IEEE Open Journal of the Computer Society

Download PDF

Keywords

Blockchains, Semantic Web, Internet, Peer To Peer Computing, Economics, Distributed Ledger, Smart Contracts, Blockchain, DAO, Digital Economy, Metaverse, Privacy Computing, Web 3 0

Abstract

With the continuous development of web technology, Web3.0 has attracted a considerable amount of attention due to its unique decentralized characteristics. The digital economy is an important driver of high-quality economic development and is currently in a rapid development stage. In the digital economy scenario, the centralized nature of the Internet and other characteristics usually bring about security issues such as infringement and privacy leakage. Therefore, it is necessary to investigate how to use Web3.0 technologies to solve the pain points encountered in the development of the digital economy by fully exploring the critical technologies of digital economy and Web3.0. In this paper, we discuss the aspects of Web3.0 that should be integrated with the digital economy to better find the entry point to solve the problems by examining the latest advances of Web3.0 in machine learning, finance, and data management. We hope this research will inspire those who are involved in both academia and industry, and finally help to build a favourable ecology for the digital economy.

I.   Introduction

The rapid growth of the digital economy in recent years has been fueled by a fresh round of technical revolution and industrial change, and the digital economy is playing an increasingly significant role in the global economy. The digital economy is an essential driver of high-quality economic development. Tapscott, an American economist, originally put forth the idea of the digital economy in his book “The Digital Economy ” in 1994 [9]. When the Internet was still in its infancy, the primary characteristic of the digital economy at the time was the utilization of information in the network for digital flow and transmission. Tapscott predicted that the Internet will fundamentally alter both the global economy and society. In 1998, the U.S. Department of Commerce released a report on the new digital economy and adopted the term “digital economy ” for the first time, and thus the concept of the digital economy has gradually been widely recognized by governments and scholars [72].

With the progress of the era, the digital economy is developing rapidly and its great potential has been recognized worldwide. The digital economy is increasingly influential in people's lives, and has now become the most dynamic and innovative economic form. Nowadays, the digital economy has been acting in various fields, gaining prominence in optimizing the economic structure and promoting industrial innovation. Obviously, the digital economy is an essential part of global economic development [58], becoming a key role in restructuring global factor resources, reshaping the global economic structure, and changing the global competitive landscape.

Digital economy is a new form of economic operation that emerged in the late stage of industrial economy development, which utilizes information network as the major carrier and makes digital resources as production factors [76]. Through modern communication and Internet technologies, the digital economy makes effective usage of resources in various industries of society, thereby creating higher economic benefits than traditional industrial economy operations [45]. Although the development of technology has changed the operation and transaction methods of enterprises and accelerated the reliance of consumers on the Internet, the simple movement of services from “offline” to “online” has been insufficient to meet the demand for online services in the new century [19]. Therefore, many companies are investing significant time and financial resources in providing virtual reality. Thereby, in the process of digital economy development, a series of new information technologies such as cloud computing [25],[87], Big Data [71],[88], artificial intelligence [7],[20], have been gradually spawned. Thus, it provides technical support to further expand the scale of new industries and economies. A new economic era with the Internet as the main driving force for the economic and social development of each country has been opened. Today, the development of information technology has allowed the digital economy to drive a comprehensive overhaul of production methods, lifestyles, and governance. The popularity of the Internet has led to the massive rise of online economic industries such as social networking, digital art, and virtual worlds, etc., while also making security issues such as copyright infringement, and privacy breaches easier and more prevalent. At present, unified rules for measuring the value of data have not yet been formed, the digitization of industry has not yet been completed, and digital technology has not yet been industrialized. As we all know, each time a user interacts via the Internet, he or she sends data to the service provider who provides the server, which can easily lead to data security, privacy, and control issues [2],[48]. Therefore, a “‘decentralized” Internet based on blockchain distributed storage technology, i.e., Web3.0, has been developed in recent years.

Web3.0 is described as the potential next phase of the Internet, which is a “decentralized” Internet running on top of blockchain-related technologies. In Web3.0, data presents a distributed storage structure, so that there will be no central node for data management, which significantly reduces the service cost of managing data [23]. Therefore, the digital economy platform established based on Web3.0 technology is the new trend of the current development.

Since the creation of the World Wide Web in 1989 [31], the Internet has experienced the Web 1.0 era with TCP/IP and other open protocols as the underlying technologies. Web 1.0 is mainly characterized by the user's access to information provided and understood in a single direction. Users can usually only click on the links on the web page to browse the text, images, and other content set by the developer. Soon, Web 1.0 was replaced by Web 2.0. Web 2.0 is characterized by user-created personalized recommendations for interaction, where users are not limited to browsing the Web, but can also create their own content and upload it to the Web to share with others. The original purpose of Web 2.0 was to bring the Internet closer to democracy and to make users more interactive. Nowadays, the Internet has entered the Web3.0 era based on blockchain and artificial intelligence and marked by decentralization and intelligence [40]. The Web3.0-based Internet has shifted banking business from offline to online, and digital transformation of the Internet has formed an industry consensual. And the development of web technologies could be illustrated in Fig. 1.

Graphic: The evolution progress of web technologies.

Figure 1. The evolution progress of web technologies.

In Web3.0, websites are allowed to have the ability to learn on autonomy themselves [86]. Moreover, blockchain distributed storage technology is adopted to realize a decentralized autonomous network. Users can accomplish content publishing, economic transactions, and other actions without going through a centralized platform. They employ DAO to manage their digital identities, assets, and data by themselves, through the extended reality (XR) technology hardware and blockchain distributed storage technology together form the technical foundation of Web3.0 [29]. Therefore, Web3.0 can provide decentralized services for the digital economy, as well as unified consensus data valorization services, thus providing a favorable foundation for the development ecology of the digital economy. And some typical applications of combining digital economy with Web3.0 are illustrated in Fig. 2.

Graphic: Applications of combining digital economy with Web3.0.

Figure 2. Applications of combining digital economy with Web3.0.

In summary, the contributions of this paper are as follows:

  1. We introduce the preliminaries of Web3.0, and review the state-of-the-art studies of Web3.0.
  2. We present four core components of the digital economy, and then discuss how Web3.0 can be effectively integrated with the digital economy in each component.
  3. We envision typical challenges to shape the future digital economy in the next decades.

The organization of this paper is as follows: Section II introduces the preliminary of blockchain, distributed storage, and privacy computing. Section III systematically introduces the related works on Web3.0 technologies. Some applications and challenges of combining digital economy with Web3.0 technology will be introduced in Sections IV and V respectively. Based on our discussion, the paper is summarized in Section VI.

II.   Preliminary

In this section, several fundamentals about Web3.0 will be introduced, such as blockchain, distributed storage and privacy computing.

A. Blockchain

Blockchain is the main foundation of the decentralized system of Web3.0, and it returns digital sovereignty to users through the decentralized power of blockchain. The technology architecture of blockchain is given as Fig. 3. The key technology stack [114] will be introduced.

Graphic: Technology architecture of blockchain.

Figure 3. Technology architecture of blockchain.

1) Distributed Ledger

The distributed ledger is a database on a peer-to-peer network without a central administrator that maintains data consistency among multiple enterprises or institutions through a consensus mechanism. Each node/enterprise/institution has a complete and identical copy of the data. Any changes or additions made to the ledger are reflected and copied to all participants in a matter of seconds or minutes [79]. Distributed ledgers are inherently more difficult to be attacked because all of the distributed copies need to be changed simultaneously for an attack to be successful. As a result, cyber attacks are reduced using distributed ledgers. And financial fraud is also reduced by the use of distributed ledgers because distributed ledgers provide for an easy flow of information [41], which makes an audit trail easy to follow for accountants when they conduct reviews of financial statements. This helps remove the possibility of fraud occurring on the financial books of a company.

