A Review of Gaps between Web 4.0 and Web 3.0 Intelligent Network Infrastructure
Abstract
World Wide Web is speeding up its pace into an intelligent and decentralized ecosystem, as seen in the campaign of Web 3.0 and forthcoming Web 4.0. Marked by the Europe Commission’s latest mention of Web 4.0, a race towards strategic Web 4.0 success has started. Web 4.0 is committed to bringing the next technological transition with an open, secure, trustworthy fairness and digital ecosystem for individuals and businesses in private and public sectors. Despite overlapping scopes and objectives of Web 3.0 and Web 4.0 from academic and industrial perspectives, there are distinct and definitive features and gaps for the next generation of WWW. In this review, a brief introduction to WWW development unravels the entangled but consistent requirement of a more vivid web experience, enhancing human-centric experience in both societal and technical aspects. Moreover, the review brings a decentralized intelligence prospect of view on native AI entities for Web 4.0, envisioning sustainable, autonomous and decentralized AI services for the entire Web 4.0 environment, powering a self-sustainable Decentralized Physical and Software Infrastructure for Computing Force Network, Semantic Network, Virtual/Mixed Reality, and Privacy-preserving content presumption.
The review aims to reveal that Web 4.0 offers native intelligence with focused thinking on utilizing decentralized physical infrastructure, in addition to sole requirements on decentralization, bridging the gap between Web 4.0 and Web 3.0 advances with the latest future-shaping blockchain-enabled computing and network routing protocols.
Index Terms:
Web 4.0, Web 3.0, Blockchain, Intelligence, AI, Semantic network, VR, AR, Computing Force Network.I Introduction
Moving on from the decentralized ecosystem of Web 3.0 [1], the fourth generation of the World Wide Web has emerged through its unique requirement on intelligence and immersion between virtual and reality, known as Web 4.0, highlighted by European Commission [2] in the report addressing the inequality of basic rights and the interactive efficiency of the environment. Web 4.0 is expected to combine advanced artificial and ambient intelligence, the Internet of Things, trusted blockchain transactions, virtual worlds and XR capabilities, and digital and real objects to establish an environment where every component is fully integrated and communicates with each other, enabling truly intuitive, immersive experiences, seamlessly blending the physical and digital worlds [2]. The EU’s strategy for Web 4.0 involves empowering users and supporting businesses in the virtual world while fostering open, inter-operable standards and multi-stakeholder governance. The ultimate goal of Web 4.0 is to pioneer user-centric, ethical and inclusive virtual worlds that boost competitiveness, foster creativity, and uphold rights.
I-A Gaps between Web 4.0 and Web 3.0
In Web 3.0, the terminology has a refined scope for decentralizing the entire World Wide Web with decentralized Applications (dApp) [1, 3], decentralized physical infrastructure (DePIN) [4] and many blockchain infrastructures in both the network layer and the application layer [1, 5]. However, Web 3.0 lacks the focus of content delivery, specifically the immersive VR/XR contents, which have exceeded the capacity of existing network infrastructure in terms of bit rates, Quality of Services (QoS) and Quality of Experience (QoE) [6, 7]. Web 4.0 sees the gap between the Web 3.0 decentralized backbone of the control plane and the incoming Web 4.0 data plane that requires network native intelligence together with future generation network infrastructures, e.g., 6G [8]. To achieve the required data rate and connectivity of VR/XR content, semantic communication is proposed as a relief from demanding bit rates [9, 10, 11]. The Web 4.0 data is characterized as semantic data, that treat bits differently based on their features and priority [10].
Joint Source Channel Coding (JSCC) is widely adopted in the latest research of making the semantic aware communication network [11, 12]. At the same time, the semantic processing leads to a computing-heavy design for future generation networks, in particular, computing force network (CFN)[13], emphasizing high-performance computing with ultra-low latency and extraordinary reachability offered by both the access network [14], the core network and the data network.
