You are on page 1of 7

High-Confidence Computing 3 (2023) 10 0 088

Contents lists available at ScienceDirect

High-Confidence Computing
journal homepage: www.elsevier.com/locate/hcc

Research

A trustless architecture of blockchain-enabled metaverseR


Minghui Xu a,∗, Yihao Guo a, Qin Hu b, Zehui Xiong c, Dongxiao Yu a, Xiuzhen Cheng a
a
School Computer Science and Technology, Shandong University, Qingdao 266237, China
b
Department of Computer and Information Science, Indiana University-Purdue University Indianapolis, USA
c
Information Systems Technology and Design Pillar, Singapore University of Technology and Design, Singapore

a r t i c l e i n f o a b s t r a c t

Article history: Metaverse has rekindled human beings’ desire to further break space-time barriers by fusing the virtual
Received 23 October 2022 and real worlds. However, security and privacy threats hinder us from building a utopia. A metaverse em-
Revised 18 November 2022
braces various techniques, while at the same time inheriting their pitfalls and thus exposing large attack
Accepted 22 November 2022
surfaces. Blockchain, proposed in 2008, was regarded as a key building block of metaverses. it enables
transparent and trusted computing environments using tamper-resistant decentralized ledgers. Currently,
Keywords: blockchain supports Decentralized Finance (DeFi) and Non-fungible Tokens (NFT) for metaverses. How-
Metaverse ever, the power of a blockchain has not been sufficiently exploited. In this article, we propose a novel
Blockchain trustless architecture of blockchain-enabled metaverse, aiming to provide efficient resource integration
Edge computing
and allocation by consolidating hardware and software components. To realize our design objectives, we
Trust
provide an On-Demand Trusted Computing Environment (OTCE) technique based on local trust evalua-
tion. Specifically, the architecture adopts a hypergraph to represent a metaverse, in which each hyper-
edge links a group of users with certain relationship. Then the trust level of each user group can be
evaluated based on graph analytics techniques. Based on the trust value, each group can determine its
security plan on demand, free from interference by irrelevant nodes. Besides, OTCEs enable large-scale
and flexible application environments (sandboxes) while preserving a strong security guarantee.
© 2022 The Author(s). Published by Elsevier B.V. on behalf of Shandong University. This is an open
access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

1. Introduction age. Nevertheless, constructing a metaverse is a challenging task,


though exciting and stirring.
The concept of metaverse was originated from Snow Cash, a Before metaverse is pushed to forefront, many efforts have been
1992 science fiction novel by Neal Stephenson. The word “meta- made, including Virtual Reality (VR)/Augmented Reality (AR), 3D
verse” is a portmanteau of “meta” (meaning transcending) and virtual world, and online video games [4]. However, how to im-
“verse” (abbreviation of the universe). In 2021, metaverse became plement a true metaverse is still unclear and controversial to de-
popular overnight since it rekindled people’s hope of building an velopers, even though they have constructed a number of relevant
ideal virtual society where human beings are tightly connected. Big tools and established a common goal of fusing virtual and reality.
companies then started to commit to developing metaverse soft- The major concerns about metaverse are related to its feasibility
ware, e.g., Meta Horizon Workroom [1], Microsoft Mesh [2], and and safety since a metaverse can consume a tremendous amount
NVIDIA Omniverse [3]. In fact, human beings have undergone a of computational resources and require a safe and trusted environ-
long history of building tight bonds and shortening the distance ment. Based on our investigations, we summarize the key issues of
among themselves, from ancient times to the current information metaverse as follows.
First, current infrastructures can hardly support building a
metaverse that meets our expectations. Metaverse applications cur-
rently exhibit a tradeoff between reality and openness as shown
R
Given her role as Editor in Chief of this journal, Xiuzhen Cheng had no involve- in Fig. 1. Resource shortage and improper allocation lead to the
ment in the peer-review of this article, and has no access to information regarding
sacrifice of either openness or reality. For example, the resource
its peer-review. Full responsibility for the editorial process for this article was del-
egated to Zhipeng Cai. in Minecraft [5] is mainly used to improve the openness for

Corresponding author. users but sacrifices the reality (users can only live in a “blocky”
E-mail address: mhxu@sdu.edu.cn (M. Xu). world). Hence there is an urgent demand for an efficient metaverse

https://doi.org/10.1016/j.hcc.2022.10 0 088
2667-2952/© 2022 The Author(s). Published by Elsevier B.V. on behalf of Shandong University. This is an open access article under the CC BY-NC-ND license
(http://creativecommons.org/licenses/by-nc-nd/4.0/)
M. Xu, Y. Guo, Q. Hu et al. High-Confidence Computing 3 (2023) 100088