2) Cryptography

Since blockchain operates with a decentralized, peer-to-peer network model and nodes don't have to trust one another [95]. Therefore, blockchain must ensure appropriate safeguards for transaction information on unsecured channels while maintaining transaction integrity [50]. And consequently, cryptography becomes an essential requirement for blockchain to safeguard user transaction information and privacy alongside ensuring data consistency [13]. Blockchain leverages the real-world concept of signatures by using cryptography techniques and encryption keys. Basically, cryptography is a technique for transmitting secure information between two or more participants [47]. The whole process works by the sender encrypting the message with a specific type of key and algorithm and then sending it to the receiver. The receiver uses decryption to get the original message. Encryption keys ensure that unauthorized recipients or readers cannot read messages, data values, or transactions. They ensure that only the intended recipient can read and process a specific message, data value, or transaction. In recent years, many new tools related to cryptographic applications in blockchain have emerged with different functionalities.

3) Consensus Mechanism

In order to maintain the consistency of the distributed ledger, the blockchain needs to reach a consensus on the block transaction history. How to make each node keep its respective data consistent through a rule is a crucial problem. The solution to this problem is to develop a consensus mechanism.

The consensus mechanism is actually a rule according to which each node confirms its own data. In the blockchain systems, the most commonly used consensus algorithms include PoW, PoS, DPoS, and PBFT [110]. The blockchain system uses this consensus algorithm to make the ledger data of each node in the network agreeable.

4) Smart Contracts

Smart contracts are decentralized, information-sharable program codes deployed on the blockchain that define the logic of applications on a decentralized network [81]. Typically, they function as a digital protocol that follows specific rules for enforcement. These rules are predefined by computer code and are replicated and enforced by all network nodes. Blockchain smart contracts support the creation of de-trusted protocols. This means that both parties to the contract make commitments through the blockchain without the need to know or trust each other [67]. In addition, the use of smart contracts eliminates the need for intermediaries, thereby significantly reducing operational costs. Smart contracts are autonomous and decentralized. Specifically, they usually automatically run the procedures defined in the smart contract when predefined conditions are met, without the intervention of any contract signatory. Besides, they not only give programmability to the underlying data of blockchain, but also encapsulate the complex behavior of each node in the blockchain network, providing a convenient interface for establishing upper-layer applications based on blockchain technology [83], and therefore have a significant impact on blockchain. However, when smart contracts are exposed to untrusted systems and lack government oversight, they still have security issues.

B. Distributed Storage

Distributed storage is the core technology that must be perfected first for the Web3.0 ecosystem and is an important cornerstone for building the underlying infrastructure of the Web3.0 ecosystem [24]. Distributed storage is based on blockchain technology that uses open source applications and algorithms to store sliced data in multiple independent network nodes. It advocates privacy protection, data backup redundancy, and value-oriented data by providing incentives for network nodes and content uploaders. Among the aforementioned features, the incentive model is an important aspect of distributed storage because it allows for long-term data preservation and security. Distributed storage technology in Web3.0 raises awareness of data security and user data ownership. The major distributed storage projects currently include BitTorrent, Filecoin, and Crust, where some of these projects will be introduced in the following subsections.

1) BitTorrent

BitTorrent is a decentralized transfer scheme proposed by Bramcoon in 2003. It uses an efficient software distribution system and peer-to-peer technology to share large files (such as a movie or TV show) and enables each user to provide upload services. It did not require the content resource publisher to own the high-performance server to transfer the data, and the more users downloading the same file, the faster the download speed can be. In addition, the free model also attracts the use of the majority of Internet users. However, BitTorrent must use the torrent file containing all targeted content addresses to perform the download. The downloading content is strictly restricted within the scope of the torrent file. Furthermore, BitTorrent lacked incentives to motivate users to share unpaid files. So BitTorrent can be described as a prototype of the distributed storage model.

2) Filecoin

Filecoin is a content-addressable and peer-to-peer distributed protocol, defines how files are stored, retrieved, and transferred in a distributed system, and this enables permanent and decentralized preservation of files. Besides, Filecoin is also a peer-to-peer network for storing files, with built-in economic incentives to motivate the behavior of various players in the network's storage and retrieval market, ensuring the safe and secure storage of files. Filecoin is built on top of IPFS to create a distributed storage marketplace for long-term storage.

3) Crust

Crust is an incentive layer protocol that implements distributed storage and is adapted to multiple storage protocols including IPFS. Besides, Crust is also known as the “Filecoin” on the Polkadot network, an incentive layer protocol based on the Polkadot parallel chain construct. What makes Crust different from other distributed storage projects is its pioneering use of a hardware solution, Trusted Execution Environment (TEE) technology, as the core solution to quantify and verify the actual workload of nodes within the local CPU hardware. Based on TEE, Crust proposed Meaningful Proof of Work (MPoW) to count the storage workload of nodes and report it to the chain. Crust also proposes a PoS consensus algorithm that defines the number of storage resources, called Guaranteed Proof of Stake (GPoS). The workload report is recorded and packaged into a block along with other transactions to calculate a Staking amount, and then based on this amount, PoS consensus is performed.

C. Privacy Computing

Web3.0 emphasizes the protection of users' personal data, and therefore, as a key technology to solve the data privacy problem, privacy computing is becoming the immediate need of Web3.0 existence. Privacy computing technology can analyze and calculate data under the premise of protecting data privacy and security, which provides a strong guarantee for efficient and safe circulation of data across industries and organizations. Currently, privacy computing technologies are classified as Secure Multi-Party Computing, Federated Learning, and Trusted Execution Environment (TEE). In the following, we will introduce each of them.

1) Secure Multi-Party Computation

Secure Multi-Party Computation (MPC) [27] was proposed by Andrew Chi-Chih Yao in 1982 through the Millionaire Problem. It aims to solve the problem of collaborative layout for privacy protection among a group of participants who do not trust each other. Furthermore, it provides the data demanders with the ability of multi-party collaborative computing without disclosing the original data. MPC is mainly concerned with the problem of how to securely compute an agreed function without a trusted third party while requiring that each participant cannot get any input information from other participants except the computation result. It mainly involves zero-knowledge proof, homomorphic encryption, differential privacy, inadvertent transmission techniques, etc. However, the higher computational or communication complexity puts some limitations on the usability of MPC.

2) Federated Learning

Federated learning is a machine learning technique developed to solve the problem of data silos [60]. Its goal is to carry out efficient machine learning among multiple participants or multiple computing nodes while guaranteeing security and protecting privacy when exchanging data. Currently, federated learning is classified into three categories according to the different data distributions among participants: horizontal federated learning, vertical federated learning, and federated transfer learning. The workflow of federated learning is given in Fig. 4.

Graphic: The workflow of federated learning.

Figure 4. The workflow of federated learning.

3) Trusted Execution Environment

The Trusted Execution Environment is based on a hardware-secure CPU that implements memory-isolated secure computing, allowing privacy-preserving computations to be performed with guaranteed computational efficiency [82]. The basic idea is that all calculations of sensitive data are performed in an isolated memory that no other hardware parts can access except for authorized interfaces. In this way, private computation of sensitive data is achieved. The security comes from the isolated hardware device's ability to resist attacks while avoiding additional communication processes and significant computational overhead. However, the disadvantage is that its security relies heavily on the hardware implementation, making it vulnerable to attacks from different attack surfaces.

III.   Related Work

Recently, Web3.0 has been widely researched, and more representative technologies will be introduced.

A. Fundamental Research

The crucial component of Web3.0 is the network structure and security is important nature of Web3.0. In order to enhance the security of the network to meet the requirements of Web3.0, there are several efforts to give their respective solutions.

Nowadays, web applications are built on centralized network protocols, and these protocols have disadvantages such as being vulnerable to attacks and prone to single points of failure. And therefore, Mainframe [21], a fully decentralized communications layer, is proposed to replace the original centralized network protocols. Based on this, many applications could be easily extended to decentralized scenarios, such as email service.

According to the definition of Web3.0, blockchain is a core component and could be regarded as a backbone where Web3.0 applications are built, and where the data is stored. For privacy issues, the data should be encrypted and stored in a distributed manner with multiple copies. However, traditional solution proof-of-replication (PoRep) consumes a lot of resources. For reducing the consumption of resources, Kan et al. proposed a new PRE scheme [46], in which transferring the ciphertext into a new one is not required, and therefore conserving computing resources.

