Professional Documents
Culture Documents
High-Confidence Computing
journal homepage: www.elsevier.com/locate/hcc
Research
a r t i c l e i n f o a b s t r a c t
Article history: Metaverse has rekindled human beings’ desire to further break space-time barriers by fusing the virtual
Received 23 October 2022 and real worlds. However, security and privacy threats hinder us from building a utopia. A metaverse em-
Revised 18 November 2022
braces various techniques, while at the same time inheriting their pitfalls and thus exposing large attack
Accepted 22 November 2022
surfaces. Blockchain, proposed in 2008, was regarded as a key building block of metaverses. it enables
transparent and trusted computing environments using tamper-resistant decentralized ledgers. Currently,
Keywords: blockchain supports Decentralized Finance (DeFi) and Non-fungible Tokens (NFT) for metaverses. How-
Metaverse ever, the power of a blockchain has not been sufficiently exploited. In this article, we propose a novel
Blockchain trustless architecture of blockchain-enabled metaverse, aiming to provide efficient resource integration
Edge computing
and allocation by consolidating hardware and software components. To realize our design objectives, we
Trust
provide an On-Demand Trusted Computing Environment (OTCE) technique based on local trust evalua-
tion. Specifically, the architecture adopts a hypergraph to represent a metaverse, in which each hyper-
edge links a group of users with certain relationship. Then the trust level of each user group can be
evaluated based on graph analytics techniques. Based on the trust value, each group can determine its
security plan on demand, free from interference by irrelevant nodes. Besides, OTCEs enable large-scale
and flexible application environments (sandboxes) while preserving a strong security guarantee.
© 2022 The Author(s). Published by Elsevier B.V. on behalf of Shandong University. This is an open
access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
https://doi.org/10.1016/j.hcc.2022.10 0 088
2667-2952/© 2022 The Author(s). Published by Elsevier B.V. on behalf of Shandong University. This is an open access article under the CC BY-NC-ND license
(http://creativecommons.org/licenses/by-nc-nd/4.0/)
M. Xu, Y. Guo, Q. Hu et al. High-Confidence Computing 3 (2023) 100088
2
M. Xu, Y. Guo, Q. Hu et al. High-Confidence Computing 3 (2023) 100088
stage. Companies are exploring the possibilities of building meta- ever, it is almost impossible to render every part of a metaverse
verses in various application scenarios such as 3D games, NFT, due to resource shortage. Therefore, we have to sacrifice reality to
online collaborations, and digital twins. However, as shown in make the metaverse open-ended, or vice versa. Overall, the cur-
Fig. 1, current metaverse projects cannot sufficiently balance re- rent networking and computing technologies are the bottlenecks
ality and openness. For example, some projects, including Second of realizing a metaverse as we expect. The fundamental challenge
Life, Minecraft, and Roblox, have good openness and allow users is: how to address the exponentially increasing number of sensors
to create their worlds according to their own interests; but it is deployed for a metaverse and amount of data collected by the sen-
difficult for these projects to guarantee reality, and the users can sors with limited hardware support?
only employ limited tools, such as pixel squares in Minecraft, to Therefore, we propose a new architecture by fusing blockchain
piece together things in a “blocky” world. Other projects, includ- and edge computing technologies to integrate all the computa-
ing Pokémon Go, Horizon Workroom, and Omniverse, can achieve tional resources from cloud-edge-device layers. A blockchain serves
reality but their virtual worlds are not fully opened. In academia, as an underlying trusted intermediary, which connects all the re-
most papers are reviews and surveys, which mainly summarize the sources within a large network. Similar to Sky computing [25], our
major metaverse platforms and propose prospects for future meta- blockchain intends to relate all the isolated services provided by
verse developments. A few articles propose layered architectures large and small companies, so as to aggregate the resources we
but lack sufficient and specific design details. Besides, rational al- can have for building a metaverse. Besides, the network is virtual-
location of resources, security, and privacy issues faced by meta- ized as a resource pool, in which computation tasks are assigned
verses are largely overlooked. to computing units based on utilization conditions. By this way,
However, a metaverse is by no means a simple combination of the integration of blockchain and various computational resources
technologies, but in need of considering a reasonable consolidation yields a virtual giant computer, and one can maximize resource
of hardware and software, so as to realize the efficient integra- utilization with all hardware in hands.