accomplish virtual collaborations and spatially aware design re-


views. NVIDIA presented Omniverse [3], which is a metaverse sys-
tem focusing on 3D simulation and digital twins. The Omniverse
ecosystem includes components such as Omniverse Connect, Nu-
cleus, and RTX, among which RTX can provide Omniverse with
powerful computing powers.
In the field of 3D games, Roblox [8] proposed eight key char-
acteristics of a metaverse, i.e., identity, friends, immersion, any-
where, diversity, low latency, economy, and civilization. Second
Life [9] is a free 3D virtual world where users can create and con-
nect with others using voice and text. Linden Dollar as the vir-
Fig. 1. The roadmap of the metaverse projects. tual currency of Second Life can be exchangeable with real-world
currency. Minecraft [5] is an online 3D game that allows users to
create virtual worlds based on their creativity. Users can enter a
architecture, which can sufficiently utilize the existing computa- game through VR devices, e.g., Oculus Rift, thereby enhancing the
tional resources. Second, security and privacy threats hinder the sense of immersion. Pokémon Go [10] is a location-based AR game,
building of a practical metaverse platform. For example, at the be- in which players can use mobile devices (iPhone and Android de-
ginning of 2022, the metaverse company Meta was sued for ille- vices) to travel between the real world and the virtual world.
gally collecting facial information without users’ consent [6]. Be- Some projects introduce blockchain to the metaverses they
sides, the attack surface of a metaverse is very largely due to build. Decentraland is a decentralized VR platform based on
its diversity [7]. Additionally, a metaverse needs to integrate var- Ethereum, in which users can obtain benefits by creating, expe-
ious technologies whose pitfalls are also naturally inherited. For riencing, and developing NFT. Cryptovoxels [11] is a virtual world
instance, blockchain, proposed in 2008, has been regarded as the built on Ethereum where players can buy, sell and construct virtual
key building block of a metaverse. Blockchain enables transparent art galleries, shops, etc.
and trusted computing environments using a tamper-resistant de-
centralized ledger; however, the functions of a blockchain are lim- 2.2. Metaverse in academia
ited, as one can see that it is only used to build Decentralized Fi-
nance (DeFi) or Non-Fungible Token (NFT) nowadays. Besides, us- Radoff [12] presented a metaverse architecture with the fol-
ing blockchain in a metaverse can consume a large amount of re- lowing seven layers: experience, discovery, creator economy, spa-
sources and incur long latency. tial computing, decentralization, human interface, and infrastruc-
In this paper, we attempt to address the aforementioned short- ture. CUHKSZ [13] is a university campus prototype implemented
comings with a novel metaverse architecture. Our contributions are with the FISCO-BCOS consortium blockchain. CUHKSZ supports to-
highlighted as follows: kens, Distributed Autonomous Organizations (DAO), and trading.
The creators also put forward a number of critical challenges and
• We propose an architecture of blockchain-based metaverse thoughtful questions about developing a metaverse. Van Huynh
by consolidating hardware and software components, aiming et al. [14] proposed a new digital twin scheme, which adopts mo-
at providing efficient resource integration and allocation. The bile edge computing (MEC) and ultra-reliable and low latency com-
architecture presents detailed collaborations among different munications (URLLC) technologies to help metaverse improve re-
modules. liability and reduce communication latency. Nair et al. [15] pre-
• We formally define a local trust model (LTM) to depict a meta- sented an ε -differential privacy framework to improve the security
verse as a weighted hypergraph. Using this model, it is feasible and privacy of VR devices, which enables users to maximize pri-
to evaluate the trust among each group of metaverse users and vacy while minimizing usability impact when using VR devices to
provide it with an appropriate computing environment accord- participate in the metaverse. In [16], Nair et al. further explored
ing to the trust value. privacy risks in the metaverse through an experiment with 30 re-
• To enhance security and privacy of a metaverse, we propose searchers.
On-Demand Trusted Computing Environment (OTCE) to support In addition to the works mentioned above, there also exist a
application environments with variable scalability, which can few surveys and reviews, which intend to summarize the effort
provide a strong security guarantee using blockchain as an un- made toward metaverse from various perspectives. Dionisio et al.
derlying technology. [4] pointed out four directions of developing a metaverse, namely
immersive realism, ubiquity of access and identity, interoperabil-
2. Related works and motivation ity, and scalability. Kye et al. [17] discussed the opportunities and
challenges of metaverse in education. Damar [18] extracted rele-
Since metaverse is a young field, we summarize the effort from vant information about the development of metaverse from the
both industry and academia made in the past two years. past three decades. Park and Kim [19] classified and analyzed the
current metaverse schemes from five perspectives, i.e., hardware,
2.1. Metaverse in industry software, contents, user interaction, implementations, and appli-
cations. In Wang et al. [7] investigated the problems of the cur-
Facebook officially announced that its company name was rent major metaverse solutions from the perspective of security
changed to Meta [6] in 2021, which marks that it has identified and privacy. The focus of Xu et al. [20] is on an edge-enabled
metaverse as an important direction for future. Horizon Work- metaverse. Yang et al. [21] studied the important role that AI and
room [1], launched by Meta, can provide people with immersive blockchain play in metaverse.
virtual meeting rooms. Users in any physical location with an Ocu-
lus Quest 2 helmet can join a Horizon Workroom and experience 2.3. Motivation
virtual whiteboard control and file sharing. Microsoft Mesh [2] is
a platform supported by Azure. It adopts technologies including According to the above description on the most related works,
blockchain, artificial intelligence (AI), and extended reality (XR) to one can see that metaverse in industry is still in its exploration

