Employing Blockchain, NFTs, and Digital Certificates for Unparalleled Authenticity and Data Protection in Source Code: A Systematic Review
Abstract
:1. Introduction
- Immutability and Security: Blockchain ensures that once a transaction is recorded, it cannot be altered, providing strong protection against plagiarism or unauthorized modifications.
- Decentralization: Eliminates the reliance on a single authority, reducing the risk of data manipulation or institutional biases in ownership claims.
- Transparent Ownership Records: NFTs allow for the creation of unique digital signatures, providing indisputable proof of authorship and ownership.
- Automated Smart Contracts: These enable streamlined licensing agreements and automatic enforcement of intellectual property rights without intermediaries.
- High Energy Consumption: Many blockchain networks require substantial computational power, raising concerns about sustainability and efficiency.
- Regulatory Uncertainty: The legal framework for blockchain-based intellectual property protection is still evolving, with varying acceptance across jurisdictions.
- Complexity and Cost: Implementing blockchain and NFTs requires technical expertise and may involve high transaction fees, making it less accessible for smaller institutions or individual students.
- Irreversible Transactions: While immutability is a strength, errors in ownership attribution or smart contracts can be difficult to correct.
- Code submission processes:
- b.
- Thesaurus in Systems Engineering:
- c.
- Definition of Source Code:
- d.
- Definition and Copyright of Source Code
- e.
- Digital Assets and Blockchain for Academic Protection
- f.
- NFTs as a Mechanism for Intellectual Property Protection
1.1. Discussion of Challenges and Limitations in the Study
- Technical Integration: The integration of Blockchain-based solutions with existing university IT infrastructures presents a significant challenge. Academic institutions rely on legacy systems that may not be fully compatible with newer blockchain-based applications, requiring a migration strategy that minimizes workflow disruptions. Furthermore, interoperability between different blockchain protocols and existing digital credentialing platforms must be ensured to facilitate seamless adoption. Recent studies suggest that hybrid architectures combining on-chain and off-chain storage can help address compatibility issues and improve performance in academic environments [24].
- Scalability and Performance: Blockchain networks face significant scalability limitations due to increasing transaction loads, particularly in environments with high volumes of student submissions and academic records. As the number of users and projects grows, transaction throughput and processing times may become bottlenecks, leading to inefficiencies [25]. Several approaches, such as sharing, off-chain computation (e.g., Layer 2 solutions), and Directed Acyclic Graphs (DAGs), have been proposed to enhance blockchain scalability in educational applications. Now, emerging technologies like rollups and sidechains also offer potential improvements by offloading computational tasks while maintaining security guarantees.As the number of users and projects increases, the scalability of the blockchain network is affected. The latency and processing issues can compromise system efficiency. Solutions such as sharding and off-chain computation have been proposed to mitigate these issues. Recent studies have shown that optimizing resource allocation in Internet of Things (IoT) networks through deep reinforcement learning techniques, such as the Deep Reinforcement Learning-based resource allocation approach, can significantly reduce latency and improve overall system performance [26]. This approach has been validated in wireless networks considering the network slicing paradigm, achieving minimization of information update times, and optimizing resource efficiency in decentralized networks.
- Security and Privacy Concerns: Ensuring the security and privacy of academic records is critical. While blockchain offers immutability and transparency, it also raises concerns regarding unauthorized data exposure and potential attacks on smart contracts. Zero-knowledge Proofs (ZKPs) and Trusted Execution Environments (TEEs) have been explored as viable methods to enhance security and privacy in blockchain-based academic credentialing. Additionally, quantum resistance remains a long-term concern, as advancements in quantum computing could compromise existing cryptographic schemes used in blockchain networks [27].
- User Adoption and Training: The technical nature of blockchain systems presents a steep learning curve for faculty and students unfamiliar with decentralized technologies. A lack of blockchain literacy could hinder adoption and effective utilization [28]. Therefore, user-friendly interfaces, comprehensive training programs, and educational resources are essential to facilitate widespread acceptance. Research has shown that gamified learning approaches and interactive tutorials can enhance blockchain adoption in academic settings [29].
1.2. Study Objectives and Motivation Behind Them
- RQ1: What is the distribution of papers across different years, focusing on Final Project, Degree, Copyright, Software, Digital Content, and University Internal Protection?
- RQ2: How are the chosen papers related to the proposed keywords concerning these topics?
- RQ3: Which of the papers explore Blockchain-based tokens and Cross-Chain (Smart Contract) as a review related to the academic setting?
- RQ4: Which papers explore non-fungible tokens, copyright, integrity, and software within academic and university contexts?
- RQ5: In the current landscape of Unique Assets of Digital Content, what constitutes the primary challenges that universities face regarding their internal protection processes?
- RQ6: What global standards are employed to safeguard the integrity and assets of digital content and media, especially in the context of educational institutions?
- RQ7: What types of NFTs are used to generate digital assets for content software and applications, and what methods and techniques are currently being utilized?
1.3. Contributions
- Synthesis of Existing Knowledge: To achieve this, we will perform a systematic review of the literature to provide a synthesis of the research studies in the field. Making this synthesis will give a clear connection on how both blockchain and NFTs can be applied to protect academic content. Further, we will describe the technical aspects and some of the ethical issues of their application in an academic context [30,31,32].
- Recommendations for Future Applications: From the identification of the project, recommendations on the future trend for the use of blockchain and NFTs in issues of intellectual property will be developed. This investigation will go outside the ivory tower’s research confines as a means of providing valuable information for other aspects of intellectual property management strategies [33,34].
- Practical Validation and Case Studies: We will look at examples of the adoption of blockchain and NFTs in academic institutions, including current use cases and pilots. This analysis would reveal the experiences of practical difficulties or achievements in the implementation of these technologies in the context of this study [37,38].
2. Materials and Methods
2.1. PRISMA
- Conducting a comprehensive and exhaustive review of the literature.
- Reducing bias in study selection.
- Increasing the transparency and reproducibility of the review.
- Facilitating the synthesis of available evidence.
- Define the research question: What are the best practices for software project management in the post-production phase?
- Identify relevant studies: Articles will be searched for in the following databases: IEEE Xplore, ACM Digital Library, ScienceDirect, and Scopus. The search terms will be: “Authenticity”, “Blockchain”, “Copyright”, “Data protection”, “Degree Works”, “Digital certificates”, “Digital Rights Management”, “Intellectual Property”, “Non-Fungible Tokens (NFTs)”, “Source code”, “Technological innovation”.
- Study selection: Studies that meet the following criteria will be selected:
- Published in a Q1 or Q2 journal
- Published in the last 10 years (2014–2024) to include recent advancements in blockchain and digital security.
- Written in English or Spanish to ensure accessibility and broad applicability.
- Directly relevant to the research question, specifically discussing blockchain, NFTs, and digital certificates in educational and intellectual property contexts.
- Data extraction: The following data will be extracted from the selected studies: Authors, Year of publication, Study title, Abstract, Methodology, Results, and Conclusions
- Data analysis: The data extracted from the different articles will be analyzed to identify the best practices for blockchain technology in educational environments.
- Presentation of results: The results of the review will be presented in an informative table and its respective analysis.
- Why PRISMA: The PRISMA methodology, designed for systematic reviews and meta-analyses, offers core principles that resonate strongly within this project’s context:
- Structured Literature Review: While this project involves system development, a PRISMA-inspired approach to the literature review would ensure a comprehensive and unbiased exploration of existing research. This includes using well-defined search terms in relevant databases, clear inclusion and exclusion criteria for studies, and a thorough analysis focused on security, intellectual property protection mechanisms, and educational applications of blockchain.
- Transparent Process: Documenting the literature search strategy, system design choices, and evaluation methods aligns with PRISMA’s emphasis on transparency. This allows others to understand the research process, assess its rigor, and potentially replicate the work.
- Focus on Evidence: PRISMA helps researchers move beyond subjective opinions and design a project that aims to generate concrete evidence. This can include data from security tests, insights from usability studies, and thematic analysis of feedback related to the system’s impact on academic integrity.
- Addressing Bias: Even in a single-institution project, biases can creep in when designing or choosing technological components. A PRISMA mindset encourages the researcher to actively consider potential biases in the literature they review, the architecture they propose, and their evaluation criteria.
- Credibility and Trustworthiness: A well-documented, evidence-based, and bias-aware approach strengthens the research findings. This is crucial when recommending potentially disruptive technology to a university’s stakeholders.
- Synthesis and Insights: PRISMA encourages researchers to move beyond just summarizing existing studies. It guides them toward identifying patterns, gaps, and areas ripe for innovation, making this project more likely to yield novel and useful solutions.
- Foundation for Future Research: A solid research foundation lays the groundwork for further exploration. The structured literature review can inform future meta-analyses, while the findings of this project might inspire replication studies at other universities.
2.2. Incorporation and Exclusion Parameters
- Direct Relevance to Education: Studies explicitly investigating blockchain and NFT applications for intellectual property protection within academic settings are prioritized. This focus on the educational context ensures the review captures research directly applicable to the project’s specific challenge.
- Technical Depth: Papers detailing technical implementations, architectural choices, NFT designs, and security mechanisms relevant to similar use cases are actively sought. These provide insight into the feasibility and potential design considerations for the proposed source code protection system.
- Usability and Adoption Analysis: Studies addressing the usability of blockchain-based systems for students and faculty, as well as potential integration challenges within university workflows, are considered vital. Practical insights into adoption barriers and facilitators contribute to the design of a solution tailored to the specific needs of the academic environment.
- Empirical Data and Case Studies: Papers presenting quantitative or qualitative evidence from pilot projects or implementations of similar systems are highly valued. Such data enable an assessment of the technology’s potential impact on deterring plagiarism and safeguarding intellectual property.
- Outdated Technologies: Studies primarily focused on superseded blockchain platforms or earlier NFT standards are excluded to maintain focus on cutting-edge and actively maintained technologies.
- Cryptocurrency Emphasis: Papers with a central emphasis on cryptocurrency applications are excluded, even while acknowledging their reliance on blockchain. This refinement concentrates research on the application of blockchain specifically for intellectual property protection.