Recently, blockchain technology has also been widely researched, and Huang et al. [38] reviewed the research related to blockchain, and then gave several major research directions. In terms of smart contracts, Zheng et al. [115] reviewed the research related to smart contracts, and Kong et al. [49] proposed a novel method to characterize and detect gas-inefficient patterns. Considering smart contracts are vulnerable to attack, SmartDagger [63] is proposed to detect cross-contract vulnerability based on the bytecode of smart contract. To make blockchain technology healthier, Park [113] used parallel-fork symbolic execution to accelerate smart contract vulnerability detection. Considering the lack of regulation of blockchain, the Ponzi schemes on Ethereum [18] should be detected, and permissions [112] should be appropriately limited.

B. Benefits to Artifical Intelligence

Traditional artificial intelligence technologies are typically presented in a centralized form, however, this generally leads to inflexibility, poor scalability, etc.

Cao et al. presented a new concept named Decentralized Artificial [12], and the authors also give the main research areas where Web3.0 and artificial intelligence are combined, such as Edge Intelligence and Decentralized Communication.

With Web3.0, artificial intelligence could present a decentralized form, and data could be stored by different parties. However, relevant laws and regulations, such as GDPR, may constrain the transmission of data, which has a significant impact on AI technologies that require large amounts of data to support them. To make data available in privacy-protection scenarios and enjoy the benefits of decentralization, federated learning [107] is proposed. In the federated settings, models with local data characteristics replace the original data for transmission and aggregation, and after several rounds of training, a global model with all data features is obtained. For mobile edge computing, combining blockchain with deep reinforcement learning, the performance of computation offloading could be increased [77], and the bitcoin network could be used to enhance complex network analysis [90].

C. Benefits to Education

COVID-19 makes it impossible for many educational institutions to conduct face-to-face sessions, leading online education especially important. Jiang [43] believes Web3.0 could bring a new environment for online education and provide personalized technologies to enhance learning effectiveness.

To improve learning outcomes, an online 3D meeting application [34] based on Virtual Reality (VR) and Web3.0 is developed. A holographic-based approach is used to ensure intuitive learning, and to bridge the remote monitoring gap.

For academic staff or students in higher education, subject information and resources are vital in teaching activities and scientific research. However, these resources are stored separately, and this also poses a challenge for information integration. Considering Web3.0 is also known as the semantic web where knowledge is connected, bringing the ideas of Web3.0 for information integration could be a good idea for information integration. Therefore, Han et al. [104] proposed to build a subject information integration system using the new technologies of Web3.0.

D. Benefits to Data Management

Recently, the generation of large amounts of data has increasingly tended to be decentralized, and this poses a great challenge to data management. Fortunately, Web3.0 technologies could be used for the management of large amounts of decentralized data.

IoT devices should be controlled by a third party, and they usually require for transmitting sensitive user data [28]. Therefore, Ayoade et al. [6] proposed a decentralized system of data management for IoT devices, where all data access privileges are stored in the blockchain, and smart contracts are used to manage interactions between devices. To make the system safer, TEE is used to store the row data.

When using blockchain to construct data management systems, storage should receive more attention. Since the former data could not be deleted, the storage costs can increase significantly. InterPlanetary File System could be used to solve this problem [75]. When storing data into blockchain, the hash value is uploaded, rather than the row data, and the hash value could be acquired by uploading data into IPFS. Considering the hash value is smaller than data itself, storing the hash value decreases costs. And to enhance the security of data storage, MOOCsChain [56] is proposed to incorporate blockchain to enhance security.

E. Benefits to Business

Web3.0 could be applied to the financial domain, and may change the way how companies use the collected information and sell their products. Almeida et al. [5] analyze how Web3.0 affect business and give nine kinds of potential business models.

Business models are explored from many aspects. Momtaz et al. [69] believe Web3.0 may give rise to new products and business models since the components of Web3.0 reduce transaction costs and the trust of interaction between social and economic has been formed for the decentralized consensus mechanisms.

Toyoda et al. [93] apply Web3.0 to behavioral economics, and propose an incentive mechanism based on crypto-enabled services, and this mechanism is general, and even can be applied for services that required making decisions under an uncertain environment. In order to prevent from internet giants monopolizing the power to use user data, Web3.0 needs to establish a decentralized identifier (DID), and the DID could be used to link user data in the form of DID documents. Hence, user assets also need to be represented decentrally. Non-Fungible Token (NFT) [97] is proposed to represent physical assets in a decentralized form, which have become an important part of Web3.0. However, the development standards of NFT are missing, leading to a couple of underlying systems and failing to govern physical asset value mapping. Yang et al. proposed a general NFT architecture for Web3.0 [106], and they used a universal connector to connect the upper application environment and the underlying value mapping of the physical asset environment.

Based on Web3.0, an online shopping platform [103] is designed. The platform incorporates mainstream technology into artificial intelligence and visualizes the 3D presentation of products to ultimately enhance the shopping experience. These mainstream technologies include Web3D, Augmented Reality (AR), and so on.

IV.   Digital Economy Under Web3.0

Web3.0 is considered as an emerging way of how to organize an internet structure. Many internet and industrial applications are now obeying the paradigm of server-client structure. Unlike most of the above applications, the new decentralized Web3.0 applications like cryptocurrency provide many systems with a new organizing method to satisfy the new meets of security, parallel, and other requirements in recent internet environments.

In this section, firstly we will introduce the conception and the classification of digital economy and then describe all these categories by analyzing the existing technologies and applications, also by giving an intuitive case as an example in each subsection.

The detailed classification of digital economy and its conception could be divided into four parts as follows:

  • Digital Industrialization: The industry includes all the products, hardware, and software around the Information technology industry. This is the most important topic where most recent applications using Web3.0 appeared. In this part, some new technologies like cryptocurrency, decentralization social software, and metaverse software will be introduced.
  • Industry Digitization: Industry digitization is committed to using advanced information and digital technology to accelerate innovation in traditional industries like agriculture to help achieve better efficiency and progress during the production process. The main point in this topic often focuses on designing an industrial internet to implement better cooperation during the production process.
  • Digital Governance: Digital Governance helps all kinds of cooperation agencies to reestablish their rule-based management system by combing with digital technology and also provides assistance to public service. Due to the traditional rule or contract having borne the latent risk of unforeseen and unordered humankind activity like rule-breaking, the introduction of digital technology aims to reduce the influence of these kinds of manners and creates a cooperation system mainly by agreements formulated previously and executed strictly by the machine.
  • Data Valorization: Most research on data science attempt to augment the value of data, especially in ways like machine learning. Federated learning is a typical way of using a distributed way to carry out the process of machine learning and satisfy the demand for data security and other need like calculation efficiency and privacy or so. The main topic of data valorization is finding out a method to collect and fully utilize the everyday data produced by each individual.

The main Web3.0 applications and their connections with digital economy are listed in Table I. And the relation between digital economy and Web3.0 could be illustrated in Fig. 5. As this figure illustrates, Web3.0 could promote the development of the digital economy as an engine. Taking digital industrialization as an example, with the help of blockchain, digital technology could be presented as a decentralized form, and therefore enhance the security of the digital economy environment.

TABLE 1 Web3.0 With Digital Economy

Graphic: The relation between digital economy and Web3.0.

Figure 5. The relation between digital economy and Web3.0.

A. Digital Industrialization

Web3.0 is an emerging way of network architecture organization. The applications based on it naturally impact the related industries of Internet and information technology. With the adoption of a novel design of the blockchain system, Nakamoto first designed a digital currency Bitcoin [70], which opened the prelude to the transformation of the digital economic system, also described as Decentralized finance. The key feature of blockchain has brought this cryptocurrency a lot of benefits on persistency, anonymity, and auditability [98]. After that, various cryptocurrencies like Litecoin [35], Ethereum [16], and USDT have emerged one after another and put forward a new idea for the new situation of currency under Web3.0 to satisfy the new need for a digital currency. In addition to this, blockchain has become a solution for many other applications due to its features of decentralization, privacy, and security preserving. The Smart Red Belly Blockchain system [92] created an enhanced transaction management system for the decentralized applications to use. In this newly designed blockchain system, the author provides all the decentralized apps with faster transaction execution. Also, the hyperledger fabric project [10] gives the developer a powerful tool to develop new applications based on blockchain. This project has given a very clear and direct definition of blockchain which can be seen as a cooperative ledger organized in a decentralized way. Based on this SDK, developers can use whatever programming language to implement a blockchain system on their own.