Unlike Web 3.0 which serves the same purpose in decentralized architecture, Web 4.0 introduces AI as a new entity in the network, an integrated part of the network, compared to service-only AI applications in Web 3.0. The new entity plays a pivotal role in enabling network intelligence and requires the network evolution of integrated computing and networking nodes with decentralized controllers. This model allows the AI entity to adapt, learn, and optimize itself, achieving levels of efficiency and responsiveness unattainable by the service-only AI applications in Web 3.0. Second, Web 4.0 emphasises virtual experience consumption, requiring advanced network evolution on semantic and deterministic quality of services for end consumers, as compared in Table I with features of Web 1.0, Web 2.0.
Web generations | Networking | Content & Applications | Computing Infrastructure | Intelligence | Quality of Services | Security |
Web 1.0 | Decentralized | Static content & Portal page | Individual server | N/A | No QoS | N/A |
Web 2.0 | Centralized | Interactive content & Search engine & Social Media | Cloud Computing [15] | N/A | Limited QoS | Certificates and PKI [16] |
Web 3.0 | Decentralized [17] | User personalized and owned content & Marketplace | Distributed Cloud Computing [18] | Client-Server AI, Network for AI | Dynamic QoS | Certificateless PKI [19] |
Web 4.0 | Decentralized | Immersive media& GPT | Computing Force Network | Semantic-aware, AI for Network | Deterministic QoE | Trust Web |
I-B Motivations and Contributions
This paper contributes to Web 4.0 in three aspects:
-
•
First, the paper gives a glance at Web history, revealing the entangled but consistent ethos of a more vivid World Wide Web with humanism, pumping enhanced virtual world interactions with considerations on privacy, efficiency and human rights.
-
•
Second, a native perspective on how AI entities interact with the general public and their sustainability is detailed and envisioned. The proposed decentralized intelligence service operation principle is the key to closing the gaps in AI accessibility and enabling a self-evolving AI for Network and Network for AI by crowdsourcing and decentralized vending of AI services.
-
•
Finally, the paper discusses the opportunities and challenges of regulations with an outlook on bringing a more intelligent and responsible privacy-preserving Web 4.0.
II Native AI entities for Web 4
II-A Decentralized operation of Computing Force Network for network native AI services
Native AI Entities (NAEs) are autonomous artificial intelligence artifacts, purposefully designed to operate on the Web 4.0 infrastructure. Born from the collective efforts of the crowd, these NAEs are primed to serve the community that fostered their inception, with the commitment to being responsible and sustainable. Within the Web 4.0 realm, NAEs operate under a decentralized framework that is as dynamic as it is evolving. Their operational matrix intersects crucial nodes such as the Computing Force Network, Blockchain nodes, AI nodes, Semantic Networks, and the VR/AR real-time network. In Fig. 1, seven main interactive scenarios and three kinds of flow are highlighted. Details of the operational blueprint of an NAE in this setting are as follows:
Purpose, Objectives, and Model Optimization
NAEs are designed to deliver specific AI services within the Web 4.0 environment, such as image generation or conversational interaction. They continually optimize their operations and upgrade models according to market demand, seamlessly integrating with elements like Semantic Networks and VR/AR real-time networks for an enhanced user experience. In scenario 1, NAEs use their deposited funds to compensate decentralized data providers within the Semantic Networks, obtaining the necessary training data for model optimization and upgrading.
Computational Resource
NAEs source computational power from computing service providers within the Web 4.0 network, i.e., decentralized computing services [20, 18] or centralized computing services, e.g., cloud computing or supercomputers. The decision to utilize specific providers is automated based on the entity’s assessment of its computational requirements and service costs. NAEs have the intrinsic capability to transition or contract alternate providers when needed. As shown in scenario 2, NAEs secure the necessary computational resources from decentralized computing resource providers within the Computing Force Network, using their deposited funds as payment. This flexible approach allows NAEs to adjust their computational resources dynamically in response to changing demands.
