Web3: The Next Internet Revolution
Web3: The Next Internet Revolution
Abstract—Since the first appearance of the World Wide Web, The following Web 3.03 and Web34 are expected to break
people more rely on the Web for their cyber social activities. monopolies, which is the most attractive characteristic called
The second phase of World Wide Web, named Web 2.0, has decentralization. Web3 is the next phase of the World Wide
been extensively attracting worldwide people that participate in
building and enjoying the virtual world. Nowadays, the next Web and perhaps organizes society as a whole. In the Web3
internet revolution: Web3 is going to open new opportunities for era, users generate content, and the content only belongs to the
traditional social models. The decentralization property of Web3 user himself or herself. What we call Web3 will center around
arXiv:2304.06111v1 [cs.CY] 22 Mar 2023
is capable of breaking the monopoly of the internet companies. a decentralized ecosystem of technology products based on
Moreover, Web3 will lead a paradigm shift from the Web as a blockchain networks that are interoperable and free of tradi-
publishing medium to a medium of interaction and participation.
This change will deeply transform the relations among users tionally trusted validators such as businesses, institutions, and
and platforms, forces and relations of production, and the government agencies.
global economy. Therefore, it is necessary that we technically,
practically, and more broadly take an overview of Web3. In
Web 2.0
this paper, we present a comprehensive survey of Web3, with 2004 - now
dynamic website, read, write
a focus on current technologies, challenges, opportunities, and centralized
outlook. This article first introduces several major technologies Web 1.0 user-generated content,
1989 - 2001 host-generated authority
of Web3. Then, we illustrate the type of Web3 applications in static website, read-only
detail. Blockchain and smart contracts ensure that decentralized centralized
host-generated content,
organizations will be less trusted and more truthful than that host-generated authority Web3
2014 - now
centralized organizations. Decentralized finance will be global, information website, read,
and open with financial inclusiveness for unbanked people. This Web 3.0 write, sensor input
decentralized, distributed
2006 - now
paper also discusses the relationship between the Metaverse and read, write, sensor input user-generated content,
user-generated authority
Web3, as well as the differences and similarities between Web 3.0 decentralized, distributed
user-generated content,
and Web3. Inspired by the Maslow’s hierarchy of needs theory, user-generated authority
we further conduct a novel hierarchy of needs theory within
Web3. Finally, several worthwhile future research directions of Fig. 1: The development timeline of Web3.
Web3 are discussed.
Index Terms—Cyber social activities, Web3, blockchain, de- The Web3 architecture is shown in Fig. 2. It adopts AI
centralization, overview. technology [1], [2], [3], [4], [5], machine learning [6], and
blockchain [7], [8], [9] to provide users with smart applica-
tions. This enables the intelligent creation and distribution of
I. I NTRODUCTION
highly tailored content to every internet user. A digital wallet is
As the world grapples with the COVID-19 pandemic, there the most important factor for each user because it offers digital
are fewer opportunities for face-to-face communication. We identification services and user data authorization functions.
are more dependent on the virtual world. The World Wide After users take actions on the front end (e.g., browser and
Web has been developed more than thirty years since the software), some request messages will be immediately sent
birth of Web 1.01 . Fig. 1 and Table I show the history of to Web servers for calling application services. Decentralized
the World Wide Web. Web 2.02 allows users to read and AI, machine learning, and other big data technologies are
write content on the website, but the data ownership belongs utilized to improve the user experience and speed up the
to corresponding platforms. This causes a lot of monopoly processes of systems. Furthermore, users’ digital wallets will
companies to continuously pursue monopolizing users’ data. also be used to invoke corresponding smart contracts. In the
meantime, the blockchain server will truthfully record users’
This research was supported in part by the National Natural Science Foun- activities on the Internet. Significantly, centralized databases
dation of China (Nos. 62002136 and 62272196), Natural Science Foundation
of Guangdong Province (No. 2022A1515011861), Fundamental Research
will be abandoned within Web3. Distributed databases are
Funds for the Central Universities of Jinan University (No. 21622416), more suitable for decentralized networks. On the one hand,
and the Young Scholar Program of Pazhou Lab (No. PZL2021KF0023). it protects stored data from tampering and corruption risks.
Corresponding author: Wensheng Gan
Shicheng Wan is with the School of Business Administration, South China
On the other hand, it provides the ability for data validation
University of Technology, Guangzhou 510641, China. without trust. As Gavin Wood said in his blog5 , “the ultimate
Hong Lin and Wensheng Gan are with the College of Cyber Security, Jinan goal of Web3 is achieving less trust and more truth”.
University, Guangzhou 510632, China; and also with Pazhou Lab, Guangzhou
510330, China. (E-mail: wsgan001@gmail.com)
The emergence of Web 3.0 and Web3 breaks the oligarchy
Jiahui Chen is with the Department of Computer Science, Guangdong and monopoly while creating a new productivity improvement
University of Technology, Guangzhou 510006, China.
Philip S. Yu is with the University of Illinois Chicago, Chicago, USA. 3 https://en.wikipedia.org/wiki/Semantic Web
1 https://en.wikipedia.org/wiki/Web1.0 4 https://en.wikipedia.org/wiki/Web3
2 https://en.wikipedia.org/wiki/Web2.0 5 https://gavwood.com/dappsweb3.html
2
Solana
Arweave B. Communicate Network
Filecoin A communication network is a pattern that aims to ef-
Sidechains
Blokchain fectively organize communication information. It is also the
Akash
Plasma
Network
established system where messages can be sent to one or more
GunDB
Layer 2 directions within the organization based on the requirements.
