Skip to main content
Log in

Digital forensic investigation framework for the metaverse

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The Metaverse is currently becoming a massive technology platform and is considered to be the next significant development in global technology and business landscapes. The Metaverse is a digital platform that people can enter or transport virtual items with a device as a medium, implemented as virtual but very similar to the real world through the concept of the digital twin as used in smart cities. The Metaverse is currently in its infancy but is developing gradually. However, the potential threat of crime in this new world already has become a concern. As the Metaverse becomes more similar to the real world, the events that occur in it can affect the real world as well. Therefore, digital forensic research on the Metaverse is necessary to investigate crimes occurring in the Metaverse, such as money laundering, virtual burglaries, virtual theft, and fraud. In this paper, we present the conceptual architecture of the Metaverse and discuss what are termed metacrimes, crimes that may occur within the Metaverse, and address the need for research on digital forensic investigations of the Metaverse. Furthermore, we propose a Metaverse forensic framework for the first time; it consists of four phases based on the digital forensic guidance of NIST. These are data collection, examination and retrieval of evidence, analysis, and reporting. In the framework, we provide three different procedures in the data collection phase and examination phase by dividing them into three categories: user, service, and the Metaverse platform. Finally, we discuss the challenge of digital forensic investigations in the Metaverse from three standpoints: data possession, anti-forensics, and privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data availability

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. Thomas L (2022) Walmart is quietly preparing to enter the metaverse. https://www.cnbc.com/2022/01/16/walmart-is-quietly-preparing-to-enter-the-metaverse.html. Accessed Jan-31-2022

  2. Meta (2021) Founder’s Letter, 2021. https://about.fb.com/news/2021/10/founders-letter/. Accessed 31-01-2022

  3. Stephenson, N.: Snow crash: a novel (2003)

  4. Meta (2021) The metaverse and how we’ll build it together. http://youtube.com/watch?v=Uvufun6xer8. Accessed Jan-31-2022

  5. Leda A (2022) How the metaverse could impact the world and the future of technology. https://abcnews.go.com/Technology/metaverse-impact-world-future-technology/story?id=82519587. Accessed Jan-30-2022

  6. Satya N (2021) The metaverse is here. https://twitter.com/satyanadella/status/1455624165201887234. Accessed Jan-31-2022

  7. Tony P (2021) The seven rules of the metaverse. https://medium.com/meta-verses/the-seven-rules-of-the-metaverse-7d4e06fa864c. Accessed Jan-31-2022

  8. BBC News (2017) Artist ’vandalises’ snapchat’s AR balloon dog sculpture. https://www.bbc.com/news/technology-41524550. Accessed Jan-30-2022

  9. Sarah P (2018) Roblox responds to the hack that allowed a child’s avatar to be raped in its game. https://techcrunch.com/2018/07/18/roblox-responds-to-the-hack-that-allowed-a-childs-avatar-to-be-raped-in-its-game/. Accessed Jan-30-2022

  10. Gamespot (2020) Roblox accounts are being hacked to share trump propaganda. https://www.gamespot.com/articles/roblox-accounts-are-being-hacked-to-share-trump-pr/1100-6479311/. Accessed Jan-30-2022

  11. Kent K, Chevalier S, Grance T, Dang H (2006) Guide to integrating forensic techniques into incident response. NIST Special Publication 10(14):800–86

    Google Scholar 

  12. Real-time data analytics and the metaverse. https://www.nanalyze.com/2021/12/real-time-data-analytics-metaverse/. Accessed Feb-3-2022

  13. Schjølberg, S., Ghernaouti-Helie, S.: A global protocol on cybersecurity and cybercrime. Cybercrimelaw. net (2009)

  14. Krombholz K, Hobel H, Huber M, Weippl E (2015) Advanced social engineering attacks. J Inf Secur Appl 22:113–122

    Google Scholar 

  15. Falchuk B, Loeb S, Neff R (2018) The social metaverse: battle for privacy. IEEE Technol Soc Mag 37(2):52–61

    Article  Google Scholar 

  16. Laue, C.(2011): Crime potential of metaverses, pp 19–29

  17. Lodder, A.R.(2011)Conflict resolution in virtual worlds: general characteristics and the 2009 dutch convictions on virtual theft, pp 79–93