- Focus on Relevant Educational Applications: While some studies may offer valuable insights, those focusing on the application of blockchain in areas unrelated to intellectual property and higher education, such as healthcare or supply chain management, are excluded unless they directly contribute transferable knowledge to the educational domain.
- Non-Academic Focus: Priority is placed on studies conducted within academic institutions or contexts. Papers primarily exploring commercial applications are excluded to ensure the review reflects the specific challenges and regulations of the university setting.
- Lack of Empirical Basis: Purely conceptual or speculative discussions without data-driven analysis are excluded. The review favors studies grounded in concrete system designs, experimental results, or reasoned arguments.
3. Results
Results Based on the Proposed Research Questions
- RQ1: What is the distribution of papers across different years?
- RQ2: How are the chosen papers related to the proposed keywords?
- Green Cluster: This cluster primarily includes terms such as network security, privacy, encryption, and authentication, which are fundamental to the secure implementation of blockchain in business and cybersecurity applications.
- Red Cluster: This group encompasses terms like digital assets, smart contracts, Ethereum, and NFTs, reflecting blockchain’s role in the digital economy, asset tokenization, and decentralized systems.
- Blue Cluster: This category focuses on the Internet of Things (IoT), consensus algorithms, and access control, highlighting the interplay between blockchain and automated digital ecosystems.
- Purple Cluster: This cluster includes open-source software and open systems, emphasizing collaboration and transparency in blockchain development.
- RQ3: Which papers explore non-fungible tokens, copyright, integrity, software, and multichain?
- RQ4: Which of the papers explores Blockchain-based tokens and Cross-Chain (Smart Contract) as a review related?
- RQ5: In the current landscape of Unique Asset of Digital content, what constitutes the primary challenges that Universities face regarding their internal protection processes?
- RQ6: What global standards are used to safeguard the integrity and assets of digital content and media?
- RQ7: What types of NFTs are used to generate digital assets for content software and applications, and what methods and techniques are currently being utilized?
4. Discussion
4.1. Integration of Hardware Security Modules (HSM) and Blockchain
4.2. Blockchain-Based Digital Rights Management (DRM)
4.3. Information-Sharing Platforms in the Scientific Community
4.4. Use of Non-Fungible Tokens (NFTs) in the Art Market
4.5. Education and Digital Competencies
4.6. Addressing Implementation Challenges in Blockchain and NFTs for Academic Integrity
- Institutional Integration and Scalability Solutions: One of the primary concerns is the technical complexity involved in integrating Blockchain with existing LMS and institutional repositories. To facilitate this process, hybrid architectures combining off-chain storage (e.g., IPFS) with on-chain verification can optimize performance while maintaining decentralization. Additionally, permissioned blockchains offer a scalable alternative, allowing universities to control access while benefiting from Blockchain’s security features.
- Enhancing Adoption through User-Centered Design: For Blockchain and NFTs to gain traction in academia, ease of use is critical. Implementing intuitive user interfaces within university portals will lower the barrier for faculty and students. Moreover, comprehensive training programs should be introduced to familiarize users with Blockchain-based certification systems. Gamification strategies, such as rewarding students with NFT-based certifications for academic achievements, can also boost engagement and drive widespread adoption.
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Chiba, K.; Ito, H. Sublinear Computation Paradigm: Constant-Time Algorithms and Sublinear Progressive Algorithms. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 2022, 105, 131–141. [Google Scholar] [CrossRef]
- Saimon, M.; Lavicza, Z.; Dana-Picard, T. Enhancing the 4Cs among College Students of a Communication Skills Course in Tanzania through a Project-Based Learning Model. Educ. Inf. Technol. 2023, 28, 6269–6285. [Google Scholar] [CrossRef] [PubMed]
- Han, S.; Nikou, S.; Ayele, W.Y. Digital Proctoring in Higher Education: A Systematic Literature Review. Int. J. Educ. Manag. 2024, 38, 265–285. [Google Scholar] [CrossRef]
- MIT. MIT Libraries: Copyright and Licensing. Available online: https://libraries.mit.edu/copyright/ (accessed on 14 August 2024).
- Stanford University. Software Intellectual Property. Available online: https://fairuse.stanford.edu/overview/faqs/software/ (accessed on 14 August 2024).
- Harvard University. Research Data Security & Safety. Available online: https://researchsupport.harvard.edu/research-data-security-and-safety (accessed on 14 August 2024).
- Cormen, T.H.; Leiserson, C.E.; Rivest, R.L.; Stein, C. Introduction to Algorithms, 3rd ed.; MIT Press: Cambridge, MA, USA, 2009. [Google Scholar]
- Massachusetts Institute of Technology. MIT License. Available online: https://memgraph.com/blog/what-is-mit-license (accessed on 14 August 2024).
- European Parliament and of the Council. Directive 2009/24/EC on the Legal Protection of Computer Programs and Their Licenses. Official Journal of the European Union, 23 April 2009. [Google Scholar]
- Lee, K.; Park, H. Copyright and Intellectual Property Law in East Asia. J. East Asian Stud. 2021, 15, 123–135. [Google Scholar]
- Direccion Nacional de Derechos de Autor. Guía Sobre Derechos de Autor en Colombia. Available online: https://www.derechodeautor.gov.co/es/guia-de-derecho-de-autor-para-creadores-y-usuarios (accessed on 14 August 2024).
- Stallman, R. Open Source Licensing: Ensuring Freedom in Digital Work. J. Softw. Freedom 2021, 7, 85–97. [Google Scholar]
- Kshetri, N.I. Digital Assets: Definition and Protection Strategies. J. Digit. Econ. 2023, 14, 25–35. [Google Scholar]
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 14 August 2024).
- Crosby, M.; Pattanayak, P.; Verma, S.; Kalyanaraman, V. Blockchain Technology: Beyond Bitcoin. Appl. Innov. Rev. 2016, 2, 6–19. [Google Scholar]
- Tapscott, A.; Tapscott, D. Blockchain Revolution: How the Technology Behind Bitcoin and Other Cryptocurrencies Is Changing the World; Penguin Random House: New York, NY, USA, 2018. [Google Scholar]
- Mougayar, K. The Business Blockchain: Promise, Practice, and the Application of the Next Internet Technology; John Wiley & Sons: Hoboken, NJ, USA, 2016. [Google Scholar]
- Garay, J.A.; Kiayias, A. The Blockchain Model of Cryptography and Security. In Advances in Cryptology—CRYPTO 2015; Springer: Berlin/Heidelberg, Germany, 2015; Volume 9216, pp. 116–140. [Google Scholar]
- Hackett, R.A. The Future of Digital Assets: Blockchain and Beyond. Harv. Bus. Rev. 2022, 94, 45–53. [Google Scholar]
- O’Reilly, D. NFTs and Intellectual Property. J. Blockchain Res. 2022, 9, 97–108. [Google Scholar]
- Alizadeh, A. Tokenizing Intellectual Property: The Case for NFTs in Academia. J. Digit. Asset Manag. 2023, 18, 67–79. [Google Scholar]
- Buterin, V. Proof of Stake: The Making of Ethereum and the Philosophy of Blockchains; Seven Stories: New York, NY, USA, 2022; Available online: https://books.google.com/books?hl=es&lr=&id=hWpVEAAAQBAJ&oi=fnd&pg=PT7&ots=DWhtVvvJmA&sig=pCWL1yOdYtmC4X0H4PqC3fk0CqA (accessed on 14 August 2024).