Initial Funding and Financial Management
In scenario 3, the initial funding for NAEs is crowdsourced within the Web 4.0 network, with the rules governing these funds being transparently communicated to all contributors. NAEs can autonomously manage their budgets and adjust their financial strategies based on real-time analysis and anticipated future needs. The deposited funds of an NAE may circulate to other NAEs or decentralized capital within the Web 4.0 network, forming a complex and dynamic network of capital circulation. This financial ecosystem is adaptive and responsive, promoting financial flexibility and resilience, and accommodating the unique requirements of various NAEs while facilitating collaboration and interdependence among them. NAEs prioritize efficiency, transparency, and accountability in their financial management, ensuring that all financial operations support the delivery of their AI services and contribute to the overall sustainability of their operations.
Blockchain Network Interaction
NAEs interact with the blockchain network primarily via smart contracts in scenario 4. This process represents a major aspect of the financial and data management activities within the Web 4.0 network. Deposited funds from NAEs may flow into the blockchain network, which in turn, can channel funds back to the NAEs. The implementation of blockchain offers a secure and transparent method for managing finances and data, fostering trust and credibility in the operations of NAEs while enabling real-time tracking and verification of transactions.
Provision of Decentralized Services and User Data Protection
In scenario 5, users can call NAEs’ decentralized services via smart contracts. This process involves the flow of funds and data from the user to the NAEs and the provision of computational resources and data to the user. NAEs operate in compliance with data protection regulations, requiring explicit user permissions to utilize user data. The process of securing permissions and usage of the data is recorded and verifiable on the blockchain, ensuring privacy and security.
VR/AR Real-time Network Interaction
In the sixth interaction scenario, the computational resources of an NAE and the Computing Force Network collectively provide computational power to the VR/AR Real-time Network, as detailed in [12]. NAEs also supply data obtained from their decentralized services to the VR/AR network, enabling real-time virtual or augmented reality experiences.
Risk Assessment and DAO Audit
Investors are made aware of the inherent risk in NAE operations. To facilitate risk assessment, details of NAE operations, including service quality and financial status, are made transparent on the blockchain network. In the seventh interaction scenario, decentralized autonomous organizations (DAOs) audit NAEs’ services and capital flow, ensuring service quality, fairness, and accountability.
II-A1 Four Phases: Initialization, Growth, Steady and Retirement
As autonomous constructs within the Web 4.0 environment, NAEs operate under a life-cycle model to facilitate specific AI services. This life cycle encompasses four stages: Initialization and Configuration, Early Operation and Growth, Steady Operation and Expansion, and Decline and Termination. The progression through these stages is marked by distinctive operational behaviors and economic transactions, revealing how an NAE acquires, utilizes, and manages its resources in pursuance of its service objectives. Each phase also presents a snapshot of the economic flows at various life-cycle stages, shown in Fig. 2, from initial capital accumulation to resource allocation, revenue generation, reinvestment, and eventually, asset liquidation.
-
•
Phase 1: Initialization and Configuration:
-
1.
Acquisition of Capital and Computational Resources: NAEs generate their initial funds via crowdfunding efforts or from mature NAEs, employing these funds to lease computational resources.
-
2.
Market Positioning: This involves identifying service provisions, target markets, and potential users.
-
3.
Resource and Market Analysis: An efficiency assessment of resource allocation is performed along with predictions for market demands and potential gains.
-
1.
-
•
Phase 2: Early Operation and Growth:
-
1.
Provision of Services and Revenue Generation: NAEs commence their operations by providing services. Revenue is generated via these services and the execution of smart contracts.
-
2.
Repayment to Initial Investors: A portion of the revenue is deducted by the NAE to repay the initial investors.
-
3.
Market Expansion: Market feedback is analyzed and service provision adjusted while exploring new service markets and growth points.
-
1.
-
•
Phase 3: Steady Operation and Expansion:
-
1.
Stable Revenue and Self-Sustenance: By providing services and generating revenue, NAEs attain self-sustenance and gradually repay the initial investors.
-
2.
Service Optimization and Innovation: Existing services are improved and optimized, which may include new AI models, superior user experiences, etc.
-
3.
Investment in Other NAEs: Surplus revenue is used to invest in other budding NAEs or blockchain projects for additional profit.