tion and allocation of resources. Only with sufficient resources can
one combine reality and openness. Moreover, metaverse should 3.1.2. Overview
take security and privacy into its initial design. As one of the key As shown in Fig. 2, the architecture of a metaverse consists of
technologies to build a metaverse, blockchain [22,23] can create a two major components: software and hardware. A real person is
trusted interactive environment for users who do not trust each physically surrounded by a variety of sensors such as a heartbeat
other and has the potential to be used as the underlying technol- sensor, a VR headset, a camera, a skin sensor, and a motion sensor.
ogy to provide security guarantee for the adoption of other tech- These sensors connect the physical and cyber worlds. A virtual hu-
nologies. However, current metaverse designs do not fully explore man must obtain a decentralized identity (DID) before being given
the potential of blockchain, which should have played a more im- birth in the metaverse.
portant role in a metaverse [21]. Motivated by these considera- In hardware, resource allocation follows the following rule:
tions, we propose a novel trustless metaverse architecture enabled maximize user experience with ultra-low latency. Cloud servers
by blockchain in this paper, which realizes a reasonable allocation are commonly used to train large AI models and carry out high-
of resources and improves the security and privacy of a metaverse. workload computations. This layer works for big data process-
ing. The edge layer and device layer deal with instant data. Edge
3. A Trustless architecture of blockchain-enabled metaverse servers form a backbone to carry out basic functions including
verifiable computation and decentralized storage, contributing to
3.1. Architecture computation and storage services. Personal devices at the edge
layer can participate as service providers. People can offer re-
3.1.1. Resource integration sources to share and get rewards. By this way we are able to
A metaverse is definitely a large-scale data-intensive system. gather enough resources for the metaverse. The device layer deals
Nevertheless, current computing technologies are not sufficiently with instant data that is hotter than those at the edge layer. On-
advanced to satisfy metaverses’ huge computational power re- device computation is an efficient way when tackling real-time ap-
quirements, making developers have to sacrifice either reality or plications, such as processing videos, tracking objects, and sending
openness. High-performance hardware (especially Graphics Pro- alarms. With specific hardware support (e.g., GPU, Tensor Process-
cessing Units (GPUs) [24]) can tackle complex rendering workloads ing Unit (TPU) [26]), we can perform on-device learning directly
and thus make a small virtual scenario approach to reality. How- on a local device. Moreover, IoT devices are resource-constrained
Fig. 2. A metaverse is established on the basis of software and hardware infrastructures. Each participant is surrounded by a variety of sensors which connect the physical
and cyber worlds. OTCE controls interactions among digital identities, which are supported by two basic functions. All software components are safeguarded by a blockchain.
The hardware is coordinated to contribute resources and is optimized under the goal of realtimeness.
3
M. Xu, Y. Guo, Q. Hu et al. High-Confidence Computing 3 (2023) 100088
in computation, storage, and energy, but they can still reach con-
sensus and collaborate through message passing (communication-
heavy). In summary, based on the above design, the Hardware can
allocate the corresponding computing resources according to the
user’s demand for the timeliness of data processing and maxi-
mize user experience with ultra-low latency. Due to the incentive
mechanism in the device layer, the device owners around the re-
quester would actively provide their computing power to help re-
questers complete the computational tasks and get rewards. There-
fore, some hotter instant data would be processed immediately
by nearby devices, providing low-latency services while ensuring Fig. 3. LTM as a hypergraph.
a good user experience.
In software, we introduce two novel approaches, LTM and OTCE,
which make the metaverse system controllable and secure. There 3.3. Trust evaluation
are two basic functions underlying the computing and storage in-
frastructure, both being supported by a blockchain: verifiable com- Trust is the basis of collaboration. A trust model can output
putation ensures that the computing process is fault-tolerant and a trust value influenced by various factors such as network size,
the computational results are verifiable; while a decentralized stor- message latency, and node behaviors. In a metaverse, applying a
age network distributes voluminous data into different types of global trust model is infeasible since one model can hardly de-
storage nodes. LTM measures the trust value of a group of nodes. pict the complex relationships among all users, both virtual and
Based on the trust value, OTCEs provide trusted services for each real. Therefore, our architecture adopts a local trust model (LTM).