- Han, H.; Shiwakoti, R.K.; Jarvis, R.; Mordi, C.; Botchie, D. Accounting and Auditing with Blockchain Technology and Artificial Intelligence: A Literature Review. Int. J. Account. Inf. Syst. 2023, 48, 100598. [Google Scholar] [CrossRef]
- Guo, H.; Yu, X. A Survey on Blockchain Technology and Its Security. Blockchain Res. Appl. 2022, 3, 100067. [Google Scholar] [CrossRef]
- Zheng, Z.; Xie, S.; Dai, H.; Chen, X.; Wang, H. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends. Proc. IEEE 2021, 106, 667–684. [Google Scholar]
- Lopes, H.S.; Rocha, F.; Vieira, F.H. Deep Reinforcement Learning Based Resource Allocation Approach for Wireless Networks Considering Network Slicing Paradigm. J. Commun. Inf. Syst. 2023, 38, 21–33. [Google Scholar]
- Basu, S.; Karmakar, S.; Bera, D. Blockchain-based Secured Virtual Machine Image Monitor. In Proceedings of the 7th International Conference on Information Systems Security and Privacy (ICISSP 2021), Online, 11–13 February 2021. [Google Scholar]
- Mishra, A.; Karmakar, S.; Dutta, A.; Bose, A.; Mohapatro, M. Design and Deployment of IoT Enabled Blockchain-Based Resilient Supply-Chain Management System using Ethereum. Int. J. Comput. Digit. Syst. 2022, 12, 1029–1050. [Google Scholar] [CrossRef]
- Tanwar, V.; Ramkumar, K.R. An Analysis of Blockchain and NFT Technologies and Their Drawbacks. In Proceedings of the 2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC), Salem, India, 4–6 May 2023; IEEE: Piscataway, NJ, USA; pp. 1251–1259. [Google Scholar] [CrossRef]
- Wu, L.; Lu, W.; Peng, Z.; Webster, C. A Blockchain Non-Fungible Token-Enabled ‘Passport’ for Construction Waste Material Cross-Jurisdictional Trading. Autom. Constr. 2023, 149, 104783. [Google Scholar] [CrossRef]
- Ismail, S.; Reza, H.; Zadeh, H.K.; Vasefi, F. A Blockchain-Based IoT Security Solution Using Multichain. In Proceedings of the 2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC 2023), Las Vegas, NV, USA, 8–11 March 2023. [Google Scholar] [CrossRef]
- Ismailisufi, A.; Popovic, T.; Gligoric, N.; Radonjic, S.; Sandi, S. A Private Blockchain Implementation Using Multichain Open Source Platform. In Proceedings of the 2020 24th International Conference on Information Technology (IT 2020), Zabljak, Montenegro, 18–22 February 2020. [Google Scholar] [CrossRef]
- Koussema, R.A.; Haga, H. Highly Secure Residents Life Event Management System Based on Blockchain by Hyperledger Fabric. J. Comput. Commun. 2021, 9, 38–55. [Google Scholar] [CrossRef]
- Chen, Z.; Ding, W.; Xu, Y.; Tian, M.; Zhong, H. Fair Auctioning and Trading Framework for Cloud Virtual Machines Based on Blockchain. Comput. Commun. 2021, 171, 89–98. [Google Scholar] [CrossRef]
- Fekete, D.L.; Kiss, A. Toward Building Smart Contract-Based Higher Education Systems Using Zero-Knowledge Ethereum Virtual Machine. Electronics 2023, 12, 664. [Google Scholar] [CrossRef]
- Zichichi, M.; D’Angelo, G.; Ferretti, S.; Marzolla, M. Accountable Clouds Through Blockchain. IEEE Access 2023, 11, 48358–48374. [Google Scholar] [CrossRef]
- Ullah, F.; Al-Turjman, F. A Conceptual Framework for Blockchain Smart Contract Adoption to Manage Real Estate Deals in Smart Cities. Neural Comput. Appl. 2023, 35, 5033–5054. [Google Scholar] [CrossRef]
- Kumar, N.; Goel, V.; Ranjan, R.; Altuwairiqi, M.; Alyami, H.; Asakipaam, S.A. A Blockchain-Oriented Framework for Cloud-Assisted System to Countermeasure Phishing for Establishing Secure Smart City. Secur. Commun. Netw. 2023, 2023, 8168075. [Google Scholar] [CrossRef]
- Karagwal, S.; Tanwar, S.; Badotra, S.; Rana, A.; Jain, V. Blockchain for Internet of Things (IoT): Research Issues, Challenges, and Future Directions. In EAI/Springer Innovations in Communication and Computing; Springer: Cham, Switzerland, 2023; pp. 15–34. [Google Scholar] [CrossRef]
- Panduro-Ramirez, J.; Lourens, M.; Gehlot, A.; Singh, D.P.; Singh, Y.; Salunke, D.J. Blockchain Approach for Implementing Access Control in IoT. In Proceedings of the 2023 International Conference on Artificial Intelligence and Smart Communication (AISC), Greater Noida, India, 27–29 January 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 596–599. [Google Scholar] [CrossRef]
- Xu, H.; Liu, W.; Liu, X. Blockchain-Based Trust Auction for Dynamic Virtual Machine Provisioning and Allocation in Clouds. Wirel. Commun. Mob. Comput. 2021, 2021, 6639107. [Google Scholar] [CrossRef]
- Wang, S.; Wang, K.; Jia, L.; Yu, L.; Li, Z.; Sun, Y.; Li, J.; Zhou, J. Blockchain Smart Contract Virtual Machine Optimization Technology for Domain Name Systems. In Proceedings of the 2021 IEEE International Conference on Industrial Application of Artificial Intelligence (IAAI), Harbin, China, 24–26 December 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 445–451. [Google Scholar] [CrossRef]
- El Koshiry, A.; Eliwa, E.; El-Hafeez, T.A.; Shams, M.Y. Unlocking the power of blockchain in education: An overview of innovations and outcomes. Blockchain Res. Appl. 2023, 2023, 100165. [Google Scholar] [CrossRef]
- Kuznetsov, O.; Frontoni, E.; Kuznetsova, K.; Shevchuk, R.; Karpinski, M. NFT Technology for Enhanced Global Digital Registers: A Novel Approach to Tokenization. Future Internet 2024, 16, 252. [Google Scholar] [CrossRef]
- Wen, X. Application of Blockchain Technology in Copyright Protection of Digital Music Information. Int. J. Grid Util. Comput. 2023, 14, 136. [Google Scholar] [CrossRef]
- Amirta, R.; Deepika, M.S.; Franklin, R.G. Decentralized Access Control with Anonymous Authentication of Data Stored Using Blockchain. Res. J. Eng. Technol. 2020, 11, 10–14. [Google Scholar] [CrossRef]
- Yi, Y. Application of Blockchain Technology Based on Privacy Data Protection in RMB Internationalization Path. Mob. Inf. Syst. 2022, 2022, 1904593. [Google Scholar] [CrossRef]
- Riabi, I.; ben Ayed, H.K.; Zaghdoudi, B.; George, L. Blockchain-Based OAuth for IoT. In Proceedings of the 2021 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN 2021), Ottawa, ON, Canada, 23–25 November 2021. [Google Scholar] [CrossRef]
- Riaz, S.; Mushtaq, A.; Ibrar, H. Content Generation in Web 3.0 and Blockchain-Based Decentralized Social Networks: A Theoretical Adoption Framework. In Proceedings of the IEEE Region 10 Annual International Conference, Proceedings/TENCON, Hong Kong, China, 1–4 November 2022. [Google Scholar] [CrossRef]
- Kimura, K.; Imamura, M.; Omote, K. Cross-Referencing Scheme to Ensure NFT and Platform Linkage Unaffected by Forking. In Proceedings of the 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2023), Dubai, United Arab Emirates, 1–5 May 2023. [Google Scholar] [CrossRef]
- Chan, W.; Gai, K.; Yu, J.; Zhu, L. Blockchain-Assisted Self-Sovereign Identities on Education: A Survey. Blockchains 2025, 3, 3. [Google Scholar] [CrossRef]
- Lo, S.K.; Staples, M.; Xu, X. Modelling Schemes for Multi-Party Blockchain-Based Systems to Support Integrity Analysis. Blockchain Res. Appl. 2021, 2, 100024. [Google Scholar] [CrossRef]
- Bae, Y.S.; Park, Y.; Lee, S.M.; Seo, H.H.; Lee, H.; Ko, T.; Lee, E.; Park, S.M.; Yoon, H.-J. Development of Blockchain-Based Health Information Exchange Platform Using HL7 FHIR Standards: Usability Test. IEEE Access 2022, 10, 79264–79271. [Google Scholar] [CrossRef]
- Reegu, F.A.; Abas, H.; Gulzar, Y.; Xin, Q.; Alwan, A.A.; Jabbari, A.; Sonkamble, R.G.; Dziyauddin, R.A. Blockchain-Based Framework for Interoperable Electronic Health Records for an Improved Healthcare System. Sustainability 2023, 15, 6337. [Google Scholar] [CrossRef]
- Arcenegui, J.; Arjona, R.; Baturone, I. Secure Management of IoT Devices Based on Blockchain Non-Fungible Tokens and Physical Unclonable Functions. Lect. Notes Comput. Sci. 2020, 12418, 24–40. [Google Scholar] [CrossRef]
- Alkadi, O.; Moustafa, N.; Turnbull, B.; Choo, K.K.R. A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks. IEEE Internet Things J. 2021, 8, 9463–9472. [Google Scholar] [CrossRef]
- Guo, J.; Zhou, H.; Yang, L.; Chen, X. Research on Digital Copyright Blockchain Technology. In Proceedings of the 2020 3rd International Conference on Smart Blockchain, SmartBlock 2020, Zhengzhou, China, 23–25 October 2020. [Google Scholar] [CrossRef]
- Verma, M. The Study on Blockchain-Based Library Management and Its Characterization. Int. J. Trend Sci. Res. Dev. 2021, 5, 1147–1149. [Google Scholar]
- Lee, G. Legal Issues Related to Blockchain Technology—Examples from Korea. In Perspectives in Law, Business and Innovation; Springer: Singapore, 2020. [Google Scholar] [CrossRef]
- Song, Z.; Yu, Z.; Shang, W.; Li, Y.X. A Digital Copyright Protection Method Based on Blockchain. In Communications in Computer and Information Science; Springer: Singapore, 2021. [Google Scholar] [CrossRef]
- Patil, P.; Sangeetha, M.; Bhaskar, V. Blockchain for IoT Access Control, Security and Privacy: A Review. Wirel. Pers. Commun. 2021, 117, 1815–1834. [Google Scholar] [CrossRef]
