Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
126 tokens/sec
GPT-4o
28 tokens/sec
Gemini 2.5 Pro Pro
42 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Privacy Computing Meets Metaverse: Necessity, Taxonomy and Challenges (2304.11643v2)

Published 23 Apr 2023 in cs.CR and cs.CY

Abstract: Metaverse, the core of the next-generation Internet, is a computer-generated holographic digital environment that simultaneously combines spatio-temporal, immersive, real-time, sustainable, interoperable, and data-sensitive characteristics. It cleverly blends the virtual and real worlds, allowing users to create, communicate, and transact in virtual form. With the rapid development of emerging technologies including augmented reality, virtual reality and blockchain, the metaverse system is becoming more and more sophisticated and widely used in various fields such as social, tourism, industry and economy. However, the high level of interaction with the real world also means a huge risk of privacy leakage both for individuals and enterprises, which has hindered the wide deployment of metaverse. Then, it is inevitable to apply privacy computing techniques in the framework of metaverse, which is a current research hotspot. In this paper, we conduct comprehensive research on the necessity, taxonomy and challenges when privacy computing meets metaverse. Specifically, we first introduce the underlying technologies and various applications of metaverse, on which we analyze the challenges of data usage in metaverse, especially data privacy. Next, we review and summarize state-of-the-art solutions based on federated learning, differential privacy, homomorphic encryption, and zero-knowledge proofs for different privacy problems in metaverse. Finally, we show the current security and privacy challenges in the development of metaverse and provide open directions for building a well-established privacy-preserving metaverse system. For easy access and reference, we integrate the related publications and their codes into a GitHub repository: https://github.com/6lyc/Awesome-Privacy-Computing-in-Metaverse.git.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (106)
  1. Deep learning with differential privacy, in: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp. 308–318.
  2. Digital twin applications in urban logistics: An overview. arXiv preprint arXiv:2302.00484 .
  3. The vanishing virtual: safeguarding heritage’s endangered digital record, in: New heritage. Routledge, pp. 43–55.
  4. A review of metaverse’s definitions, architecture, applications, challenges, issues, solutions, and future trends. IEEE Access 10, 125835–125866.
  5. Opus: Online patches and updates for security., in: USENIX Security Symposium, pp. 287–302.
  6. A survey of augmented reality. Presence: teleoperators & virtual environments 6, 355–385.
  7. Bringing data minimization to digital wallets at scale with general-purpose zero-knowledge proofs. arXiv preprint arXiv:2301.00823 .
  8. History of Virtual Reality. Springer International Publishing, Cham. pp. 1–9. URL: https://doi.org/10.1007/978-3-319-08234-9_169-1, doi:10.1007/978-3-319-08234-9_169-1.
  9. Botnets and internet of things security. Computer 50, 76–79.
  10. A privacy-preserving mechanism based on local differential privacy in edge computing. China Communications 17, 50–65.
  11. Shared virtual reality for design and management: the porta susa project. Automation in Construction 10, 217–228.
  12. Security patch management: Share the burden or share the damage? Management Science 54, 657–670.
  13. Metasecure: A passwordless authentication for the metaverse. arXiv e-prints , arXiv–2301.
  14. Differentially private empirical risk minimization. Journal of Machine Learning Research 12.
  15. A decentralized federated learning framework via committee mechanism with convergence guarantee. IEEE Transactions on Parallel and Distributed Systems 33, 4783–4800.
  16. Visual hide and seek, in: 2020 Conference on Artificial Life, ALIFE 2020, online, July 13-18, 2020, pp. 645–655.
  17. Federated learning based mobile edge computing for augmented reality applications, in: 2020 international conference on computing, networking and communications (ICNC), IEEE. pp. 767–773.
  18. Armor: A secure combinatorial auction for heterogeneous spectrum. IEEE Transactions on Mobile Computing 18, 2270–2284.
  19. Metaverse security and privacy: An overview, in: IEEE International Conference on Big Data, Big Data 2022, Osaka, Japan, December 17-20, 2022, pp. 2950–2959.
