :3796-3838
[2]  
Bretto Alain, 2013, HYPERGRAPH THEORY IN
[3]   Graphics processing unit (GPU) programming strategies and trends in GPU computing [J].
Brodtkorb, Andre R. ;
Hagen, Trond R. ;
Saetra, Martin L. .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2013, 73 (01) :4-13
[4]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461
[5]  
Chainlink, 2021, What is a blockchain oracle
[6]  
Cryptovoxels, 2021, Welcome to voxels - a user-owned virtual world
[7]  
Damar M, 2021, J METAVERSE, V1, P1
[8]   Edge Intelligence-Based Ultra-Reliable and Low-Latency Communications for Digital Twin-Enabled Metaverse [J].
Dang Van Huynh ;
Khosravirad, Saeed R. ;
Masaracchia, Antonino ;
Dobre, Octavia A. ;
Duong, Trung Q. .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2022, 11 (08) :1733-1737
[9]   3D Virtual Worlds and the Metaverse: Current Status and Future Possibilities [J].
Dionisio, John David N. ;
Burns, William G., II ;
Gilbert, Richard .
ACM COMPUTING SURVEYS, 2013, 45 (03)
[10]   The Sybil attack [J].
Douceur, JR .
PEER-TO-PEER SYSTEMS, 2002, 2429 :251-260