-
4.
Economic Benefit Analysis: Economic benefits are analyzed, optimizing investment and operation strategies.
-
1.
-
•
Phase 4: Sunset and Termination:
-
1.
Service Termination and Asset Liquidation: NAEs cease their services and liquidate any remaining assets.
-
2.
Investor Refunds: Any remaining assets (if any) are returned to the investors.
-
3.
Lessons and Experience: The causes of failure are analyzed, offering valuable lessons and experiences for other NAEs and investors.
-
1.
II-B Semantic content aware network for VR/AR in confidential peer-to-peer network
Semantic Networks play an essential role within NAEs, allowing them to understand and process complex information across diverse contexts. By mapping relationships and drawing inferences between different entities, NAEs can generate context-relevant responses and provide highly personalized services in the VR/AR space. For instance, an NAE serving as a VR guide could understand a user’s interests and pre-train JSCC models based on the characteristics of content [12].
As NAEs process complex and often sensitive information, they employ robust measures to prevent potential misuse of this information within the network. A key component of these preventative measures is confidential computing, which ensures that data remains encrypted while being processed. This secure processing prevents unauthorized access, safeguarding the information even when operating in shared or potentially insecure environments.
In addition to confidential computing, NAEs are considered operated with the support of Trusted Execution Environments (TEE) to further enhance data security. TEE creates isolated, secure environments for processing sensitive information away from the rest of the system [5]. Even in scenarios where a malicious entity gains access to the network, the integrity and confidentiality of the data being processed within the TEE remain unaffected. Beyond these protective measures, NAEs also leverage their AI capabilities for real-time network monitoring and anomaly detection. This allows them to swiftly identify potential threats and take immediate corrective actions against abnormal traffics.
III Opportunities and Challenges
III-A Privacy challenges in identity and data distribution
Since Web 4.0 is evolved from Web 3.0, it inherits the privacy challenges from not only Web 3.0 itself but also the shift from Web 1.0/2.0 to Web 3.0. To transform the centralized identity management in Web 1.0/2.0 to a decentralized manner, a universal identity management strategy is proposed in Web 3.0 using zero-knowledge proof (ZKP), multi-party computation (MPC) and other cryptographic methods [1, 4]. Such a strategy utilizes ZKP to protect users’ real identities and derive different identities used by networks and applications in Web 3.0. Furthermore, the derived identities can be publicly verified by smart contracts but the private information related to the identities is not revealed. However, this rudimentary design for Web 3.0 does not consider the border control issue in identity verification. Since its nationalities issue the real identities of a user, the derived identities based on the real identities can be only verified by the networks and applications in the countries of the user’s nationalities with the assistance of the corresponding authorities. When a user needs to access networks and applications outside its nationalities, the identity verification performed by other countries still needs to be further advanced in Web 4.0. Specifically, the interaction between two or more smart contracts of identity verification belonging to different countries should be considered and designed. In addition, the private information of users involved in such abroad identity verification also needs to be standardized to protect user privacy and ease the identity verification process to ensure desirable access efficiency in Web 4.0.
“Read-write-own” is the core of Web 3.0, representing the self-governance of data for all users in equivalent. In Web 3.0, all users aim to freely reach content, services and applications deployed in decentralized networks but not in centralized servers applied in Web 1.0/2.0. Meanwhile, all users can manage their data in distributed storage and authorize access without barriers. As the next generation of the Internet inherits and further develops Web 3.0, Web 4.0 should keep building user data autonomy. However, more and more NAEs involved in Web 4.0 networks, content, services and applications may challenge the progress of data autonomy. Compared with Web 3.0, a distinctive characteristic of Web 4.0 is tremendous data generated by NAE for different purposes. Although there is a multi-layer identity strategy has been suggested to enable users to use different identities in different scenarios in Web 3.0, fine-grained permissions and multi-layer tags for different parts of data have not been considered for users to control who can access specific data, especially for massive data generated by AI. In addition, data flows and content distributions across different countries may incur censorship difficulty for authorities due to varied data censorship mechanisms and standards. On the other hand, censorship conflicts with data autonomy in users’ view since censorship may leak user private information. Therefore, data censorship by different countries should be regulated in a uniform manner with restricting the exposure of sensitive parts of data.