2
M. Xu, Y. Guo, Q. Hu et al. High-Confidence Computing 3 (2023) 100088

stage. Companies are exploring the possibilities of building meta- ever, it is almost impossible to render every part of a metaverse
verses in various application scenarios such as 3D games, NFT, due to resource shortage. Therefore, we have to sacrifice reality to
online collaborations, and digital twins. However, as shown in make the metaverse open-ended, or vice versa. Overall, the cur-
Fig. 1, current metaverse projects cannot sufficiently balance re- rent networking and computing technologies are the bottlenecks
ality and openness. For example, some projects, including Second of realizing a metaverse as we expect. The fundamental challenge
Life, Minecraft, and Roblox, have good openness and allow users is: how to address the exponentially increasing number of sensors
to create their worlds according to their own interests; but it is deployed for a metaverse and amount of data collected by the sen-
difficult for these projects to guarantee reality, and the users can sors with limited hardware support?
only employ limited tools, such as pixel squares in Minecraft, to Therefore, we propose a new architecture by fusing blockchain
piece together things in a “blocky” world. Other projects, includ- and edge computing technologies to integrate all the computa-
ing Pokémon Go, Horizon Workroom, and Omniverse, can achieve tional resources from cloud-edge-device layers. A blockchain serves
reality but their virtual worlds are not fully opened. In academia, as an underlying trusted intermediary, which connects all the re-
most papers are reviews and surveys, which mainly summarize the sources within a large network. Similar to Sky computing [25], our
major metaverse platforms and propose prospects for future meta- blockchain intends to relate all the isolated services provided by
verse developments. A few articles propose layered architectures large and small companies, so as to aggregate the resources we
but lack sufficient and specific design details. Besides, rational al- can have for building a metaverse. Besides, the network is virtual-
location of resources, security, and privacy issues faced by meta- ized as a resource pool, in which computation tasks are assigned
verses are largely overlooked. to computing units based on utilization conditions. By this way,
However, a metaverse is by no means a simple combination of the integration of blockchain and various computational resources
technologies, but in need of considering a reasonable consolidation yields a virtual giant computer, and one can maximize resource
of hardware and software, so as to realize the efficient integra- utilization with all hardware in hands.
tion and allocation of resources. Only with sufficient resources can
one combine reality and openness. Moreover, metaverse should 3.1.2. Overview
take security and privacy into its initial design. As one of the key As shown in Fig. 2, the architecture of a metaverse consists of
technologies to build a metaverse, blockchain [22,23] can create a two major components: software and hardware. A real person is
trusted interactive environment for users who do not trust each physically surrounded by a variety of sensors such as a heartbeat
other and has the potential to be used as the underlying technol- sensor, a VR headset, a camera, a skin sensor, and a motion sensor.
ogy to provide security guarantee for the adoption of other tech- These sensors connect the physical and cyber worlds. A virtual hu-
nologies. However, current metaverse designs do not fully explore man must obtain a decentralized identity (DID) before being given
the potential of blockchain, which should have played a more im- birth in the metaverse.
portant role in a metaverse [21]. Motivated by these considera- In hardware, resource allocation follows the following rule:
tions, we propose a novel trustless metaverse architecture enabled maximize user experience with ultra-low latency. Cloud servers
by blockchain in this paper, which realizes a reasonable allocation are commonly used to train large AI models and carry out high-
of resources and improves the security and privacy of a metaverse. workload computations. This layer works for big data process-
ing. The edge layer and device layer deal with instant data. Edge
3. A Trustless architecture of blockchain-enabled metaverse servers form a backbone to carry out basic functions including
verifiable computation and decentralized storage, contributing to
3.1. Architecture computation and storage services. Personal devices at the edge
layer can participate as service providers. People can offer re-
3.1.1. Resource integration sources to share and get rewards. By this way we are able to
A metaverse is definitely a large-scale data-intensive system. gather enough resources for the metaverse. The device layer deals
Nevertheless, current computing technologies are not sufficiently with instant data that is hotter than those at the edge layer. On-
advanced to satisfy metaverses’ huge computational power re- device computation is an efficient way when tackling real-time ap-
quirements, making developers have to sacrifice either reality or plications, such as processing videos, tracking objects, and sending
openness. High-performance hardware (especially Graphics Pro- alarms. With specific hardware support (e.g., GPU, Tensor Process-
cessing Units (GPUs) [24]) can tackle complex rendering workloads ing Unit (TPU) [26]), we can perform on-device learning directly
and thus make a small virtual scenario approach to reality. How- on a local device. Moreover, IoT devices are resource-constrained

