Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

HCNCT: A Cross-chain Interaction Scheme for the Blockchain-based Metaverse

Published: 27 March 2024 Publication History

Abstract

As a new type of digital living space that blends virtual and reality, Metaverse combines many emerging technologies. It provides an immersive experience based on VR technology and stores and protects users’ digital content and digital assets through blockchain technology. However, different virtual environments are often highly heterogeneous in terms of underlying architecture and software implementation technology, which leads to many challenges in scalability and interoperability for blockchains serving the Metaverse. Cross-chain technology is an essential technology to realize the scalability and interoperability of blockchain. However, the current cross-chain technologies all have their own merits and demerits, and there is no cross-chain solution that can be fully applied to any scenario. To this end, in the blockchain-based Metaverse, this article proposes a cross-chain transaction scheme based on improved hash timelock, HCNCT. By combining the notary mechanism, this scheme uses a group of notaries to supervise and participate in cross-chain transactions, effectively solving the problem that malicious users create a large number of time-out transactions to block the transaction channel, which exists in the traditional hash timelock method. Besides, this article uses the verifiable secret sharing method in the notary group, which can effectively prevent the centralization problem of the notary mechanism. Moreover, this article discusses the process of key processing, cross-chain transaction and transaction verification of the scheme, and designs the user credibility evaluation mechanism, which can effectively reduce the occurrence of malicious default of users. Compared with existing solutions, our solution has the advantage of effectively addressing time-out transaction attacks and centralization issues while guaranteeing security. The experiments also verify the effectiveness of the proposed scheme.