P2P Rollup
Data Storage The InterPlanetary File System (IPFS) [20] has been widely
Computation
Geramic adopted in Web3, which is expected to replace the traditional
Hyper Text Transfer (HTTP) [36]. It helps people search
the internet through a content-addressable mechanism instead
of an IP-addressable mechanism. For example, if you want
Helium
Web3 to watch or download a movie (such as Titanic, Avatar, or
Harry Potter), the browser first has to know where the movie
Polkadot Communicate is on the Internet (i.e., the domain name or IP address).
Network However, if the servers are unfortunately closed, you will
IPFS get “404 Page Not Found” error from browsers. That means
Livepeer you cannot watch or download the movie. Others may have
downloaded the movie before and still have it, but it seems
Fig. 3: Several main technologies of Web3. you have no way of connecting with that them. However,
the situation is totally different within IPFS. Each file in
IPFS will have a unique hash value based on file content.
Hence, you just need to tell your browser what you want, and
A. Data Storage then the browser will search for the target hash value from
The research around the area of distributed databases, such IPFS. Additionally, there is no blockchain that is capable of
as P2P databases, has been developing for a long time [33], supporting all kinds of functions and being applied in distinct
4
situations. The Bitcoin blockchain can deal with transactions based on blockchain, which intends to reinvent how to return
among accounts very well and is more likely a value-exchange data ownership to users and let everyone equally participate
medium [7]. The Ethereum blockchain is designed to act as in it. Fig. 4 reveals a simple instance of a user case within
a platform and promote the development of smart contract Web3, and we provide a detailed introduction to describe how
technology. Polkadot can link several blockchains into an the Web3 system works in this subsection.
integrated network. In Web3, collaboration among different
blockchains will be more and more important. This means that
User
blockchains are able to offer better services while improving
their efficiency and security by reducing unnecessary code. In
short, building rich, information-sharing, and cross-platform
Front-end
responsive web applications is also needed with the help of
cross-blockchain collaboration [37].
sign
read
and developers proposed a variety of solutions. Let’s take transactions transactions
Ethereum as an example. On the one hand, the blockchain de-
mands that all nodes take part in recording transactions. On the
other hand, the massive trading volume on blockchain causes
Computation
communication crowding. The above issues always increase
latency and potentially result in a worse user experience. Hybrid
Storage
Therefore, additional chains are proposed, where the Layer 2
(additional) chains [38] are added to the main chains (that is,
the Layer 1 chains, e.g., Bitcoin and Ethereum), and process Fig. 4: A simple instance of Web3.
new transactions faster while reducing the load on the main
chains in the meantime. Though sidechains [39] function as Tom recently plans to buy a new smartphone, and he also
auxiliary networks to a Layer 1 chain, the sidechains have their wants to sell the old one. He opens a Web3 software or website
own consensus approaches and therefore run independently (like decentralized eBay or Letgo) and then publishes a smart
with main chains. If data from sidechains is concealed, forged, contract. The contract records information about the sale of his
or tampered with, the dealing results that the main chains phone, such as the selling price of $200, blue color, complete
receive are obviously wrong. After that, the plasma chains [40] appearance, usage time, warranty date, and ownership. Jim
are likely a tree structure, which compresses the representation learns from a decentralized Web3 compatible service that
of transaction results and then commits it at a fixed interval. Tom has posted a selling smart contract. Jim wants to buy
The difference between plasma chains and sidechains is that the phone and clicks on “buy” button. The smart contract
plasma will check the correctness of transaction results before services first check that the selling phone indeed belongs to
sending them to the main chains. If an error occurs, users Tom, and then make sure Jim has enough tokens ($200) in
are able to safely withdraw from plasma chains. What’s more, his digital wallet. If the results on both sides are true, the
rollup chains [41] compress a certain amount of transaction smart contract is automatically enforced. The ownership of
data on a block at some intervals. The main chains not only the phone will be re-registered as Jim instead of Tom, and
accept the transaction results but also receive information the balance of Tom’s digital wallet increases $200. At last,
about the transaction. Up until now, rollup has been the topic Jim receives Tom’s phone, and then this transaction is done.
of Layer 2 solutions because of its high throughput and low Maybe someone will ask: “if Tom refuses to give the phone
cost. Furthermore, the optimistic rollup and the ZK rollup to Jim, what will happen?” Firstly, the smart contracts already
are both practice solutions with rollup chains. ZK rollup change the ownership of the phone from Tom to Jim. Secondly,
adopts zero-knowledge proof [42] to make sure confirmation the phone cannot offer an unlock service for Tom without
and a tamper-proof record of transactions. It reduces the Jim’s authorization. Thirdly, the blockchain network can easily
validity proof cost but does not effectively save computation. verify the whole transaction process between them. Therefore,
Optimistic rollup is a solution for extending universal smart it makes no sense for Jim to keep this phone.
contracts, but it suffers from the same flaw as plasma chains.