group that can maintain diversified applications in the metaverse. LTM satisfies a locality property, which means that we can mea-
OTCEs are built on top of the two basic functions and can be re- sure the local trust with only a subset of nodes. In comparison,
garded as “sandboxes”. a global trust model implies that trust is evenly distributed. For
example, the upper bound f = N/3 about Byzantine nodes usually
refers to the case in which any node might become Byzantine with
3.2. Distributed identity equal probability but no more than N/3 nodes are Byzantine at the
same time in total. Byzantine-resilient protocols can have strong
Distributed Identity (DID) is a critical technique applied in security guarantees when confronted with f malicious nodes. In
metaverse. A DID represents a legitimate identifier and verifiable such a circumstance, a subset of nodes with high trust values has
credential for a metaverse participant. Usually, each identity is to follow the protocol without exception and thus endure the un-
mapped to an avatar. For example, CryptoAvatars built on top of necessary high communication overheads. Therefore, a global trust
an Ethereum blockchain creates 3D avatars in the form of NFTs. model fits into simple distributed systems such as a blockchain or
Tokenized avatars can be exchanged or transferred in a trustless a P2P network. However, global models do not suit a complicated
platform. Note that avatars are not necessary in some cases where metaverse because treating all nodes alike ignores the differences
users can directly interact with each other without relying on a vir- between different subsets of nodes, thus negatively impacting the
tual character. For example, when Alice and Bob are trading digital system performance and user experience.
commodities, they can issue transactions without creating avatars Essentially, LTM assigns each group of nodes a trust value to
first. depict trust in a fine-grained manner, rather than offer a unified
However, it remains a challenging problem that how to guar- trust value for the entire network. LTM provides metaverse net-
antee a secure and precise mapping from an identity or avatar to works with a rigorous mathematical expression, from which one
a real person. Such a capability is indispensable when establishing can benefit greatly when setting up a trusted computing environ-
a metaverse. Without a secure and reliable mapping technique, a ment or carrying out tasks such as social mining.
malicious user can launch Sybil attacks [27]. For example, an at- To have a better illustration on LTM, we provide a symbolized
tacker can control an election process using numerous Zombie ac- expression of an LTM as a hypergraph [30] shown in Fig. 3. Specif-
counts. ically, we denote a metaverse network as a weighted hypergraph
Hence we propose a new method of constructing DIDs with H = (V, E, W ), where V is the set of nodes, E is the set of hyper-
a strong security guarantee. Our method focuses on the map- edges, and W is the set of weights. Each hyperedge e ∈ E repre-
ping from digital identity to physical identity and supports large- sents a relation among a group of k nodes {v1 , v2 , · · · , vk }, denoted
scale identity establishments in harsh environments. On one hand, by e = {v1 , v2 , · · · , vk }, and is weighted by a trust value depicting
users’ personal information is collected by sensors and transferred to what extent the nodes in the group trust each other. In the
to a DID attestation module. The DID attestation module is built metaverse, a pairwise relationship is insufficient to depict social
with smart contracts, by which all the formats and policies are connections. Hypergraph fits the multi-adic relationships well, and
verified in a trustless and automatic way. To achieve precise at- each group of nodes collaborates to establish their own LTM. Thus,
testation, we can deploy biometric technologies such as finger- one can quantify the metaverse network and study its character-
print and facial recognition [28]. On the other hand, DID supports istics by various graph analytics techniques. For example, we can
asynchronous distributed key generation (ADKG) [29] apart from estimate the distribution of computing power usage from the de-
the public key infrastructure. Asynchronous byzantine algorithms gree distribution and clustering coefficients. The estimation can be
should work under the assumptions of both asynchronous net- further used to determine the resource allocation of hardware. Us-
works and Byzantine nodes. An asynchronous network refers to ing LTMs and hypergraphs, we can create sandboxes for massive
the case when the message delay can be infinitely long. Byzan- interacted applications with strong security guarantees and formu-
tine nodes can behave arbitrarily such as crash or collude. ADKG late the metaverse in a formal and computable graph model. The
distributes a secret among a group. A sufficient number of nodes metaverse hereby becomes controllable and auditable.
can later reconstruct the secret by combining their shares when Generally, a metaverse can aggregate the sensed network data
they want to use the secret in tasks such as group authentication, to calculate trust. However, poor data quality can lead to inaccu-
byzantine agreement, and multi-party computation. rate trust estimation. Data quality is measured based on factors of
4
M. Xu, Y. Guo, Q. Hu et al. High-Confidence Computing 3 (2023) 100088
completeness, consistency, and reliability. Hence we introduce Or- the blockchain to establish an on-demand trusted computing en-
acle to serve as a data transport module and provide high-quality vironment P at time t, and the request is verified by the miners.
