Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

MIS: A Multi-Identifier Management and Resolution System in the Metaverse

Published: 27 March 2024 Publication History
  • Get Citation Alerts
  • Abstract

    The metaverse gradually evolves into a virtual world containing a series of interconnected sub-metaverses. Diverse digital resources, including identities, contents, services, and supporting data, are key components of the sub-metaverse. Therefore, a Domain Name System (DNS)-like system is necessary for efficient management and resolution. However, the legacy DNS was designed with security vulnerabilities and trust risks due to centralized issues. Blockchain is used to mitigate these concerns due to its decentralized features. Additionally, it supports identity management as a default feature, making it a natural fit for the metaverse. While there are several DNS alternatives based on the blockchain, they either manage only a single type of identifiers or isolate identities from other sorts of identifiers, making it difficult for sub-metaverses to coexist and connect with each other. This article proposes a Multi-Identifier management and resolution System (MIS) in the metaverse, supporting the registration, resolution, and inter-translation functions. The basic MIS is portrayed as a four-tier architecture on a consortium blockchain due to its manageability, enhanced security, and efficiency properties. On-chain data is lightweight and compressed to save on storage while accelerating reading and writing operations. The resource data is encrypted based on the attributes of the sub-metaverse in the storage tier for privacy protection and access control. For users with decentralization priorities, a modification named EMIS is built on top of Ethereum. Finally, MIS is implemented on two testbeds and is available online as the open-source system. The first testbed consists of 4 physical servers located in the UK and Malaysia while the second is made up of 200 virtual machines (VMs) spread over 26 countries across all 5 continents on Google Cloud. Experiments indicate that MIS provides efficient reading and writing performance than the legacy DNS and other public blockchain-based workarounds including EMIS and Ethereum Name Service (ENS).