B. Blockchain
III. T YPES OF A PPLICATIONS OF W EB 3 D EVELOPERS
Herein, we further explore Web3 from the perspective
A. Web3 of blockchain. A blockchain runs with a lot of automatic
While Web 2.0 was a front-end revolution, Web3 is an in- protocols. These protocols offer a variety of different web
depth back-end revolution. Web3 embraces a set of protocols services (e.g., storage, transaction, and identity). There are also
5
some trigger protocols that replace unnecessary and inefficient and technological infrastructure for all citizens of the inter-
intermediaries in Web 2.0. A new song, for example, begins net. Blockchain technology enables nearly instantaneous and
with creation and ends with a publication, which is frequently peer-to-peer digital transactions. Before the birth of Bitcoin,
completed through collaboration. A third-party company is centralized intermediaries, such as banks and credit card insti-
usually in charge of things like the release, rate payment, and tutions, could deal with almost all digital payment activities.
profit distribution among collaborators. There are so many The perfection of bank infrastructure has a great impact on
participants involved that copyright or profit disputes often financial liquidity. Cryptocurrencies are like money in Web3
happen. Nevertheless, things will be simple with the help of [43]. Cryptocurrencies are digital currencies underpinned by
blockchain technology. Once fans confirm the purchase of a cryptographic systems, where cryptography ensures the secu-
song, a certain number of tokens will immediately be sent from rity of online payments without the use of centralized third-
their digital wallets to the creator’s digital wallet. The entire party intermediaries.
process is automatically executed by several triggered proto- Aside from the features of DeFi we’ve already talked about,
cols. If there are several co-creators, the blockchain faithfully DeFi services also use other Web3 features, such as open
records the contribution of each one. The information is open governance and low fees. Financial inclusion, which provides
and transparent, and no one can have exclusive access to it. In affordable and user-friendly financial products and services,
the Web3 era, there will be a lot of talented individual creators. is vital for the economic cycle. Nowadays, if you are living
There is no need to share their revenue with intermediaries, in an emerging country, perhaps activities such as payments,
and this is good news for both creators and supporters. The savings, credit, and insurance will not be easy without financial
immutable property will make sure a creator enjoys rights over and technological experience. Today, DeFi services are being
their works throughout its lifetime. experienced in real life by more than one million people.
Through user-friendly operation and low-cost automated finan-
C. Smart Contract cial services that occur at scale, DeFi services could potentially
The smart contract [9] is a kind of digitalized contract in the evolve and lead to the broader global financial inclusiveness
virtual world. It will automatically execute if some conditions of billions of unbanked people worldwide in the future.
are met. Smart contracts were proposed in the early years,
but due to the trust issue, they have not been widely used in
recent decades. After all, no one will unreservedly believe a E. Non-Fungible Token
stranger will keep their contracts without a reliable guarantee. Non-fungible token (NFT) [27] refers to a special kind of
Fortunately, blockchain technology provides a trusted virtual digital token. It is the opposite side of a fungible token (FT)
environment and then promotes the application of smart con- [28] like bitcoin. In practice, FT represents currency, share-
tract technology. Smart contracts allow developers to build new holding, and other quantitative differences. NFT represents a
applications on top of blockchains. For instance, smart con- collection, an ID account, an IP address, and other unique
tracts can be written to create systems such as authentication, assertions. An FT can be divided into several equivalent assets,
financial transactions, supply-chain management, power distri- and each asset can be freely further divided or combined.
bution, and reputation systems. What’s more, the importance However, an NFT-like digital collection cannot be divided and
of smart contracts on distinct blockchains is different. Bitcoin is usually used to represent specific and unique things. In other
[7] can be seen as a naive smart contract that deals with peer- words, a bitcoin is equal to a bitcoin, but a digital collection
to-peer transactions. Ethereum [18], on the other hand, is built cannot be regarded as another digital collection.
as a decentralized computation network. As a matter of fact, Compared to FT, the liquidity of NFT is obviously lower.
Bitcoin is more likely a neutral bank. It only offers fast and However, NFT also plays a vital role in peer-to-peer transac-
convenient payout and deposit services and does not care how tions in Web3. Firstly, NFT is friendly to individual creators.
or why you do anything. The smart contracts in Bitcoin can be In the Web 2.0 era, creators have to upload their digital prod-
seen as a complete set of operation-locking protocols. It targets ucts to online platforms (e.g., Instagram, YouTube, TikTok,
a single mission: protecting your tokens and ensuring tokens and Spotify), and then these centralized platforms promote
are sent to the right digital wallet. On the other hand, Ethereum products and earn revenue in different ways. Creators and
regards any contract as essentially a series of transactions. The platforms share profits. In contrast, digital creators can directly
state of the last transaction is related to the state of the pre- earn profits from their fans via NFTs. Because NFTs are public
transactions. So, it provides a general mechanism for tracking on the blockchain, buyers rarely purchase fake products and
and updating historical states, and users can customize the get a clearer picture of the creation process. In addition, NFTs
corresponding logic and conditions. In a word, smart contracts are also able to contribute as much as possible to copyright
are verified by the peer-to-peer network. This feature avoids registration, and identification recognition in Web3.
the involvement of a third party. Furthermore, automating
smart contracts frees massive amounts of manual services.
F. Decentralized autonomous organization
D. Decentralized Finance Decentralized autonomous organization (DAO) [21] is a
Decentralized finance (DeFi) [23] refers to decentralized blockchain-based and internet-native organization model that
applications of finance, including exchange, loans, and invest- encodes management and operating rules according to a se-
ment. DeFi is a global, open-source, and accessible financial ries of smart contracts. DAO is also a staple within Web3,
6
which discards centralized control or third-party participation model in the Metaverse, i.e., the creator economy. Web3
elements. There are three basic elements that a DAO owns: provides a new method and novel paradigm for copyright,
• What the mission of the DAO is? A clear mission is circulation, and value discovery of digital products. This case
the first step for consensus-building among members. Its will deeply invoke the passion of creators, which leads to a
common goal can quickly gather a number of strangers better experience for others. Web3 will encourage more and
to work together. more users to participate in the decentralized Metaverse, which
• How to maintain consensus in a DAO? A well-developed will put all bribes back into Web3 and Metaverse in the end.
organization depends on a complete rule-based system,
including governance, incentives, voting, and punishment. IV. T HE C URRENT W EB 3 C ONCERNS
These rules are encoded by smart contracts and deployed Recently, Stack Overflow completed a 595 developer ques-
on the blockchain, which prevents them from being tionnaire survey, and the result post title is “New data: Do
changed. developers think Web3 will build a better internet?” [48]. The
• What can an incentive involve? An appropriate incen- result shows that most people surveyed had already heard or
tive mechanism ensures that members contribute to the learned about Web3, but only a quarter thought that Web3
sustainable development of the DAO. In some cases, was the future of the internet. The popularity of blockchain
incentives help discover talented individuals from the and Web3 is undeniable, but the question is, will this all stand
masses and encourage them to play greater roles. the test of time?