data. An oracle (e.g., Provable) is a third-party trusted service that When the verification is successful, the behavior of opening OTCE
collects data from the digital world. It can provide authenticity is recorded on the blockchain and the participating nodes can in-
proofs to demonstrate that the data source is authentic and un- teract with each other in OTCE. When the node interaction in P is
tampered. Relying on oracles, we can evaluate trust more accu- completed (at time t + δ ), the participants in G upload their final
rately and efficiently. Note that, currently, oracles are commonly results based on the verifiable computing techniques, e.g., trusted
connected to blockchain systems, which improves the security of hardware and zero-knowledge proofs [39] (more descriptions are
the data flowing into the blockchain and is considered one of the shown in Section 3.4.3), to the blockchain and apply to close P .
best solutions for the smart contract to compute based on inputs After successful verification by miners, the blockchain closes the
from the real world [31,32]. Moreover, as a third party, the oracle OTCE P .
→
does not affect the blockchain consensus and other processes, so Formally, we denote an OTCE by a vector E = (EID,
the entire system is still decentralized. State, G, T , Results ). Environment identity (abbreviated
by EID) is a unique identity of an OTCE, making OTCEs
3.4. On-demand trusted computing environment distinguishable and traceable. State represents the current
state of E. An OTCE has four different states, denoted by
The role a blockchain plays definitely is beyond cryptocur- State ∈ {New, Running, Suspend, Terminated}. State transitions
rency, DeFi, and NFT. Even though blockchains have demon- are triggered by transactions. When a group of nodes G intends
strated their effectiveness in enhancing the security of cloud [33], to establish a new OTCE, they first create a transaction with
edge [34,35] and device [36–38] layers, their power has not E = (EID, New, G, T , ⊥ ). The creation process is fully executed by
been unleashed in a metaverse. In our metaverse architecture, a smart contract, which outputs E = (EID, Running, G, T , ⊥ ). The
blockchains are expected to help the metaverse build a trusted information of the registered OTCE is thereby confirmed by the
ecosystem. To meet this goal, we have to address three challenges. smart contract. T is a time duration that regulates how long E
First, blockchains should be appropriately and lightly deployed in can last. Since there is no precise synchronized clocks in G, T is
the metaverse to support massive data-intensive applications in measured by the block height. The Suspend state is wakened when
parallel. Storing hashes of data chunks on a blockchain might in- G needs to temporarily stop an application and continues later.
cur unaffordable storage overheads in the metaverse even though The corresponding metadata can be stored on-chain for context
this approach is effective in saving storage of traditional blockchain switching. Once G decides to continue, it changes its status from
systems. Secondly, even if the throughput of a blockchain has been Suspend back to Running. The cases of suspending an OTCE should
dramatically improved (e.g., from 6 TPS to 10 0 kTPS) since 20 08, be common in a metaverse since applications may frequently need
deploying and terminating blockchains are still costly and time- to be stopped and resumed to save resources. When computation
consuming. In fact, it is hard for small companies or organiza- processes are completely finished or E expires, E should be closed.
tions to quickly deploy a blockchain in a short time due to the The termination of E can be initiated by G if the task is finished
prohibitively high cost. Third, cross-chain interoperability becomes before E expires, or the smart contract automatically triggers a
a bottleneck in the current blockchain ecosystem, in which more transaction to terminate E when E expires.
than ten thousand independent blockchain systems are isolated
and heterogeneous; thus unifying blockchains deployed in a meta- 3.4.2. Security plan according to trust value
verse is very challenging. To achieve efficient resource utilization, we map trust values to
To address the above challenges, we propose On-Demand different security plans in OTCE. For example, PBFT [40] is good
Trusted Computing Environment (OTCE), which serves as an un- for a group of N nodes among which at most f = N/3 of them
derlying infrastructure to provide trust throughout the metaverse. can be Byzantine. A generic Paxos [41] can solve consensus when
The design goals of an OTCE are listed as follows. at most f = N/2 nodes can be faulty. Since the generic Paxos has
higher performance but weaker resiliency compared to PBFT, it
• Security. The lifecycle of each OTCE is protected. State transi- might suffice for a group with a high trust level. Nevertheless, if
tions of an OTCE are fully recorded in a tamper-proof way. the group suffers from Byzantine attacks, it needs PBFT instead.
