Skip to main content

Sustainable Framework for Metaverse Security and Privacy: Opportunities and Challenges

  • Conference paper
  • First Online:
International Conference on Cyber Security, Privacy and Networking (ICSPN 2022) (ICSPN 2021)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 599))

Included in the following conference series:

Abstract

A metaverse is a network of 3D virtual worlds focused on social connection. In futurism and science fiction, it is often described as a hypothetical iteration of the Internet as a single, universal virtual world that is facilitated by the use of virtual reality (VR) and augmented reality (AR) headsets. Many of the technologies that make up the metaverse’s building pieces are already in advanced stages of development. Many others, on the other hand, are still some years away from being practical. We start by looking at its establishments, then, at that point, continue on toward the clever protection and security issues raised by this new worldview. At last, we feature a portion of the sweeping yet consistent ramifications on an assortment of spaces. The discussed topics are privacy user profiling in the metaverse, user privacy, and countermeasures and security perspective with humans in and out of the loop, integrity, and authentication in the metaverse, Polarization and radicalization in a singleton world, distributed denial of service, device vulnerability, and data explosion and exploitation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wang, Y., Su, Z., Zhang, N., Liu, D., Xing, R., Luan, T. H., Shen, X.: A survey on metaverse: fundamentals, security, and privacy. arXiv Preprint (2022). arXiv:2203.02662

  2. Gupta, S., et al.: PHP-sensor: a prototype method to discover workflow violation and XSS vulnerabilities in PHP web applications. In: Proceedings of the 12th ACM International Conference on Computing Frontiers (CF ’15). Association for Computing Machinery, New York, NY, USA, Article 59, pp. 1–8 (2015). https://doi.org/10.1145/2742854.2745719

  3. Chopra, M., Singh, et al.: Analysis and prognosis of sustainable development goals using big data-based approach during COVID-19 pandemic. Sustain. Technol. Entrepreneurship 1(2), 100012 (2022)

    Google Scholar 

  4. Liu, Y., et al.: Survey on atrial fibrillation detection from a single-lead ECG wave for internet of medical things. Comput. Commun. 178, 245–258 (2021). ISSN: 0140-3664

    Google Scholar 

  5. Chopra, M., Singh, S.K., Sharma, A., Gill, S.S.: A comparative study of generative adversarial networks for text-to-image synthesis. Int. J. Softw. Sci. Comput. Intell. (IJSSCI) 14(1), 1–12 (2022)

    Article  Google Scholar 

  6. Sahoo, S.R., et al.: Security issues and challenges in online social networks (OSNs) based on user perspective. Comput. Cyber Secur. 591–606 (2018)

    Google Scholar 

  7. Singh, A., Singh, S.K., Mittal, A.: A review on dataset acquisition techniques in gesture recognition from Indian sign language, pp. 305–313. In: Advances in Data Computing, Communication and Security (2022)

    Google Scholar 

  8. Chopra, M., et al.: Predicting catastrophic events using machine learning models for natural language processing. In: Data Mining Approaches for Big Data and Sentiment Analysis in Social Media, pp. 223–243. IGI Global (2022)

    Google Scholar 

  9. Singh, I., Singh, S.K., Kumar, S., Aggarwal, K.: Dropout-VGG based convolutional neural network for traffic sign categorization. In: Congress on Intelligent Systems, pp. 247–261. Springer, Singapore (2022)

    Google Scholar 

  10. Singh, R., Rana, R., Singh, S.K.: Performance evaluation of VGG models in detection of wheat rust. Asian J. Comput. Sci. Technol. 7(3), 76–81 (2018)

    Article  MathSciNet  Google Scholar 

  11. Singh, S.K., Kaur, K., Aggrawal, A.: Emerging trends and limitations in technology and system of ubiquitous computing. Int. J. Adv. Res. Comput. Sci. 5(7) (2014)

    Google Scholar 

  12. Gupta, S., Singh, S.K., Jain, R.: Analysis and optimisation of various transmission issues in video streaming over Bluetooth. Int. J. Comput. Appl. 11(7), 44–48 (2010)

    Google Scholar 

  13. Chopra, M., Singh, S.K., Sharma, S., Mahto, D.: Impact and usability of artificial intelligence in manufacturing workflow to empower Industry 4.0 (2020)

    Google Scholar 

  14. Aggarwal, K., Singh, S.K., Chopra, M., Kumar, S.: Role of social media in the COVID- 19 pandemic: a literature review. In: Data Mining Approaches for Big Data and Sentiment Analysis in Social Media, pp. 91–115 (2022)

    Google Scholar 

  15. Gupta, A., Singh, S.K., Chopra, M., Gill, S.S.: An inquisitive prospect on the shift toward online media, before, during, and after the COVID-19 pandemic: a technological analysis. In: Advances in Data Computing. Communication and Security, pp. 229–238. Springer, Singapore (2022)