Fig. 2. A metaverse is established on the basis of software and hardware infrastructures. Each participant is surrounded by a variety of sensors which connect the physical
and cyber worlds. OTCE controls interactions among digital identities, which are supported by two basic functions. All software components are safeguarded by a blockchain.
The hardware is coordinated to contribute resources and is optimized under the goal of realtimeness.

3
M. Xu, Y. Guo, Q. Hu et al. High-Confidence Computing 3 (2023) 100088

in computation, storage, and energy, but they can still reach con-
sensus and collaborate through message passing (communication-
heavy). In summary, based on the above design, the Hardware can
allocate the corresponding computing resources according to the
user’s demand for the timeliness of data processing and maxi-
mize user experience with ultra-low latency. Due to the incentive
mechanism in the device layer, the device owners around the re-
quester would actively provide their computing power to help re-
questers complete the computational tasks and get rewards. There-
fore, some hotter instant data would be processed immediately
by nearby devices, providing low-latency services while ensuring Fig. 3. LTM as a hypergraph.
a good user experience.
In software, we introduce two novel approaches, LTM and OTCE,
which make the metaverse system controllable and secure. There 3.3. Trust evaluation
are two basic functions underlying the computing and storage in-
frastructure, both being supported by a blockchain: verifiable com- Trust is the basis of collaboration. A trust model can output
putation ensures that the computing process is fault-tolerant and a trust value influenced by various factors such as network size,
the computational results are verifiable; while a decentralized stor- message latency, and node behaviors. In a metaverse, applying a
age network distributes voluminous data into different types of global trust model is infeasible since one model can hardly de-
storage nodes. LTM measures the trust value of a group of nodes. pict the complex relationships among all users, both virtual and
Based on the trust value, OTCEs provide trusted services for each real. Therefore, our architecture adopts a local trust model (LTM).
group that can maintain diversified applications in the metaverse. LTM satisfies a locality property, which means that we can mea-
OTCEs are built on top of the two basic functions and can be re- sure the local trust with only a subset of nodes. In comparison,
garded as “sandboxes”. a global trust model implies that trust is evenly distributed. For
example, the upper bound f = N/3 about Byzantine nodes usually
refers to the case in which any node might become Byzantine with
3.2. Distributed identity equal probability but no more than N/3 nodes are Byzantine at the
same time in total. Byzantine-resilient protocols can have strong
Distributed Identity (DID) is a critical technique applied in security guarantees when confronted with f malicious nodes. In
metaverse. A DID represents a legitimate identifier and verifiable such a circumstance, a subset of nodes with high trust values has
credential for a metaverse participant. Usually, each identity is to follow the protocol without exception and thus endure the un-
mapped to an avatar. For example, CryptoAvatars built on top of necessary high communication overheads. Therefore, a global trust
an Ethereum blockchain creates 3D avatars in the form of NFTs. model fits into simple distributed systems such as a blockchain or
Tokenized avatars can be exchanged or transferred in a trustless a P2P network. However, global models do not suit a complicated
platform. Note that avatars are not necessary in some cases where metaverse because treating all nodes alike ignores the differences
users can directly interact with each other without relying on a vir- between different subsets of nodes, thus negatively impacting the
tual character. For example, when Alice and Bob are trading digital system performance and user experience.
commodities, they can issue transactions without creating avatars Essentially, LTM assigns each group of nodes a trust value to
first. depict trust in a fine-grained manner, rather than offer a unified
However, it remains a challenging problem that how to guar- trust value for the entire network. LTM provides metaverse net-
antee a secure and precise mapping from an identity or avatar to works with a rigorous mathematical expression, from which one
a real person. Such a capability is indispensable when establishing can benefit greatly when setting up a trusted computing environ-
a metaverse. Without a secure and reliable mapping technique, a ment or carrying out tasks such as social mining.
malicious user can launch Sybil attacks [27]. For example, an at- To have a better illustration on LTM, we provide a symbolized
tacker can control an election process using numerous Zombie ac- expression of an LTM as a hypergraph [30] shown in Fig. 3. Specif-
counts. ically, we denote a metaverse network as a weighted hypergraph
Hence we propose a new method of constructing DIDs with H = (V, E, W ), where V is the set of nodes, E is the set of hyper-
a strong security guarantee. Our method focuses on the map- edges, and W is the set of weights. Each hyperedge e ∈ E repre-
ping from digital identity to physical identity and supports large- sents a relation among a group of k nodes {v1 , v2 , · · · , vk }, denoted
scale identity establishments in harsh environments. On one hand, by e = {v1 , v2 , · · · , vk }, and is weighted by a trust value depicting
users’ personal information is collected by sensors and transferred to what extent the nodes in the group trust each other. In the
to a DID attestation module. The DID attestation module is built metaverse, a pairwise relationship is insufficient to depict social
with smart contracts, by which all the formats and policies are connections. Hypergraph fits the multi-adic relationships well, and
verified in a trustless and automatic way. To achieve precise at- each group of nodes collaborates to establish their own LTM. Thus,
testation, we can deploy biometric technologies such as finger- one can quantify the metaverse network and study its character-
print and facial recognition [28]. On the other hand, DID supports istics by various graph analytics techniques. For example, we can
asynchronous distributed key generation (ADKG) [29] apart from estimate the distribution of computing power usage from the de-
the public key infrastructure. Asynchronous byzantine algorithms gree distribution and clustering coefficients. The estimation can be
should work under the assumptions of both asynchronous net- further used to determine the resource allocation of hardware. Us-
works and Byzantine nodes. An asynchronous network refers to ing LTMs and hypergraphs, we can create sandboxes for massive
the case when the message delay can be infinitely long. Byzan- interacted applications with strong security guarantees and formu-
tine nodes can behave arbitrarily such as crash or collude. ADKG late the metaverse in a formal and computable graph model. The
distributes a secret among a group. A sufficient number of nodes metaverse hereby becomes controllable and auditable.
can later reconstruct the secret by combining their shares when Generally, a metaverse can aggregate the sensed network data
they want to use the secret in tasks such as group authentication, to calculate trust. However, poor data quality can lead to inaccu-
byzantine agreement, and multi-party computation. rate trust estimation. Data quality is measured based on factors of