• Flexibility. An OTCE can be efficiently created, manipulated, Mapping trust levels to security plans benefits resource allocation
and terminated in the metaverse. and thus can enhance efficiency. The mapping can be denoted by
• Lightweight. Data flows are closely related to a specific OTCE. TV → SP , where TV (Trust Value) and SP (Security Plan) can both
Different OTCEs can freely share real-time data to avoid storage reside in high dimensional spaces. One can use a matrix to repre-
redundancy. sent a linear mapping or adopt machine learning and deep learn-
ing approaches to determine non-linear mappings. Note that an
3.4.1. OTCE details OTCE can be dynamically adjusted according to the changing trust
With OTCE, a group of nodes can collaboratively establish a values. For example, if an OTCE needs to shift from the generic
trusted computing environment on demand. Recall that in on- Paxos to PBFT due to the appearance of Byzantine nodes, it can be
chain computation, the entire computation process is executed by changed through a confirmed transaction.
all miners via smart contracts, results are validated by validators
(or miners), and confirmed results are recorded on a blockchain 3.4.3. Blockchain virtual machine (BVM): decentralized computation
and then become readable to all nodes. In contrast, off-chain com- over decentralized data
putation occurs outside of smart contracts with only critical in- Trusted computing is a necessity in a metaverse since the so-
formation being written to the blockchain. An OTCE can be cre- ciety of the metaverse cannot be long live without establishing
ated when needed and then terminated when its duty is complete. trust. If computational results are unreliable and unpredictable, no
Some predefined operations are required to be on-chain, but most one knows what would happen next and thus the metaverse is in
of the computation processes are carried out off-chain. For exam- chaos. IEEE has defined “trust” as the level of predictability. In our
ple, Fig. 4 presents three OTCEs (P , Q, and S) from opening to clos- architecture, we need all computational results to be fault-tolerant
ing, and we take P as an example to show the whole process of and verifiable. Specifically, we allow some nodes to deviate from
an OTCE. To be specific, multiple nodes form a group G to request the protocols or output wrong intermediary results but require
5
M. Xu, Y. Guo, Q. Hu et al. High-Confidence Computing 3 (2023) 100088
that the final results must be correct. To avoid malicious behaviors, and BVM. In our future study, we intend to instantiate our pro-
we need the results to be verifiable so that everyone can confirm posed metaverse architecture by building a demo metaverse.
the result without incurring much computational overhead. Veri-
fiable computation is used to outsource computational tasks from Declaration of competing interest
clients to workers with dishonest behaviors. In a metaverse, we re-
quire critical computation to be verifiable. The approaches to real- The authors declare that they have no known competing finan-
ize verifiable computation include trusted hardware (e.g., Intel SGX cial interests or personal relationships that could have appeared to
and ARM Trustzone), secure multi-party computation (MPC), com- influence the work reported in this paper.
mitment, and zero-knowledge proofs [39], which can be applied
to metaverses based on specific needs. Fault-tolerant and verifiable References
computing replaces centralized trusted third parties in a meta-
verse. [1] A. Heath, Inside facebook’s metaverse for work, 2004. https://www.theverge.
com/2021/8/19/22629942/facebook- workroomshorizon- oculus- vr.
Compared to the Ethereum Virtual Machine (EVM), the
[2] M. Team, Microsoft mesh, 2022. https://www.microsoft.com/en-us/mesh.
blockchain virtual machine (BVM) used in our architecture should [3] N. Team, Nvidia omniverse, 2021. https://www.nvidia.com/en-us/omniverse/.
support a decentralized execution of smart contracts. In an EVM, [4] J.D.N. Dionisio, W.G.B. III, R. Gilbert, 3d virtual worlds and the metaverse: Cur-
rent status and future possibilities, ACM Computing Surveys (CSUR) 45 (3)
each miner executes the entire smart contract on its own and com-
(2013) 1–38.
petes with other independent miners. In such a competition, only [5] M. Team, Minecraft maps, 2009. https://www.minecraftmaps.com/tags/
one miner can win, and the others finally lose, which wastes a real- cities- in- minecraft.