Another important application of blockchain in Web3.0 is a Non-Fungible Token (NFT). NFT almost like its name creates a non-fungible mark on the chain to enable artists to create works that can be traded with their digital certificates. According to the definition of NFTs, NFTs represent the rights to unique digital assets and are presented in digital form, and NFTs could even be traded on the market using blockchain technology [100].

The metaverse is an aggregated vessel where lots of technologies can be used to build a virtual world. Therefore, a lot of research put their eye on how to apply Web3.0 technology into the metaverse [108].

Storage is another important content in the network infrastructure. Given that most of the current storage is collective, the Web3.0 tech gives a new consumption of constructing a decentralized storage system. We may be familiar with this form of storage like the P2P file sharing system BitTorrent protocol [26] early in 2003. This storage form without a central server may bring out many challenges, but it's a vital question for real decentralized applications, considering the data in these apps must be decentralized too. The technology route of decentralized storage is divided into two main parts according to whether it is based on blockchain or not. Like the IPFS protocol, we discussed the previous chapter and the application Filecoin [8] based on it. The article [94] analyzes the IPFS storage protocol function as a layer of Web3.0 storage. Also, there exist some storage systems relying on blockchain like Arweave [99] which is similar to Ethereum to store the data on the chain and use the token as a reward to motivate the miner storing files on the chain. Many decentralized applications now still rely on a centralized client for simplicity and usability, so storing the data decentrally will be a critical point to the coming of the real decentralized Web3.0.

B. Industry Digitization

The main infrastructure of industry digitization is industrial internet, and the design of industrial internet aims to connect machines to networks and harvest the production data while also being able to control them remotely, which finally achieves the goal of combing software and machines together. The abstraction of software connects the physical world and can optimize the whole factory above the scale of a single machine. Some entity assets will be replaced by online software and human labor can also be liberated by the productive forces of a highly connected internet of machines.

To build an industrial internet, it should be considered how to connect machines with the upper layer of internet. Internet of things [80] has provided a good research base for the communication between physical objects with the networks. The emergence of blockchain naturally gives these distributed machines a good way to organize an industrial Internet of Things (IIoT) as the basis of industrial internet [3],[17]. To implement a reliable IIoT, some key features like interoperability, heterogeneity, confidentiality, and safety vulnerabilities must be solved with a reliable plan. And some of these challenges that arise in IIoT can be overcome by using a current form of blockchain techniques that provides solutions with enhanced safety, and dependability [51].

Some component has been used in the industrial internet already and has shown a great influence in the blockchain-based IIoT. A novel communication model, named M2M [68],[102], uses the blockchain to connect the machine with the machine and integrate the factorized machine. Based on this system, some design a power management system, in which the power is transacted between the generator and the machine and can also automatically adjust the load state of the different grids of the machine. The unmanned aerial vehicles (UAV) assisted M2M system [59] further enhanced the stability of the IIoT, which makes a more capable system of data computation and decision-making.

In addition to these specific models, the Web3.0-formed IIoT has already been used in various industries. For example, the blockchain has already been used in the food supply chain as an effective way of monitoring the quality and safety of food by providing a more traceable and transparent chain of food production [73],[96]. The whole supply chain contains from production to transportation and meanwhile involves many subjects like enterprise, consumer, and logistics, which gives the traditional way of monitoring lots of issues that is hard to solve [64]. Smart Farming is another important field in which the factors impacting agriculture are complicated and messy and bring many challenges. Fishing now uses many sensors which can provide many data like temperature, humidity, water level, etc. Blockchain can help integrate these decentralized data and helps farmers to monitor and control [36]. Other industries like manufacturing [1],[53], petrochemical industry [4],[66], automotive manufacturing [32],[85] also use the blockchain as a plan to collect and analyze the production data.

Another possible form of the industrial internet is complemented by metaverse. Metaverse aims to communicate the 3D-formed virtual worlds with the real physical worlds [57]. With the help of AR and VR, many applications can be implemented in the world of metaverse like the healthcare [89], the social software [44], the entertainment [52], and the smart city construction [109].

C. Digital Governance

Decentralized Autonomous Organization (DAO) is an important method to achieve digital governance, enabling people to coordinate and govern themselves mediated by a set of self-executing rules deployed on blockchain. The governance form of DAO is decentralized [37]. The early-stage application of DAO like crowdfunding is a specific example with the problem that small-scale investors may suffer from financial mismanagement and outright fraud. The blockchain system Ethereum [101] may have the possibility to solve the issues above. Ethereum acts as an intermediary between the participants and the token, which represents the profit and the right of the participant in this DAO.

Recent community is committed to exploring the other usage of the blockchain and its token of DAO. The stem is a social media platform, it uses the “stem” token to reward the user who uploads the content of text, image, video, or live stream which receive “likes” from others. In this form of social media, the benefits are owned by the content generator instead of the platform, making the participants both users and owners [14]. Another application is Augur [74] based on Ethereum to create a market forecasting system.

D. Data Valorization

Data Valorization analyzes the daily produced data and makes them benefit economically. And the progress of data valorization is often divided into four steps: data requirement and labeling, data analysis, data storage, and data transaction. Due to the limitation of the calculation capability and the storage, putting all these progress distributable often becomes a good way. Also decentralizing all these progresses helps the acquisition of data from the number of users, the calculation using enough computing power, and the storage of data.

Federated learning [39],[111] studies the distribution machine learning program which includes data communication, privacy security, and making good use of the amount of data to train a reliable model. Obviously, the nature of the blockchain can provide the federated learning system with some key components, and satisfy some vital requirements of federated learning [55]. Fed2Coin [65] model implements the federated learning system by using blockchain to help overcome the difficulty of the calculation of Shapley Value, the contribution of each user in the cooperation. Fed2Coin helps solve the profit distribution problem among all the participants during the data valorization. Besides, the model BAFFLE [78] aims to design an aggregator based on blockchain. Considering federated learning systems are vulnerable to attacks, BFLC [61] is proposed to defend against byzantine attacks, and proved to be convergent [15].

V.   Challenges

A. Web3.0 for Digital Industrialization

Digital industrialization is primarily to promote digital technology to form a large-scale industry. Currently, Web3.0 is based on the concept of decentralization and the application of blockchain and other digital technologies to create a new digital ecosystem that integrates multiple scenarios into one. Besides, Web3.0 is an Internet infrastructure owned and trusted by users and builders. Therefore, in the role of Web3.0, digital technology based on blockchain and other digital technologies promote information technology services and consequently accelerates digital industrialization based on digital technologies.

In the era of Big Data, organizations tend to collect as much data as possible, which is prone to the problem of user privacy violation and threatens the data security of enterprises and individuals [42]. Undeniably, blockchain technology has many advantages in terms of privacy protection. However, the existing technology is still in the stage of development and improvement, while the characteristics of blockchain itself can no longer meet the user's demand for privacy protection. Anonymity is a critical feature of blockchain technology, but this feature brings conflict with privacy protection [30]. In addition to privacy issues, Web3.0 is a technology that is considered impractical and expensive. However, blockchain-based Web3.0 systems are extremely cost-inefficient compared to centralized systems such as Amazon Web Services, which can only process a few transactions per minute [33]. Since Web3.0 can truly achieve the “trustworthiness” of blockchain, it must achieve consensus across the network, which will inevitably affect the transaction throughput. Due to the inefficient PoW algorithm of the blockchain, it consumes a large amount of energy when we save data on the blockchain [105]. Thus Web3.0 tends to be energy intensive, technically wasteful, and to handle only a limited amount of data.

B. Web3.0 for Industry Digitization

Industry digitization is mainly to use digital technology to support and promote the transformation and upgrading of traditional industries, while Web3.0 provides a new scene for this process and can accelerate the growth of information consumption, thus promoting industrial digitization. During the process of industry digitization, data is a key component. And therefore, efficient data management technology in Web3.0 should be paid more attention to make data work better.