    References

    [1]
    Lik-Hang Lee, Tristan Braud, Pengyuan Zhou, Lin Wang, Dianlei Xu, Zijun Lin, Abhishek Kumar, Carlos Bermejo, and Pan Hui. 2021. All one needs to know about metaverse: A complete survey on technological singularity, virtual ecosystem, and research agenda. arXiv:2110.05352 (2021). Retrieved from https://arxiv.org/abs/2110.05352.
    [2]
    Joe Sanchez. 2007. Second life: An interactive qualitative analysis. In Proceedings of the Society for Information Technology & Teacher Education International Conference 2007.
    [3]
    John David N. Dionisio, William G. Burns III, and Richard Gilbert. 2013. 3d virtual worlds and the metaverse: Current status and future possibilities. ACM Comput. Surv 45, 3 (2013), 34.
    [4]
    Anders Bruun and Martin Lynge Stentoft. 2019. Lifelogging in the wild: Participant experiences of using lifelogging as a research tool. In Proceedings of the Human-Computer Interaction – INTERACT 2019: 17th IFIP TC 13 International Conference.
    [5]
    Kyoungro Yoon, Sang-Kyun Kim, Sangkwon Peter Jeong, and Jeong-Hwan Choi. 2021. Interfacing cyber and physical worlds: Introduction to ieee 2888 standards. In Proceedings of the 2021 IEEE International Conference on Intelligent Reality (ICIR) (12-13, 2021).
    [6]
    Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review (2008), 21260.
    [9]
    Aaron Swartz. Squaring the Triangle: Secure, Decentralized, Human-readable Names. http://www.aaronsw.com/weblog/squarezooko.
    [10]
    Muneeb Ali, Jude Nelson, Ryan Shea, and Michael J. Freedman. 2016. Blockstack: A global naming and storage system secured by blockchains. In Proceedings of the the 2016 USENIX Conference on Usenix Annual Technical Conference.
    [11]
    Ens Documentation. 2022. https://docs.ens.domains/.
    [12]
    [14]
    Ittay Eyal and Emin Gün Sirer. 2014. Majority is not enough: Bitcoin mining is vulnerable. Communications of the ACM 61, 7 (2014), 436–454.
    [15]
    Zhong Yu, Dong Xue, Jiulun Fan, and Chang Guo. 2020. Dnstsm: Dns cache resources trusted sharing model based on consortium blockchain. IEEE Access 8 (2020), 13640–13650.
    [16]
    Guobiao He, Wei Su, Shuai Gao, and Jiarui Yue. 2020. Td-root: A trustworthy decentralized dns root management architecture based on permissioned blockchain. Future Generation Computer Systems, 102 (2020), 912–924.
    [17]
    Ho-Kyung Yang, Hyun-Jong Cha, and You-Jin Song. 2018. Secure identifier management based on blockchain technology in ndn environment. IEEE Access, 7 (2018), 6262–6268.
    [18]
    Hui Li, Jiangxing Wu, Xin Yang, Han Wang, Julong Lan, Ke Xu, Hua Tan, Jinwu Wei, Wei Liang, and Fusheng Zhu. 2020. Min: Co-governing multi-identifier network architecture and its prototype on operator's network. IEEE Access 8 (2020), 36569–36581.
    [19]
    Welcome to Decentraland. https://decentraland.org/.
    [20]
    Cryptovoxels - a user Owned Virtual World. https://cryptowexels.com/.
    [21]
    The Sandbox Game — user-Generated Crypto. https://www.sandbox.game.
    [22]
    Haihan Duan, Jiaye Li, Sizheng Fan, Zhonghao Lin, Xiao Wu, and Wei Cai. 2021. Metaverse for social good: A university campus prototype. In Proceedings of the MM '21: Proceedings of the 29th ACM International Conference on Multimedia.
    [23]
    Aleksandar Jovanović and Aleksandar Milosavljević. 2022. Vortex metaverse platform for gamified collaborative learning. Electronics 11, 3 (2022), 317.
    [24]
    Zijian Bao, Wenbo Shi, Debiao He, and Kim-Kwang Raymond Chood. 2018. Iotchain: A three-tier blockchain-based iot security architecture. arXiv:1806.02008 (2018). Retrieved from https://arxiv.org/abs/1806.02008.
    [25]
    Mohammed Amine Bouras, Qinghua Lu, Sahraoui Dhelim, and Huansheng Ning. 2021. A lightweight blockchain-based iot identity management approach. Future Internet 13, 2 (2021), 24.
    [26]
    Youngjun Song and Sunghyuck Hong. 2021. Build a secure smart city by using blockchain and digital twin. International Journal of Advanced Science and Convergence 3 (2021), 9–13.
    [27]
    Chunpeng Ge, Zhe Liu, Jinyue Xia, and Liming Fang. 2019. Revocable identity-based broadcast proxy re-encryption for data sharing in clouds. IEEE Transactions on Dependable and Secure Computing 18, 3 (2019), 1214–1226.
    [28]
    Chunpeng Ge, Willy Susilo, Joonsang Baek, Zhe Liu, Jinyue Xia, and Liming Fang. 2021. A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds. IEEE Transactions on Dependable and Secure Computing 19, 5 (2021), 2907–2919.
    [29]
    Matt Blaze, Gerrit Bleumer, and Martin Strauss. 1998. Divertible protocols and atomic proxy cryptography. In Proceedings of the Advances in Cryptology—EUROCRYPT'98: International Conference on the Theory and Application of Cryptographic Techniques Espoo, Finland, May 31–June 4, 1998 Proceedings 17 (1998).
    [30]
    Adi Shamir. 1985. Identity-based cryptosystems and signature schemes. In Proceedings of the Advances in Cryptology: Proceedings of CRYPTO (1985).
    [31]
    Amit Sahai and Brent Waters. 2005. Fuzzy identity-based encryption. In Proceedings of the Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, (2005).
    [32]
    John Bethencourt, Amit Sahai, and Brent Waters. 2007. Ciphertext-policy attribute-based encryption. In Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP'07) (2007).
    [33]
    Chunpeng Ge, Willy Susilo, Zhe Liu, Jinyue Xia, Pawel Szalachowski, and Liming Fang. 2020. Secure keyword search and data sharing mechanism for cloud computing. IEEE Transactions on Dependable and Secure Computing 18, 6 (2020), 2787–2800.
    [34]
    Chunpeng Ge, Willy Susilo, Joonsang Baek, Zhe Liu, Jinyue Xia, and Liming Fang. 2021. Revocable attribute-based encryption with data integrity in clouds. IEEE Transactions on Dependable and Secure Computing 19, 5 (2021), 2864–2872.
    [35]
    Xiaohui Liang, Rongxing Lu, Xiaodong Lin, and Xuemin Sherman Shen. 2010. Ciphertext Policy Attribute based Encryption with Efficient Revocation. 2010, http://bbcr.uwaterloo.ca/∼x27liang/abe_with_revocation.pdf.
    [36]
    Hui Cui and Robert H. Deng. 2016. Revocable and decentralized attribute-based encryption. The Computer Journal 59, 8 (2016), 1220–1235.
    [37]
