A trustless architecture of blockchain-enabled metaverse

被引:41
作者
Xu, Minghui [1 ]
Guo, Yihao [1 ]
Hu, Qin [2 ]
Xiong, Zehui [3 ]
Yu, Dongxiao [1 ]
Cheng, Xiuzhen [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Qingdao 266237, Peoples R China
[2] Indiana Univ Purdue Univ Indianapolis, Dept Comp & Informat Sci, Indianapolis, IN USA
[3] Singapore Univ Technol & Design, Informat Syst Technol & Design Pillar, Singapore, Singapore
来源
HIGH-CONFIDENCE COMPUTING | 2023年 / 3卷 / 01期
关键词
Metaverse; Blockchain; Edge computing; Trust; TRENDS;
D O I
10.1016/j.hcc.2022.100088
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Metaverse has rekindled human beings' desire to further break space-time barriers by fusing the virtual and real worlds. However, security and privacy threats hinder us from building a utopia. A metaverse embraces various techniques, while at the same time inheriting their pitfalls and thus exposing large attack surfaces. Blockchain, proposed in 2008, was regarded as a key building block of metaverses. it enables transparent and trusted computing environments using tamper-resistant decentralized ledgers. Currently, blockchain supports Decentralized Finance (DeFi) and Non-fungible Tokens (NFT) for metaverses. How-ever, the power of a blockchain has not been sufficiently exploited. In this article, we propose a novel trustless architecture of blockchain-enabled metaverse, aiming to provide efficient resource integration and allocation by consolidating hardware and software components. To realize our design objectives, we provide an On-Demand Trusted Computing Environment (OTCE) technique based on local trust evaluation. Specifically, the architecture adopts a hypergraph to represent a metaverse, in which each hyper -edge links a group of users with certain relationship. Then the trust level of each user group can be evaluated based on graph analytics techniques. Based on the trust value, each group can determine its security plan on demand, free from interference by irrelevant nodes. Besides, OTCEs enable large-scale and flexible application environments (sandboxes) while preserving a strong security guarantee.(c) 2022 The Author(s). Published by Elsevier B.V. on behalf of Shandong University. This is an open access article under the CC BY-NC-ND license ( http://creativecommons.org/licenses/by-nc-nd/4.0/ )
引用
收藏
页数:7
相关论文
共 41 条
[11]   Metaverse for Social Good: A University Campus Prototype [J].
Duan, Haihan ;
Li, Jiaye ;
Fan, Sizheng ;
Lin, Zhonghao ;
Wu, Xiao ;
Cai, Wei .
PROCEEDINGS OF THE 29TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, MM 2021, 2021, :153-161
[12]  
Heath A., 2004, Inside facebook's metaverse for work
[13]   In-Datacenter Performance Analysis of a Tensor Processing Unit [J].
Jouppi, Norman P. ;
Young, Cliff ;
Patil, Nishant ;
Patterson, David ;
Agrawal, Gaurav ;
Bajwa, Raminder ;
Bates, Sarah ;
Bhatia, Suresh ;
Boden, Nan ;
Borchers, Al ;
Boyle, Rick ;
Cantin, Pierre-luc ;
Chao, Clifford ;
Clark, Chris ;
Coriell, Jeremy ;
Daley, Mike ;
Dau, Matt ;
Dean, Jeffrey ;
Gelb, Ben ;
Ghaemmaghami, Tara Vazir ;
Gottipati, Rajendra ;
Gulland, William ;
Hagmann, Robert ;
Ho, C. Richard ;
Hogberg, Doug ;
Hu, John ;
Hundt, Robert ;
Hurt, Dan ;
Ibarz, Julian ;
Jaffey, Aaron ;
Jaworski, Alek ;
Kaplan, Alexander ;
Khaitan, Harshit ;
Killebrew, Daniel ;
Koch, Andy ;
Kumar, Naveen ;
Lacy, Steve ;
Laudon, James ;
Law, James ;
Le, Diemthu ;
Leary, Chris ;
Liu, Zhuyuan ;
Lucke, Kyle ;
Lundin, Alan ;
MacKean, Gordon ;
Maggiore, Adriana ;
Mahony, Maire ;
Miller, Kieran ;
Nagarajan, Rahul ;
Narayanaswami, Ravi .
44TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA 2017), 2017, :1-12
[14]   Sky Computing [J].
Keahey, Katarzyna ;
Tsugawa, Mauricio ;
Matsunaga, Andrea ;
Fortes, Jose A. B. .
IEEE INTERNET COMPUTING, 2009, 13 (05) :43-51
[15]   Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures [J].
Kokoris-Kogias, Eleftherios ;
Malkhi, Dahlia ;
Spiegelman, Alexander .
CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, :1751-1767
[16]   Core Concepts, Challenges, and Future Directions in Blockchain: A Centralized Tutorial [J].
Kolb, John ;
AbdelBaky, Moustafa ;
Katz, Randy H. ;
Culler, David E. .
ACM COMPUTING SURVEYS, 2020, 53 (01)
[17]   Educational applications of metaverse: possibilities and limitations [J].
Kye, Bokyung ;
Han, Nara ;
Kim, Eunji ;
Park, Yeonjeong ;
Jo, Soyoung .
JOURNAL OF EDUCATIONAL EVALUATION FOR HEALTH PROFESSIONS, 2021, 18 :1-13
[18]  
L. Labs, 2003, Second life
[19]  
Lamport L., 2001, SIGACT News, V32, P51
[20]   Extending On-Chain Trust to Off-Chain - Trustworthy Blockchain Data Collection Using Trusted Execution Environment (TEE) [J].
Liu, Chunchi ;
Guo, Hechuan ;
Xu, Minghui ;
Wang, Shengling ;
Yu, Dongxiao ;
Yu, Jiguo ;
Cheng, Xiuzhen .
IEEE TRANSACTIONS ON COMPUTERS, 2022, 71 (12) :3268-3280