III-B Regulatory opportunities and concerns
As discussed in previous sections, NAE-enabled Web 4.0 can benefit individual by achieving legal objectives in cyberspace. The existing legislative framework in cyberspace already applies to several aspects of Web 4.0; however, there is no a powerful enforcement toolkit. In relation to users’ privacy and personal data, General Data Protection Regulation (GDPR) establishes an omnibus system of informed-consent-based obligations and rights [21].
The advent of NAE and the transition to Web 4.0 have fundamentally revolutionized the ways users interact with service providers. For example, with NAE’s assistance, users now have an enhanced capacity to review privacy policies in a more comprehensive manner. Users can utilize the automated NAE mapping to gain a clear understanding of the types of personal data the enterprises are collecting, processing, and storing. Meanwhile, NAEs can be tailored to learn the users’ privacy preferences in order to better protect their privacy. In this way, the service can be personalized without sacrificing users’ privacy in different contexts. This technology not only enables individuals to exercise their data subject rights, such as access, erasure, and rectification in a timely manner, but it also aids in detecting and flagging potential data breaches. Consequently, NAE-enabled Web 4.0 helps meet notification requirements, offering users a level of data security and privacy protection that was previously unattainable [22].
Moreover, NAE-enabled Web 4.0 can provide valuable analytical support for conducting data protection impact assessments required under data privacy regulations like the GDPR. It can systematically categorize and analyze personal data flows, flag potential compliance issues around legal basis or data minimization, identify inherent risk factors such as large-scale profiling or automated decision systems, assess potential impacts on individuals, and suggest technical controls to mitigate risks.
As for the individuals’ protection and regulations on competition and innovation, the Digital Services Act (DSA) and the Digital Markets Act (DMA) also apply to Web 4.0. In this context, NAE could automatically monitor online service providers for the presence of illegal content or prohibited goods. This could enable timely flagging and removal as well as enforcement of notice-and-action procedures. Regarding the anti-competitive practices, NAE-enabled Web 4.0 could identify anomaly anti-competitive activities that contravene DMA rules in cyberspace. For instance, self-preferencing and exclusion of competitor products or services can be automatically flagged to regulators. At a technical level, NAE testing and analysis of dominant service providers’ APIs, data structures, and interoperability presents the means to evaluate and ensure compliance with data portability obligations under the DMA. Such NAE functionality applied in continuous compliance processes promotes the DMA’s goals in regulating the gatekeepers on digital ecosystems. However, oversight and evaluation of NAE’s reasoning is critical to ensure appropriate recommendations aligned with regulatory goals.
While promising, more advanced legal and ethical oversight is required to align NAE in Web 4.0 with our fundamental values and rights protection in whole decentralized ecosystems. Existing conflicts between this emerging web architecture and legislations can been foreseen. For example, there are some potential conflicts between Right to be Forgotten (RtbF), granted by the GDPR and many other data privacy legislations, and the NAE-enable system [23]. A core tension arises from the fact that personal data used to train AI systems can become deeply embedded within the models’ architectural parameters, neural network weights, and decision-making logic flows. Unlike data residing in traditional databases, deleting or removing the original training data does not necessarily erase its latent traces from the AI model itself. In a sense, the model persists as a record of its own training. This presents challenges in fully implementing individuals’ right to be forgotten requests and erasing their personal data under GDPR Article 17 when such data was utilized in model development.
Confronting these concerns and rapidly evolving technologies, regulatory experimental tools are a valuable approach to collecting data, assessing legal, institutional and technological ramifications and shaping new regulatory approaches outside of prevailing regulatory frameworks. Such experimental regulatory approaches include regulatory sandboxes, standardization, and co-regulation involving regulators, industrial guidelines and markets. Among these, sandboxes create a controlled area where participators obtain a waiver from certain legal provisions and compliance processes and attain tailored legal support to foster the development of new technologies. There are several successful instances for setting up such experimental regulatory environments. The UK Financial Conduct Authority (FCA) pioneered the first fintech regulatory sandbox [24], while the UK Information Commissioner’s Office is testing the impact of AI-related products and services on data privacy frameworks [25].