Thereafter, we briefly introduce how DAO works: Firstly,
DAO founders have to create a new kind of cryptocurrency6 .
A. Web3 vs Web 3.0
Secondly, founders release cryptocurrency to stakeholders
(DAO members). Finally, his or her voting power and influence Difference between Web3 and Web 3.0. Though both
are determined by the amount of cryptocurrency he or she Web3 and Web 3.0 [47] are familiar names, there are several
owns. Additionally, cryptocurrency can be bought and sold at remarkable differences between their technologies and con-
will between DAO members. cepts.
• Web 3.0 [47], also known as the semantic web, focuses
the next generation of the Web is, both Web3 and Web 3.0 of the chunks and not the entirety of the file, thus ensuring
are ideal virtual worlds for which scholars and developers that only the file owner can access it [51].
strive. Democracy, harmony, freedom, equality, and justice will
be further incorporated into our internet lives. Furthermore,
Web3 and Web 3.0 are still in their early stages. Despite the C. Privacy and Personal Data in Web3
publication of massive business products with Web3 and Web In the Web3 world, some people who dislike the poor
3.0, they have yet to walk a long growth path. underlying technologies will do some nesting based on the
original infrastructure. However, the problems brought about
by these “stacked houses” may exceed the harm caused by
B. Data Storage in Web3
outdated planning and even become a worse fusion of the
As users’ awareness of data ownership grows, the disad- shortcomings between Web 2.0 and Web3. For example, after
vantages of Web 2.0’s data storage model (e.g., centralized NFT becomes popular, fractional NFT (F-NFT) occurs, which
storage) are gradually exposed. Commercial companies require uses the idea of FT to dismantle NFTs. The Centralized
users to trust them in order to provide storage services. While DeFi (CeDeFi) has been proposed to modify the traditional
users enjoy convenience, they also lose ownership of data, cryptocurrency model and is expected to hold costs down.
because operators may change user data intentionally or unin- Several subsequent thoughts are conducted using the simple
tentionally at any time. Web3 will use a new storage model, examples of the above scenario applications. Firstly, the fusion
namely decentralized storage. Nevertheless, even though Web3 of centralization and decentralization ideas in products is
runs on blockchain, it cannot be achieved solely on blockchain. perfect, but it may be a castle in the air. On the one hand, this
There are some problems in using the blockchain to store kind of fusion approach is more complicated than utilizing
all data [49]. On the one hand, the blockchain’s transaction either centralization or decentralization alone. On the other
speed is far from adequate for dealing with massive amounts hand, because of the lack of supervision among CeDeFi,
of data. On the other hand, storing massive data violates the many frauds have happened in the last few years. Second, due
design of the blockchain. The original idea was to store only a to the astronomical value of personal data on decentralized
small amount of representative data for sharing and verification platforms, this type of fusion application or software still
among nodes. For example, an NFT on the blockchain doesn’t exists, with the risk of intentional information leakage. Thirdly,
actually store the actual item it represents, but just a pointer compromise is a kind of wisdom on security issues. It suggests
to data that is not on-chain. Therefore, if these data are stored striking a balance between the costs of protection and attack.
in a centralized manner, once they are changed, the NFT will Considering both centralization and decentralization properties
become a null pointer. Obviously, this cannot guarantee the at the same time undoubtedly adds to the development burden.
lifetime and unique characteristics that NFT claims. In addition
to ensuring users’ data ownership, decentralized storage is
more cost-effective than centralized storage [50]. D. What Problem Does Web3 Solve?
At present, there are already some decentralized storage Identity authentication at the Web 2.0 stage is a necessary
solutions. The solution of Storj8 is to divide the encrypted but troublesome thing for users. Due to the inconsistent au-
data files uploaded by users into several blocks, and then thentication of different platforms, we often forget passwords,
distribute these blocks to each storage node. These nodes and it is not easy to recall email addresses and security
come from those storage space contributors who benefit from questions when resetting passwords. Web3 will solve these
the incentive mechanism. Only when a certain number of problems with the combination of a digital wallet and digital
blocks are met can the corresponding file be retrieved. This signing, providing a common way to represent the ownership
can ensure that the complete file cannot be obtained when of data, assets, and certificates. Web3’s wallet is a fixed
a few storage nodes are hacked [51]. IPFS is a hypermedia address that is bound to the user’s identity and stores the
protocol that is a counterpart to the HTTP protocol. It has the user’s asset information. Users prove their ownership of the
characteristics of peer-to-peer. The content loads no longer wallet by providing a digital signature [52]. Obviously, they
come from the central server but are retrieved from several still need to spend energy to remember the private key, but
storage nodes. In addition, the addressing is content-based, since the wallet is directly linked to the asset, there will
rather than traditional location-based (such as domain name be great motivation to drive them to protect their private
and IP). Filecoin9 is a decentralized network for storing files key [53]. If users own any NFTs or other tokens, they can
built on IPFS. It has a built-in incentive mechanism and issues connect their wallets to different websites and applications,
a native cryptocurrency to facilitate transaction efficiency. view and manipulate these assets in different ways, and it
Also, there are other solutions (such as SIA10 and SWARM11 ). will all be unimpeded. A number of products already exist
In short, what they all have in common is that the complete and implement the functionality of Web3 wallets, including
data file is chunked and stored with the help of multiple nodes MetaMask, WalletConnect, Web3Auth, and Forform, which
in the network. The storage nodes only have the information serve as apps or browser extensions.