In the context of Web3.0, the design of the industrial internet is now facing the issues like communication among heterogeneous devices under the circumstance of calculation resource constraints. The example of the previous UAV-assisted IIoT is a way to fix this by using a different strategy of deployment of the base station, especially when the devices of the industry are often located fragmentedly where the communication condition is poor. Research on edge computing [11] may help resolve the heterogeneity. Another imagination of the industrial internet is the digital twin [91] using the metaverse technology which is now still under exploitation. The problem of practicalizing the metaverse lies in the cyber world's scalability, and the computer graphic's bottleneck [57].

C. Web3.0 for Digital Governance

Lawrence Lessig argues in CODE [54] that the network order will be regulated by laws, codes, markets, and codes at the same time. With the network operator as the main target of regulation, the thought behind it is to require the operator to have the ability to be responsible for the data in the server, which is the traditional regulatory thought in the era of network centrality. Currently, digital governance is regulating blockchain information service providers as well as the filing system, without really considering the challenges that decentralization brings to regulation, let alone the challenges that DAO operations bring to regulation.

Decentralization is the essential feature of blockchain technology, and the existing traditional regulatory model is the exact opposite of this feature, which will inevitably bring great difficulties to digital governance. First, for the purpose of promoting the development of technology, timely and effective regulation of the technology itself is difficult. Besides, the cost of regulation is excessive. Blockchain technology was born among a group of anarchists called “cyberpunks”, and the “decentralization” has led to the fact that the privacy on the chain is no longer centrally and uniformly managed, but held by the users of each node. In this process, the scope of regulation is not clear, and the subject of regulation cannot be identified, so it is difficult to counter the “dishonesty” of the technology itself under the cloak of the “trustworthiness” of Web3.0. For example, one of the earliest and most successful applications of blockchain is Bitcoin, which was in a sense created with evil intentions. Admittedly, Bitcoin is widely used in the “dark web” as a way to launder money and illicit transactions [62], as well as a tool to fund terrorists and insurgents. Therefore, while maintaining the advantages of the blockchain, integration into real-world regulatory systems is a necessary path to the widespread adoption of Web3.0.

D. Web3.0 for Data Valorization

Considering the decentralized feature of Web3.0, the five core progresses of data valorization, data collection and labeling, data analysis, data storage, and data trading, have the potential for decentralization, thus breaking through the limitations of computation and storage. However, in the process of decentralization, many problems may arise.

When building a blockchain-based federated learning system for data analysis, the client's model is uploaded to the blockchain's distributed ledger in the form of a transaction. However, considering the storage as well as consensus efficiency issues, a limit is generally imposed on the size of a single transaction, while in practice, the client-side model may adopt a very large model, resulting in exceeding the blockchain's constraint on transaction size [84]. Although reducing the size of the model as much as possible can alleviate this problem to a certain extent [22], it not only cannot solve the problem fundamentally but also may have the side effect of decreasing the effectiveness of the model and the accuracy of data analysis. Therefore, more efficient consensus algorithms need to be researched. As the model training process proceeds, more and more models will be saved to the blockchain. When model aggregation is performed on the blockchain, the query time will increase when there are more models on the blockchain, because all client models uploaded in this round need to be queried.

VI.   Conclusion

Web3.0 technologies are expected to play an important role in the digital economy. For example, blockchain technology could be used to enable decentralized data storage while combining with federated learning to solve possible privacy problems in the process of data analysis and can guarantee the transparency and fairness of data trading environment. Combined with the relevant technologies of Web3.0, the pain point problems in the digital economy will be solved, and the latest applications can be developed rapidly.

By investigating the most relevant work of Web3.0 in artificial intelligence, education, data management, finance, and Web3.0-based technologies, we summarize technologies that can be applied to the four core components of the digital economy, and provide Web3.0-based solutions to the problems existing in the development of the digital economy. Besides, we also analyze the critical challenges and unresolved issues that may arise in deeply integrating Web3.0 with the digital economy, and point out the direction for future research and application in this area for a good development ecology of the digital economy.