- Shrestha, A.K.; Deters, R.; Vassileva, J. User-Controlled Privacy-Preserving User Profile Data Sharing Based on Blockchain. arXiv 2019, arXiv:1909.05028. [Google Scholar]
- Raj, A.; Kumar, A.; Sharma, V.; Rani, S.; Shanu, A.K. Enhancing Security Feature in Financial Transactions Using Multichain-Based Blockchain Technology. In Proceedings of the 4th International Conference on Intelligent Engineering and Management (ICIEM 2023), London, UK, 9–11 May 2023. [Google Scholar] [CrossRef]
- Li, X.; Luo, Q.; Yang, X.; Luo, N.; Xu, D.; Sun, C. Design and Implementation of Blockchain Hierarchical Supervision Model for Wheat Supply Chain. Nongye Jixie Xuebao/Trans. Chin. Soc. Agric. Mach. 2023, 54, 363–371. [Google Scholar] [CrossRef]
- Prata, D.N.; Araújo, H.X.; Santos, C. Blockchain Technology Applied to Education. Int. J. Adv. Eng. Res. Sci. 2019, 6, 295–298. [Google Scholar] [CrossRef]
- Meyliana; Surjandy; Fernando, E.; Widjaja, H.A.E.; Cassandra, C.; Tan, A.; Carolina, M.; Carolina, M. Blockchain Technology for Vehicle Maintenance Registration. In Proceedings of the 2021 International Conference on Information Management and Technology (ICIMTech 2021), Jakarta, Indonesia, 19–20 August 2021. [Google Scholar] [CrossRef]
- Prasad, N.B.L.V.; Pramodh, M.N.A.; Lalitha, R.V.S.; Kavitha, K.; Saritha, K. Tracking Industrial Assets Using Blockchain Technology. In Lecture Notes in Electrical Engineering; Springer: Singapore, 2022. [Google Scholar] [CrossRef]
- Huynh-The, T.; Gadekallu, T.R.; Wang, W.; Yenduri, G.; Ranaweera, P.; Pham, Q.; Benevides, D.; Liyanage, M. Blockchain for the metaverse: A Review. Future Gener. Comput. Syst. 2023, 143, 401–419. [Google Scholar] [CrossRef]
- Kim, C.G. A Study on Technology to Counter Copyright Infringement According to NFT Transaction Types. J. Semicond. Disp. Technol. 2021, 20, 187–191. [Google Scholar]
- Yang, W.; He, P.; Yang, Z.; Yi, X.; Chen, C. Digital Copyright Depository System Enhanced by Blockchain. In Proceedings of the 2020 International Conference on Culture-Oriented Science and Technology (ICCST 2020), Beijing, China, 28–31 October 2020. [Google Scholar] [CrossRef]
- Rafli, D.P.A.D. NFT Become a Copyright Solution. J. Digit. Law Policy 2022, 1, 87–96. [Google Scholar] [CrossRef]
- Altaf, A.; Iqbal, F.; Latif, R.; Yakubu, B.M.; Latif, S.; Samiullah, H. A Survey of Blockchain Technology: Architecture, Applied Domains, Platforms, and Security Threats. Soc. Sci. Comput. Rev. 2022, 41, 1941–1962. [Google Scholar] [CrossRef]
- Bamakan, M.; Nezhadsistani, N.; Bodaghi, O.; Qu, Q. A Decentralized Framework for Patents and Intellectual Property as NFT in Blockchain Networks. Comput. Math. Theor. Comput. Sci. 2021. [Google Scholar] [CrossRef]
- Qin, R.; Li, J.; Wang, X.; Zhu, J.; Yuan, Y.; Wang, F.Y. NFT: Blockchain-Based Non-Fungible Token and Applications. Chin. J. Intell. Sci. Technol. 2021, 3, 110–118. [Google Scholar] [CrossRef]
- Bellagarda, J.; Abu-Mahfouz, A.M. Connect2NFT: A Web-Based, Blockchain Enabled NFT Application with the Aim of Reducing Fraud and Ensuring Authenticated Social, Non-Human Verified Digital Identity. Mathematics 2022, 10, 3934. [Google Scholar] [CrossRef]
- Mazur, M. Non-Fungible Tokens (NFT). The Analysis of Risk and Return (31 October 2021). Available online: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3953535 (accessed on 14 August 2024). [CrossRef]
- Chen, C.; Huang, H.; Zhao, B.; Shu, D.; Wang, Y. The Research of AHP-Based Credit Rating System on a Blockchain Application. Electronics 2023, 12, 887. [Google Scholar] [CrossRef]
- Taherdoost, H. Non-Fungible Tokens (NFT): A Systematic Review. Information 2023, 14, 26. [Google Scholar] [CrossRef]
- Ko, K.; Jeong, T.; Woo, J.; Hong, J.W. Survey on Blockchain-Based Non-Fungible Tokens: History, Technologies, Standards, and Open Challenges. Int. J. Netw. Manag. 2024, 34, e2245. [Google Scholar] [CrossRef]
- Manzoor, A.; Samarin, M.; Mason, D.; Ylianttila, M. Scavenger Hunt: Utilization of Blockchain and IoT for a Location-Based Game. IEEE Access 2020, 8, 204863–204879. [Google Scholar] [CrossRef]
- Hong, S.; Noh, Y.; Hwang, J.; Park, C. Fabasset: Unique Digital Asset Management System for Hyperledger Fabric. In Proceedings of the International Conference on Distributed Computing Systems, Singapore, 29 November–1 December 2020. [Google Scholar] [CrossRef]
- Uribe, D.; Waters, G. Privacy Laws, Genomic Data, and Non-Fungible Tokens. J. Br. Blockchain Assoc. 2020, 3. [Google Scholar] [CrossRef]
- Grech, A.; Sood, I.; Ariño, L. Blockchain, Self-Sovereign Identity and Digital Credentials: Promise Versus Praxis in Education. Front. Blockchain 2021, 4, 616779. [Google Scholar] [CrossRef]
- Cantu, A.; Geng, J.; Rong, C. NFT as a Proof of Digital Ownership-Reward System Integrated to a Secure Distributed Computing Blockchain Framework. In Proceedings of the International Conference on Cloud Computing Technology and Science (CloudCom), Bangkok, Thailand, 13–16 December 2022. [Google Scholar] [CrossRef]
- Lendo, R.; Jacobus, A.; Mapaly, H.A. Rancang Bangun Aplikasi Perpustakaan Digital Berbasis Mobile Menggunakan Framework Flutter. J. Tek. Inform. 2023, 18, 353–362. [Google Scholar] [CrossRef]
- Moreaux, A.C.; Mitrea, M.P. Royalty-Friendly Digital Asset Exchanges on Blockchains. IEEE Access 2023, 11, 56235–56247. [Google Scholar] [CrossRef]
- Turchet, L.; Ngo, C.N. Blockchain-Based Internet of Musical Things. Blockchain Res. Appl. 2022, 3, 100083. [Google Scholar] [CrossRef]
- Cheung, A.; Keung, J. On the Scrutinization of the NFT Valuation Factors. In Proceedings of the Asia-Pacific Software Engineering Conference (APSEC), Virtual Event, 6–9 December 2022. [Google Scholar] [CrossRef]
- Kucheryaviy, O. System of Professional-Digital Competencies of a Teacher of a Higher Pedagogical Educational Institution. Sci. Pedagog. Educ. 2022, 2, 44–49. [Google Scholar] [CrossRef]
- Casillo, M.; Colace, F.; Gupta, B.B.; Lorusso, A.; Marongiu, F.; Santaniello, D. Blockchain and NFT: A Novel Approach to Support BIM and Architectural Design. In Proceedings of the 2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT 2022), Sakheer, Bahrain, 20–21 November 2022. [Google Scholar] [CrossRef]
- Martínez Luna, W.F.; Moreno Ballesteros, A.M.; Ruiz Dorantes, E.J. Linking a Digital Asset to an NFT—Technical and Legal Analysis. Laws 2024, 13, 59. [Google Scholar] [CrossRef]
- Ante, L. Non-Fungible Token (NFT) Markets on the Ethereum Blockchain: Temporal Development, Cointegration and Interrelations. SSRN Electron. J. 2021, 32, 1216–1234. [Google Scholar] [CrossRef]
- Wu, C.-H.; Liu, C.-Y. Educational Applications of Non-Fungible Token (NFT). Sustainability 2023, 15, 7. [Google Scholar] [CrossRef]
- Islam, M.M.; In, H.P. Decentralized Global Copyright System Based on Consortium Blockchain with Proof of Authority. IEEE Access 2023, 11, 43101–43115. [Google Scholar] [CrossRef]
- Qureshi, A.; Jiménez, D.M. Blockchain-Based Multimedia Content Protection: Review and Open Challenges. Appl. Sci. 2021, 11, 1. [Google Scholar] [CrossRef]
- Kaushik, A.; Malik, M. Securing the Transfer and Controlling the Piracy of Digital Files Using Blockchain. In Proceedings of the 2022 5th International Conference on Computational Intelligence and Communication Technologies (CCICT 2022), Sonepat, India, 8–9 July 2022. [Google Scholar] [CrossRef]
- Ante, L. The Non-Fungible Token (NFT) Market and Its Relationship with Bitcoin and Ethereum. SSRN Electron. J. 2021. [Google Scholar] [CrossRef]
- Zagidullin, D.R.; Pulyavina, N.S. The Prospects for the Development of Blockchain Technology in the NFT Format. Lizing 2021, 1, 40–44. [Google Scholar] [CrossRef]
- Rasolroveicy, M.; Fokaefs, M. Performance and Cost Evaluation of Public Blockchain: An NFT Marketplace Case Study. In Proceedings of the 2022 4th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), Paris, France, 27–30 September 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 79–86. [Google Scholar] [CrossRef]
- Sun, L.; Li, X.F.; Zhao, H.; Yu, B.; Zhou, T.; Li, X.R. NFT-Based Method for Assetization of Physical Assets on Blockchain. Zhejiang Daxue Xuebao (Gongxue Ban)/J. Zhejiang Univ. 2022, 56, 1900–1911. [Google Scholar] [CrossRef]
- Rudytsia, Y.; Bogdanova, N. UML Model of the Property Right Distribution Module Using NFT Fractionalization Based on Blockchain Technology. Int. Sci. J. Eng. Agric. 2022, 1, 98–109. [Google Scholar] [CrossRef]
- Gia, K.H.; Huong, L.H.; Vo, H.K.; Trong, P.N.; Dang, K.T.; Le Van, H.; Phu, L.V.C.; Quoc, D.N.T.; Tran, N.H.; The, A.N.; et al. Delivery Management System Based on Blockchain, Smart Contracts, and NFT: A Case Study in Vietnam. Int. J. Adv. Comput. Sci. Appl. 2023, 14. [Google Scholar] [CrossRef]
- Lee, Y.; Rathore, S.; Park, J.H.; Park, J.H. A Blockchain-Based Smart Home Gateway Architecture for Preventing Data Forgery. Hum.-Centric Comput. Inf. Sci. 2020, 10, 9. [Google Scholar] [CrossRef]