  18. Cavaliere L (2021) VOMA: The world’s First Entirely Online Art Museum. https://voma.space/about-us/. Accessed Apr-18-2022

  19. Google arts and culture (2021) A new way of experiencing art and culture. https://about.artsandculture.google.com//. Accessed Apr-18-2022

  20. Jordanoska A (2021) The exciting world of nfts: a consideration of regulatory and financial crime risks. Butterworths J Int Bank and Finac Law 10:716

    Google Scholar 

  21. Rebecca O (2022) Roblox: easy ways to get robux. https://www.thegamer.com/roblox-ways-to-get-robux/. Accessed Nov-23-2022

  22. Rishav D (2022) How to hack in Roblox 2022 for free and in easy steps? https://www.phoneswiki.com/how-to-hack-roblox/. Accessed Nov-23-2022

  23. Jung S, Seo S, Kim Y, Lee C (2021) Memory layout extraction and verification method for reliable physical memory acquisition. Electronics 10(12):1380

    Article  Google Scholar 

  24. Tran SDP, Seok B, Lee C (2020) Hanmre - an authenticated encryption secure against side-channel attacks for nonce-misuse and lightweight approaches. Appl Soft Comput 97:106663

    Article  Google Scholar 

  25. Seok B, Lee C (2019) Fast implementations of arx-based lightweight block ciphers (sparx, cham) on 32-bit processor. Int J Distrib Sens Netw 15(9):1550147719874180

    Article  Google Scholar 

  26. Ebert LC, Nguyen TT, Breitbeck R, Braun M, Thali MJ, Ross S (2014) The forensic holodeck: an immersive display for forensic crime scene reconstructions. Forensic Sci Med Pathol 10(4):623–626

    Article  Google Scholar 

  27. Dean T (2022) The ethics of the metaverse. https://venturebeat.com/2022/01/26/the-ethics-of-the-metaverse-2/. Accessed Apr-18-2022

  28. Davic B (2021) Ethical implications posed by the Metaverse. https://loupedin.blog/2021/12/ethical-implications-posed-by-the-metaverse/. Accessed Apr-18-2022

  29. The New York times (2020) F.B.I. asks apple to help unlock two iPhones. https://www.nytimes.com/2020/01/07/technology/apple-fbi-iphone-encryption.html. Accessed Feb-2-2022

  30. Nordvik R, Stoykova R, Franke K, Axelsson S, Toolan F (2021) Reliability validation for file system interpretation. Forensic Sci Int: Digital Invest 37:301174

    Google Scholar 

  31. Pietro RD, Cresci S (2021) Metaverse: Security and privacy issues. In: IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (IEEE TPS)

  32. Jeremy B (2021) Current and future xr risks include: the vast tracking of consumers and bystanders–including their sensitive information–manipulation and abuse of digital identities, cyberharassment, and more. In: Augmented Reality + Virtual Reality-Privacy & Autonomy Considerations in Emerging, Immersive Digital Worlds, pp. 15–21. Future of privacy forum

  33. Pfeuffer K, Geiger MJ, Prange S, Mecke L, Buschek D, Alt F (2019) Behavioural biometrics in vr: identifying people from body motion and relations in virtual reality. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, pp 1–12

  34. Zarepour E, Hosseini M, Kanhere SS, Sowmya A (2016) A context-based privacy preserving framework for wearable visual lifeloggers. In: 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), pp 1–4

  35. Reilly D, Salimian M, MacKay B, Mathiasen N, Edwards WK, Franz J (2014) Secspace: prototyping usable privacy and security for mixed reality collaborative environments. In: Proceedings of the 2014 ACM SIGCHI Symposium on Engineering Interactive Computing Systems, pp 273–282

Download references

Acknowledgements

This research was supported by the MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program(IITP-2022-2020-0-01797) supervised by the IITP(Institute for Information & Communications Technology Planning & Evaluation).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Changhoon Lee.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Seo, S., Seok, B. & Lee, C. Digital forensic investigation framework for the metaverse. J Supercomput 79, 9467–9485 (2023). https://doi.org/10.1007/s11227-023-05045-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-023-05045-1

Keywords

Navigation