8 https://www.storj.io/
In addition to solving the issue of authentication, Web3
9 https://filecoin.io/ also has a set of advanced solutions to address the issue
10 https://sia.tech/ of community governance. The current common centralized
11 https://www.ethswarm.org/ system of governance is based on discussion and voting,
8
“What a man can be, he must be.” The self-actualization level gratifying that Web3 technologies are gradually shifting from
implies that anyone is capable of accomplishing anything. idealism towards pragmatism. The market for Web3 technolo-
This also matches the concept of the top need in Maslow’s gies has expanded dramatically over the years, and traditional
hierarchy. The low levels fall in line to become the step-by- Internet companies are involved too. Web3 technologies are
step process, and thus the basic needs must be met before accumulating power and building commercial value along
achieving higher-level needs. Every person is finally capable several technology and business branches [67]. However, the
of achieving his or her self-worth with the help of Web3 and inefficient-by-design blockchain systems (e.g., Bitcoin) waste
its derivative products. a lot of energy because of their proof-of-work mechanism.
It is also important to consider how to make Web3 more
VI. F UTURE R ESEARCH D IRECTIONS sustainable while its technologies improve people’s lives. For
There are many interesting and challenging directions for instance, after Ethereum completes the merger, it estimates
future research, as discussed below. that the update to proof of stake will cut its energy usage
New applications. Within the decentralization characteristic by 99.95% [68]. Besides, a new blockchain, called Solana,
of Web3, one of the significant transformations of application combines proof of stake and proof history mechanisms to
development is that people’s learning and information acqui- make itself faster and more efficient15 . This environmental
sition paradigms shift from passive acceptance to proactive issue causes the emergence of ReFi [69]. Though ReFi has
cognition. During the Web3 era, applications will be more been interpreted differently by institutions, it argues for tack-
open and transparent, and users will have a better under- ling climate change, supporting environmental protection and
standing of the functions and goals of these Web3 products biodiversity, and creating a more equitable, transparent, and
[59]. While DAO enables a novel governance model, it has sustainable financial system.
a decisive impact on the development and usage of Web3 Entertainment industry. Entertainment activities (e.g.,
applications. Until now, thousands of DAOs have emerged in games [70], AI-Generated Content (AIGC) [71], interaction
the financial services, investment, content creation, gaming, movies [72], and smart tourism [73]) are almost the eas-
and social network domains. That means we are currently in iest way for encouraging users to participate in building
the exploratory design phase of the DAO. In the foreseeable Web3. Digital reality technology helps humans overcome the
future, we will likely apply the DAO to other areas (such as limitations of time and space on Web 2.0. For example,
healthcare, insurance, education, and urban governance [60]) augmented reality and virtual reality technologies strengthen
and create revolutionary products. The booming growth of the immersive experience of users. Besides, playing games is
demands for virtual and real interaction in offline scenes, enjoyable for all ages. As we discussed previously, Web3 has
online virtual scenes, AR applications, digital twin space, the potential to drastically transform our talents in creation,
digital collection distribution, and the design and usage of a and entertainment activities will shift from being profit-driven
digital human directly improves the quality of Web3 products to being interest-driven. People, especially young people, will
and accelerates their iteration. Web3’s developer ecosystem demand and design more personalized, informative, vivid, and
has created a lot of demand for new types of staff at the creative games on Web3. In return, the related technologies
same time [61]. This will put forward higher requirements actually promote the development of Web3. Moreover, the
for constructing and maintaining reliable neutral platforms and training activities of teams of all sizes can benefit from these
practicing a decentralized concept. types of seamless and mixed reality interactions through the
Privacy and security. Web3’s leading bug bounty platform, “Playing to Learn” concept. Games are only one of the most
i.e., Immunefi14 , had reviewed massive hacking instances, as intuitive and addressable segments within the entertainment
well as cases of fraud in 2022. It conducted an appalling industry, but the Web3 opportunity extends far beyond gaming.
report stating that nearly four billion dollars had been lost
across the Web3 ecosystem in 2022. The report figures out VII. C ONCLUSION
that the major reason is that most users are still getting used Web3 is still in its early stages, and there are still some
to Web 2.0. Most people do not know how to correctly use a problems and limitations with how it works that haven’t been
digital wallet to conduct transactions with others. Therefore, fixed yet. It encourages us to think in new ways about the
it is urgent to construct safer and more user-friendly software World Wide Web and aims to address most problems in Web
architectures [59], [62], [63]. In addition, some underlying 2.0 today. This paper has presented a comprehensive overview
technologies are also required to further improve the security of Web3 and its implementation. Firstly, we begin with an
services of applications, including reconciling privacy and introduction to the motivation for decentralization and how
distributed ledgers [64] and cryptocurrency malware hunting Web3 can serve as a chance for breaking the monopoly of
[65]. In practice, the root cause of large losses within the companies on Web 2.0. Then, we provide detailed reviews
Web3 ecosystem is that blockchain security flaws, such as and analyses of approaches for emerging implementation
51% attacks, malicious nodes, and scalability issues, are not challenges in Web3. The issues include data storage, communi-
completely immune to attacks [66]. cation networks, and computation. Following that, we describe
Power utility. Web3 is expected to change the relations
between productions and return data ownership to users. It is 15 Solana can deal with 65,000 transactions per second, but Ethereum is
about 15 transactions per second, and Bitcoin is down to 7 transactions per
14 https://immunefi.com second.