- Luan, B. On the Inheritance of National Music Culture in Colleges and Universities and the Reform and Innovation of Music Education in Colleges and Universities Under Blockchain Technology. In ACM International Conference Proceeding Series, Proceedings of the ICISCAE 2021: 2021 IEEE 4th International Conference on Information Systems and Computer Aided Education, Dalian, China, 24–26 September 2021; Association for Computing Machinery: New York, NY, USA, 2021. [Google Scholar] [CrossRef]
- Almajed, R.; Abualkishik, A.Z.; Ibrahim, A.; Mourad, N. Forecasting NFT Prices on Web3 Blockchain Using Machine Learning to Provide SAAS NFT Collectors. Fusion Pract. Appl. 2023, 10, 55–68. [Google Scholar] [CrossRef]
- Agudelo-Gonzalez, L.E.; Marta-Lazo, C.; Aguaded, I. Digital Competencies in the Journalism Curriculum: Case Analysis of a Central American University. Vivat Acad. 2022, 155, 297–317. [Google Scholar]
- Dowling, M. Is Non-Fungible Token Pricing Driven by Cryptocurrencies? Financ. Res. Lett. 2022, 44, 102097. [Google Scholar] [CrossRef]
- Mwanzu, A. Perceptions of Librarians on the Usefulness of DRM Technology in Protecting Against Copyright Violation. Libr. Philos. Pract. 2021, 2021, 5517. [Google Scholar]
- Sung, E.; Kwon, O.; Sohn, K. NFT Luxury Brand Marketing in the Metaverse: Leveraging Blockchain-Certified NFTs to Drive Consumer Behavior. Psychol. Mark. 2023, 40, 2306–2325. [Google Scholar] [CrossRef]
- Khan, P.W.; Byun, Y.C.; Park, N. A Data Verification System for CCTV Surveillance Cameras Using Blockchain Technology in Smart Cities. Electronics 2020, 9, 484. [Google Scholar] [CrossRef]
- Takahashi, H.; Lakhani, U. Voting Blockchain for High Security NFT. In Proceedings of the 2021 IEEE 10th Global Conference on Consumer Electronics (GCCE 2021), Kyoto, Japan, 12–15 October 2021. [Google Scholar] [CrossRef]
- Hari, M.K.; Agrawal, A.; Bhatia, R.; Bhatia, A.; Tiwari, K. T-PASS: A Blockchain-Based NFT Enabled Property Management and Exchange System. In Proceedings of the 2023 International Conference on Information Networking (ICOIN), Bangkok, Thailand, 11–14 January 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 140–145. [Google Scholar] [CrossRef]
- Wilson, K.B.; Karg, A.; Ghaderi, H. Prospecting Non-Fungible Tokens in the Digital Economy: Stakeholders and Ecosystem, Risk and Opportunity. Bus. Horiz. 2022, 65, 657–670. [Google Scholar] [CrossRef]
- Li, P. The Application of Blockchain and Cryptocurrency in Meta-Universe and NFT. BCP Bus. Manag. 2023, 44, 55–61. [Google Scholar] [CrossRef]
- Igarashi, T.; Kazuhiko, T.; Kobayashi, Y.; Kuno, H.; Diehl, E. Photrace: A Blockchain-Based Traceability System for Photographs on the Internet. In Proceedings of the 2021 IEEE International Conference on Blockchain, Blockchain 2021, Melbourne, Australia, 6–8 December 2021. [Google Scholar] [CrossRef]
- Cabrera-Gutierrez, A.J.; Castillo, E.; Escobar-Molero, A.; Alvarez-Bermejo, J.A.; Morales, D.P.; Parrilla, L. Integration of Hardware Security Modules and Permissioned Blockchain in Industrial IoT Networks. IEEE Access 2022, 10, 114331–114345. [Google Scholar] [CrossRef]
- Kräussl, R.; Tugnetti, A. Non-Fungible Tokens (NFTs): A Review of Pricing Determinants, Applications, and Opportunities. J. Econ. Surv. 2024, 38, 555–574. [Google Scholar] [CrossRef]
- Kholiavko, N.; Popelo, O.; Bazhenkov, I.; Shaposhnykova, I.; Sheremet, O. Information and Communication Technologies as a Tool of Strategy for Ensuring the Higher Education Adaptability to the Digital Economy Challenges. Int. J. Comput. Sci. Netw. Secur. 2021, 21, 187–195. [Google Scholar]
- Bamakan, S.M.H.; Nezhadsistani, N.; Bodaghi, O.; Qu, Q. Patents and Intellectual Property Assets as Non-Fungible Tokens: Key Technologies and Challenges. Sci. Rep. 2022, 12, 2178. [Google Scholar] [CrossRef]
- Far, S.B.; Bamakan, S.M.H.; Qu, Q.; Jiang, Q. A Review of Non-Fungible Tokens Applications in the Real-World and Metaverse. Procedia Comput. Sci. 2022, 214, 755–762. [Google Scholar] [CrossRef]
- Liu, C.; Zhang, X.; Chai, K.K.; Loo, J.; Chen, Y. A Survey on Blockchain-Enabled Smart Grids: Advances, Applications, and Challenges. IET Smart Cities 2021, 3, 56–78. [Google Scholar] [CrossRef]
- Jing, N.; Liu, Q.; Sugumaran, V. A Blockchain-Based Code Copyright Management System. Inf. Process. Manag. 2021, 58, 102518. [Google Scholar] [CrossRef]
- Ali, A.; Abideen, Z.U.; Ullah, K. SESCon: Secure Ethereum Smart Contracts by Vulnerable Patterns’ Detection. Secur. Commun. Netw. 2021, 2021, 2897565. [Google Scholar] [CrossRef]
- Hu, S. Improved Private Data Protection Scheme for Blockchain Smart Contracts. Int. J. Distrib. Sens. Netw. 2023, 2023, 5963039. [Google Scholar] [CrossRef]
- Barbosa, S.; Butler, R.; Pettey, C. A MultiChain-Based Homework Submission System. In Proceedings of the 2017 International Conference on Computational Science and Computational Intelligence (CSCI 2017), Las Vegas, NV, USA, 14–16 December 2017. [Google Scholar] [CrossRef]
- Naz, M.; Al-Zahrani, F.A.; Khalid, R.; Javaid, N.; Qamar, A.M.; Afzal, M.K.; Shafiq, M. A Secure Data Sharing Platform Using Blockchain and Interplanetary File System. Sustainability 2019, 11, 7054. [Google Scholar] [CrossRef]
- Chun, D. When the NFT Hype Settles, What Is Left Beyond Profile Pictures? A Critical Review on the Impact of Blockchain Technologies in the Art Market. Arts 2023, 12, 181. [Google Scholar] [CrossRef]
- Núñez-Gómez, C.; Garcia-Font, V. HyperNet: A Conditional k-Anonymous and Censorship Resistant Decentralized Hypermedia Architecture. Expert Syst. Appl. 2022, 208, 118079. [Google Scholar] [CrossRef]
- Zhang, Z.; Zhao, L. A Design of Digital Rights Management Mechanism Based on Blockchain Technology. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer: Cham, Switzerland, 2018. [Google Scholar] [CrossRef]
- Muthaiyah, S.; Phang, K.; Sembakutti, S. Bridging Skill Gaps and Creating Future-Ready Accounting and Finance Graduates: An Exploratory Study. F1000Research 2021, 10, 892. [Google Scholar] [CrossRef]
- Kumar, A.; Gupta, A.; Sanagavarapu, L.M.; Reddy, Y.R. An Approach to Open-Source Software License Management Using Blockchain-Based Smart Contracts. In ACM International Conference Proceeding Series, Proceedings of the ISEC 2022: 15th Innovations in Software Engineering Conference, Gandhinagar, India, 24–26 February 2022; Association for Computing Machinery: New York, NY, USA, 2022. [Google Scholar] [CrossRef]
- Liang, W.; Zhang, D.; Lei, X.; Tang, M.; Li, K.C.; Zomaya, A.Y. Circuit Copyright Blockchain: Blockchain-Based Homomorphic Encryption for IP Circuit Protection. IEEE Trans. Emerg. Top. Comput. 2021, 9, 1410–1420. [Google Scholar] [CrossRef]
- Chen, X.; Yang, A.; Weng, J.; Tong, Y.; Huang, C.; Li, T. A Blockchain-Based Copyright Protection Scheme with Proactive Defense. IEEE Trans. Serv. Comput. 2023, 16, 2316–2329. [Google Scholar] [CrossRef]
- Cai, Z. Usage of Deep Learning and Blockchain in Compilation and Copyright Protection of Digital Music. IEEE Access 2020, 8, 164144–164154. [Google Scholar] [CrossRef]
- Luo, L. Application of Blockchain Technology in Intellectual Property Protection. Math. Probl. Eng. 2022, 2022, 4641559. [Google Scholar] [CrossRef]
- Falco, G.; Siegel, J.E. Assuring Automotive Data and Software Integrity Employing Distributed Hash Tables and Blockchain: A Preprint. arXiv 2020, arXiv:2002.02780. [Google Scholar]
- Borandag, E. A Blockchain-Based Recycling Platform Using Image Processing, QR Codes, and IoT System. Sustainability 2023, 15, 6116. [Google Scholar] [CrossRef]
- Chen, C.; Li, Y.; Wu, Z.; Xu, M.; Wang, R.; Zheng, Z. Towards Reliable Utilization of AIGC: Blockchain-Empowered Ownership Verification Mechanism. IEEE Open J. Comput. Soc. 2023, 4, 326–337. [Google Scholar] [CrossRef]
- Ferro, E.; Saltarella, M.; Rotondi, D.; Giovanelli, M.; Corrias, G.; Moncada, R.; Cavallaro, A.; Favenza, A. Digital Assets Rights Management Through Smart Legal Contracts and Smart Contracts. Blockchain Res. Appl. 2023, 4, 100142. [Google Scholar] [CrossRef]
- Ma, Z.; Huang, W.; Gao, H. Secure DRM Scheme Based on Blockchain with High Credibility. Chin. J. Electron. 2018, 27, 1025–1036. [Google Scholar] [CrossRef]
- Zaidi, S.Y.A.; Shah, M.A.; Khattak, H.A.; Maple, C.; Rauf, H.T.; El-Sherbeeny, A.M.; El-Meligy, M.A. An Attribute-Based Access Control for IoT Using Blockchain and Smart Contracts. Sustainability 2021, 13, 10556. [Google Scholar] [CrossRef]
- Mentzer, K.; Price, J.; Powers, E.; Lavrenchuk, N. Examining the Hype Behind the Blockchain NFT Market. Issues Inf. Syst. 2022, 23, 15–29. [Google Scholar] [CrossRef]
- Jiang, Z.; Chen, K.; Wen, H.; Zheng, Z. Applying Blockchain-Based Method to Smart Contract Classification for CPS Applications. Digit. Commun. Netw. 2022, 8, 964–975. [Google Scholar] [CrossRef]
- ISO/IEC 21000-23:2022; Information Technology—Multimedia Framework (MPEG-21)—Part 23: Smart Contracts for Media. ISO: Geneva, Switzerland, 2022.
