Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

RAC-Chain: An Asynchronous Consensus-based Cross-chain Approach to Scalable Blockchain for Metaverse

Published: 27 March 2024 Publication History

Abstract

The metaverse, as an emerging technical term, conceptually aims to construct a virtual digital space that runs parallel to the physical world. Due to human behaviors and interactions being represented in the virtual world, security in the metaverse is a challenging issue in which the traditional centralized service model is one of the threat sources. To conquer the obstacle caused by centralized computing, blockchain-based solutions are potential problem-solving methods. However, it is difficult for a single blockchain to support large-scale data and business services in the metaverse, due to the scalability restrictions. Moreover, multi-chain settings also encounter the interoperability issues. In this work, we propose a Relay chain and Asynchronous consensus-based Consortium blockchain cross-Chain model, which realizes message transmission and cross-chain transactions in multiple chains by adopting the relay chain and cross-chain gateways. All nodes of the application chains and the relay chain execute cross-chain transactions in sequence and reach a consensus on transactions at any transmission delay. Our experiment evaluations demonstrate that our approach performs well in atomicity, security, and functionality (cross-chain transactions), such that the performance of blockchain scalability in the metaverse can be improved, compared with the traditional relay chain schemes.

References

[1]
Y. Amoussou-Guenou, D. Pozzo, M. Potop-Butucaru, and S. Tucci-Piergiovanni. 2018. Correctness of tendermint-core blockchains. In Proceedings of the 22nd International Conference on Principles of Distributed Systems (OPODIS’18). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik.
[2]
M. Ben-Or, B. Kelmer, and T. Rabin. 1994. Asynchronous secure computations with optimal resilience. In Proceedings of the 13th Annual ACM Symposium on Principles of Distributed Computing. 183–192.
[3]
A. Bessani, E. Alchieri, J. Sousa, A. Oliveira, and F. Pedone. 2020. From byzantine replication to blockchain: Consensus is only the beginning. In Proceedings of the 50th Annual IEEE/IFIP International Conference on DSN. IEEE, 424–436.
[4]
R. Canetti and T. Rabin. 1993. Fast asynchronous byzantine agreement with optimal resilience. In Proceedings of the 25th Annual ACM Symposium on Theory of Computing. 42–51.
[5]
B. Dai, S. Jiang, M. Zhu, M. Lu, D. Li, and C. Li. 2020. Research and implementation of cross-chain transaction model based on improved hash-locking. In Proceedings of the International Conference on Blockchain and Trustworthy Systems. Springer, 218–230.
[6]
L. Deng, H. Chen, J. Zeng, and L. Zhang. 2018. Research on cross-chain technology based on sidechain and hash-locking. In Proceedings of the International Conference on Edge Computing. Springer, 144–151.
[7]
H. Duan, J. Li, S. Fan, Z. Lin, X. Wu, and W. Cai. 2021. Metaverse for social good: A university campus prototype. In Proceedings of the 29th ACM International Conference on Multimedia. 153–161.
[8]
S. Duan, M. K. Reiter, and H. Zhang. 2018. BEAT: Asynchronous BFT made practical. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 2028–2041.
[9]
C. Dwork, N. A. Lynch, and L. J. Stockmeyer. 1988. Consensus in the presence of partial synchrony. J. ACM 35, 2 (1988), 288–323.
[10]
M. J. Fischer, N. A. Lynch, and M. Paterson. 1985. Impossibility of distributed consensus with one faulty process. J. ACM 32, 2 (1985), 374–382.
[11]
P. Frauenthaler, M. Sigwart, C. Spanring, M. Sober, and S. Schulte. 2020. ETH relay: A cost-efficient relay for ethereum-based blockchains. In Proceedings of the IEEE International Conference on Blockchain (Blockchain’20). IEEE, 204–213.
[12]
T. Reddy Gadekallu, T. Huynh, W. Wang, G. Yenduri, P. Ranaweera, Q. Pham, D. Costa, and M. Liyanage. 2022. Blockchain for the metaverse: A review. Retrieved from https://arXiv:2203.09738.
[13]
K. Gai, S. Wang, H. Zhao, Y. She, Z. Zhang, and L. Zhu. 2022. Blockchain-based multisignature lock for UAC in metaverse. IEEE Trans. Comput. Soc. Syst. (2022), 1–13.
[14]
K. Gai, Q. Xiao, M. Qiu, G. Zhang, J. Chen et al. 2022. Digital twin-enabled AI enhancement in smart critical infrastructures for 5G. ACM Trans. Sensor Netw. 18, 3 (2022), 1–20.
[15]
K. Gai, Y. Zhang, M. Qiu, and B. Thuraisingham. 2022. Blockchain-enabled service optimizations in supply chain digital twin. IEEE Trans. Serv. Comput. (2022), 1–12.
[16]
B. Guo, Z. Lu, Q. Tang, J. Xu, and Z. Zhang. 2020. Dumbo: Faster asynchronous bft protocols. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 803–818.
[17]
M. Herlihy. 2018. Atomic cross-chain swaps. In Proceedings of the ACM Symposium on Principles of Distributed Computing. 245–254.
[18]
A. Hope-Bailie and S. Thomas. 2016. Interledger: Creating a standard for payments. In Proceedings of the 25th International Conference Companion on World Wide Web. 281–282.
[19]
A. Ittai, M. Dahlia, N. Kartik, R. Ling, and Y. Maofan. 2020. Sync hotstuff: Simple and practical synchronous state machine replication. In Proceedings of the IEEE Symposium on Security and Privacy (SP’20). IEEE, 106–118.
[20]
A. Ittai, N. Kartik, R. Ling, and Z. Xiang. 2020. Optimal good-case latency for byzantine broadcast and state machine replication. J. Environ. Sciences (China) English Ed. (2020).
[21]
Y. Jiang, C. Wang, Y. Wang, and L. Gao. 2019. A cross-chain solution to integrating multiple blockchains for IoT data management. Sensors 19, 9 (2019), 2042.
[22]