Therefore, similar experimental regulatory toolkit can be used in the context of Web 4, in order to provide appropriate flexibility while protecting legal principles and fundamental rights. However, such experimental regulation requires careful design and testing. Otherwise, a lack of harmonized and standardized criteria, testing processes and inadequate specifications will harm competition, consumers, and public or personal data. In the context of Web 4, crafting the experimental regulatory environment firstly necessitates a multidisciplinary regulatory framework, given the convergence of various emerging technologies inherent in Web 4.0. Secondly, multi-stakeholder’s interests need to be considered. As Web 4.0 encompasses a complex ecosystem and impacts various sectors, the diverse interests of all stakeholders should be taken into account, including enterprises, SMEs, authorities, individuals, operators, standardization bodies and legislators, among others. These necessitate a strong regulatory interoperability in an international level. Thirdly, the comprehensive eligibility and testing criteria for experimental regulation are crucial. On the one hand, the pro-innovation mechanisms are important in order to provide flexibility. On the other hand, the design of testing parameters, duration, entry requirements and terminal conditions are also essential. Therefore, in the context of Web 4, the experimental regulatory tools should be carefully designed to embody the aforementioned concerns and probe into the potential impact on the risks on users’ protection and innovation.
IV Conclusions and Future Work
In this paper we summarise the key impacts of Web 4.0 and detail how it is different from Web 3.0 in a tight scope developed within Europe Commissioners’ outlook emphasizing not only the intelligence, decentralization, semantic and VR/XR ready but also regulator improvements on human rights, privacy and sustainability. A novel NAE operation model is proposed to benefit the network with its native ecosystem of sustainable AI and provides ubiquitous AI to every aspect of network, e.g., Autonomous Driving Network, NetGPT, ChatGPT-alike service, etc. Meanwhile, the end-to-end semantic communication network is also projected to be the key enabler for Web 4.0 due to the demands of VR/XR ready services with assured Quality of Services. In the end, this paper provides insight into regulator opportunities regarding the privacy, content ownership, sustainability, legal and ethics perspectives of Web 4.0.
References
- [1] H. Xu, Y. Sun, Z. Li, Y. Sun, X. Zhang, and L. Zhang, “deController: A Web3 Native Cyberspace Infrastructure Perspective,” IEEE communications magazine, 2023.
- [2] J. Bahrke and R. Thomas, “Towards the next technological transition: Commission presents eu strategy to lead on web 4.0 and virtual worlds,” European Commission, Strasbourg, Tech. Rep., 2023.
- [3] X. Shi, Q. Li, D. Wang, and L. Lu, “Mobile computing force network (mcfn): Computing and network convergence supporting integrated communication service,” in 2022 International Conference on Service Science (ICSS), 2022, pp. 131–136.
- [4] H. Xu, Y. Sun, X. Zhang, E. Liu, and C.-l. I, “When Web 3.0 Meets Reality : A Hyperdimensional Fractal Polytope P2P Ecosystems,” pp. 1–7, 2023.
- [5] H. Xu, Z. Li, Z. Li, X. Zhang, Y. Sun, and L. Zhang, “Metaverse Native Communication : A Blockchain and Spectrum Prospective,” in 2022 International Conference on Communications, 2022.
- [6] T. Hewa, G. Gur, A. Kalla, M. Ylianttila, A. Bracken, and M. Liyanage, “The role of blockchain in 6G: Challenges, opportunities and research directions,” 2nd 6G Wireless Summit 2020: Gain Edge for the 6G Era, 6G SUMMIT 2020, 2020.