References

[1]
Rafael Belchior, André Vasconcelos, Sérgio Guerreiro, and Miguel Correia. 2022. A survey on blockchain interoperability: Past, present, and future trends. Comput. Surveys 54, 8 (Nov. 2022), 1–41. DOI:
[2]
Anirudh Chandramouli, Ashish Choudhury, and Arpita Patra. 2022. A survey on perfectly secure verifiable secret-sharing. ACM Comput. Surveys 54, 11 (Sep. 2022), 1–36. DOI:
[3]
Bingrong Dai, Shengming Jiang, Menglu Zhu, Ming Lu, Dunwei Li, and Chao Li. 2020. Research and implementation of cross-chain TranTransaction model based on improved hash-locking. Blockchain Trustworthy Syst. 1267, 1, 218–230. DOI:
[4]
Liping Deng, Huan Chen, Jing Zeng, and Liang-Jie Zhang. 2018. Research on cross-chain technology based on sidechain and hash-locking. In Proceedings of the Conference onEdge Computing (EDGE’18), 144–151. DOI:
[5]
Haihan Duan, Jiaye Li, Sizheng Fan, Zhonghao Lin, Xiao Wu, and Wei Cai. 2021. Metaverse for social good: A university campus prototype. In Proceedings of the 29th ACM International Conference on Multimedia, 153–161. DOI:
[6]
Weiwei Fang, Xuening Yao, Xiaojie Zhao, Jianwei Yin, and Naixue Xiong. 2018. A stochastic control approach to maximize profit on service provisioning for mobile cloudlet platforms. IEEE Trans. Syst., Man, Cybernet.: Syst. 48, 4 (Apr. 2018), 522–534. DOI:
[7]
Paolo Faraboschi, Eitan Frachtenberg, Phil Laplante, Dejan Milojicic, and Roberto Saracco. 2022. Virtual worlds (Metaverse): From skepticism, to fear, to immersive opportunities. Computer 55, 10 (Oct. 2022), 100–106. DOI:
[8]
Thippa Reddy Gadekallu, Thien Huynh-The, Weizheng Wang, Gokul Yenduri, Pasika Ranaweera, Quoc-Viet Pham, Daniel Benevides da Costa, and Madhusanka Liyanage. 2022. Blockchain for the Metaverse: A review. Retrieved from https://arXiv:2203.09738.
[9]
Chunpeng Ge, Zhe Liu, Jinyue Xia, and Liming Fang. 2021. Revocable identity-based broadcast proxy re-encryption for data sharing in clouds. IEEE Trans. Depend. Secure Comput. 18, 3 (Feb. 2021), 1214–1226. DOI:
[10]
Chunpeng Ge, Willy Susilo, Zhe Liu, Jinyue Xia, Pawel Szalachowski, and Liming Fang. 2021. Secure keyword search and data sharing mechanism for cloud computing. IEEE Trans. Depend. Secure Comput. 18, 6 (Jan. 2021), 2787–2800. DOI:
[11]
Pengchong Han, Zhouyang Zhang, Shan Ji, Xiaowan Wang, Liang Liu, and Yongjun Ren. 2023. Access control mechanism for the Internet of Things based on blockchain and inner product encryption. J. Info. Secur. Appl. 74 (May 2023), 103446. DOI:
[12]
Maurice Herlihy. 2018. Atomic cross-chain swaps. Proceedings of the ACM Symposium on Principles of Distributed Computing, 245–254. DOI:
[13]
Maurice Herlihy, Barbara Liskov, and Liuba Shrira. 2019. Cross-chain deals and adversarial commerce. Retrieved from https://arXiv:arXiv:1905.09743.
[14]
Thien Huynh-The, Quoc-Viet Pham, Xuan-Qui Pham, Thanh Thi Nguyen, Zhu Han, and Dong-Seong Kim. 2023. Artificial intelligence for the metaverse: A survey. Retrieved from https://arxiv.org/abs/2202.10336. DOI:
[15]
Poon Joseph and Buterin Vitalik. 2017. Plasma: Scalable Autonomous Smart Contracts. Retrieved July 13, 2022 from https://www.plasma.io/plasma-deprecated.pdf.
[16]
Lik-Hang Lee, Tristan Braud, Pengyuan Zhou, Lin Wang, Dianlei Xu, Zijun Lin, Abhishek Kumar, Carlos Bermejo, and Pan Hui. 2021. All one needs to know about metaverse: A complete survey on technological singularity, virtual ecosystem, and research agenda. Retrieved from https://arXiv:arXiv:2110.05352.
[17]
Haoran Liang, Jun Wu, Xi Zheng, Mengshi Zhang, Jianhua Li, and Alireza Jolfaei. 2020. Fog-based secure service discovery for Internet of multimedia things: A cross-blockchain approach. ACM Trans. Multimedia Comput. Commun. Appl. 16, 3s, Article 96 (Dec. 2020), 23 pages. DOI:
[18]
Jian-Hong Lin, Emiliano Marchese, Claudio J. Tessone, and Tiziano Squartini. 2022. The weighted bitcoin lightning network. Chaos, Solitons Fractals 164 (Nov. 2022), 112620. DOI:
[19]
Aitong Lu, Kuo Zhao, and Jingying Yang. 2019. Research on cross-chain technology of blockchain. Netinfo Secur. 19, 8 (May 2019), 83–90. DOI:
[20]
Samrat Mitra, Samanwita Das, and Malay Kule. 2021. Prevention of the man-in-the-middle attack on Diffie–Hellman key exchange algorithm: A review. In Proceedings of International Conference on Frontiers in Computing and Systems (COMSYS’20). Springer, 625–635. DOI:
[21]
Susil Kumar Mohanty and Somanath Tripathy. 2021. n-HTLC: Neo hashed time-Lock commitment to defend against wormhole attack in payment channel networks. Comput. Secur. 106 (Jul. 2021), 102291. DOI:
[22]
Huansheng Ning, Hang Wang, Yujia Lin, Wenxi Wang, Sahraoui Dhelim, Fadi Farha, Jianguo Ding, and Mahmoud Daneshmand. 2021. A survey on Metaverse: The state-of-the-art, technologies, applications, and challenges. Retrieved from https://arXiv:2111.09673. DOI:
[23]
Palletone. 2018. Protocol for Abstract-level Ledger Ecosystem. Retrieved October 14, 2019 from http://pallet.one/doc/PalletOne_whitepaper_en.pdf.
[24]
Yanzhen Qu and Naixue Xiong. 2012. RFH: A resilient, fault-tolerant and high-efficient replication algorithm for distributed cloud storage. In Proceedings of the 41st International Conference on Parallel Processing. IEEE, 520–529. DOI:
[25]