10
various types of current Web3 applications. More importantly, [23] F. Schär, “Decentralized finance: On blockchain-and smart contract-
we discuss the similarities and differences between Web 3.0 based financial markets,” Federal Reserve Bank of Street Louis Review,
pp. 153–174, 2021.
and Web3 in detail. A hierarchical theory of needs within [24] A. Diaz Valdivia and M. Poblet, “Governance of ReFi ecosystem and the
Web3 is also proposed in this article. Finally, we introduce integrity of voluntary carbon markets as a common resource,” Available
some key challenges and future research directions. at SSRN 4286167, 2022.
[25] W. Ding, J. Hou, J. Li, C. Guo, J. Qin, R. Kozma, and F. Y. Wang, “Desci
based on Web3 and DAO: A comprehensive overview and reference
model,” IEEE Transactions on Computational Social Systems, vol. 9,
R EFERENCES no. 5, pp. 1563–1573, 2022.
[26] C. Li and B. Palanisamy, “Incentivized blockchain-based social media
[1] G. A. Montes and B. Goertzel, “Distributed, decentralized, and de- platforms: A case study of Steemit,” in Proceedings of the 10th ACM
mocratized artificial intelligence,” Technological Forecasting and Social Conference on Web Science, 2019, pp. 145–154.
Change, vol. 141, pp. 354–358, 2019. [27] Q. Wang, R. Li, Q. Wang, and S. Chen, “Non-fungible token (NFT):
[2] Y. Hailemariam, A. Yazdinejad, R. M. Parizi, G. Srivastava, and A. De- Overview, evaluation, opportunities and challenges,” arXiv:2105.07447,
hghantanha, “An empirical evaluation of AI deep explainable tools,” in pp. 1–22, 2021.
International Conference on IEEE Globecom Workshops. IEEE, 2020, [28] N. Karandikar, A. Chakravorty, and C. Rong, “Blockchain based trans-
pp. 1–6. action system with fungible and non-fungible tokens for a community-
[3] A. Ekramifard, H. Amintoosi, A. H. Seno, A. Dehghantanha, and R. M. based energy infrastructure,” Sensors, vol. 21, no. 11, p. 3822, 2021.
Parizi, “A systematic literature review of integration of blockchain and [29] M. Weiser, “The computer for the 21st century,” ACM SIGMOBILE
artificial intelligence,” Blockchain Cybersecurity, Trust and Privacy, Mobile Computing and Communications Review, vol. 3, no. 3, pp. 3–
vol. 79, pp. 147–160, 2020. 11, 1999.
[4] L. Cao, “Decentralized AI: Edge intelligence and smart blockchain, [30] C. Zhao, S. Zhao, M. Zhao, Z. Chen, C. Z. Gao, H. Li, and Y. A.
metaverse, Web3, and DeSci,” IEEE Intelligent Systems, vol. 37, no. 3, Tan, “Secure multi-party computation: theory, practice and applications,”
pp. 6–19, 2022. Information Sciences, vol. 476, pp. 357–372, 2019.
[5] B. Zolfaghari, E. Rabieinejad, A. Yazdinejad, R. M. Parizi, and A. De- [31] J. Zhu, J. Cao, D. Saxena, S. Jiang, and H. Ferradi, “Blockchain-
hghantanha, “Crypto makes AI evolve,” arXiv:2206.12669, pp. 1–14, empowered federated learning: challenges, solutions, and future direc-
2022. tions,” ACM Computing Surveys, pp. 1–29, 2022.
[6] D. Li, D. Han, T. H. Weng, Z. Zheng, H. Li, H. Liu, A. Castiglione, and [32] M. Sabt, M. Achemlal, and A. Bouabdallah, “Trusted execution envi-
K. C. Li, “Blockchain for federated learning toward secure distributed ronment: what it is, and what it is not,” in The 14th IEEE International
machine learning systems: A systemic survey,” Soft Computing, vol. 26, Conference on Trust, Security and Privacy in Computing and Commu-
no. 9, pp. 4423–4440, 2022. nications. IEEE, 2015, pp. 57–64.
[7] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” Decen- [33] A. Öztürk, L. Eyango, S. Y. Waksman, S. Lallich, and J. Darmont,
tralized Business Review, pp. 21 260–21 269, 2008. “Warehousing complex archaeological objects,” in The 9th International
[8] A. Yazdinejad, R. M. Parizi, A. Dehghantanha, and K. K. R. Choo, and Interdisciplinary Conference on Modeling and Using Context.
“Blockchain-enabled authentication handover with efficient privacy pro- Springer, 2015, pp. 226–239.
tection in SDN-based 5G networks,” IEEE Transactions on Network [34] S. Huh, S. Muralidharan, H. Ko, and B. Yoo, “XR collaboration
Science and Engineering, vol. 8, no. 2, pp. 1120–1132, 2019. architecture based on decentralized web,” in The 24th International
[9] A. Singh, R. M. Parizi, Q. Zhang, K. K. R. Choo, and A. Dehghantanha, Conference on 3D Web Technology, 2019, pp. 1–9.