- Dev, A.; Shaji Gomez, K.; Mathew, S.V. NON-Fungible Tokens (NFT): New Emerging Digital Asset. Int. J. Res. Eng. Sci. (IJRES) 2022, 10, 1–7. [Google Scholar]
Year | Number of Papers |
---|---|
2020 | 20 |
2021 | 35 |
2022 | 38 |
2023 | 38 |
2024 | 2 |
Work | Integrity | Copyright | Software | Digital Content/Asset | Non-Fungible Token |
---|---|---|---|---|---|
[1,2,3,23,24,25,27,29,33,45,46,47,48,49,50,51,52,53,54] | X | X | |||
[10,11,12,26,28,30,31,32,39,42,44,55,56,57,58,59,60,61,62,63,64,65,66,67] | X | X | X | ||
[13,34,36,38,40,41,43,68,69,70,71,72] | X | X | |||
[16,35,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89,90] | X | X | X | ||
[19,20,21,37,91,92,93,94,95,96] | X | X | X | ||
[97,98,99,100,101,102,103,104,105,106,107,108,109,110] | X | X | X | ||
[98,111,112] | X | X | X | X | |
[113,114,115,116,117,118,119,120] | X | X | X | X | |
[121,122,123,124,125,126,127,128,129,130] | X | X | X | ||
[95,131,132,133,134,135,136,137,138,139,140,141] | X | X | X | X |
Reference | Main Keywords | Contribution |
---|---|---|
[24] | Blockchain, consensus algorithm, risk, blockchain security | This article provides an in-depth review of blockchain technology, including its history, consensus algorithms, cryptographic details (public key cryptography, zero-knowledge proofs, and hash functions), and a comprehensive list of blockchain applications. In addition, it focuses on blockchain security, assessing security risks, analyzing real attacks and failures, and summarizing recent security measures. Finally, it presents the challenges and research trends to achieve more scalable and secure blockchain systems for massive deployments. |
[29] | Blockchain technology, Multichain, simulation method, tracing drug | This study implements simulations with blockchain technology to track medicines, involving the pharmaceutical industry, wholesalers, health services, and consumers. The main contribution is to improve traceability in the supply chain through a Decentralized Autonomous Organization (DAO) that organizes data and transactions in blockchain. The simulation demonstrates key features of blockchain such as transparency, immutability, and peer-to-peer transactions, strengthening control over drug distribution. |
[31] | Blockchain, digital transformation, food tracking and tracing, Multichain, private blockchain | In this article, the authors discussed the application of private blockchain using the Multichain open-source software that can be applied in agri-food products like food tracking and tracing, product life cycle, and anti-counterfeit. He points out that digital evolution enabled by disruptive technologies, including IoT, augmented reality, artificial intelligence, and blockchain, affects all spheres of human activity. Ever since blockchain was designed for cryptocurrencies, it has become a disruptor or an enabler of innovation in different sectors. |
[91] | NFTs, non-fungible token, minting, ethereum, copyright, infringement, blockchain | This article addresses transactions of intrinsically valuable assets in the digital world using Blockchain-based NFTs used in games, literature, art, and music. As various NFT exchanges emerge, copyright infringement issues also arise. The article classifies the types of copyright infringement that can occur in NFT exchanges and proposes countermeasures. Ten types of NFT exchanges are examined, and it is hoped that the proposed countermeasures will help revitalize the NFT market by providing solutions to these problems. |
[69] | NFTs, voting blockchain, escrow account | This paper proposes a secure blockchain architecture for NFTs that confirms transaction ownership and implements a secure payment method. NFTs, stored in a blockchain-based digital ledger, represent items such as photos, videos, audio, and other intellectual properties, certifying their uniqueness. The proposed architecture uses a transaction confirmation node called J Node to prevent errors in token transfer via an escrow account. |
[142] | Non-fungible tokens, digital identity, verifiable credentials, blockchain technology, smart contract; | This white paper addresses two key problems of NFTs: data storage security and breaches and fraud. It proposes a theoretical solution for storing digital assets underlying NFTs in a decentralized manner and presents “Connect2NFT”, an application that connects Twitter accounts with NFTs to verify owner authenticity. A performance analysis and comparison with similar applications is performed, contributing to improving security and authenticity in the NFTs space. |
[113] | Blockchain, elliptical cryptography, unique token, fractionalization, property right | In this study, authors outlined UML diagrams for the property rights distribution module through the fractal decomposition of NFTs, which are based on blockchain and conform to the ERC-1155 standard [78]. The blockchain, which is commonly used in the execution of operations in Bitcoin, helps in maintaining data and security without having a third party who is believed to be trustworthy. Implementation of this module creates the possibility of obtaining specific ownership fractions in decentralized applications by means of Ethereum cryptographic protocols. The objective is that, when creating new NFTs, a functionality should enable the fractalization and the sale of fractions to other people when guaranteeing security and meeting functionality requirements. |
[112] | Blockchain, non-fungible-token, analytic hierarchy process, credit rating, internet of things | This paper proposes a method to measure the credit rating of users in a blockchain traceability system, addressing the lack of efficient technologies to ensure the authenticity of data before it is stored in the blockchain. It analyzes trading processes and models in NFT markets and uses the analytic hierarchy process (AHP) to establish a credit rating system based on an evaluation matrix and efficiency coefficient. The experimental results show that this credit evaluation system can help judge the reputation of users and decide whether to restrict transactions of users with abnormal behaviors. |
[122] | Decentralized copyright, international copyright, cross-border copyright, copyright protection, consortium blockchain, proof of authority | This paper discusses an understanding of a novel copyright framework in global protection and international IP management using a consortium blockchain. By doing so, it enables copyright to be registered and traded internationally without the need for a universal cloud, with the use of a proof-of-authority consensus mechanism. Member countries also authenticate and settle transactions on the block chain while a tokenized payment is employed for the copyright fees. Based on some of the ideas above, a prototype was created and tested; some ideas were provided to help manage international copyrights. |
[133] | Copyright protection, blockchain, deep learning, data models, music, generative adversarial networks, mathematical model | Deep learning models as applied to music composition and music copyright protection using blockchain technology is the innovation described by this paper. A deep convolutional generative adversarial network (DCGAN) has been utilized to synthesize monophonic melodies in addition to a multi-instrumental arrangement model called MICA. Additionally, a new scheme known as Improved Byzantine Fault Tolerance (IPBFT) has been put forward to safeguard the copyrights of digital music. The performance analysis reveals that the DCGANs and MICA models are more accurate and perform better as compared to other models. The IPBFT-based system is more efficient, with a high throughput of 3469 transactions per second and a 0% error rate. |
[95] | Block-chain, digital copyright, algorithm, technology | This article investigates how blockchain technology, based on P2P networks and cryptography, can solve problems in the digital copyright industry: the confirmation, authorization, and maintenance of rights. Using blockchain’s self-monitoring, traceability, and decentralization features, as well as the Map function, this study improves the data transmission rate in a multi-channel model and significantly reduces the probability of digital copyright infringement. |
[57] | Blockchain, distributed hash tables, embedded systems, automotive networks | This paper proposes a software and data provenance mechanism for the automotive industry that ensures the integrity and reliability of vehicular software. Since automotive software is complex and security-critical, and updates can introduce risks, the proposed approach uses distributed hash tables (DHTs) and a public blockchain to ensure high security, scalability, and efficiency, thus protecting users, service providers, and original equipment manufacturers (OEMs) against software compromises and errors. |
[143] | Software protection, privacy distributed objects, services software, cryptographic controls, authentication, data encryption | In this article, the author provides a solution to the issue of software piracy and how to protect the copyrights through the implementation of what could be termed as decentralized software license validation system using blockchain technology and cryptocurrencies. The proposed method forms an environment where the privileges and rights of participants are observed. This has enhanced software protection since the 1970s, when the issue of license validation as the major solution to combat piracy came up. |
[70] | Blockchain, distributed ledger, blockchain-based library management, ethereum, bitcoin, peer-to-peer network | This paper presents a blockchain-based library management system to overcome problems in auditing and inventory of books, journals, and periodicals, despite automation with RFID. Blockchain technology provides transparent and immutable records, which improves auditing and inventory control in advanced libraries. The implementation of a library management system using smart contracts written in Solidity in Remix IDE is demonstrated. The article includes the smart contract source code and screenshots of the blockchain-based book management system. |
[115] | Smart contract system, non-fungible token, copyright | The problems addressed by this article are how, through NFTs, creators of art can easily register and sell their art through an implemented smart contract, which will mean that the ownership of the artwork can change hands with evidence of a verified digital certificate. It also looks at how NFTs are posted on marketplace galleries and offline galleries. As for the advantages and disadvantages of applying NFTs for copyright protection, the former include the legal genuineness of applying NFTs to the protection of copyrights, considering that NFTs are still a relatively young, unheard-of technology. |
[61] | Blockchain, Multichain, decentralization, privacy, data sharing | This article presents a decentralized data-sharing architecture using the MultiChain blockchain, applied to the travel industry and adaptable to other domains such as education, health, and sports. The solution enables companies in the travel industry, such as travel agencies, hotels, and shopping malls, to share user profile data in a secure and controlled manner. A hotel booking service is used as an example, where users decide what data to share, ensuring privacy and control. The data are converted into an open format and shared across the blockchain for easy integration with other nodes. This paper evaluates the performance of the model by measuring latency and memory consumption in three test scenarios, showing fast responses in all cases. |
[62] | Fin-Tech, blockchain, distributed ledger technologies (DLT), cryptography, equity market, integrity | This article develops a complex of reforms in financial transactions based on the decentralized application of the blockchain model, demonstrating the possibility of increasing the reliability of financial transactions in such spheres as Fin-Tech, Medicare, hospitality, manufacturing, and others. Applied to financial services, blockchain or distributed ledger technologies (DLT) ensure the integrity of records through cryptography to eliminate vices like money laundering. Major characteristics of those blockchains, including PoW and PoS, and their effects on the stock exchange, wealth management, payments and remittances, commerce, and insurance are highlighted in this article. |
[47] | Wheat products, traceability, authority-control, hierarchical supervision, blockchain, multi-chain | To cover the shortcomings of centralized monitoring and privacy leakage in agricultural traceability systems, this paper proposes a hierarchical monitoring model of the wheat supply chain based on blockchain and Hyperledger Fabric. The model guarantees the availability and clarity of the data and strict control of private data, with their protection through encryption and the possibility of access control in terms of shares. The results indicate high security levels, while the average latency times are 6.67 ms for public data and up to 37.78 ms for private data monitoring, where protection of privacy and data monitoring in real time is possible. |