N. Kannengießer, M. Pfister, M. Greulich, S. Lins, and A. Sunyaev. 2020. Bridges between islands: Cross-chain technology for distributed ledger technology. In Proceedings of the 53rd Hawaii International Conference on System Sciences. Social Science Electronic Publishing.
[23]
L. Kong, K. Ma, B. Qiao, and X. Guo. 2016. Adaptive relay chain routing with load balancing and high energy efficiency. IEEE Sensors J. 16, 14 (2016), 5826–5836.
[24]
L. Lee, T. Braud, P. Zhou, L. Wang, D. Xu et al. 2021. All one needs to know about metaverse: A complete survey on technological singularity, virtual ecosystem, and research agenda. Retrieved from https://arXiv:2110.05352.
[25]
J. Lind, O. Naor, I. Eyal, F. Kelbert, E. Sirer, and P. Pietzuch. 2019. Teechain: A secure payment network with asynchronous blockchain access. In Proceedings of the 27th ACM Symposium on Operating Systems Principles. 63–79.
[26]
S. Liu, P. Viotti, C. Cachin, V. Quéma, and M. Vukolic. 2016. XFT: Practical fault tolerance beyond crashes. In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI’16). 485–500.
[27]
Z. Liu, Y. Xiang, J. Shi, P. Gao, H. Wang, X. Xiao, B. Wen, and Y. Hu. 2019. Hyperservice: Interoperability and programmability across heterogeneous blockchains. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 549–566.
[28]
L. Lys, A. Micoulet, and M. Potop-Butucaru. 2020. Atomic cross chain swaps via relays and adapters. In Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for Distributed Systems. 59–64.
[29]
D. Malkhi, K. Nayak, and L. Ren. 2019. Flexible byzantine fault tolerance. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 1041–1053.
[30]
A. Miller, Y. Xia, K. Croman, E. Shi, and D. Song. 2016. The honey badger of BFT protocols. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 31–42.
[31]
M. Miraz and D. Donald. 2019. Atomic cross-chain swaps: Development, trajectory and potential of non-monetary digital token swap facilities. Retrieved from https://arXiv:1902.04471.
[32]
A. Momose and L. Ren. 2021. Multi-threshold byzantine fault tolerance. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 1686–1699.
[33]
S. Muhammad, A. Afsah, R. Srivatsan, and M. David. 2021. Revisiting Nakamoto consensus in asynchronous networks: A comprehensive analysis of bitcoin safety and chainquality. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 988–1005.
[34]
W. Ou, S. Huang, J. Zheng, Q. Zhang, G. Zeng, and W. Han. 2022. An overview on cross-chain: Mechanism, platforms, challenges and advances. Computer Networks 218 (2022), 109378.
[35]
R. Pass, L. Seeman, and A. Shelat. 2017. Analysis of the blockchain protocol in asynchronous networks. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 643–673.
[36]
B. Ryskeldiev, Y. Ochiai, M. Cohen, and J. Herder. 2018. Distributed metaverse: Creating decentralized blockchain-based model for peer-to-peer sharing of virtual spaces for mixed reality applications. In Proceedings of the 9th Augmented Human International Conference. 1–3.
[37]
I. Seres, L. Gulyás, D. Nagy, and P. Burcsi. 2020. Topological analysis of bitcoin’s lightning network. In Mathematical Research for Blockchain Economy. Springer, 1–12.
[38]
A. Singh, K. Click, R. Parizi, Q. Zhang, A. Dehghantanha et al. 2020. Sidechain technologies in blockchain networks: An examination and state-of-the-art review. J. Netw. Comput. Appl. 149 (2020), 102471.
[39]
S. Thyagarajan, G. Malavolta, and P. Moreno-Sánchez. 2022. Universal atomic swaps: Secure exchange of coins across all blockchains. IEEE Symposium on Security and Privacy (SP). IEEE, 1299–1316.
[40]
D. Vujičić, D. Jagodić, and S. Ranđić. 2018. Blockchain technology, bitcoin, and ethereum: A brief overview. In Proceedings of the 17th International Symposium Infoteh-jahorina (Infoteh’18). IEEE, 1–6.
[41]
A. Wang, Z. Gao, L. Lee, T. Braud, and P. Hui. 2022. Decentralized, not dehumanized in the metaverse: Bringing utility to NFTs through multimodal interaction. Retrieved from https://arXiv:2206.03737.
[42]
J. Wang and H. Wang. 2019. Monoxide: Scale out blockchains with asynchronous consensus zones. In Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI’19). 95–112.
[43]
Y. Wang, Z. Su, N. Zhang, D. Liu, R. Xing, T. H. Luan, and X. Shen. 2022. A survey on metaverse: Fundamentals, security, and privacy. Retrieved from https://arXiv:2203.02662.
[44]
C. Worley and A. Skjellum. 2018. Blockchain tradeoffs and challenges for current and emerging applications: Generalization, fragmentation, sidechains, and scalability. In Proceedings of the IEEE International Conference on iThings and IEEE GreenCom and IEEE CPSCom and IEEE SmartData. IEEE, 1582–1587.
[45]
D. Yang, C. Long, H. Xu, and S. Peng. 2020. A review on scalability of blockchain. In Proceedings of the 2nd International Conference on Blockchain Technology. 1–6.
[46]
M. Yin, D. Malkhi, M. K. Reiter, G. Golan-Gueta, and I. Abraham. 2019. Hotstuff: Bft consensus with linearity and responsiveness. In Proceedings of the ACM Symposium on Principles of Distributed Computing. 347–356.
[47]
Z. Yin, B. Zhang, J. Xu, K. Lu, and K. Ren. 2022. Bool network: An open, distributed, secure cross-chain notary platform. IEEE Trans. Info. Forensics Secur. 17 (2022), 3465–3478.
[48]
Z. Zhao, G. Wu, W. Susilo, F. Guo, B. Wang, and Y. Hu. 2019. Accountable identity-based encryption with distributed private key generators. Info. Sci. 505 (2019), 352–366.
[49]
C. Zhong, Z. Liang, Y. Huang, F. Xiong, M. Qin, and Z. Guo. 2022. Research on cross-chain technology of blockchain: Challenges and prospects. In Proceedings of the IEEE 2nd ICPECA. IEEE, 422–428.
[50]
J. Zie, J. Deneuville, J. Briffaut, and B. Nguyen. 2019. Extending atomic cross-chain swaps. In Data Privacy Management, Cryptocurrencies and Blockchain Technology. Springer, 219–229.