huge amount of resources. By using BVM, nodes can collaboratively [6] Meta, Facebook company is now meta, 2021. https://about.fb.com/news/2021/
10/facebook- company- is- now- meta/.
execute a smart contract, which decreases the execution time and [7] Y. Wang, Z. Su, N. Zhang, R. Xing, D. Liu, T.H. Luan, X. Shen, A survey on meta-
also avoids undesirable race conditions. To ensure safety and live- verse: fundamentals, security, and privacy, IEEE Commun. Surv. Tutor. (2022).
ness, task allocation follows a directed acyclic graph (DAG) repre- [8] R. Corporation, Roblox, 2006. https://developer.roblox.com/en-us/.
[9] L. Labs, Second life, 2003. https://secondlife.com/.
sentation of smart contracts. [10] P. Company, PokȨmon go, 2016. https://www.pokemon.com/us/app/
A decentralized storage network (DSN) contributes to building pokemon-go/.
a decentralized storage market without relying on cloud storage. [11] Cryptovoxels, Welcome to voxels - a user-owned virtual world, 2021, https:
//www.cryptovoxels.com/.
In our architecture, decentralized computation and decentralized [12] J. Radoff, The metaverse value-chain, 2021. https://medium.com/
storage are merged into a single system to provide basic comput- building- the- metaverse/the- metaverse- value- chain- afcf9e09e3a7.
ing/storage functions for a metaverse. Recall that BVMs collabo- [13] H. Duan, J. Li, S. Fan, Z. Lin, X. Wu, W. Cai, Metaverse for social good: a uni-
versity campus prototype, in: Proceedings of the 29th ACM International Con-
rate on contract execution. With a DSN, each BVM can compute
ference on Multimedia, 2021, pp. 153–161.
on nearby or local data without querying big data from remote [14] D. Van Huynh, S.R. Khosravirad, A. Masaracchia, O.A. Dobre, T.Q. Duong, Edge
servers. By this way, the computation can be more real-time and intelligence-based ultra-reliable and low-latency communications for digital
twin-enabled metaverse, IEEE Wirel. Commun. Lett. 11 (8) (2022) 1733–1737.
data owners can have stronger privacy guarantees compared to tra-
[15] V. Nair, G.M. Garrido, D. Song, Going incognito in the metaverse, arXiv preprint
ditional approaches. arXiv:2208.05604(2022a).
[16] V. Nair, G.M. Garrido, D. Song, Exploring the unprecedented privacy risks of
the metaverse, arXiv preprint arXiv:2207.13176(2022b).
4. Conclusion [17] B. Kye, N. Han, E. Kim, Y. Park, S. Jo, Educational applications of metaverse:
possibilities and limitations, J. Educ. Eval. Health Prof. 18 (2021) 1–13.
[18] M. Damar, Metaverse shape of your life for future: a bibliometric snapshot, J.
In this article, we present a trustless blockchain-enabled meta- Metaverse 1 (1) (2021) 1–8.
verse architecture. The architecture provides an efficient coordina- [19] S.-M. Park, Y.-G. Kim, A metaverse: taxonomy, components, applications, and
tion method of software and hardware. To improve performance open challenges, IEEE Access 10 (2022) 4209–4251.
[20] M. Xu, W.C. Ng, W.Y.B. Lim, J. Kang, Z. Xiong, D. Niyato, Q. Yang, X.S. Shen, C.
while preserving security, we propose a few new techniques, in- Miao, A full dive into realizing the edge-enabled metaverse: visions, enabling
cluding DID attestation and trust evaluation by hypergraph, OTCE, technologies, and challenges, arXiv preprint arXiv:2203.05471(2022).
6
M. Xu, Y. Guo, Q. Hu et al. High-Confidence Computing 3 (2023) 100088
[21] Q. Yang, Y. Zhao, H. Huang, Z. Xiong, J. Kang, Z. Zheng, Fusing blockchain and [32] A. Pasdar, Y.C. Lee, Z. Dong, Connect api with blockchain: a survey on
ai with metaverse: a survey, IEEE Open J. Comput. Soc. 3 (2022) 122–136. blockchain oracle implementation, ACM Comput. Surv. (2022).