[66] | Blockchain, asset traceability, data security, immutability | This article describes the possibilities of deploying blockchain in an organization’s supply chain and of sharing assets without formal permissions. The developed software application takes advantage of blockchain technology allowing it to provide more secure storage and immutable records for asset transfers that can either be public or private depending on the setting of the application. Data cannot be altered after entry and the push for accuracy means it will not require any manual check. |
[48] | Blockchain, smart contracts, Multichain, submission systems | This article covers a real-life case of redesigning a homework submission system based on the blockchain approach. Nonetheless, it was not a perfect match for blockchain, but it helped us to have some fun and discover some compelling features of this technology that can be used in a hard and familiar problem. It expanded the knowledge base about what blockchain could potentially solve, and what issues it could avoid. |
Reference | Contribution |
---|---|
[34] | This article proposes using blockchain to reduce costs and improve certification in higher education. It analyzes the prerequisites for decentralized education, suggesting a solution integrating zero-knowledge proofs (ZKP) with the Ethereum Virtual Machine (EVM). The improved system for managing academic documents complies with regulations such as GDPR and leverages smart contracts and a modular blockchain structure for enhanced security. |
[36] | This article presents a conceptual framework for implementing blockchain-based smart contracts in the real estate sector of smart cities. Through a literature review, it identifies ten key aspects and proposes a design using the EVM to manage these contracts. The solution improves the user experience and benefits property owners and real estate agents, aligning the sector with Industry 4.0. |
[41] | This article discusses centralization in the current Domain Name System (DNS) and proposes blockchain as a solution. The Ethereum Virtual Machine (EVM) supports a smart contract-based DNS to enhance governance, accelerate transactions, and improve domain name resolution. The study demonstrates a significant performance improvement in blockchain-based domain name management. |
[44] | This article explores how blockchain’s security and decentralization could transform multiple industries, with a focus on the financial sector. It also examines the growing trend of NFTs, unique digital assets linked to art, music, and other content. Additionally, it analyzes the negative impacts of blockchain and NFTs across industries such as IoT, banking, music, agriculture, and healthcare. |
[93] | This article examines the concepts, characteristics, and applications of NFTs in collectibles, crypto art, and gaming. It discusses issues such as property rights, valuation, and regulation. Additionally, it reviews relevant literature and suggests research directions on transaction models and NFT pricing. Finally, it explores the digitalization trend driven by NFTs. |
[97] | This article evaluates the evolution of NFTs and their future potential from a technological perspective, as they are still not well-documented in the scientific literature. It analyzes current limitations and highlights the need to enhance blockchain security and conduct further research in this field. |
[102] | This study explores how the metaverse merges the physical world with virtual reality, enabling trade and entertainment through avatars. NFTs, primarily used in gaming and art, have potential applications for real-world problem-solving. The research examines the role of blockchain and tokenization in the metaverse, their use cases, and challenges, encouraging further studies on their implementation. |
[114] | This article examines the rise of asset tokenization—covering stocks, funds, debt, and intellectual property—driven by decentralized finance. Blockchain enables converting physical or digital assets into NFTs and trading them via cryptocurrencies. While NFTs are mostly used in digital art and gaming, the article proposes their application in real estate management, presenting a detailed model for implementation. |
[45] | This article analyzes trends and challenges in using open-source software and ensuring compliance with licenses such as GPL, MIT, Apache, Mozilla, and BSD. It proposes using blockchain to enhance license management through modules like the Interplanetary File System (IPFS), smart contracts, and MetaMask to ensure legal, ethical, and security compliance. |
[138] | This article introduces an innovative framework for managing intellectual property rights (IPR) through blockchain-based smart contracts. Developed within the EU-funded MediaVerse project, the framework extends smart legal contracts to manage cloning, notarization, rights transfers, and revenue distribution. The goal is to enhance the monetization and protection of content creators’ rights. |
Reference | Challenges |
---|---|
[38] | This article highlights key challenges in merging blockchain with IoT, including data protection, privacy concerns, and the complexity of securing information across multiple devices. It discusses blockchain’s limitations, such as low throughput and block size constraints, as well as multichain integration issues. Decentralization also raises governance and regulatory concerns. Additionally, the long-term feasibility of blockchain–IoT integration, particularly regarding security, privacy, and efficiency, remains uncertain. |
[111] | This paper emphasizes the need for decentralized storage solutions and NFT-authenticated patents. It explores decentralized verification of patent authenticity and ownership, blockchain implementation challenges, and real-world applications in areas such as financing, biotechnology, and ticketing. It also outlines unresolved legal, compatibility, and scalability concerns related to NFTs in patent management. |
[56] | This article examines blockchain’s technological growth in smart grids, focusing on decentralization in billing, metering, and energy projects. It also discusses security threats, the Ethereum Virtual Machine (EVM), and smart contracts in this sector. By evaluating various protocols, it provides insights into their benefits and drawbacks, serving as a reference for developing a secure blockchain-based energy infrastructure. |
[134] | This paper explores how blockchain enhances digital copyright protection through decentralization, timestamping, and traceable records. It outlines the blockchain’s role in registering and verifying digital copyrights, monitoring transactions, and preserving evidence. The study also presents a blockchain-based system to detect copyright infringement and provide legal proof while reducing costs and improving efficiency. |
[135] | This article highlights problems in applying blockchain to multimedia copyright protection, including the lack of a systematic classification for applications and the limited number of successful implementations. It identifies gaps in the literature and technical barriers that hinder development. The study calls for further research to integrate technical and practical knowledge to enhance blockchain-based copyright protection. |
[136] | This article discusses legal issues in applying blockchain to copyright protection, such as determining whether content should be stored on-chain or off-chain, the legal status of intermediaries, and balancing blockchain’s immutability with copyright flexibility. It also examines trust in blockchain records, the legalization of cryptocurrency transactions, and the economic implications of blockchain-based copyright management. |
[46] | This article examines four critical issues in data protection and privacy within edge computing and blockchain: blockchain’s limitations in securing edge computing, the potential of a multi-chain master-slave system, integrating elliptic curve cryptography (ECC) with blockchain encryption, and managing user privileges. It also discusses the challenge of balancing low system overhead with high transaction rates. |
[64] | This paper identifies challenges in using private blockchain infrastructure for academic certificate storage. It discusses certificate forgery prevention via hashing, the cost-effectiveness of private blockchains like Multichain compared to public blockchains, and the need for a secure, transparent, and low-cost data storage system that is easy to maintain. |
[84] | This study details the development of a mobile digital library system that allows users to upload, borrow, read, and return books remotely. It employs digital protection techniques such as watermarking and content locking to prevent piracy and plagiarism. The article stresses the importance of implementing these techniques to safeguard digital assets and preserve electronic content. |
[86] | This article identifies key challenges in protecting digital assets in universities, such as the need for revised legal frameworks, the difficulty in maintaining viable business models for open content creators, and the lack of coherent policies for production, financing, and marketing. These issues threaten the sustainability of the Open Content Filmmaking (OCF) movement. |
[88] | This study explores the challenges of preparing future educators for the digital era, emphasizing the need to develop professional digital competencies aligned with teaching functions. It highlights the importance of integrating heuristic-digital, management-digital, and self-development-digital skills, along with digital security awareness, into higher education curricula to enhance educational digitization and data protection. |
[90] | The article discusses blockchain’s potential to protect educational resources, particularly in music education and digital learning. It identifies challenges in designing a suitable architecture for copyright protection, assessing real-world applicability, and addressing model weaknesses. It also highlights the need for reforms to integrate blockchain into university-level music education to combat piracy. |
[105] | Based on a case study at Universidad Centroamericana José Simón Cañas, this article outlines difficulties in developing digital competencies in social communication programs. These challenges include a lack of deep understanding of digital skills, limited environments for critical digital learning, and the absence of copyright and cybersecurity content in curricula, which impacts digital literacy. |
[107] | This article analyzes digital rights management (DRM) systems in libraries, highlighting their role in copyright enforcement but also their limitations. It points out that DRM restricts content sharing and access while failing to prevent unauthorized downloads of e-books and e-journals. The study calls for better government policies to regulate copyright and fair use in digital libraries. |
[109] | This article examines legal and regulatory challenges in protecting rights within Initial Coin Offerings (ICOs). Key risks include applying traditional intellectual property laws to ICOs, preventing money laundering, and ensuring personal data protection. It emphasizes the need for new regulations tailored to the evolving digital economy and blockchain-based financial systems. |
[117] | This study explores the impact of digitization on higher education institutions, focusing on IT security threats, personal data protection, and the need for strategic adaptation to the digital economy. It highlights the importance of integrating information and communication technologies (ICT) in universities and suggests measures to ensure their effective implementation. |
Reference | Description |
---|---|
[78] | This article explores barriers to NFT adoption, including usability issues that affect user experience and interoperability challenges limiting cross-platform functionality. Although NFT standards like ERC-721 and ERC-1155 [78] provide a foundation, the technology remains underdeveloped. Additionally, speculative market bubbles and the relative immaturity of NFTs compared to other technologies pose risks to their long-term stability. |
[81] | This article examines the legal requirements of the California Consumer Protection Act (CCPA) and the General Data Protection Regulation (GDPR) concerning genomic data and smart contracts, including NFTs. These laws impose strict regulations on data storage, access, and processing, creating challenges for blockchain-based solutions. The study highlights how smart contracts with “programmable privacy” can offer digital ownership and legal compliance, with the Genobank.io platform serving as an example of genomic data protection. |
[125] | This paper proposes a blockchain-powered data-sharing platform using the Interplanetary File System (IPFS) to improve trust, transparency, security, and immutability. Data are encrypted, divided into secret parts, and accessed via Solidity-based smart contracts. Users authenticate with RSA signatures and pay for content, while Ethereum blockchain and incentive mechanisms ensure security and owner authenticity. Testing on an Ethereum network shows improved computational efficiency using the Shamir Secret Sharing Scheme (SSS). |