References


  • [1]S. A. Abeyratne and R. P. Monfared, “Blockchain ready manufacturing supply chain using distributed ledger,” Int. J. Res. Eng. Technol., vol. 5, no. 9, pp. 1–10, 2016.
  • [2]A. Acquisti, C. Taylor, and L. Wagman, “The economics of privacy,” J. Econ. Literature, vol. 54, no. 2, pp. 442–492, 2016.
  • [3]F. Ahmad, Z. Ahmad, C. A. Kerrache, F. Kurugollu, A. Adnane, and E. Barka, “Blockchain in internet-of-things: Architecture, applications and research directions,” in Proc. Int. Conf. Comput. Inf. Sci., 2019, pp. 1–6.
  • [4]R. W. Ahmad, K. Salah, R. Jayaraman, I. Yaqoob, and M. Omar, “Blockchain in oil and gas industry: Applications, challenges, and future trends,” Technol. Soc., vol. 68, 2022, Art. no. 101941.
  • [5]F. Almeida, J. D. Santos, and J. A. Monteiro, “e-commerce business models in the context of Web3. 0 paradigm,” 2014, arXiv:1401.6102 .
  • [6]G. Ayoade, V. Karande, L. Khan, and K. Hamlen, “Decentralized iot data management using blockchain and trusted execution environment,” in Proc. IEEE Int. Conf. Inf. Reuse Integr., 2018, pp. 15–22.
  • [7]A. Bahtizin, V. Bortalevich, E. Loginov, and A. I. Soldatov, “Using artificial intelligence to optimize intermodal networking of organizational agents within the digital economy,” J. Phys.: Conf. Ser., vol. 1327, 2019, Art. no. 12042.
  • [8]D. P. Bauer, “Filecoin,” in Getting Started With Ethereum. Berlin, Germany: Springer, 2022, pp. 97–101.
  • [9]J. P. Bowman, “The digital economy: Promise and peril in the age of networked intelligence,” Acad. Manage. Perspectives, vol. 10, no. 2, 1996, Art. no. 69.
  • [10]C. Cachin et al., “Architecture of the hyperledger blockchain fabric,” in Proc. Workshop Distrib. Cryptocurrencies Consensus Ledgers, Chicago, IL, 2016, pp. 1–4.
  • [11]K. Cao, Y. Liu, G. Meng, and Q. Sun, “An overview on edge computing research,” IEEE Access, vol. 8, pp. 85714–85728, 2020.
  • [12]L. Cao, “Decentralized AI: Edge intelligence and smart blockchain, metaverse, web3, and DeSci,” IEEE Intell. Syst., vol. 37, no. 3, pp. 6–19, May/Jun.2022.
  • [13]G. R. Carrara, L. M. Burle, D. S. Medeiros, C. V. N. de Albuquerque, and D. M. Mattos, “Consistency, availability, and partition tolerance in blockchain: A survey on the consensus mechanism over peer-to-peer networking,” Ann. Telecommun., vol. 75, no. 3, pp. 163–174, 2020.
  • [14]M. Chang, Q. Min, and Z. Li, “Understanding members' active participation in a DAO: An empirical study on steemit,” in Proc. 23rd Pacific Asia Conf. Inf. Syst., X'ian, China, Jul., 2019, p. 197. [Online]. Available: https://aisel.aisnet.org/pacis2019/197
  • [15]C. Che, X. Li, C. Chen, X. He, and Z. Zheng, “A decentralized federated learning framework via committee mechanism with convergence guarantee,” IEEE Trans. Parallel Distrib. Syst., vol. 33, no. 12, pp. 4783–4800, Dec.2022.
  • [16]H. Chen, M. Pendleton, L. Njilla, and S. Xu, “A survey on ethereum systems security: Vulnerabilities, attacks, and defenses,” ACM Comput. Surv., vol. 53, no. 3, pp. 1–43, 2020.
  • [17]W. Chen et al., “Cooperative and distributed computation offloading for blockchain-empowered industrial Internet of Things,” IEEE Internet Things J., vol. 6, no. 5, pp. 8433–8446, Oct.2019.
  • [18]W. Chen, Z. Zheng, J. Cui, E. Ngai, P. Zheng, and Y. Zhou, “Detecting ponzi schemes on ethereum: Towards healthier blockchain technology,” in Proc. World Wide Web Conf., 2018, pp. 1409–1418.
  • [19]S.-Y. Choi and A. B. Whinston, “The future of the digital economy,” in Handbook on Electronic Commerc. Berlin, Germany: Springer, 2000, pp. 25–52.
  • [20]M. Chui, “Artificial intelligence the next digital frontier,” McKinsey Company Glob. Inst., vol. 47, no. 3.6, pp. 6–8, 2017.
  • [21]A. Clarke et al., “Mainframe: The web3 communications layer,” 2018, Accessed: Sep., 2018. [Online]. Available: https://mainframe.docsend.com/view/j39qpui
  • [22]L. Cui et al., “CREAT: Blockchain-assisted compression algorithm of federated learning for content caching in edge computing,” IEEE Internet Things J., vol. 9, no. 16, pp. 14151–14161, Aug.2022.
  • [23]H. Cui-hong, “Research on Web3.0 application in the resources integration portal,” in Proc. 2nd Int. Conf. Bus. Comput. Glob. Informatization, 2012, pp. 728–730.
  • [24]A. G. Dimakis, K. Ramchandran, Y. Wu, and C. Suh, “A survey on network codes for distributed storage,” Proc. IEEE, vol. 99, no. 3, pp. 476–489, Mar.2011.
  • [25]V. M. Dincă, A. M. Dima, and Z. Rozsa, “Determinants of cloud computing adoption by Romanian SMEs in the digital economy,” J. Bus. Econ. Manage., vol. 20, no. 4, pp. 798–820, 2019.
  • [26]D. Erman, D. Ilie, and A. Popescu, “Bittorrent session characteristics and models,” Traffic Perform. Eng. Heterogeneous Netw., vol. 61, no. 84, 2022, Art. no. 61.
  • [27]D. Evans et al., “A pragmatic introduction to secure multi-party computation,” Found. Trends Privacy Secur., vol. 2, no. 2/3, pp. 70–246, 2018.
  • [28]E. Fernandes, J. Jung, and A. Prakash, “Security analysis of emerging smart home applications,” in Proc. IEEE Symp. Secur. Privacy, 2016, pp. 636–654.
  • [29]T. R. Gadekallu et al., “Blockchain for the metaverse: A review,” 2022, arXiv:2203.09738 .
  • [30]F. Gille and C. Brall, “Limits of data anonymity: Lack of public awareness risks trust in health system activities,” Life Sci., Soc. Policy, vol. 17, no. 1, pp. 1–8, 2021.
  • [31]J. M. Gillies et al., How the Web Was Born: The Story of the World Wide Web. New York, NY, USA: Oxford Univ. Press, 2000.
  • [32]R. Guhathakurta, “Blockchain in automotive domain,” in The Age of Blockchain: A Collection of Articles. New York, NY, USA:IndraStra Global, 2018, pp. 17–20.
  • [33]Y. Guo and C. Liang, “Blockchain application and outlook in the banking industry,” Financial Innov., vol. 2, no. 1, pp. 1–12, 2016.
  • [34]Y. P. Gupta, A. Chawla, T. Pal, M. P. Reddy, and D. S. Yadav, “3D networking and collaborative environment for online education,” in Proc. 10th Int. Conf. Emerg. Trends Eng. Technol.-Signal Inf. Process., 2022, pp. 1–5.
  • [35]M. Haferkorn and J. M. Quintana Diaz, “Seasonality and interconnectivity within cryptocurrencies-an analysis on the basis of bitcoin, litecoin and namecoin,” in Proc. Int. Workshop Enterprise Appl. Serv. Finance Ind., 2014, pp. 106–120.
  • [36]L. Hang, I. Ullah, and D.-H. Kim, “A secure fish farm platform based on blockchain for agriculture data integrity,” Comput. Electron. Agriculture, vol. 170, 2020, Art. no. 105251.
  • [37]S. Hassan and P. De Filippi, “Decentralized autonomous organization,” Internet Policy Rev., vol. 10, no. 2, pp. 1–10, 2021.
  • [38]H. Huang, W. Kong, S. Zhou, Z. Zheng, and S. Guo, “A survey of state-of-the-art on blockchains: Theories, modelings, and tools,” ACM Comput. Surv., vol. 54, no. 2, pp. 1–42, 2021.
  • [39]H. Huang, R. Li, J. Liu, S. Zhou, K. Lin, and Z. Zheng, “ContextFL: Context-aware federated learning by estimating the training and reporting phases of mobile clients,” in Proc. IEEE 42nd Int. Conf. Distrib. Comput. Syst., 2022, pp. 1–11.
  • [40]M. Hussein, “Transition to web 3.0: E-learning 3.0 opportunities and challenges,” in Proc. EELU Int. Conf. E-Learn., 2014, pp. 1–15.
  • [41]H. Hyvärinen, M. Risius, and G. Friis, “A blockchain-based approach towards overcoming financial fraud in public sector services,” Bus. Inf. Syst. Eng., vol. 59, no. 6, pp. 441–456, 2017.
  • [42]P. Jain, M. Gyanchandani, and N. Khare, “Big data privacy: A technological perspective and review,” J. Big Data, vol. 3, no. 1, pp. 1–25, 2016.
  • [43]D. Jiang et al., “What will web 3.0 bring to education?,” World J. Educ. Technol.: Curr. Issues, vol. 6, no. 2, pp. 126–131, 2014.
  • [44]L. Jiaxin and G. Gongjing, “Socializing in the metaverse: The innovation and challenge of interpersonal communication,” in Proc. 8th Int. Conf. Humanities Social Sci. Res., 2022, pp. 2128–2131.
  • [45]H. Kagermann, “Change through digitization–value creation in the age of industry 4.0,” in Management of Permanent Change. Berlin, Germany: Springer, 2015, pp. 23–45.
  • [46]J. Kan, J. Zhang, D. Liu, and X. Huang, “Proxy re-encryption scheme for decentralized storage networks,” Appl. Sci., vol. 12, no. 9, 2022, Art. no. 4260.
  • [47]J. Katz and Y. Lindell, Introduction to Modern Cryptography. Boca Raton, FL, USA: CRC Press, 2020.
  • [48]W. Kerber, “Digital markets, data, and privacy: Competition law, consumer law and data protection,” J. Intellectual Property Law Pract., vol. 11, no. 11, pp. 856–866, 2016.
  • [49]Q.-P. Kong et al., “Characterizing and detecting gas-inefficient patterns in smart contracts,” J. Comput. Sci. Technol., vol. 37, no. 1, pp. 67–82, 2022.
  • [50]A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, “Hawk: The blockchain model of cryptography and privacy-preserving smart contracts,” in Proc. IEEE Symp. Secur. Privacy, 2016, pp. 839–858.
  • [51]R. L. Kumar, F. Khan, S. Kadry, and S. Rho, “A survey on blockchain for industrial Internet of Things,” Alexandria Eng. J., vol. 61, no. 8, pp. 6001–6022, 2022.
  • [52]B. Kye, N. Han, E. Kim, Y. Park, and S. Jo, “Educational applications of metaverse: Possibilities and limitations,” J. Educ. Eval. Health Professions, vol. 18, 2021, Art. no. 32.
  • [53]J. Leng et al., “Blockchain-empowered sustainable manufacturing and product lifecycle management in industry 4.0: A survey,” Renewable Sustain. Energy Rev., vol. 132, 2020, Art. no. 110112.
  • [54]L. Lessig, “Code is law,” Harvard Mag., vol. 1, 2000, Art. no. 2000.
  • [55]D. Li et al., “Blockchain for federated learning toward secure distributed machine learning systems: A systemic survey,” Soft Comput., vol. 26, no. 9, pp. 4423–4440, 2022.
  • [56]D. Li et al., “MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning,” Comput. Standards Interfaces, vol. 81, 2022, Art. no. 103597.
  • [57]K. Li et al., “When Internet of Things meets metaverse: Convergence of physical and cyber worlds,” 2022, arXiv:2208.13501 .
  • [58]K. Li, D. J. Kim, K. R. Lang, R. J. Kauffman, and M. Naldi, “How should we understand the digital economy in Asia? Critical assessment and research agenda,” Electron. Commerce Res. Appl., vol. 44, 2020, Art. no. 101004.