  20. Intel sgx explained. Cryptology ePrint Archive .
  21. Immersive virtual reality in the age of the metaverse: A hybrid-narrative review based on the technology affordance perspective. J. Strateg. Inf. Syst. 31, 101717. URL: https://doi.org/10.1016/j.jsis.2022.101717, doi:10.1016/j.jsis.2022.101717.
  22. Differential privacy, in: Automata, Languages and Programming: 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II 33, Springer. pp. 1–12.
  23. Differential privacy: A survey of results, in: International conference on theory and applications of models of computation, Springer. pp. 1–19.
  24. Calibrating noise to sensitivity in private data analysis, in: Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings 3, Springer. pp. 265–284.
  25. Community detection algorithm for mitigating eclipse attacks on blockchain-enabled metaverse, in: 2023 IEEE International Conference on Metaverse Computing, Networking and Applications (MetaCom), IEEE. pp. 403–407.
  26. Blockchain-based asset storage and service mechanism to metaverse universe: Metarepo. Transactions on Emerging Telecommunications Technologies 34, e4658.
  27. A qualitative research on the supportive components of pokemon go addiction. AJIT-e 8, 271.
  28. Privacy preserving machine learning with homomorphic encryption and federated learning. Future Internet 13, 94.
  29. A survey of blockchain and intelligent networking for the metaverse. IEEE Internet Things J. 10, 3587–3610. URL: https://doi.org/10.1109/JIOT.2022.3222521, doi:10.1109/JIOT.2022.3222521.
  30. A survey of blockchain: Techniques, applications, and challenges, in: 2018 27th international conference on computer communication and networks (ICCCN), IEEE. pp. 1–11.
  31. Fully homomorphic encryption using ideal lattices, in: Proceedings of the forty-first annual ACM symposium on Theory of computing, pp. 169–178.
  32. Fast data anonymization with low information loss, in: Proceedings of the 33rd international conference on Very large data bases, pp. 758–769.
  33. A framework for efficient data anonymization under privacy and accuracy constraints. ACM Transactions on Database Systems (TODS) 34, 1–47.
  34. Self-sovereign identity for trust and interoperability in the metaverse. arXiv preprint arXiv:2303.00422 .
  35. The knowledge complexity of interactive proof-systems, in: Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, pp. 203–225.
  36. The metaverse: Web 3.0 virtual cloud economies. Grayscale Research , 1–19.
  37. Digital twin: Mitigating unpredictable, undesirable emergent behavior in complex systems. Transdisciplinary perspectives on complex systems: New findings and approaches , 85–113.
  38. Blockmaze: An efficient privacy-preserving account-model blockchain based on zk-snarks. IEEE Transactions on Dependable and Secure Computing 19, 1446–1463.
  39. Virtual reality: Applications and implications for tourism. Tourism management 31, 637–651.
  40. Supporting participation in planning new roads by using virtual reality systems. Virtual Reality 11, 145–159.
  41. Dynamic defense strategy against advanced persistent threat with insiders, in: 2015 IEEE Conference on Computer Communications (INFOCOM), IEEE. pp. 747–755.
  42. Towards indistinguishable augmented reality: A survey on optical see-through head-mounted displays. ACM Computing Surveys (CSUR) 54, 1–36.
  43. Cooperative federated learning and model update verification in blockchain-empowered digital twin edge networks. IEEE Internet of Things Journal 9, 11154–11167.
  44. Blockchain-based federated learning for industrial metaverses: Incentive scheme with optimal aoi, in: 2022 IEEE International Conference on Blockchain (Blockchain), IEEE. pp. 71–78.
  45. Digital twins for ports: Derived from smart city and supply chain twinning experience. arXiv preprint arXiv:2301.10224 .
  46. Understanding emerging design practices for avatar systems in the commercial social vr ecology, in: Proceedings of the 2019 on Designing Interactive Systems Conference, pp. 241–252.
  47. Metaverse intrusion detection of wormhole attacks based on a novel statistical mechanism. Future Generation Computer Systems 143, 179–190.
  48. Cuteness as a ‘dark pattern’in home robots, in: 2019 14th ACM/IEEE International Conference on Human-Robot Interaction (HRI), IEEE. pp. 374–381.