[126] | This article examines challenges in the art market regarding NFT technology, offering insights from an art technology entrepreneur. Despite initial enthusiasm, NFT transactions have declined, and empirical research on blockchain in the art industry remains limited. The study compares NFT use cases to the traditional art market and discusses the work of the Art ID Standard consortium, which focuses on decentralized identity and blockchain applications for artists and collectors. |
[128] | This study presents a blockchain-based Digital Rights Management (DRM) system designed to enhance transparency and security by decentralizing license transactions. Smart contracts automate licensing, eliminating reliance on central servers. The system also enables flexible pricing models based on content usage rules. The paper’s main contribution is a blockchain-integrated licensing scheme that aligns with existing DRM standards for easier adoption by the industry. |
[129] | This research highlights the increasing role of blockchain and automation in accounting and finance training. It identifies a gap between technological advancements and course content, revealing that only 5% of required digital applications are explicitly taught. The study emphasizes the need for updated curricula to address digital transformation, as instructors remain largely unaware of the latest developments in FinTech and automation. |
[50] | This article reviews 18 blockchain-based solutions addressing electronic health record (EHR) interoperability challenges, including reliability, privacy, and standardization. The study follows a six-phase research process and discusses best practices, implementation models, and adoption barriers for blockchain in EHR management. It provides a comprehensive analysis of existing solutions and their potential for improving healthcare data sharing. |
[52] | This paper discusses HealthPocket, a blockchain-powered platform for secure health data exchange using a dynamic consent mechanism aligned with HL7 FHIR standards. Blockchain ensures data authenticity and security while enabling collaboration between medical institutions. By using standardized templates, HealthPocket facilitates seamless and tamper-proof health data sharing across global healthcare networks. |
[54] | This article explores blockchain’s potential to enhance digital identity and credentialing in education. It highlights governance, interoperability, and trust challenges that have limited blockchain adoption in educational processes. The study focuses on digital credentialing in Europe, emphasizing the importance of self-sovereign digital identity and infrastructure integrity for successful blockchain implementation in education. |
[83] | This paper proposes integrating Hardware Security Modules (HSM) with blockchain, particularly in public key cryptography, to enhance authenticity, authorization, and integrity. HSMs provide physical protection as a “root of trust” in decentralized systems. The study presents a proof-of-concept analysis, demonstrating that HSM integration improves security in industrial IoT systems, aligning with PKCS standards for decentralized content and asset protection. |
Reference | Title | Content |
---|---|---|
[103] | NFTs as a Proof of Digital Ownership-Reward System Integrated to a Secure Distributed Computing Blockchain Framework | This paper suggests an organizational infrastructure in the blockchain context using “Hyperledger Fabric” technology, through which companies can securely transmit and share information. One of the ways is embracing digital asset technology, which encodes data in NFTs to reduce the possibility of forgery. It uses smart contracts and adopts the IPFS decentralized storage system, with all components interfacing via a WEB application. The solution is feasible, manageable, and applicable to the development of new systems and processes in digital asset management. |
[85] | Royalty-Friendly Digital Asset Exchanges on Blockchains | This study addresses the automatic distribution of royalty payments associated with digital assets, especially NFTs. It proposes a marketplace-independent trading framework for royalty management, called RM-TLSC (Royalty Management Token-Level Smart Contract), which creates synergies between the token and smart contract paradigms, ensuring royalty management throughout the asset lifecycle. An open-source software implementation for the Ethereum blockchain is provided, and the generality of the approach is verified with a proof-of-concept for the Tezos blockchain. Effectiveness is demonstrated with a case study related to the ISO 21000-23 [144] media smart contract standard. |
[87] | On the Scrutinization of the NFTs Valuation Factors | This paper investigates the concept of software in relation to NFTs, with more emphasis on the inception and selling of NFTs based on the underpinning digital or tangible assets. What it specifically does is that it outlines a method for evaluating the value of an NFT and how best to anticipate its success. However, it points out that community and scarcity are dominating the valuation of NFTs and again dwells more on the relationship between factors and NFT prices. It also provides possible future research prospects within this field. |
[89] | Blockchain and NFTs: a Novel Approach to Support BIM and Architectural Design | This research focuses on the benefits of blockchain technology in the use of Building Information Modeling (BIM) system adopted in structural designing and construction project management. It explains how, and why, NFTs could be used to manage the provenance and ownership of relatively bespoke and precise digital goods—such as BIM models—represented by digital files. These NFTs help to solve questions related to copyright, as well as manage author’s and owner’s rights for numerous large projects; they also help with file certification. The findings of the study also show that incorporation of BIM with blockchain can enhance security and raise efficiency in the administration of digital assets in architectural, engineering, and construction projects through effective protection of copyright and sharing of information. |
[104] | Forecasting NFTs Prices on Web3 Blockchain Using Machine Learning to Provide SAAS NFTs Collectors | This study investigates NFTs, describing them as unique digital assets that may include art, video game goods, and entertainment collectibles. These NFTs are distinguished by their exclusivity and authenticity, backed by digital certificates. The paper introduces a Software as a Service (SAAS)-based system that uses Web3 blockchain technology to facilitate the management, security, and trading of these digital assets. This system enables unrestricted access and detailed analysis of NFTs. In addition, the study applies adaptive enhanced convolutional neural networks (AICNN) and a tree seed chaotic atom search optimization (TSC-ASO) algorithm to predict the prices of NFTs, demonstrating that this methodology is effective in generating accurate predictions about the future value of these assets. |
[106] | Is Non-Fungible Token Pricing Driven by Cryptocurrencies? | This study analyzes NFTs as the first application of blockchain technology to reach public prominence. NFTs are exchangeable rights to digital assets (images, music, videos, virtual creations) whose ownership is recorded in smart contracts on the blockchain. It is investigated whether the price of NFTs is related to that of cryptocurrencies. Through a spillover index, a limited volatility transmission between cryptocurrencies and NFTs is observed, while a wavelet coherence analysis shows a co-movement between the two markets. This suggests that the pricing behaviors of cryptocurrencies could help us to understand the pricing patterns of NFTs. However, the low volatility transmission indicates that NFTs could be considered an asset class with a low correlation with respect to cryptocurrencies. |
[108] | NFTs Luxury Brand Marketing in the Metaverse: Leveraging Blockchain-Certified NFTs to Drive Consumer Behavior | This paper explores how Industry 4.0 technology can increase the value of digital assets in the metaverse of luxury brands in the virtual marketplace to retain their brand image and target new customers. In this way, luxury brands can guarantee the process of marketing and shelter consumers’ digital properties with the help of blockchain-based NFTs’ ability to check assets’ originality. The study examines the consumer attitudes towards luxury NFTs in the metaverse and found out that the psychological evaluation aspects are the reason influencing the purchase of such products. Thus, the study expands the horizons of game theory and prospect theory while presenting arguments based on the psychological perception of the risks that result in failures/successes in purchasing (or not purchasing) luxury fashion NFT in global virtual markets. |
[110] | Non-Fungible Tokens (NFTs): A Review of Pricing Determinants, Applications and Opportunities | This work intends to examine the current and upcoming opportunities in the NFT market, with a special emphasis on price factors and applications. It looks at the status of the NFT markets, and the investors’ attitudes and expectations towards these products. It offers an overview and a comparative analysis of the financial and econometric models used in the literature regarding their predictive capabilities for valuing NFTs. This paper presents a conceptual model for the analysis of the formation of NFT prices and aims to reveal the value creation drivers behind these assets to explain investors’ behavior in the blockchain environment. |
[118] | Patents and Intellectual Property Assets as Non-Fungible Tokens; Key Technologies and Challenges | This paper investigates the role of NFTs in intellectual property, which is still a relatively uncharted terrain when it comes to NFTs as opposed to digital art, video games, and collectibles. However, with the rapid development of tokenization, through the token-like and non-tangible characteristics, NFTs have a chance to enhance the transparency and marketability of intangible assets like a patent. As part of the research, they proposed a conceptual framework for patents as NFTs and elaborated on the filing specifications for intellectual property assets as NFTs. Furthermore, it identifies new issues as well as future considerations towards NFT-based patents, providing the foundation and direction for companies to employ this technology in areas such as patenting, financing, and biotechnology. |
[119] | A Review of Non-fungible Tokens Applications in the Real-world and Metaverse | This research delves into the rise in popularity of NFTs, which were first introduced in 2017 utilizing blockchain technology and are now being increasingly utilized in both commercial and scholarly investigations. The paper examines the existing uses of NFTs and delves into their possibilities within the Metaverse, a blockchain technology that facilitates interactions with digital personas in a virtual realm. It elaborates on how NFTs can enhance identity management and rights to ownership of assets within the Metaverse, while also suggesting potential future applications in research and industry. |
[120,145] | Non-Fungible Tokens (NFTs): New Emerging Digital Asset | This article delves into the expanding realm of NFTs, which has seen growth in recent years. The concept originated from Ethereum, allowing for the creation of tokens with distinctive digital attributes tied to factors like age, rarity, and liquidity. As of May 2021, NFT sales have surpassed $34 million in value, capturing global interest for their lucrative investment potential. However, the NFT landscape is still nascent, with ongoing technological advancements and a need for comprehensive assessments. This document offers a look at NFT ecosystems, covering new approaches, potential risks and rewards, as well as technical elements like protocols and standards that are important features to consider in the digital asset space. It also includes an evaluation of safety measures and explores design concepts, along with the opportunities and hurdles involved in the NFT ecosystem, marking it as a pioneering analysis in this field. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ramirez Lopez, L.J.; Morillo Ledezma, G.G. Employing Blockchain, NFTs, and Digital Certificates for Unparalleled Authenticity and Data Protection in Source Code: A Systematic Review. Computers 2025, 14, 131. https://doi.org/10.3390/computers14040131
Ramirez Lopez LJ, Morillo Ledezma GG. Employing Blockchain, NFTs, and Digital Certificates for Unparalleled Authenticity and Data Protection in Source Code: A Systematic Review. Computers. 2025; 14(4):131. https://doi.org/10.3390/computers14040131
Chicago/Turabian StyleRamirez Lopez, Leonardo Juan, and Genesis Gabriela Morillo Ledezma. 2025. "Employing Blockchain, NFTs, and Digital Certificates for Unparalleled Authenticity and Data Protection in Source Code: A Systematic Review" Computers 14, no. 4: 131. https://doi.org/10.3390/computers14040131
APA StyleRamirez Lopez, L. J., & Morillo Ledezma, G. G. (2025). Employing Blockchain, NFTs, and Digital Certificates for Unparalleled Authenticity and Data Protection in Source Code: A Systematic Review. Computers, 14(4), 131. https://doi.org/10.3390/computers14040131