- [7] Z. Zhang, Y. Xiao, Z. Ma, M. Xiao, Z. Ding, X. Lei, G. K. Karagiannidis, and P. Fan, “6G wireless networks: Vision, requirements, architecture, and key technologies,” IEEE Vehicular Technology Magazine, vol. 14, no. 3, pp. 28–41, 2019.
- [8] X. You et al., “Towards 6G wireless communication networks: vision, enabling technologies, and new paradigm shifts,” Science China Information Sciences, vol. 64, no. 1, p. 110301, jan 2021.
- [9] D. Gündüz, Z. Qin, I. E. Aguerri, H. S. Dhillon, Z. Yang, A. Yener, K. K. Wong, and C.-B. Chae, “Beyond transmitting bits: Context, semantics, and task-oriented communications,” IEEE Journal on Selected Areas in Communications, vol. 41, no. 1, pp. 5–41, 2023.
- [10] L. Xia, Y. Sun, D. Niyato, X. Li, and M. A. Imran, “Wireless Semantic Communication: A Networking Perspective,” dec 2022.
- [11] P. Popovski, O. Simeone, F. Boccardi, D. Gunduz, and O. Sahin, “Semantic-effectiveness filtering and control for post-5g wireless connectivity,” 2019.
- [12] H. Xu, W. Chen, X. N. Member, and M. D. Fellow, “SemRAN : Semantic Radio Access Networks with Collective Knowledge Sharing in 5G and Beyond,” 2023.
- [13] N. Li, X. Xu, Q. Sun, J. Wu, Q. Zhang, G. Chi, I. Chih-Lin, and N. Sprecher, “Transforming the 5G RAN With Innovation: The Confluence of Cloud Native and Intelligence,” IEEE Access, vol. 11, no. January, pp. 4443–4454, 2023.
- [14] X. Duan, H. Yao, Y. Fu, L. Lu, and T. Sun, “Computing force network technologies for computing and network integration evolution,” Telecommunications Science, vol. 37, no. 10, pp. 76–85, 2021.
- [15] A. Wittig and M. Wittig, Amazon Web Services in Action, 1st ed. USA: Manning Publications Co., 2015.
- [16] C. Adams and S. Lloyd, Understanding PKI: Concepts, Standards, and Deployment Considerations, 2nd ed. USA: Addison-Wesley Longman Publishing Co., Inc., 2002.
- [17] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008. [Online]. Available: http://www.bitcoin.org/bitcoin.pdf
- [18] DFINITY, “The Internet Computer for Geeks,” pp. 1–45, 2022. [Online]. Available: https://dfinity.org/foundation/;
- [19] H. Xu, L. Zhang, Y. Sun, and C.-L. I, “BE-RAN: Blockchain-enabled Open RAN with Decentralized Identity Management and Privacy-Preserving Communication,” jan 2021.
- [20] J. Camenisch, M. Drijvers, T. Hanke, Y. A. Pignolet, V. Shoup, and D. Williams, “Internet Computer Consensus,” Proceedings of the Annual ACM Symposium on Principles of Distributed Computing, vol. 2021, pp. 81–91, 2022.
- [21] P. Voigt and A. von dem Bussche, The EU General Data Protection Regulation (GDPR): A Practical Guide, 1st ed. Springer Publishing Company, Incorporated, 2017.
- [22] D. Yu, H. Xu, L. Zhang, B. Cao, and M. A. Imran, “Security Analysis of Sharding in the Blockchain System,” in 2021 IEEE 32nd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). Alto: IEEE, sep, pp. 1030–1035.
- [23] Z. Li, H. Xu, Y. Fang, B. Zhao, and L. Zhang, “Recordism: A Social-Scientific Prospect of Blockchain from Social, Legal, Financial, and Technological Perspectives,” SSRN Electronic Journal, 2022.
- [24] FCA, “Regulatory Sandbox,” George Washington Law Review, vol. 87, no. 3, pp. 579–645, 2015.
- [25] Information Commissioner’s Office, “Regulatory Sandbox,” 2023. [Online]. Available: https://ico.org.uk/for-organisations/advice-and-services/regulatory-sandbox/