“Blockchain smart contracts formalization: Approaches and challenges [35] R. C. Merkle, “A digital signature based on a conventional encryption
to address vulnerabilities,” Computers & Security, vol. 88, p. 101654, function,” in The 7th International Conference on Advances in Cryptol-
2020. ogy. Springer, 1987, pp. 369–378.
[10] R. Rudman and R. Bruwer, “Defining Web 3.0: opportunities and [36] R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach,
challenges,” The Electronic Library, vol. 34, no. 1, pp. 132–154, 2016. and T. J. Berners Lee, “Hypertext transfer protocol–http/1.1,” Internet
[11] N. V. Keizer, F. Yang, I. Psaras, and G. Pavlou, “The case for AI Society, Tech. Rep., 1999.
based Web3 reputation systems,” in International of the IFIP Networking [37] M. Kazemi and A. Yazdinejad, “Towards automated benchmark
Conference. IEEE, 2021, pp. 1–2. support for multi-blockchain interoperability-facilitating platforms,”
[12] G. Korpal and D. Scott, “Decentralization and Web3 technologies,” arXiv:2103.03866, pp. 1–15, 2021.
TechRxiv, pp. 1–9, 2022. [38] C. Sguanci, R. Spatafora, and A. M. Vergani, “Layer 2 blockchain
[13] U. W. Chohan, “Web 3.0: The future architecture of the Internet?” SSRN: scaling: A survey,” arXiv:2107.10881, pp. 1–51, 2021.
https://ssrn.com/abstract=4037693, pp. 1–14, 2022. [39] R. M. Parizi, S. Homayoun, A. Yazdinejad, A. Dehghantanha, and
[14] Q. Wang, R. Li, Q. Wang, S. Chen, M. Ryan, and T. Hardjono, K. K. R. Choo, “Integrating privacy enhancing techniques into
“Exploring Web3 from the view of blockchain,” arXiv:2206.08821, pp. blockchains using sidechains,” in The 32nd IEEE Canadian Conference
1–38, 2022. on Electrical and Computer Engineering. IEEE, 2019, pp. 1–4.
[15] K. Nabben, “Web3 as ’self-infrastructuring’: The challenge is how,” Big [40] J. Poon and V. Buterin, “Plasma: Scalable autonomous smart contracts,”
Data & Society, vol. 10, no. 1, pp. 1–6, 2023. White Paper, pp. 1–47, 2017.
[16] A. Murray, D. Kim, and J. Combs, “The promise of a decentralized [41] V. Gramoli, L. Bass, A. Fekete, and D. W. Sun, “Rollup: Non-disruptive
Internet: What is Web3 and how can firms prepare?” Business Horizons, rolling upgrade with fast consensus-based dynamic reconfigurations,”
vol. 66, no. 2, pp. 191–202, 2023. IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 9,
[17] A. Raman, S. Joglekar, E. D. Cristofaro, N. Sastry, and G. Tyson, “Chal- pp. 2711–2724, 2015.
lenges in the decentralised Web: The mastodon case,” in Proceedings of [42] U. Feige, A. Fiat, and A. Shamir, “Zero-knowledge proofs of identity,”
the Internet Measurement Conference, 2019, pp. 217–229. Journal of Cryptology, vol. 1, no. 2, pp. 77–94, 1988.
[18] G. Wood, “Ethereum: A secure decentralized generalized transaction [43] L. Y. Gely-Rojas, “Cryptocurrencies and the uniform commercial code:
ledger,” Ethereum Project Yellow Paper, vol. 151, no. 2014, pp. 1–32, The curious case of bitcoin,” UPR Business Law Journal, vol. 8, p. 129,
2014. 2016.
[19] T. J. Berners-Lee, “Semantic web road map,” 1998. [Online]. Available: [44] J. Sun, W. Gan, H. C. Chao, and P. S. Yu, “Metaverse: Survey, appli-
https://www.emse.fr/∼beaune/websem/SWRoadmapLee.pdf cations, security, and opportunities,” arXiv preprint arXiv:2210.07990,
[20] J. Benet, “IPFS-content addressed, versioned, P2P file system,” 2022.
arXiv:1407.3561, pp. 1–11, 2014. [45] H. Lin, S. Wan, W. Gan, J. Chen, and H.-C. Chao, “Metaverse in
[21] S. Wang, W. Ding, J. Li, Y. Yuan, L. Ouyang, and F. Y. Wang, “Decen- education: Vision, opportunities, and challenges,” in The 10th IEEE
tralized autonomous organizations: Concept, model, and applications,” International Conference on Big Data. IEEE, 2022, pp. 2857–2866.
IEEE Transactions on Computational Social Systems, vol. 6, no. 5, pp. [46] Z. Chen, J. Wu, W. Gan, and Z. Qi, “Metaverse security and privacy:
870–878, 2019. An overview,” in The 10th IEEE International Conference on Big Data.
[22] K. Wu, Y. Ma, G. Huang, and X. Liu, “A first look at blockchain-based IEEE, 2022, pp. 2950–2959.
decentralized applications,” Software: Practice and Experience, vol. 51, [47] W. Gan, Z. Ye, S. Wan, and P. S. Yu, “Web 3.0: The future of Internet,”
no. 10, pp. 2033–2050, 2021. in Companion Proceedings of the ACM Web Conference, 2023, pp. 1–10.
11
[48] D. Gibson, “New data: Do developers think Web3 will build a better [72] M. R. Miller, F. Herrera, H. Jun, J. A. Landay, and J. N. Bailenson,
Internet?” 2022. [Online]. Available: https://stackoverflow.blog/2022/ “Personal identifiability of user tracking data during observation of 360-
04/20/new-data-developers-web3/ degree vr video,” Scientific Reports, vol. 10, no. 1, pp. 1–10, 2020.