    Jiawei Zhang, Jianfeng Ma, Yanbo Yang, Ximeng Liu, and Neal N. Xiong. 2021. Revocable and privacy-preserving decentralized data sharing framework for fog-assisted internet of things. IEEE Internet of Things Journal 9, 13 (2021), 10446–10463.
    [38]
    Ping Yu, Qiaoyan Wen, Wei Ni, Wenmin Li, Caijun Sun, Hua Zhang, and Zhengping Jin. 2019. Decentralized, revocable and verifiable attribute-based encryption in hybrid cloud system. Wireless Personal Communications 106 (2019), 719–738.
    [39]
    Allison Lewko and Brent Waters. 2011. Decentralizing attribute-based encryption. In Proceedings of the Advances in Cryptology–EUROCRYPT 2011: 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques.
    [40]
    Ipfs Powers the Distributed Web. https://ipfs.io.
    [41]
    Michael Dowling. 2022. Is non-fungible token pricing driven by cryptocurrencies? Finance Research Letters 44 (2022), 102097.
    [42]
    Catalina Goanta. 2020. Selling land in decentraland: The regime of non-fungible tokens on the ethereum blockchain under the digital content directive. Springer International Publishing 2020.
    [43]
    Brendan Benshoof, Andrew Rosen, Anu G. Bourgeois, and Robert W. Harrison. 2016. Distributed decentralized domain name service. In Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW) (2016).
    [45]
    Ittay Eyal, Adem Efe Gencer, Emin Gün Sirer, and Robbert Van Renesse. 2016. Bitcoin-ng: A scalable blockchain protocol. In Proceedings of the the 13th Usenix Conference on Networked Systems Design and Implementation.
    [46]
    Muneeb Ali. 2020. Stacks 2.0: Apps and Smart Contracts for Bitcoin. 2020. https://gaia.blockstack.org/hub/1Eo6q4qLMcSSpkhoUADxRAGZhgUyjVEVcK/stacks-zh.pdf.
    [47]
    Wentong Wang, Ning Hu, and Xin Liu. 2019. Blockzone: A blockchain-based dns storage and retrieval scheme. In Proceedings of the International Conference on Artificial Intelligence and Security.
    [48]
    Miguel Castro and Barbara Liskov. 1999. Practical byzantine fault tolerance. In Proceedings of the OSDI '99: Proceedings of the Third Symposium on Operating Systems Design and Implementation (1999).
    [49]
    Tong Jin, Xiang Zhang, Yirui Liu, and Kai Lei. 2017. Blockndn: A bitcoin blockchain decentralized system over named data networking. In Proceedings of the 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN) (2017).
    [50]
    Jingqiang Liu, Bin Li, Lizhang Chen, Meng Hou, Feiran Xiang, and Peijun Wang. 2018. A data storage method based on blockchain for decentralization dns. In Proceedings of the 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC) (2018), 18–21.
    [51]
    Wondeuk Yoon, Indal Choi, and Daeyoung Kim. 2019. Blockons: Blockchain based object name service. In Proceedings of the 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (2019).
    [52]
    Yantao Shen, Yang Lu, Zhili Wang, Xin Xv, Feng Qi, Ningzhe Xing, and Ziyu Zhao. 2021. Dns service model based on permissioned blockchain. Intelligent Automation and Soft Computing 27, 1 (2021), 259–268.
    [53]
    Xiangui Wang, Kedan Li, Hui Li, Yinghui Li, and Zhiwei Liang. 2017. Consortiumdns: A distributed domain name service based on consortium chain. In Proceedings of the 2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC/SmartCity/DSS) (2017).
    [54]
    Maofan Yin, Dahlia Malkhi, Michael K. Reiter, Guy Golan Gueta, and Ittai Abraham. 2019. Hotstuff: Bft consensus with linearity and responsiveness. In Proceedings of the the 2019 ACM Symposium on Principles of Distributed Computing.
    [55]
    Yongjie Bai, Yang Zhi, Hui Li, Han Wang, Ping Lu, and Chengtao Ma. 2021. On parallel mechanism of consortium blockchain: Take pov as an example. In Proceedings of the 2021 The 3rd International Conference on Blockchain Technology.
    [56]
    Dan Boneh, Ben Lynn, and Hovav Shacham. 2001. Short signatures from the weil pairing. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security (2001).
    [57]
    Stephen B. Wicker and Vijay K. Bhargava. 1999. Reed-solomon Codes and their Applications. John Wiley & Sons, Published, 1999.
    [62]
    Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov. 2017. Ouroboros: A provably secure proof-of-stake blockchain protocol. In Proceedings of the Annual International Cryptology Conference.
    [63]
    Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, and Nickolai Zeldovich. 2017. Algorand: Scaling byzantine agreements for cryptocurrencies. In Proceedings of the the 26th Symposium on Operating Systems Principles.
    [64]
    Yonatan Sompolinsky and Aviv Zohar. 2015. Secure high-rate transaction processing in bitcoin. In Proceedings of the International Conference on Financial Cryptography and Data Security.
    [65]
    Chenxin Li, Peilun Li, Dong Zhou, Zhe Yang, Ming Wu, Guang Yang, Wei Xu, Fan Long, and Andrew Chi-Chih Yao. 2020. A decentralized blockchain with high throughput and fast confirmation. In Proceedings of the 2020 USENIX Annual Technical Conference (USENIX ATC 20) (2020).
    [67]
    Ramakrishna Kotla, Lorenzo Alvisi, Mike Dahlin, Allen Clement, and Edmund Wong. 2007. Zyzzyva: Speculative byzantine fault tolerance. In Proceedings of the Twenty-first ACM SIGOPS Symposium on Operating Systems Principles.
    [68]
    Kejiao Li, Hui Li, Hanxu Hou, Kedan Li, and Yongle Chen. 2017. Proof of vote: A high-performance consensus protocol based on vote mechanism & consortium blockchain. IEEE, 2017.
    [69]
    Kejiao Li, Hui Li, Han Wang, Huiyao An, Ping Lu, Peng Yi, and Fusheng Zhu. 2020. Pov: An efficient voting-based consensus algorithm for consortium blockchains. Frontiers in Blockchain 3, 11 (2020), 1–16.
    [70]
    Seth Gilbert and Nancy Lynch. 2002. Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services. SIGACT News 33, 2 (2002), 51–59.
    [71]
    Size of the Bitcoin Blockchain from January 2009 to july 11, 2022(in gigabytes). https://www.statista.com/statistics/647523/worldwide-bitcoin-blockchain-size/.
    [72]
    Doriane Perard, Jérôme Lacan, Yann Bachy, and Jonathan Detchart. 2018. Erasure code-based low storage blockchain node. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (2018).
    [73]
    Xiaodong Qi, Zhao Zhang, Cheqing Jin, and Aoying Zhou. 2020. Bft-store: Storage partition for permissioned blockchain via erasure coding. In Proceedings of the 2020 IEEE 36th International Conference on Data Engineering (ICDE) (2020).