4
M. Xu, Y. Guo, Q. Hu et al. High-Confidence Computing 3 (2023) 100088

completeness, consistency, and reliability. Hence we introduce Or- the blockchain to establish an on-demand trusted computing en-
acle to serve as a data transport module and provide high-quality vironment P at time t, and the request is verified by the miners.
data. An oracle (e.g., Provable) is a third-party trusted service that When the verification is successful, the behavior of opening OTCE
collects data from the digital world. It can provide authenticity is recorded on the blockchain and the participating nodes can in-
proofs to demonstrate that the data source is authentic and un- teract with each other in OTCE. When the node interaction in P is
tampered. Relying on oracles, we can evaluate trust more accu- completed (at time t + δ ), the participants in G upload their final
rately and efficiently. Note that, currently, oracles are commonly results based on the verifiable computing techniques, e.g., trusted
connected to blockchain systems, which improves the security of hardware and zero-knowledge proofs [39] (more descriptions are
the data flowing into the blockchain and is considered one of the shown in Section 3.4.3), to the blockchain and apply to close P .
best solutions for the smart contract to compute based on inputs After successful verification by miners, the blockchain closes the
from the real world [31,32]. Moreover, as a third party, the oracle OTCE P .

does not affect the blockchain consensus and other processes, so Formally, we denote an OTCE by a vector E = (EID,
the entire system is still decentralized. State, G, T , Results ). Environment identity (abbreviated
by EID) is a unique identity of an OTCE, making OTCEs
3.4. On-demand trusted computing environment distinguishable and traceable. State represents the current
state of E. An OTCE has four different states, denoted by
The role a blockchain plays definitely is beyond cryptocur- State ∈ {New, Running, Suspend, Terminated}. State transitions
rency, DeFi, and NFT. Even though blockchains have demon- are triggered by transactions. When a group of nodes G intends
strated their effectiveness in enhancing the security of cloud [33], to establish a new OTCE, they first create a transaction with
edge [34,35] and device [36–38] layers, their power has not E = (EID, New, G, T , ⊥ ). The creation process is fully executed by
been unleashed in a metaverse. In our metaverse architecture, a smart contract, which outputs E = (EID, Running, G, T , ⊥ ). The
blockchains are expected to help the metaverse build a trusted information of the registered OTCE is thereby confirmed by the
ecosystem. To meet this goal, we have to address three challenges. smart contract. T is a time duration that regulates how long E
First, blockchains should be appropriately and lightly deployed in can last. Since there is no precise synchronized clocks in G, T is
the metaverse to support massive data-intensive applications in measured by the block height. The Suspend state is wakened when
parallel. Storing hashes of data chunks on a blockchain might in- G needs to temporarily stop an application and continues later.
cur unaffordable storage overheads in the metaverse even though The corresponding metadata can be stored on-chain for context
this approach is effective in saving storage of traditional blockchain switching. Once G decides to continue, it changes its status from
systems. Secondly, even if the throughput of a blockchain has been Suspend back to Running. The cases of suspending an OTCE should
dramatically improved (e.g., from 6 TPS to 10 0 kTPS) since 20 08, be common in a metaverse since applications may frequently need
deploying and terminating blockchains are still costly and time- to be stopped and resumed to save resources. When computation
consuming. In fact, it is hard for small companies or organiza- processes are completely finished or E expires, E should be closed.
