{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T10:03:15Z","timestamp":1753869795773,"version":"3.41.2"},"reference-count":22,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T00:00:00Z","timestamp":1731542400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Int J Network Mgmt"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:title>ABSTRACT<\/jats:title><jats:p>Blockchain has evolved into a secure and trustworthy environment for decentralized applications, offering the advantages of tamper\u2010resistant, while simultaneously introducing on\u2010chain overhead issues. The development of metaverse related smart contracts on blockchain has given rise to a compelling research inquiry concerning the secure reduction of on\u2010chain storage overhead. In this research, the Metaverse Off\u2010chain Storage Framework based on Chameleon hash (MSC), a unique framework for decentralized system based on chameleon hash, supports code or stored data updates without changing on\u2010chain data is presented. The index of decentralized applications' data is calculated using the Chameleon hash to ensure that the index remains unchanged during the data modification process. Simultaneously, data can be stored outside of the blockchain with proper authentication mechanisms in place. The experimental results have shown that MSC exhibits reduced on\u2010chain storage requirements when compared to similar frameworks. Furthermore, MSC significantly reduced overhead as compared to the direct storage of data within a smart contract.<\/jats:p>","DOI":"10.1002\/nem.2314","type":"journal-article","created":{"date-parts":[[2024,11,15]],"date-time":"2024-11-15T04:44:37Z","timestamp":1731645877000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["MSC: A Unique Chameleon Hash\u2010Based Off\u2010Chain Storage Framework for Metaverse Applications"],"prefix":"10.1002","volume":"35","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5094-7468","authenticated-orcid":false,"given":"Chenxi","family":"Xiong","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology University of Electronic Science and Technology of China  Chengdu China"}]},{"given":"Ting","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology University of Electronic Science and Technology of China  Chengdu China"}]},{"given":"Gang","family":"Mao","sequence":"additional","affiliation":[{"name":"The Second Research Institute of CAAC Civil Aviation Logistics Technology Company Ltd.  Chengdu China"}]}],"member":"311","published-online":{"date-parts":[[2024,11,14]]},"reference":[{"key":"e_1_2_10_2_1","doi-asserted-by":"publisher","DOI":"10.14778\/3476249.3476283"},{"key":"e_1_2_10_3_1","doi-asserted-by":"crossref","unstructured":"R.Kumar N.Marchang andR.Tripathi \u201cSmdsb: Efficient Off\u2010Chain Storage Model for Data Sharing in Blockchain Environment \u201d inMachine Learning and Information Processing: Proceedings of ICMLIP 2020(Springer 2021) 225\u2013240.","DOI":"10.1007\/978-981-33-4859-2_24"},{"key":"e_1_2_10_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.05.013"},{"key":"e_1_2_10_5_1","doi-asserted-by":"crossref","unstructured":"M.Al\u2010Bassam \u201cSCPKI: A Smart Contract\u2010Based PKI and Identity System \u201d inProceedings of the ACM Workshop on Blockchain Cryptocurrencies and Contracts(ACM 2017) 35\u201340.","DOI":"10.1145\/3055518.3055530"},{"key":"e_1_2_10_6_1","doi-asserted-by":"crossref","unstructured":"J.Zhao Z.Lin X.Huang Y.Zhang andS.Xiang \u201cTrustca: Achieving Certificate Transparency Through Smart Contract in Blockchain Platforms \u201d in2020 International Conference on High Performance Big Data and Intelligent Systems (HPBD&IS)(IEEE 2020) 1\u20136.","DOI":"10.1109\/HPBDIS49115.2020.9130581"},{"key":"e_1_2_10_7_1","unstructured":"V.Durham \u201cNamecoin \u201d (2010) Namecoin.org."},{"key":"e_1_2_10_8_1","doi-asserted-by":"publisher","DOI":"10.3390\/app9091788"},{"key":"e_1_2_10_9_1","unstructured":"F. S.AliandA.Kupcu \u201cImproving PKI BGP and DNS Using Blockchain: A Systematic Review \u201d (2020) arXiv preprint arXiv:2001.00747."