  • [59]M. Li, F. R. Yu, P. Si, R. Yang, Z. Wang, and Y. Zhang, “UAV-assisted data transmission in blockchain-enabled M2M communications with mobile edge computing,” IEEE Netw., vol. 34, no. 6, pp. 242–249, Nov./Dec.2020.
  • [60]Q. Li et al., “A survey on federated learning systems: Vision, hype and reality for data privacy and protection,” 2019, arXiv:1907.09693 .
  • [61]Y. Li, C. Chen, N. Liu, H. Huang, Z. Zheng, and Q. Yan, “A blockchain-based decentralized federated learning framework with committee consensus,” IEEE Netw., vol. 35, no. 1, pp. 234–241, Jan./Feb.2021.
  • [62]Y. Li et al., “Toward privacy and regulation in blockchain-based cryptocurrencies,” IEEE Netw., vol. 33, no. 5, pp. 111–117, Sep./Oct.2019.
  • [63]Z. Liao, Z. Zheng, X. Chen, and Y. Nan, “SmartDagger: A bytecode-based static analysis approach for detecting cross-contract vulnerability,” in Proc. 31st ACM SIGSOFT Int. Symp. Softw. Testing Anal., 2022, pp. 752–764.
  • [64]Q. Lin, H. Wang, X. Pei, and J. Wang, “Food safety traceability system based on blockchain and EPCIS,” IEEE Access, vol. 7, pp. 20698–20707, 2019.
  • [65]Y. Liu, Z. Ai, S. Sun, S. Zhang, Z. Liu, and H. Yu, “FedCoin: A peer-to-peer payment system for federated learning,” in Federated Learning. Berlin, Germany: Springer, 2020, pp. 125–138.
  • [66]H. Lu, K. Huang, M. Azimi, and L. Guo, “Blockchain technology in the oil and gas industry: A review of applications, opportunities, challenges, and risks,” IEEE Access, vol. 7, pp. 41426–41444, 2019.
  • [67]J. Lyu, Z. L. Jiang, X. Wang, Z. Nong, M. H. Au, and J. Fang, “A secure decentralized trustless e-voting system based on smart contract,” in Proc. IEEE Int. Conf. Trust, Secur. Privacy Comput. Commun., 2019, pp. 570–577.
  • [68]Z. Meng, Z. Wu, C. Muvianto, and J. Gray, “A data-oriented M2M messaging mechanism for industrial IoT applications,” IEEE Internet Things J., vol. 4, no. 1, pp. 236–246, Feb.2017.
  • [69]P. P. Momtaz, “Some very simple economics of web3 and the metaverse,” 2022.
  • [70]S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” Decentralized Bus. Rev., 2008, Art. no. 21260.
  • [71]S. V. Novikov, “Data science and Big Data technologies role in the digital economy,” TEM J., vol. 9, no. 2, 2020, Art. no. 756.
  • [72]D. J. Kim, D. L. Ferrin, and H. R. Rao, “A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents,” Decis. Support Syst., vol. 44, no. 2, pp. 544–564, 2008.
  • [73]M. Peña, J. Llivisaca, and L. Siguenza-Guzman, “Blockchain and its potential applications in food supply chain management in Ecuador,” in Proc. Int. Conf. Adv. Emerg. Trends Technol., 2019, pp. 101–112.
  • [74]J. Peterson and J. Krug, “Augur: A decentralized, open-source platform for prediction markets,” 2015, arXiv:1501.01042 .
  • [75]P. Poornima Devi, S. A. Bragadeesh, and A. Umamakeswari, “Secure data management using IPFs and Ethereum,” in Proc. Int. Conf. Comput. Intell., Data Sci. Cloud Comput., 2021, pp. 565–578.
  • [76]U. A. Pozdnyakova, I. V. Mukhomorova, V. V. Golikov, S. P. Sazonov, and G. G. Pleshakov, “Internet of things as a new factor of production in the conditions of digital economy,” in Ubiquitous Computing and the Internet of Things: Prerequisites for the Development of ICT. Berlin, Germany: Springer, 2019, pp. 1145–1151.
  • [77]X. Qiu, L. Liu, W. Chen, Z. Hong, and Z. Zheng, “Online deep reinforcement learning for computation offloading in blockchain-empowered mobile edge computing,” IEEE Trans. Veh. Technol., vol. 68, no. 8, pp. 8050–8062, Aug.2019.
  • [78]P. Ramanan and K. Nakayama, “BAFFLE: Blockchain based aggregator free federated learning,” in Proc. IEEE Int. Conf. Blockchain, 2020, pp. 72–81.
  • [79]M. Rauchs et al., “Distributed ledger technology systems: A conceptual framework,” 2018.
  • [80]K. Rose, S. Eldridge, and L. Chapin, “The Internet of Things: An overview,” Internet Soc. , vol. 80, pp. 1–50, 2015.
  • [81]S. Rouhani and R. Deters, “Security, performance, and applications of smart contracts: A systematic survey,” IEEE Access, vol. 7, pp. 50759–50779, 2019.
  • [82]M. Sabt, M. Achemlal, and A. Bouabdallah, “Trusted execution environment: What it is, and what it is not,” in Proc. IEEE Trustcom/BigDataSE/ISPA, 2015, pp. 57–64.
  • [83]P. L. Seijas, S. J. Thompson, and D. McAdams, “Scripting smart contracts for distributed ledger technology,” IACR Cryptol. ePrint Arch., p. 1156, 2016. [Online]. Available: http://eprint.iacr.org/2016/1156
  • [84]S. M. Shah and V. K. Lau, “Model compression for communication efficient federated learning,” IEEE Trans. Neural Netw. Learn. Syst., early access, 2021, doi: 10.1109/TNNLS.2021.3131614.
  • [85]P. K. Sharma, N. Kumar, and J. H. Park, “Blockchain-based distributed framework for automotive industry in a smart city,” IEEE Trans. Ind. Informat., vol. 15, no. 7, pp. 4197–4205, Jul.2019.
  • [86]J. M. Silva, A. S. M. Mahfujur Rahman, and A. El Saddik, “Web 3.0: A vision for bridging the gap between real and virtual,” in Proc. 1st ACM Int. Workshop Communicability Des. Eval. Cultural Ecol. Multimedia Syst., 2008, pp. 9–14.
  • [87]A. Strømmen-Bakhtiar, “Digital economy, business models, and cloud computing,” in Global Virtual Enterprises in Cloud Computing Environments. PA, USA: IGI Global, 2019, pp. 19–44.
  • [88]K. H. Tan, G. Ji, C. P. Lim, and M.-L. Tseng, “Using Big Data to make better decisions in the digital economy,” Int. J. Prod. Res., vol. 55, no. 17, pp. 4998–5000, 2017.
  • [89]T. F. Tan et al., “Metaverse and virtual health care in ophthalmology: Opportunities and challenges,” Asia-Pacific J. Ophthalmol., vol. 11, no. 3, pp. 237–246, 2022.
  • [90]B. Tao et al., “Complex network analysis of the bitcoin transaction network,” IEEE Trans. Circuits Syst. II: Exp. Briefs, vol. 69, no. 3, pp. 1009–1013, Mar.2022.
  • [91]F. Tao, H. Zhang, A. Liu, and A. Y. Nee, “Digital twin in industry: State-of-the-art,” IEEE Trans. Ind. Informat., vol. 15, no. 4, pp. 2405–2415, Apr.2019.
  • [92]D. Tennakoon and V. Gramoli, “Smart red belly blockchain: Enhanced transaction management for decentralized applications,” 2022, arXiv:2207.05971 .
  • [93]K. Toyoda, X.-T. Tran, M. S. Nguyen, and H. T. Dinh, “Web3 meets behavioral economics: An example of profitable crypto lottery mechanism design,” 2022, arXiv:2206.03664 .
  • [94]D. Trautwein et al., “Design and evaluation of IPFs: A storage layer for the decentralized web,” in Proc. ACM SIGCOMM Conf., 2022, pp. 739–752.
  • [95]H. Treiblmaier and C. Sillaber, “The impact of blockchain on e-commerce: A framework for salient research topics,” Electron. Commerce Res. Appl., vol. 48, 2021, Art. no. 101054.
  • [96]D. Tse, B. Zhang, Y. Yang, C. Cheng, and H. Mu, “Blockchain application in food supply information security,” in Proc. IEEE Int. Conf. Ind. Eng. Eng. Manage., 2017, pp. 1357–1361.
  • [97]Q. Wang, R. Li, Q. Wang, and S. Chen, “Non-fungible token (NFT): Overview, evaluation, opportunities and challenges,” 2021, arXiv:2105.07447 .
  • [98]E. G. Weyl, P. Ohlhaver, and V. Buterin, “Decentralized society: Finding web3’s soul,” 2022.
  • [99]S. Williams, V. Diordiiev, L. Berman, and I. Uemlianin, “Arweave: A protocol for economically sustainable information permanence,” Arweave Yellow Paper, 2019. [Online]. Available: www.arweave.org/yellow-paper.pdf
  • [100]K. B. Wilson, A. Karg, and H. Ghaderi, “Prospecting non-fungible tokens in the digital economy: Stakeholders and ecosystem, risk and opportunity,” Bus. Horiz., vol. 65, pp. 657–670, 2022.
  • [101]G. Wood et al., “Ethereum: A secure decentralised generalised transaction ledger,” Ethereum Project Yellow Paper, vol. 151, pp. 1–32, 2014.
  • [102]X. Wu, B. Duan, Y. Yan, and Y. Zhong, “M2M blockchain: The case of demand side management of smart grid,” in Proc. IEEE Int. Conf. Parallel Distrib. Syst., 2017, pp. 810–813.
  • [103]T. Xiao, Z. Hu, and L. He, “The design of online shopping platform support system based on web3.0,” in Proc. Int. Conf. Econ., Finance Statist., 2017, pp. 230–235.
  • [104]H. Xiaoting and N. Li, “Subject information integration of higher education institutions in the context of web3.0,” in Proc. Int. Conf. Ind. Mechatronics Automat., 2010, pp. 170–173.
  • [105]C. Xu et al., “Making Big Data open in edges: A resource-efficient blockchain-based approach,” IEEE Trans. Parallel Distrib. Syst., vol. 30, no. 4, pp. 870–882, Apr.2019.
  • [106]L. Yang, X. Dong, Y. Zhang, Q. Qu, and Y. Shen, “Generic-NFT: A generic non-fungible token architecture for flexible value transfer in web3,” 2022.
  • [107]Q. Yang, Y. Liu, Y. Cheng, Y. Kang, T. Chen, and H. Yu, “Federated learning,” Synth. Lectures Artif. Intell. Mach. Learn., vol. 13, no. 3, pp. 1–207, 2019.
  • [108]Q. Yang, Y. Zhao, H. Huang, Z. Xiong, J. Kang, and Z. Zheng, “Fusing blockchain and AI with metaverse: A survey,” IEEE Open J. Comput. Soc., vol. 3, pp. 122–136, Jul.2022.
  • [109]S.-C. Yoo, D. Piscarac, and S. Kang, “Digital outdoor advertising tecoration for the metaverse smart city,” Int. J. Adv. Culture Technol., vol. 10, no. 1, pp. 196–203, 2022.
  • [110]C. Zhang, C. Wu, and X. Wang, “Overview of blockchain consensus mechanism,” in Proc. 2nd Int. Conf. Big Data Eng., 2020, pp. 7–12.
  • [111]C. Zhang, Y. Xie, H. Bai, B. Yu, W. Li, and Y. Gao, “A survey on federated learning,” Knowl.-Based Syst., vol. 216, 2021, Art. no. 106775.
  • [112]P. Zheng et al., “Aeolus: Distributed execution of permissioned blockchain transactions via state sharding,” IEEE Trans. Ind. Informat., vol. 18, no. 12, pp. 9227–9238, Dec.2022.
  • [113]P. Zheng, Z. Zheng, and X. Luo, “Park: Accelerating smart contract vulnerability detection via parallel-fork symbolic execution,” in Proc. 31st ACM SIGSOFT Int. Symp. Softw. Testing Anal., 2022, pp. 740–751.
  • [114]X. Zheng, Y. Zhu, and X. Si, “A survey on challenges and progresses in blockchain technologies: A performance and security perspective,” Appl. Sci., vol. 9, no. 22, 2019, Art. no. 4731.
  • [115]Z. Zheng et al., “An overview on smart contracts: Challenges, advances and platforms,” Future Gener. Comput. Syst., vol. 105, pp. 475–491, 2020.