tions to quickly deploy a blockchain in a short time due to the The termination of E can be initiated by G if the task is finished
prohibitively high cost. Third, cross-chain interoperability becomes before E expires, or the smart contract automatically triggers a
a bottleneck in the current blockchain ecosystem, in which more transaction to terminate E when E expires.
than ten thousand independent blockchain systems are isolated
and heterogeneous; thus unifying blockchains deployed in a meta- 3.4.2. Security plan according to trust value
verse is very challenging. To achieve efficient resource utilization, we map trust values to
To address the above challenges, we propose On-Demand different security plans in OTCE. For example, PBFT [40] is good
Trusted Computing Environment (OTCE), which serves as an un- for a group of N nodes among which at most f = N/3 of them
derlying infrastructure to provide trust throughout the metaverse. can be Byzantine. A generic Paxos [41] can solve consensus when
The design goals of an OTCE are listed as follows. at most f = N/2 nodes can be faulty. Since the generic Paxos has
higher performance but weaker resiliency compared to PBFT, it
• Security. The lifecycle of each OTCE is protected. State transi- might suffice for a group with a high trust level. Nevertheless, if
tions of an OTCE are fully recorded in a tamper-proof way. the group suffers from Byzantine attacks, it needs PBFT instead.
• Flexibility. An OTCE can be efficiently created, manipulated, Mapping trust levels to security plans benefits resource allocation
and terminated in the metaverse. and thus can enhance efficiency. The mapping can be denoted by
• Lightweight. Data flows are closely related to a specific OTCE. TV → SP , where TV (Trust Value) and SP  (Security Plan) can both
Different OTCEs can freely share real-time data to avoid storage reside in high dimensional spaces. One can use a matrix to repre-
redundancy. sent a linear mapping or adopt machine learning and deep learn-
ing approaches to determine non-linear mappings. Note that an
3.4.1. OTCE details OTCE can be dynamically adjusted according to the changing trust
With OTCE, a group of nodes can collaboratively establish a values. For example, if an OTCE needs to shift from the generic
trusted computing environment on demand. Recall that in on- Paxos to PBFT due to the appearance of Byzantine nodes, it can be
chain computation, the entire computation process is executed by changed through a confirmed transaction.
all miners via smart contracts, results are validated by validators
(or miners), and confirmed results are recorded on a blockchain 3.4.3. Blockchain virtual machine (BVM): decentralized computation
and then become readable to all nodes. In contrast, off-chain com- over decentralized data
putation occurs outside of smart contracts with only critical in- Trusted computing is a necessity in a metaverse since the so-
formation being written to the blockchain. An OTCE can be cre- ciety of the metaverse cannot be long live without establishing
ated when needed and then terminated when its duty is complete. trust. If computational results are unreliable and unpredictable, no
Some predefined operations are required to be on-chain, but most one knows what would happen next and thus the metaverse is in
of the computation processes are carried out off-chain. For exam- chaos. IEEE has defined “trust” as the level of predictability. In our
ple, Fig. 4 presents three OTCEs (P , Q, and S) from opening to clos- architecture, we need all computational results to be fault-tolerant
ing, and we take P as an example to show the whole process of and verifiable. Specifically, we allow some nodes to deviate from
an OTCE. To be specific, multiple nodes form a group G to request the protocols or output wrong intermediary results but require

5
M. Xu, Y. Guo, Q. Hu et al. High-Confidence Computing 3 (2023) 100088

Fig. 4. On-demand Trusted Computing Environment (OTCE).