},{"key":"e_1_2_10_10_1","doi-asserted-by":"crossref","unstructured":"S.MatsumotoandR. M.Reischuk \u201cIKP: Turning a PKI Around With Decentralized Automated Incentives \u201d in2017 IEEE Symposium on Security and Privacy (SP)(IEEE 2017) 410\u2013426.","DOI":"10.1109\/SP.2017.57"},{"key":"e_1_2_10_11_1","doi-asserted-by":"crossref","unstructured":"A.Yakubov W.Shbair A.Wallbom andD.Sanda \u201cA Blockchain\u2010Based PKI Management Framework \u201d inThe First IEEE\/IFIP International Workshop on Managing and Managed by Blockchain (Man2Block) Colocated with IEEE\/IFIP Noms 2018 Tapei Tawain 23\u201027 April 2018(2018) 1\u20136.","DOI":"10.1109\/NOMS.2018.8406325"},{"key":"e_1_2_10_12_1","doi-asserted-by":"crossref","unstructured":"S.Ali G.Wang B.White andR. L.Cottrell \u201cA Blockchain\u2010Based Decentralized Data Storage and Access Framework for Pinger \u201d in2018 17th IEEE International Conference on Trust Security and Privacy in Computing and Communications\/12th IEEE International Conference on Big Data Science and Engineering (Trustcom\/Bigdatase)(IEEE 2018) 1303\u20131308.","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00179"},{"key":"e_1_2_10_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2929205"},{"key":"e_1_2_10_14_1","doi-asserted-by":"crossref","unstructured":"J.Liu B.Li L.Chen M.Hou F.Xiang andP.Wang \u201cA Data Storage Method Based on Blockchain for Decentralization DNS \u201d in2018 IEEE Third International Conference on Data Science in Cyberspace (DSC)(IEEE 2018) 189\u2013196.","DOI":"10.1109\/DSC.2018.00035"},{"key":"e_1_2_10_15_1","unstructured":"C.Ens \u201cEns \u201d (2020) https:\/\/docs.ens.domains\/."},{"key":"e_1_2_10_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.277"},{"key":"e_1_2_10_17_1","doi-asserted-by":"crossref","unstructured":"C.Li Q.Shen Z.Xie J.Dong Y.Fang andZ.Wu \u201cEfficient Identity\u2010Based Chameleon Hash for Mobile Devices \u201d inICASSP 2022\u20102022 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP)(IEEE 2022) 3039\u20133043.","DOI":"10.1109\/ICASSP43922.2022.9746617"},{"key":"e_1_2_10_18_1","doi-asserted-by":"crossref","unstructured":"S.FanandY.Chen \u201cEditable Blockchain Scheme Based on Shamir Chameleon Hash Secret Sharing \u201d in2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC) Vol.\u00a06(IEEE 2022) 1125\u20131128.","DOI":"10.1109\/ITOEC53115.2022.9734554"},{"key":"e_1_2_10_19_1","first-page":"1","article-title":"Chameleon Hashing and Signatures","author":"Krawczyk H.","year":"1998","journal-title":"Cryptology ePrint Archive"},{"key":"e_1_2_10_20_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107360211"},{"key":"e_1_2_10_21_1","doi-asserted-by":"crossref","unstructured":"P.MaymounkovandD.Mazieres \u201cKademlia: A Peer\u2010to\u2010Peer Information System Based on the XOR Metric \u201d inPeer\u2010to\u2010peer Systems: First International Workshop IPTPS 2002 Cambridge MA USA March 7\u20138 2002 Revised Papers(Springer 2002) 53\u201365.","DOI":"10.1007\/3-540-45748-8_5"},{"volume-title":"Remote Procedure Call","year":"1981","author":"Nelson B. J.","key":"e_1_2_10_22_1"},{"key":"e_1_2_10_23_1","first-page":"1","article-title":"Evaluation of Security Level of Cryptography: the Elliptic Curve Discrete Logarithm Problem (ECDLP)","volume":"14","author":"Menezes A.","year":"2001","journal-title":"University of Waterloo"}],"container-title":["International Journal of Network Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/nem.2314","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,26]],"date-time":"2025-01-26T23:59:27Z","timestamp":1737935967000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/nem.2314"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,14]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1002\/nem.2314"],"URL":"https:\/\/doi.org\/10.1002\/nem.2314","archive":["Portico"],"relation":{},"ISSN":["1055-7148","1099-1190"],"issn-type":[{"type":"print","value":"1055-7148"},{"type":"electronic","value":"1099-1190"}],"subject":[],"published":{"date-parts":[[2024,11,14]]},"assertion":[{"value":"2024-06-30","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-23","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e2314"}}