    Cited By

    View all
    • (2024)S-ID: Implementing Intelligent Interoperability for Heterogeneous IoT Identifiers Through a Semantic-Based FrameworkIEEE Access10.1109/ACCESS.2023.334758612(1341-1359)Online publication date: 2024
    • (2023)A Review of Approaches for Detecting Vulnerabilities in Smart Contracts within Web 3.0 ApplicationsBlockchains10.3390/blockchains10100021:1(3-18)Online publication date: 23-Aug-2023
    • (2023)GBT-CHAIN: A System Framework for Solving the General Trilemma in Permissioned BlockchainsDistributed Ledger Technologies: Research and Practice10.1145/3615871Online publication date: 23-Aug-2023
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Multimedia Computing, Communications, and Applications
    ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 20, Issue 7
    July 2024
    973 pages
    ISSN:1551-6857
    EISSN:1551-6865
    DOI:10.1145/3613662
    • Editor:
    • Abdulmotaleb El Saddik
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 27 March 2024
    Online AM: 26 May 2023
    Accepted: 02 April 2023
    Revised: 30 March 2023
    Received: 31 July 2022
    Published in TOMM Volume 20, Issue 7

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Metaverse
    2. blockchain
    3. Domain Name System
    4. identifier management

    Qualifiers

    • Research-article

    Funding Sources

    • National Keystone Research and Development Program of China
    • Foshan Innovation Team
    • Basic Research Enhancement Program of China
    • China Environment for Network Innovation, GJFGW
    • SZFGW
    • Guangdong Province Research and Development Key Program
    • Guangdong Province Basic Research
    • Shenzhen Research Programs
    • Shenzhen Fundamental Research Program
    • ZTE Funding
    • Huawei Funding

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)484
    • Downloads (Last 6 weeks)58

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)S-ID: Implementing Intelligent Interoperability for Heterogeneous IoT Identifiers Through a Semantic-Based FrameworkIEEE Access10.1109/ACCESS.2023.334758612(1341-1359)Online publication date: 2024
    • (2023)A Review of Approaches for Detecting Vulnerabilities in Smart Contracts within Web 3.0 ApplicationsBlockchains10.3390/blockchains10100021:1(3-18)Online publication date: 23-Aug-2023
    • (2023)GBT-CHAIN: A System Framework for Solving the General Trilemma in Permissioned BlockchainsDistributed Ledger Technologies: Research and Practice10.1145/3615871Online publication date: 23-Aug-2023
    • (2023)Blockchain-Assisted UAV Communication Systems: A Comprehensive SurveyIEEE Open Journal of Vehicular Technology10.1109/OJVT.2023.32952084(558-580)Online publication date: 2023
    • (2023)EMIS: A Uniform Management and Resolution System of Multiple Identifiers on Ethereum2023 IEEE International Conference on Blockchain (Blockchain)10.1109/Blockchain60715.2023.00033(145-150)Online publication date: 17-Dec-2023
    • (2023)H-MIS: A Hierarchical Multi-Identifier System Based on Blockchain2023 IEEE International Conference on Big Data (BigData)10.1109/BigData59044.2023.10386505(2326-2333)Online publication date: 15-Dec-2023

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media