Rewarding Developers by Storing Applications on Non-Fungible Tokens
Abstract
:1. Introduction
2. Background and Literature Review
2.1. Working of Non-Fungible Tokens (NFTs)
2.1.1. Mining NFTs
- New block creation.
- Information verification and validation.
- Uploading data to the blockchain.
2.1.2. Owning NFTs
- It is simple to indicate ownership.
- Verifying the ownership of an NFT is analogous to demonstrating that they have ETH in their account.
- Suppose one buys an NFT, and their public address can transfer ownership of the token to one’s wallet. This token demonstrates that the digital file they have copied is the original.
- Their private key serves as ownership documentation for the original.
- The certificate of authenticity for that particular digital object is the public key of the content producer.
- The public key of the token’s authors is a permanent part of its history. By proving that the token they own was produced by a certain person, the creator’s public key might raise the token’s market value.
- Signing messages to demonstrate ownership of the private key underlying the address is another approach to proving NFT ownership.
- Their private key serves as ownership documentation for the original, as already indicated. This indicates that the NFT is controlled by the private keys hidden behind that address.
- Without disclosing their private keys to anyone, they may use a signed message to demonstrate their ownership of the NFT.
- It is impossible to adjust NFTs in any manner. They can be sold, in some cases bringing in resale royalties for the original author.
- Alternatively, an NFT owner can keep them forever, content in the knowledge that the Ethereum wallet is protecting their asset.
2.1.3. Selling NFTs
- Authorship can be simply established.
- The level of scarcity is chosen.
- Each time it is sold, royalties might be received.
- On any NFT market or from peer to peer, a person can sell an NFT, do not have to use anyone as an intermediary, and they are not restricted to any platform [7].
2.2. Developing Non-Fungible Tokens
2.3. Storing Non-Fungible Tokens
3. Proposed Framework
3.1. Mechanism of Action–Approach
3.2. Proposed NFT Mechanism
3.2.1. Storage Layer
- Saving money is accomplished by best using the available storage.
- Multiple copies are maintained on different nodes, preventing congestion on central servers and accelerating downloads.
- Keeping data under owners’ names.
3.2.2. IPFS
- Concerning the content, when users upload data to NFT storage, they are given a content identifier (CID), which is the content’s IPFS hash. CIDs are the specific fingerprints of the data and global addresses that may be used to refer to them no matter how or where they are kept. Since CIDs are produced from the content itself, using them to reference NFT data prevents issues such as weak connections and “rug pulls”.
- Demonstrable storage: Filecoin is used by NFTs, offering storage for decentralised data for a long time. To ensure the longevity and persistence of NFT data over time, Filecoin employs cryptographic proofs.
- Durable retrieval: these data may be accessed directly in the browser using any public IPFS that stores Filecoin and IPFS data.
3.2.3. Authentication (Identity Protection) Layer
3.2.4. Verification Layer
- Digitalisation: the applications that students create are virtual.
- Recording: if they are available to the public on a blockchain network, miners may reject the idea and use the innovations themselves.
3.2.5. Validation
3.2.6. Electronic Certificate
- Version: the CA states that validators can select the version that students prefer.
- A certificate for a serial number.
- Signature method identifier for indicating authority.
- Issuer name.
3.2.7. Application Layer
4. Challenges, Limitations, and Discussion
Working Hierarchy of the Proposed Blockchain Distributed Application (DApp)
- The platform welcomes new creators.
- IP is uploaded by creators to the blockchain network.
- Requests by consumers to utilise the content.
- A blockchain is used by organisations to safeguard copyrights and resolve associated issues.
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Bamakan, S.M.H.; Nezhadsistani, N.; Bodaghi, O.; Qu, Q. Patents and intellectual property assets as non-fungible tokens; key technologies and challenges. Sci. Rep. 2022, 12, 2178. [Google Scholar] [CrossRef]
- Vasan, K.; Janosov, M.; Barabási, A.-L. Quantifying NFT-driven networks in crypto art. Sci. Rep. 2022, 12, 2769. [Google Scholar] [CrossRef] [PubMed]
- Kugler, L. Non-fungible tokens and the future of art. Commun. ACM 2021, 64, 19–20. [Google Scholar] [CrossRef]
- Hakkarainen, T.; Colicev, A. Blockchain-enabled advances (BEAs): Implications for consumers and brands. J. Bus. Res. 2023, 160, 113763. [Google Scholar] [CrossRef]
- Gunay, S.; Kaskaloglu, K. Does utilizing smart contracts induce a financial connectedness between Ethereum and non-fungible tokens? Res. Int. Bus. Financ. 2022, 63, 101773. [Google Scholar] [CrossRef]
- Munoz-Ausecha, C.; Gómez, J.E.G.; Ruiz-Rosero, J.; Ramirez-Gonzalez, G. Asset Ownership Transfer and Inventory Using RFID UHF TAGS and Ethereum Blockchain NFTs. Electronics 2023, 12, 1497. [Google Scholar] [CrossRef]