Cited By

View all
  • (2024)Decision Tree-Based Federated Learning: A SurveyBlockchains10.3390/blockchains20100032:1(40-60)Online publication date: 7-Mar-2024
  • (2024)Decision Tree-based Privacy Protection in Federated Learning: A Survey2024 IEEE 10th Conference on Big Data Security on Cloud (BigDataSecurity)10.1109/BigDataSecurity62737.2024.00028(119-124)Online publication date: 10-May-2024

Index Terms

  1. RAC-Chain: An Asynchronous Consensus-based Cross-chain Approach to Scalable Blockchain for Metaverse

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Transactions on Multimedia Computing, Communications, and Applications
        ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 20, Issue 7
        July 2024
        973 pages
        EISSN:1551-6865
        DOI:10.1145/3613662
        • Editor:
        • Abdulmotaleb El Saddik
        Issue’s Table of Contents

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 27 March 2024
        Online AM: 02 March 2023
        Accepted: 12 February 2023
        Revised: 15 January 2023
        Received: 31 July 2022
        Published in TOMM Volume 20, Issue 7

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Relay chain
        2. cross-chain technology
        3. asynchronous consensus
        4. blockchain scalability
        5. blockchain interoperability

        Qualifiers

        • Research-article

        Funding Sources

        • National Key Research and Development Program of China
        • National Natural Science Foundation of China

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)331
        • Downloads (Last 6 weeks)23
        Reflects downloads up to 02 Sep 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Decision Tree-Based Federated Learning: A SurveyBlockchains10.3390/blockchains20100032:1(40-60)Online publication date: 7-Mar-2024
        • (2024)Decision Tree-based Privacy Protection in Federated Learning: A Survey2024 IEEE 10th Conference on Big Data Security on Cloud (BigDataSecurity)10.1109/BigDataSecurity62737.2024.00028(119-124)Online publication date: 10-May-2024

        View Options

        Get Access

        Login options

        Full Access

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Full Text

        View this article in Full Text.

        Full Text

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media