[22] M. Belotti, N. Božić, G. Pujolle, S. Secci, A vademecum on blockchain tech- [33] M. Xu, S. Liu, D. Yu, X. Cheng, S. Guo, J. Yu, Cloudchain: a cloud blockchain
nologies: when, which, and how, IEEE Commun. Surv. Tutor. 21 (4) (2019) using shared memory consensus and rdma, IEEE Trans. Comput. (2022) 1,
3796–3838. doi:10.1109/TC.2022.3147960.
[23] J. Kolb, M. AbdelBaky, R.H. Katz, D.E. Culler, Core concepts, challenges, and fu- [34] M. Xu, C. Wang, Y. Zou, D. Yu, X. Cheng, W. Lyu, Curb: trusted and scalable
ture directions in blockchain: a centralized tutorial, ACM Comput. Surv. (CSUR) software-defined network control plane for edge computing, in: Proceedings
53 (1) (2020) 1–39. of the IEEE 42nd International Conference on Distributed Computing Systems
[24] A.R. Brodtkorb, T.R. Hagen, M.L. Sætra, Graphics processing unit (GPU) pro- (ICDCS), 2022, pp. 492–502, doi:10.1109/ICDCS54860.2022.0 0 054.
gramming strategies and trends in GPU computing, J. Parallel Distrib. Comput. [35] M. Xu, Z. Zou, Y. Cheng, Q. Hu, D. Yu, X. Cheng, Spdl: a blockchain-enabled
73 (1) (2013) 4–13. secure and privacy-preserving decentralized learning system, IEEE Trans. Com-
[25] K. Keahey, M. Tsugawa, A. Matsunaga, J. Fortes, Sky computing, IEEE Internet put. (2022) 1, doi:10.1109/TC.2022.3169436.
Comput. 13 (5) (2009) 43–51. [36] M. Xu, F. Zhao, Y. Zou, C. Liu, X. Cheng, F. Dressler, Blown: a blockchain pro-
[26] N.P. Jouppi, C. Young, N. Patil, D. Patterson, G. Agrawal, R. Bajwa, S. Bates, tocol for single-hop wireless networks under adversarial sinr, IEEE Trans. Mob.
S. Bhatia, N. Boden, A. Borchers, et al., In-datacenter performance analysis of a Comput. (2022) 1, doi:10.1109/TMC.2022.3162117.
tensor processing unit, in: Proceedings of the 44th Annual International Sym- [37] M. Xu, C. Liu, Y. Zou, F. Zhao, J. Yu, X. Cheng, wchain: a fast fault-tolerant
posium on Computer Architecture, 2017, pp. 1–12. blockchain protocol for multihop wireless networks, IEEE Trans. Wirel. Com-
[27] J.R. Douceur, The sybil attack, in: Proceedings of the International Workshop mun. 20 (10) (2021) 6915–6926, doi:10.1109/TWC.2021.3078639.
on Peer-to-Peer Syzstems, Springer, 2002, pp. 251–260. [38] C. Liu, H. Guo, M. Xu, S. Wang, D. Yu, J. Yu, X. Cheng, Extending on-chain trust
[28] J. Unar, W.C. Seng, A. Abbasi, A review of biometric technology along with TC off-chain – trustworthy blockchain data collection using trusted execution
trends and prospects, Pattern Recognit. 47 (8) (2014) 2673–2688. environment (TEE), IEEE Trans. Comput. (2022) 1, doi:10.1109/TC.2022.3148379.
[29] E. Kokoris Kogias, D. Malkhi, A. Spiegelman, Asynchronous distributed key gen- [39] X. Yu, Z. Yan, A.V. Vasilakos, A survey of verifiable computation, Mob. Netw.
eration for computationally-secure randomness, consensus, and threshold sig- Appl. 22 (3) (2017) 438–453.
natures, in: Proceedings of the 2020 ACM SIGSAC Conference on Computer and [40] M. Castro, B. Liskov, et al., Practical byzantine fault tolerance, in: Proceedings
Communications Security, 2020, pp. 1751–1767. of the OSDI, volume 99, 1999, pp. 173–186.
[30] A. Bretto, Hypergraph theory, An Introduction. Mathematical Engineering, [41] L. Lamport, Paxos made simple, ACM SIGACT News 32 (2001) 51–58. (Dis-
Cham: Springer, 2013. tributed Computing Column) 32, 4 (Whole Number 121, December 2001)
[31] Chainlink, What is a blockchain oracle, 2021. https://chain.link/education/
blockchain-oracles.