- Notaro, A. All that is solid melts in the Ethereum: The brave new (art) world of NFTs. J. Vis. Art Pract. 2022, 21, 359–382. [Google Scholar] [CrossRef]
- Khan, A.A.; Laghari, A.A.; Shafiq, M.; Awan, S.A.; Gu, Z. Vehicle to Eve-rything (V2X) and Edge Computing: A Secure Lifecycle for UAV-Assisted Vehicle Network and Offloading with Blockchain. Drones 2022, 6, 377. [Google Scholar] [CrossRef]
- Ante, L. Non-fungible token (NFT) markets on the Ethereum blockchain: Temporal development, cointegration and interrelations. Econ. Innov. New Technol. 2022, 1–19. [Google Scholar] [CrossRef]
- Aharon, D.Y.; Demir, E. NFTs and asset class spillovers: Lessons from the period around the COVID-19 pandemic. Financ. Res. Lett. 2021, 47, 102515. [Google Scholar] [CrossRef]
- Khan, A.A.; Laghari, A.A.; Shaikh, Z.A.; Dacko-Pikiewicz, Z.; Kot, S. Internet of Things (IoT) Security With Blockchain Technology: A State-of-the-Art Review. IEEE Access 2022, 10, 122679–122695. [Google Scholar] [CrossRef]
- Khan, A.A.; Laghari, A.A.; Li, P.; Dootio, M.A.; Karim, S. The collaborative role of blockchain, artificial intelligence, and industrial internet of things in digitalization of small and medium-size enterprises. Sci. Rep. 2023, 13, 1656. [Google Scholar] [CrossRef]
- Valeonti, F.; Bikakis, A.; Terras, M.; Speed, C.; Hudson-Smith, A.; Chalkias, K. Crypto Collectibles, Museum Funding and OpenGLAM: Challenges, Opportunities and the Potential of Non-Fungible Tokens (NFTs). Appl. Sci. 2021, 11, 9931. [Google Scholar] [CrossRef]
- Khan, A.A.; Shaikh, A.A.; Laghari, A.A. IoT with Multimedia Investigation: A Secure Process of Digital Forensics Chain-of-Custody using Blockchain Hyperledger Sawtooth. Arab. J. Sci. Eng. 2022, 47, 1–16. [Google Scholar] [CrossRef]
- Wagan, A.A.; Khan, A.A.; Chen, Y.L.; Yee, P.L.; Yang, J.; Laghari, A.A. Artificial Intelli-gence-Enabled Game-Based Learning and Quality of Experience: A Novel and Secure Framework (B-AIQoE). Sustainability 2023, 15, 5362. [Google Scholar] [CrossRef]
- Khan, A.A.; Laghari, A.A.; Gadekallu, T.R.; Shaikh, Z.A.; Javed, A.R.; Rashid, M.; Estrela, V.V.; Mikhaylov, A. A drone-based data management and optimization using metaheuristic algorithms and blockchain smart contracts in a secure fog environment. Comput. Electr. Eng. 2022, 102, 108234. [Google Scholar] [CrossRef]
- Lee, J.; Kwon, K.H. Novel pathway regarding good cosmetics brands by NFT in the metaverse world. J. Cosmet. Dermatol. 2022, 21, 6584–6593. [Google Scholar] [CrossRef] [PubMed]
- Das, D.; Bose, P.; Ruaro, N.; Kruegel, C.; Vigna, G. Understanding security issues in the NFT ecosystem. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, Los Angeles, CA, USA, 7–11 November 2022; pp. 667–681. [Google Scholar]
- Kapoor, A.; Guhathakurta, D.; Mathur, M.; Yadav, R.; Gupta, M.; Kumaraguru, P. TweetBoost: Influence of Social Media on NFT Valuation. In Proceedings of the WWW’22: The ACM Web Conference 2022, Virtual Event. Lyon, France, 25–29 April 2022. [Google Scholar] [CrossRef]
- Khan, A.A.; Laghari, A.A.; Rashid, M.; Li, H.; Javed, A.R.; Gadekallu, T.R. Artificial intelligence and blockchain technology for secure smart grid and power distribution Automation: A State-of-the-Art Review. Sustain. Energy Technol. Assess. 2023, 57, 103282. [Google Scholar]
- Taherdoost, H. Non-Fungible Tokens (NFT): A Systematic Review. Information 2022, 14, 26. [Google Scholar] [CrossRef]
- Pinto-Gutiérrez, C.; Gaitán, S.; Jaramillo, D.; Velasquez, S. The NFT hype: What draws attention to non-fungible tokens? Mathematics 2022, 10, 335. [Google Scholar] [CrossRef]
- Ko, H.; Son, B.; Lee, Y.; Jang, H.; Lee, J. The economic value of NFT: Evidence from a portfolio analysis using mean–variance framework. Financ. Res. Lett. 2022, 47, 102784. [Google Scholar] [CrossRef]
- Park, A.; Kietzmann, J.; Pitt, L.; Dabirian, A. The Evolution of Nonfungible Tokens: Complexity and Novelty of NFT Use-Cases. IT Prof. 2022, 24, 9–14. [Google Scholar] [CrossRef]
- ERC-721: Non-Fungible Token Standard. Available online: https://eips.ethereum.org/EIPS/eip-721 (accessed on 3 April 2023).
- X.509: Information technology—Open Systems Interconnection—The Directory: Public-Key and Attribute Certificate Frameworks. Available online: https://www.itu.int/rec/T-REC-X.509 (accessed on 3 April 2023).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kalhoro, A.; Wagan, A.A.; Khan, A.A.; Lin, J.-M.; Ku, C.S.; Por, L.Y.; Yang, J. Rewarding Developers by Storing Applications on Non-Fungible Tokens. Mathematics 2023, 11, 2519. https://doi.org/10.3390/math11112519
Kalhoro A, Wagan AA, Khan AA, Lin J-M, Ku CS, Por LY, Yang J. Rewarding Developers by Storing Applications on Non-Fungible Tokens. Mathematics. 2023; 11(11):2519. https://doi.org/10.3390/math11112519
Chicago/Turabian StyleKalhoro, Ayesha, Asif Ali Wagan, Abdullah Ayub Khan, Jim-Min Lin, Chin Soon Ku, Lip Yee Por, and Jing Yang. 2023. "Rewarding Developers by Storing Applications on Non-Fungible Tokens" Mathematics 11, no. 11: 2519. https://doi.org/10.3390/math11112519