[49] A. Takyar, “How Web3 data storage works,” 2022. [Online]. Available: [73] A. Kontogianni, E. Alepis, and C. Patsakis, “Promoting smart tourism
https://www.leewayhertz.com/how-web3-data-storage-works/ personalised services via a combination of deep learning techniques,”
[50] C. Mellor, “Storj gives the lowdown on Web3 decentralized Expert Systems with Applications, vol. 187, p. 115964, 2022.
storage,” 2022. [Online]. Available: https://blocksandfiles.com/2022/11/
08/storej-gives-the-lowdown-on-web-3-0-decentralized-storage/
[51] M. B. Moe, “Web3 and its impact on privacy and personal data
management,” Theseus, pp. 1–41, 2022.
[52] A. Yazdinejad, G. Srivastava, R. M. Parizi, A. Dehghantanha, K.-
K. R. Choo, and M. Aledhari, “Decentralized authentication of dis-
tributed patients in hospital networks using blockchain,” IEEE Journal
of Biomedical and Health Informatics, vol. 24, no. 8, pp. 2146–2156,
2020.
[53] J. Bambacht and J. Pouwelse, “Web3: A decentralized societal in-
frastructure for identity, trust, money, and data,” arXiv preprint
arXiv:2203.00398, pp. 1–19, 2022.
[54] J. Potts, D. W. Allen, C. Berg, A. M. Lane, and T. MacDonald,
“The exchange theory of Web3 governance (or ’blockchains without
romance’),” Available at SSRN, 2022.
[55] M. Deer, “What are governance tokens, and how do they
work?” 2022. [Online]. Available: https://cointelegraph.com/news/
what-are-governance-tokens-and-how-do-they-work
[56] K. Qin and A. Gervais, “An overview of blockchain scalability, in-
teroperability and sustainability,” Hochschule Luzern Imperial College
London Liquidity Network, pp. 1–15, 2018.
[57] D. Sheridan, J. Harris, F. Wear, J. Cowell Jr, E. Wong, and A. Yazdinejad,
“Web3 challenges and opportunities for the market,” arXiv:2209.02446,
pp. 1–7, 2022.
[58] A. Yazdinejad, R. M. Parizi, A. Dehghantanha, G. Srivastava, S. Mo-
han, and A. M. Rababah, “Cost optimization of secure routing with
untrusted devices in software defined networking,” Journal of Parallel
and Distributed Computing, vol. 143, pp. 36–46, 2020.
[59] A. D. Carleton, E. Harper, J. E. Robert, M. H. Klein, D. De Niz,
E. Desautels, J. B. Goodenough, C. Holland, I. Ozkaya, and D. Schmidt,
“Architecting the future of software engineering: A national agenda
for software engineering research and development,” Carnegie-Mellow
University Pittsburgh, Tech. Rep., 2021.
[60] C. M. Kayanan, “A critique of innovation districts: Entrepreneurial living
and the burden of shouldering urban development,” Environment and
Planning A: Economy and Space, vol. 54, no. 1, pp. 50–66, 2022.
[61] M. Nystrom, “Web3 jobs: How to get a job in
crypto,” 2022. [Online]. Available: https://messari.io/article/
web3-jobs-how-to-get-a-job-in-crypto-updated-2022
[62] A. Yazdinejad, R. M. Parizi, A. Dehghantanha, and K.-K. R. Choo, “P4-
to-blockchain: A secure blockchain-enabled packet parser for software
defined networking,” Computers & Security, vol. 88, p. 101629, 2020.
[63] A. Yazdinejadna, R. M. Parizi, A. Dehghantanha, and M. S. Khan,
“A kangaroo-based intrusion detection system on software-defined net-
works,” Computer Networks, vol. 184, p. 107688, 2021.
[64] M. Berberich and M. Steiner, “Blockchain technology and the gdpr-how
to reconcile privacy and distributed ledgers,” European Data Protection
Law Review, vol. 2, p. 422, 2016.
[65] A. Yazdinejad, H. HaddadPajouh, A. Dehghantanha, R. M. Parizi,
G. Srivastava, and M. Y. Chen, “Cryptocurrency malware hunting:
A deep recurrent neural network approach,” Applied Soft Computing,
vol. 96, p. 106630, 2020.
[66] E. Zamani, Y. He, and M. Phillips, “On the security risks of the
blockchain,” Journal of Computer Information Systems, vol. 60, no. 6,
pp. 495–506, 2020.
[67] R. Lewis, J. McPartland, R. Ranjan et al., “Blockchain and financial
market innovation,” Economic Perspectives, vol. 41, no. 7, pp. 1–17,
2017.
[68] C. Stoll, L. Klaaßen, and U. Gallersdörfer, “The carbon footprint of
bitcoin,” Joule, vol. 3, no. 7, pp. 1647–1661, 2019.
[69] J. Fullerton, “Regenerative capitalism,” Capital Institute: Greenwich, CT,
USA, pp. 1–120, 2015.
[70] M. Thompson, C. Uz Bilgin, M. S. Tutwiler, M. Anteneh, J. C. Meija,
A. Wang, P. Tan, R. Eberhardt, D. Roy, and J. Perry, “Immersion
positively affects learning in virtual reality games compared to equally
interactive 2d games,” Information and Learning Sciences, vol. 122, no.
7-8, pp. 442–463, 2021.
[71] K. Roose, “An AI-generated picture won an art prize: artists aren’t
happy,” 2022. [Online]. Available: https://www.nytimes.com/2022/09/
02/technology/ai-artificial-intelligence-artists.html