that the final results must be correct. To avoid malicious behaviors, and BVM. In our future study, we intend to instantiate our pro-
we need the results to be verifiable so that everyone can confirm posed metaverse architecture by building a demo metaverse.
the result without incurring much computational overhead. Veri-
fiable computation is used to outsource computational tasks from Declaration of competing interest
clients to workers with dishonest behaviors. In a metaverse, we re-
quire critical computation to be verifiable. The approaches to real- The authors declare that they have no known competing finan-
ize verifiable computation include trusted hardware (e.g., Intel SGX cial interests or personal relationships that could have appeared to
and ARM Trustzone), secure multi-party computation (MPC), com- influence the work reported in this paper.
mitment, and zero-knowledge proofs [39], which can be applied
to metaverses based on specific needs. Fault-tolerant and verifiable References
computing replaces centralized trusted third parties in a meta-
verse. [1] A. Heath, Inside facebook’s metaverse for work, 2004. https://www.theverge.
com/2021/8/19/22629942/facebook- workroomshorizon- oculus- vr.
Compared to the Ethereum Virtual Machine (EVM), the
[2] M. Team, Microsoft mesh, 2022. https://www.microsoft.com/en-us/mesh.
blockchain virtual machine (BVM) used in our architecture should [3] N. Team, Nvidia omniverse, 2021. https://www.nvidia.com/en-us/omniverse/.
support a decentralized execution of smart contracts. In an EVM, [4] J.D.N. Dionisio, W.G.B. III, R. Gilbert, 3d virtual worlds and the metaverse: Cur-
rent status and future possibilities, ACM Computing Surveys (CSUR) 45 (3)
each miner executes the entire smart contract on its own and com-
(2013) 1–38.
petes with other independent miners. In such a competition, only [5] M. Team, Minecraft maps, 2009. https://www.minecraftmaps.com/tags/
one miner can win, and the others finally lose, which wastes a real- cities- in- minecraft.
huge amount of resources. By using BVM, nodes can collaboratively [6] Meta, Facebook company is now meta, 2021. https://about.fb.com/news/2021/
10/facebook- company- is- now- meta/.
execute a smart contract, which decreases the execution time and [7] Y. Wang, Z. Su, N. Zhang, R. Xing, D. Liu, T.H. Luan, X. Shen, A survey on meta-
also avoids undesirable race conditions. To ensure safety and live- verse: fundamentals, security, and privacy, IEEE Commun. Surv. Tutor. (2022).
ness, task allocation follows a directed acyclic graph (DAG) repre- [8] R. Corporation, Roblox, 2006. https://developer.roblox.com/en-us/.
[9] L. Labs, Second life, 2003. https://secondlife.com/.
sentation of smart contracts. [10] P. Company, PokȨmon go, 2016. https://www.pokemon.com/us/app/
A decentralized storage network (DSN) contributes to building pokemon-go/.
a decentralized storage market without relying on cloud storage. [11] Cryptovoxels, Welcome to voxels - a user-owned virtual world, 2021, https:
//www.cryptovoxels.com/.
In our architecture, decentralized computation and decentralized [12] J. Radoff, The metaverse value-chain, 2021. https://medium.com/
storage are merged into a single system to provide basic comput- building- the- metaverse/the- metaverse- value- chain- afcf9e09e3a7.
ing/storage functions for a metaverse. Recall that BVMs collabo- [13] H. Duan, J. Li, S. Fan, Z. Lin, X. Wu, W. Cai, Metaverse for social good: a uni-
versity campus prototype, in: Proceedings of the 29th ACM International Con-
rate on contract execution. With a DSN, each BVM can compute
ference on Multimedia, 2021, pp. 153–161.
on nearby or local data without querying big data from remote [14] D. Van Huynh, S.R. Khosravirad, A. Masaracchia, O.A. Dobre, T.Q. Duong, Edge
servers. By this way, the computation can be more real-time and intelligence-based ultra-reliable and low-latency communications for digital
twin-enabled metaverse, IEEE Wirel. Commun. Lett. 11 (8) (2022) 1733–1737.
data owners can have stronger privacy guarantees compared to tra-
[15] V. Nair, G.M. Garrido, D. Song, Going incognito in the metaverse, arXiv preprint
ditional approaches. arXiv:2208.05604(2022a).
[16] V. Nair, G.M. Garrido, D. Song, Exploring the unprecedented privacy risks of
the metaverse, arXiv preprint arXiv:2207.13176(2022b).
4. Conclusion [17] B. Kye, N. Han, E. Kim, Y. Park, S. Jo, Educational applications of metaverse:
possibilities and limitations, J. Educ. Eval. Health Prof. 18 (2021) 1–13.
[18] M. Damar, Metaverse shape of your life for future: a bibliometric snapshot, J.
In this article, we present a trustless blockchain-enabled meta- Metaverse 1 (1) (2021) 1–8.
verse architecture. The architecture provides an efficient coordina- [19] S.-M. Park, Y.-G. Kim, A metaverse: taxonomy, components, applications, and
tion method of software and hardware. To improve performance open challenges, IEEE Access 10 (2022) 4209–4251.
[20] M. Xu, W.C. Ng, W.Y.B. Lim, J. Kang, Z. Xiong, D. Niyato, Q. Yang, X.S. Shen, C.
while preserving security, we propose a few new techniques, in- Miao, A full dive into realizing the edge-enabled metaverse: visions, enabling
cluding DID attestation and trust evaluation by hypergraph, OTCE, technologies, and challenges, arXiv preprint arXiv:2203.05471(2022).