Graphic:
Chuan Chen (Member, IEEE) received the B.S. degree from Sun Yat-sen University, Guangzhou, China, in 2012, and the Ph.D. degree from Hong Kong Baptist University, Hong Kong, in 2016. He is currently a Research Associate Professor with the School of Data and Computer Science, SunYat-Sen University. He authored or coauthored more than 70 international journal and conference papers, including one ESI highly cited papers. His research interests include graph neural network, trustworthy machine learning, and financial Big Data. He is also the Associate Editor for the journal Software Impacts .
Graphic:
Lei Zhang (Student Member, IEEE) received the B.S. degree in computer science from Anhui University, Hefei, China, in 2018. He is currently working toward the Graduate degree in computer technology with Sun Yat-sen University, Guangzhou, China. His research focuses on federated learning.
Graphic:
Yihao Li (Student Member, IEEE) received the B.S. degree in information engineering in 2022 from Sun Yat-sen University, Guangzhou, China, where he is currently working toward the Graduate degree in computer technology. His research focuses on the federated learning.
Graphic:
Tianchi Liao (Student Member, IEEE) is currently working toward the master's degree with the School of Computer Science and Engineering, Sun Yat-Sen University, Guangzhou, China. Her research interests include machine learning and federated learning.
Graphic:
Siran Zhao (Student Member, IEEE) received the B.E. degree in software engineering from Central South University, Changsha, China. He is currently working toward the master's degree with the School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China. His research interests include federated learning and graph machine learing.
Graphic:
Zibin Zheng (Senior Member, IEEE) received the Ph.D. degree from the Chinese University of Hong Kong, Hong Kong, in 2011. He is currently a Professor with School of Data and Computer Science, Sun Yat-sen University, Guangzhou, China. He is also the Chairman of the Software Engineering Department. He has authored or coauthored more than 120 international journal and conference papers, including three ESI highly cited papers. According to Google Scholar, his papers have more than 7000 citations, with an H-index of 42. His research interests include blockchain, services computing, software engineering, and financial Big Data. He was the recipient of several awards, including the Top 50 Influential Papers in Blockchain of 2018, ACM SIGSOFT Distinguished Paper Award at ICSE2010, Best Student Paper Award at ICWS2010. He was BlockSys'19 and CollaborateCom'16 General Co-Chair, SC2’19, ICIOT'18 and IoV'14 PC Co-Chair.
Graphic:
Huawei Huang (Senior Member, IEEE) received the Ph.D. degree in computer science and engineering from the University of Aizu, Aizuwakamatsu, Japan, in 2016. He is currently an Associate Professor with Sun Yat-Sen University, Guangzhou, China. He was a Research Fellow of Japan Society for the Promotion of Science, and an Assistant Professor with Kyoto University, Kyoto, Japan. His research interests include blockchain and distributed computing. He is also a Guest Editor of the IEEE Journal on Selected Areas in Communications and IEEE Open Journal of the Computer Society, Operation-Committee Chair of the IEEE Symposium on blockchain at IEEE SERVICES 2021, and the TPC Co-Chair of GLOBECOM'2021/ICC'2022 Workshop on scalable, secure, and intelligent blockchain.
Graphic:
Jiajing Wu (Senior Member, IEEE) received the Ph.D. degree from The Hong Kong Polytechnic University, Hong Kong, in 2014. In 2015, she joined Sun Yat-sen University, Guangzhou, China, where she is currently an Associate Professor. Her research interests include blockchain, graph mining, and network science. Dr. Wu was the recipient of the Hong Kong Ph.D. Fellowship Scheme during Ph.D. in Hong Kong from 2010 to 2014. She is also an Associate Editor for IEEE Transactions on Circuits and Systems II: Express Briefs.

Related Articles