    Google Scholar 

  16. Singla, D., et al.: Evolving requirements of smart healthcare in cloud computing and MIoT. In: International Conference on Smart Systems and Advanced Computing (Syscom-2021) (2021)

    Google Scholar 

  17. Sharma, S.K., Singh, S.K., Panja, S.C.: Human factors of vehicle automation. In: Autonomous Driving and Advanced Driver-Assistance Systems (ADAS), pp. 335–358. CRC Press (2021)

    Google Scholar 

  18. Singh, S.K., Kaur, K., Aggarwal, A., Verma, D.: Achieving High Performance Distributed System: Using Grid Cluster and Cloud Computing. Int. J. Eng. Res. Appl. 5(2), 59–67 (2015)

    Google Scholar 

  19. Nedjah, N., et al.: Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities. In: Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities 1030 (2022)

    Google Scholar 

  20. Gupta, A., Singh, S.K., Gupta, A.: A novel smart transportation based framework interlinking the advancements in technology and system engineering. In: International Conference on Smart Systems and Advanced Computing (Syscom-2021) (2021)

    Google Scholar 

  21. Kumar, S., et al.: Evaluation of automatic parallelization algorithms to minimize speculative parallelism overheads: an experiment. J. Discrete Math. Sci. Crypt. 24(5), 1517–1528 (2021)

    MATH  Google Scholar 

  22. Singh, Singh, S.K., Singh R., Kumar, S.: Efficient loop unrolling factor prediction algorithm using machine learning models. In: 2022 3rd International Conference for Emerging Technology (INCET), pp. 1–8 2022. https://doi.org/10.1109/INCET54531.2022.9825092

  23. Singh, S.K., Singh, R.K., Bhatia, M.S.: System level architectural synthesis and compilation technique in reconfigurable computing system. In: ESA 2010: Proceedings of the 2010 International Conference on Embedded Systems and Applications (Las Vegas NV, July 12–15, 2010), pp. 109–115 (2010)

    Google Scholar 

  24. Aggarwal, K., et al.: Deep learning in robotics for strengthening Industry 4.0.: opportunities, challenges and future directions. In: Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities, pp. 1–19 (2022)

    Google Scholar 

  25. Singh, S.K., Singh, R.K., Bhatia, M.P.S.: Design flow of reconfigurable embedded system architecture using LUTs/PLAs. In: 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, pp. 385–390. IEEE (2012)

    Google Scholar 

  26. Singh, S.K., Singh, R.K., Bhatia, M.P.S., Singh, S.P.: CAD for delay optimization of symmetrical FPGA architecture through hybrid LUTs/PLAs. In: Advances in Computing and Information Technology, pp. 581–591. Springer, Berlin, Heidelberg (2013)

    Google Scholar 

  27. Su, Z., Zhang, N., Liu, D., Luan, T.H., Shen, X.: A survey on metaverse: fundamentals, security, and privacy (2022)

    Google Scholar 

  28. Di Pietro, R., Cresci, S.: Metaverse: security and privacy issues. In 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), pp. 281–288. IEEE (2021)

    Google Scholar 

  29. Zhao, R., Zhang, Y., Zhu, Y., Lan, R., Hua, Z.: Metaverse: security and privacy concerns. arXiv Preprint (2022). arXiv:2203.03854

  30. Dionisio, J.D.N., III., W.G.B., Gilbert, R.: 3D virtual worlds and the metaverse: current status and future possibilities. ACM Comput. Surv. (CSUR) 45(3), 1–38 (2013)

    Google Scholar 

  31. Wang, F.Y., Qin, R., Wang, X., Hu, B.: Metasocieties in metaverse: metaeconomics and metamanagement for metaenterprises and metacities. IEEE Trans. Comput. Soc. Syst. 9(1), 2–7 (2022)

    Article  Google Scholar 

  32. Kemp, J., Livingstone, D.: Putting a second life “metaverse” skin on learning management systems. In: Proceedings of the Second Life education workshop at the Second Life community convention, vol. 20. The University of Paisle, CA, San Francisco (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manraj Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Singh, M., Singh, S.K., Kumar, S., Madan, U., Maan, T. (2023). Sustainable Framework for Metaverse Security and Privacy: Opportunities and Challenges. In: Nedjah, N., Martínez Pérez, G., Gupta, B.B. (eds) International Conference on Cyber Security, Privacy and Networking (ICSPN 2022). ICSPN 2021. Lecture Notes in Networks and Systems, vol 599. Springer, Cham. https://doi.org/10.1007/978-3-031-22018-0_30

Download citation

Publish with us

Policies and ethics