Yongjun Ren, Yan Leng, Yaping Cheng, and Jin Wang. 2019. Secure data storage based on blockchain and coding in edge computing. Math. Biosci. Eng. 16, 4 (Mar. 2019), 1874–1892. DOI:
[26]
Yongjun Ren, Yan Leng, Jian Qi, Pradip Kumar Sharma, Jin Wang, Zafer Almakhadmeh, and Amr Tolba. 2021. Multiple cloud storage mechanism based on blockchain in smart homes. Future Gen. Comput. Syst. 115 (Feb. 2021), 304–313. DOI:
[27]
Yongjun Ren, Fujian Zhu, Pradip Kumar Sharma, Tian Wang, Jin Wang, Osama Alfarraj, and Amr Tolba. 2019. Data query mechanism based on hash computing power of Blockchain in Internet of Things. Sensors 20, 1 (Dec. 2019), 207. DOI:
[28]
Yongjun Ren, Fujian Zhu, Jin Wang, Pradip Kumar Sharma, and Uttam Ghosh. 2022. Novel vote scheme for decision-making feedback based on blockchain in Internet of Vehicles. IEEE Trans. Intell. Transport. Syst. 23, 2 (Feb. 2022), 1639–1648. DOI:
[29]
Elias Rohrer and Florian Tschorsch. 2020. Counting down thunder: Timing attacks on privacy in payment channel networks. In Proceedings of the 2nd ACM Conference on Advances in Financial Technologies. 214–227. DOI:
[30]
Liucheng Shi and Zhaozhong Guo. 2020. Baguena: A practical proof of stake protocol with a robust delegation mechanism. Chinese J. Electron. 29, 5 (Sept. 2020), 887–898. DOI:
[31]
Stefan Thomas and Evan Schwartz. 2015. A Protocol for Interledger Pay-ments. Retrieved April 14, 2021 from https://interledger.org/interledger.pdf.
[32]
Itay Tsabary, Matan Yechieli, Alex Manuskin, and Ittay Eyal. 2021. MAD-HTLC: Because HTLC is crazy-cheap to attack. In Proceedings of the IEEE Symposium on Security and Privacy (SP’21). IEEE, 1230–1248. DOI:
[33]
Jin Wang, Jiahao Chen, Yongjun Ren, Pradip Kumar Sharma, Osama Alfarraj, and Amr Tolba. 2022. Data security storage mechanism based on blockchain industrial Internet of Things. Comput. Industr. Eng. 164 (Feb. 2022), 107903. DOI:
[34]
Jin Wang, Wencheng Chen, Yongjun Ren, Osama Alfarraj, and Lei Wang. 2020. Blockchain based data storage mechanism in cyber physical system. J. Internet Technol. 21, 6 (Nov. 2020), 1681–1689. DOI:
[35]
Jin Wang, Wencheng Chen, Lei Wang, R. Simon Sherratt, Osama Alfarraj, and Amr Tolba. 2020. Data secure storage mechanism of sensor networks based on Blockchain. Comput. Mater. Cont. 65, 3 (Oct. 2020), 2365–2384. DOI:
[36]
Jin Wang, Yu Gao, Wei Liu, Arun Kumar Sangaiah, and Hye-Jin Kim. 2019. An intelligent data gathering schema with data fusion supported for mobile sink in wireless sensor networks. Int. J. Distrib. Sensor Netw. 15, 3 (2019). DOI:
[37]
Jin Wang, Yu Gao, Wei Liu, Wenbing Wu, and Se-Jung Lim. 2019. An asynchronous clustering and mobile data gathering schema based on timer mechanism in wireless sensor networks. Comput. Mater. Cont. 58, 3 (2019), 711–725. DOI:
[38]
Jin Wang, Yu Gao, Xiang Yin, Feng Li, and HyeJin Kim. 2018. An enhanced PEGASIS algorithm with mobile sink support for wireless sensor networks. Wireless Commun. Mobile Comput. (Dec. 2018). DOI:
[39]
Jin Wang, Yu Gao, Chang Zhou, Simon Sherratt, and Lei Wang. 2020. Optimal coverage multi-path scheduling scheme with multiple mobile sinks for WSNs. Comput. Mater. Cont. 62, 2 (2020), 695–711. DOI:
[40]
Jin Wang, Chunwei Ju, Yu Gao, Arun Kumar Sangaiah, Gwang-jun Kim, et al. 2018. A PSO based energy efficient coverage control algorithm for wireless sensor networks. Comput. Mater. Cont. 56, 3 (2018), 433–446. DOI:
[41]
Jin Wang, Yaqiong Yang, Tian Wang, R. Simon Sherratt, and Jingyu Zhang. 2020. Big data service architecture: A survey. J. Internet Technol. 21, 2 (Mar. 2020), 393–405. DOI:
[42]
Mou Wu, Liansheng Tan, and Naixue Xiong. 2014. A structure fidelity approach for big data collection in wireless sensor networks. Sensors 15, 1 (Dec. 2014), 248–273. DOI:
[43]
Qiang Wu, Zhaoyang Han, Ghulam Mohiuddin, and Yongjun Ren. 2023. Distributed timestamp mechanism based on verifiable delay functions. Comput. Syst. Sci. Eng. 44 (2023), 1633–1646. DOI:
[44]
Qiang Wu, Liang Xi, Shiren Wang, Shan Ji, Shenqing Wang, and Yongjun Ren. 2022. Verifiable delay function and its blockchain-related application: A survey. Sensors 22, 19 (Sept. 2022). DOI:
[45]
Hailiang Xiong, Changwu Hu, Yujun Li, Guangyuan Wang, and Hongchao Zhou. 2020. Secure secret sharing with adaptive bandwidth in distributed cloud storage systems. IEEE Access 8 (June 2020), 108148–108157. DOI:
[46]
Naixue Xiong, Athanasios V. Vasilakos, Jie Wu, Y. Richard Yang, Andy Rindos, Yuezhi Zhou, Wen-Zhan Song, and Yi Pan. 2012. A self-tuning failure detection scheme for cloud computing service. In Proceedings of the IEEE 26th International Parallel and Distributed Processing Symposium. 668–679. DOI:
[47]
Qinglin Yang, Yetong Zhao, Huawei Huang, Zehui Xiong, Jiawen Kang, and Zibin Zheng. 2022. Fusing Blockchain and AI with Metaverse: A survey. Retrieved from https://arXiv:arXiv:2201.03201.
[48]
Xiaofeng Yu, Shunzhi Zhu, and Yongjun Ren. 2023. Continuous trajectory similarity search with result diversification. Future Gen. Comput. Syst. 143 (June 2023), 392–400. DOI:
[49]
Qi Zhang, Chunjie Zhou, Yu-Chu Tian, Naixue Xiong, Yuanqing Qin, and Bowen Hu. 2017. A fuzzy probability Bayesian network approach for dynamic cybersecurity risk assessment in industrial control systems. IEEE Trans. Industr. Inform. 14, 6 (Nov. 2017), 2497–2506. DOI:

Cited By

View all
  • (2024)Conditional Proxy Re-Encryption-Based Key Sharing Mechanism for Clustered Federated LearningElectronics10.3390/electronics1305084813:5(848)Online publication date: 22-Feb-2024
  • (2024)Privacy-Preserving Multi-Party Cross-Chain Transaction ProtocolsCryptography10.3390/cryptography80100068:1(6)Online publication date: 4-Feb-2024
  • (2024)Multistream Adaptive Attention-Enhanced Graph Convolutional Networks for Youth Fencing Footwork TrainingPediatric Exercise Science10.1123/pes.2024-002536:4(274-288)Online publication date: 1-Nov-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Multimedia Computing, Communications, and Applications
ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 20, Issue 7
July 2024
973 pages
EISSN:1551-6865
DOI:10.1145/3613662
  • Editor:
  • Abdulmotaleb El Saddik
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 March 2024
Online AM: 25 April 2023
Accepted: 20 April 2023
Revised: 10 March 2023
Received: 28 July 2022
Published in TOMM Volume 20, Issue 7

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Metaverse
  2. blockchain
  3. cross-chain
  4. blockchain interoperability
  5. Hash timelock contract
  6. notary mechanism

Qualifiers

  • Research-article

Funding Sources

  • National Natural Science Foundation of China
  • National Science Foundation of Hunan Province
  • Hunan Provincial Key Research and Development Program

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)587
  • Downloads (Last 6 weeks)70
Reflects downloads up to 10 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Conditional Proxy Re-Encryption-Based Key Sharing Mechanism for Clustered Federated LearningElectronics10.3390/electronics1305084813:5(848)Online publication date: 22-Feb-2024
  • (2024)Privacy-Preserving Multi-Party Cross-Chain Transaction ProtocolsCryptography10.3390/cryptography80100068:1(6)Online publication date: 4-Feb-2024
  • (2024)Multistream Adaptive Attention-Enhanced Graph Convolutional Networks for Youth Fencing Footwork TrainingPediatric Exercise Science10.1123/pes.2024-002536:4(274-288)Online publication date: 1-Nov-2024
  • (2024)A Blockchain Cross-Chain Transaction Method Based on Decentralized Dynamic Reputation Value AssessmentIEEE Transactions on Network and Service Management10.1109/TNSM.2024.343341421:5(5597-5612)Online publication date: 1-Oct-2024
  • (2024)ABE-Based Postquantum Cross-Blockchain Data Exchange Approach for Smart AgricultureIEEE Transactions on Industrial Informatics10.1109/TII.2024.341368420:10(12083-12091)Online publication date: Oct-2024
  • (2024)ACRS-Raft: A Raft Consensus Protocol for Adaptive Data Maintenance in the Metaverse Based on Cauchy Reed–Solomon CodesIEEE Transactions on Consumer Electronics10.1109/TCE.2024.337343570:1(3792-3801)Online publication date: Feb-2024
  • (2024)User Safety and Security in the Metaverse: A Critical ReviewIEEE Open Journal of the Communications Society10.1109/OJCOMS.2024.33970445(5467-5487)Online publication date: 2024
  • (2024)Integration of Quantum Technologies into Metaverse: Applications, Potentials, and ChallengesIEEE Access10.1109/ACCESS.2024.336652712(29995-30019)Online publication date: 2024
  • (2024)Avatars at Risk: Exploring Public Response to Sexual Violence in Immersive Digital SpacesComputers in Human Behavior10.1016/j.chb.2024.108500(108500)Online publication date: Nov-2024
  • (2023)Two-Phase Election Algorithm for Cross-Chain Notaries2023 3rd International Conference on Computer Science and Blockchain (CCSB)10.1109/CCSB60789.2023.10398755(53-58)Online publication date: 17-Nov-2023
  • Show More Cited By

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media