6
M. Xu, Y. Guo, Q. Hu et al. High-Confidence Computing 3 (2023) 100088

[21] Q. Yang, Y. Zhao, H. Huang, Z. Xiong, J. Kang, Z. Zheng, Fusing blockchain and [32] A. Pasdar, Y.C. Lee, Z. Dong, Connect api with blockchain: a survey on
ai with metaverse: a survey, IEEE Open J. Comput. Soc. 3 (2022) 122–136. blockchain oracle implementation, ACM Comput. Surv. (2022).
[22] M. Belotti, N. Božić, G. Pujolle, S. Secci, A vademecum on blockchain tech- [33] M. Xu, S. Liu, D. Yu, X. Cheng, S. Guo, J. Yu, Cloudchain: a cloud blockchain
nologies: when, which, and how, IEEE Commun. Surv. Tutor. 21 (4) (2019) using shared memory consensus and rdma, IEEE Trans. Comput. (2022) 1,
3796–3838. doi:10.1109/TC.2022.3147960.
[23] J. Kolb, M. AbdelBaky, R.H. Katz, D.E. Culler, Core concepts, challenges, and fu- [34] M. Xu, C. Wang, Y. Zou, D. Yu, X. Cheng, W. Lyu, Curb: trusted and scalable
ture directions in blockchain: a centralized tutorial, ACM Comput. Surv. (CSUR) software-defined network control plane for edge computing, in: Proceedings
53 (1) (2020) 1–39. of the IEEE 42nd International Conference on Distributed Computing Systems
[24] A.R. Brodtkorb, T.R. Hagen, M.L. Sætra, Graphics processing unit (GPU) pro- (ICDCS), 2022, pp. 492–502, doi:10.1109/ICDCS54860.2022.0 0 054.
gramming strategies and trends in GPU computing, J. Parallel Distrib. Comput. [35] M. Xu, Z. Zou, Y. Cheng, Q. Hu, D. Yu, X. Cheng, Spdl: a blockchain-enabled
73 (1) (2013) 4–13. secure and privacy-preserving decentralized learning system, IEEE Trans. Com-
[25] K. Keahey, M. Tsugawa, A. Matsunaga, J. Fortes, Sky computing, IEEE Internet put. (2022) 1, doi:10.1109/TC.2022.3169436.
Comput. 13 (5) (2009) 43–51. [36] M. Xu, F. Zhao, Y. Zou, C. Liu, X. Cheng, F. Dressler, Blown: a blockchain pro-
[26] N.P. Jouppi, C. Young, N. Patil, D. Patterson, G. Agrawal, R. Bajwa, S. Bates, tocol for single-hop wireless networks under adversarial sinr, IEEE Trans. Mob.
S. Bhatia, N. Boden, A. Borchers, et al., In-datacenter performance analysis of a Comput. (2022) 1, doi:10.1109/TMC.2022.3162117.
tensor processing unit, in: Proceedings of the 44th Annual International Sym- [37] M. Xu, C. Liu, Y. Zou, F. Zhao, J. Yu, X. Cheng, wchain: a fast fault-tolerant
posium on Computer Architecture, 2017, pp. 1–12. blockchain protocol for multihop wireless networks, IEEE Trans. Wirel. Com-
[27] J.R. Douceur, The sybil attack, in: Proceedings of the International Workshop mun. 20 (10) (2021) 6915–6926, doi:10.1109/TWC.2021.3078639.
on Peer-to-Peer Syzstems, Springer, 2002, pp. 251–260. [38] C. Liu, H. Guo, M. Xu, S. Wang, D. Yu, J. Yu, X. Cheng, Extending on-chain trust
[28] J. Unar, W.C. Seng, A. Abbasi, A review of biometric technology along with TC off-chain – trustworthy blockchain data collection using trusted execution
trends and prospects, Pattern Recognit. 47 (8) (2014) 2673–2688. environment (TEE), IEEE Trans. Comput. (2022) 1, doi:10.1109/TC.2022.3148379.
[29] E. Kokoris Kogias, D. Malkhi, A. Spiegelman, Asynchronous distributed key gen- [39] X. Yu, Z. Yan, A.V. Vasilakos, A survey of verifiable computation, Mob. Netw.
eration for computationally-secure randomness, consensus, and threshold sig- Appl. 22 (3) (2017) 438–453.
natures, in: Proceedings of the 2020 ACM SIGSAC Conference on Computer and [40] M. Castro, B. Liskov, et al., Practical byzantine fault tolerance, in: Proceedings
Communications Security, 2020, pp. 1751–1767. of the OSDI, volume 99, 1999, pp. 173–186.
[30] A. Bretto, Hypergraph theory, An Introduction. Mathematical Engineering, [41] L. Lamport, Paxos made simple, ACM SIGACT News 32 (2001) 51–58. (Dis-
Cham: Springer, 2013. tributed Computing Column) 32, 4 (Whole Number 121, December 2001)
[31] Chainlink, What is a blockchain oracle, 2021. https://chain.link/education/
blockchain-oracles.

You might also like