  49. All one needs to know about metaverse: A complete survey on technological singularity, virtual ecosystem, and research agenda. arXiv preprint arXiv:2110.05352 .
  50. Interaction methods for smart glasses: A survey. IEEE access 6, 28712–28732.
  51. Privacy computing: Concept, computing framework and future development trends. IACR Cryptol. ePrint Arch. , 1145.
  52. When internet of things meets metaverse: Convergence of physical and cyber worlds. IEEE Internet of Things Journal 10, 4148–4173.
  53. Towards ubiquitous semantic metaverse: Challenges, approaches, and opportunities. IEEE Internet of Things Journal .
  54. A blockchain-based decentralized federated learning framework with committee consensus. IEEE Network 35, 234–241.
  55. Contrastive deep nonnegative matrix factorization for community detection. arXiv preprint arXiv:2311.02357 .
  56. Community-aware efficient graph contrastive learning via personalized self-training. arXiv preprint arXiv:2311.11073 .
  57. Clients collaborate: Flexible differentially private federated learning with guaranteed improvement of utility-privacy trade-off. arXiv preprint arXiv:2402.07002 .
  58. Realizing the metaverse with edge intelligence: A match made in heaven. IEEE Wireless Communications .
  59. Blockchain-aided secure semantic communication for ai-generated content in metaverse. arXiv preprint arXiv:2301.11289 .
  60. Extending on-chain trust to off-chain–trustworthy blockchain data collection using trusted execution environment (tee). IEEE Transactions on Computers 71, 3268–3280.
  61. Blocknet: Beyond reliable spatial digital twins to parallel metaverse. Patterns 3, 100468.
  62. Privacy-preserving federated learning based on multi-key homomorphic encryption. International Journal of Intelligent Systems 37, 5880–5901.
  63. Communication-efficient learning of deep networks from decentralized data, in: Artificial intelligence and statistics, PMLR. pp. 1273–1282.
  64. A taxonomy of mixed reality visual displays. IEICE TRANSACTIONS on Information and Systems 77, 1321–1329.
  65. Overview: Technology roadmap of the future trend of metaverse based on iot, blockchain, AI technique, and medical domain metaverse activity, in: 24th International Conference on Advanced Communication Technology, ICACT 2022, Pyeongchang, Korea, February 13-16, 2022, pp. 256–261.
  66. Virtual reality campuses as new educational metaverses. IEICE Trans. Inf. Syst. 106, 93–100. URL: https://doi.org/10.1587/transinf.2022eti0001, doi:10.1587/transinf.2022eti0001.
  67. Going incognito in the metaverse. arXiv preprint arXiv:2208.05604 .
  68. Paillier encryption and signature schemes.
  69. Metaverse: Security and privacy issues, in: 3rd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2021, Atlanta, GA, USA, December 13-15, 2021, pp. 281–288. URL: https://doi.org/10.1109/TPSISA52974.2021.00032, doi:10.1109/TPSISA52974.2021.00032.
  70. Demystifying arm trustzone: A comprehensive survey. ACM computing surveys (CSUR) 51, 1–36.
  71. Federated learning with homomorphic encryption. https://developer.nvidia.com/blog/federated-learning-with-homomorphic-encryption/.
  72. Role-based access using partial homomorphic encryption for securing cloud data. International Journal of System Assurance Engineering and Management , 1–17.
  73. A study on metaverse awareness, cyber risks, and steps for increased adoption. Int. J. Secur. Priv. Pervasive Comput. 14, 1–11.
  74. A descriptive study on metaverse: Cybersecurity risks, controls, and regulatory framework. Int. J. Secur. Priv. Pervasive Comput. 15, 1–14. URL: https://doi.org/10.4018/ijsppc.315591, doi:10.4018/ijsppc.315591.
  75. Performance-enhanced federated learning with differential privacy for internet of things. IEEE Internet of Things Journal 9, 24079–24094.
  76. Verifiable credentials data model v2.0. URL: https://w3c.github.io/vc-data-model/.
  77. Extended reality (xr: Vr/ar/mr), 3d printing, holography, ai, radiomics, and online vr tele-medicine for precision surgery, in: Surgery and Operating Room Innovation. Springer, pp. 65–70.
  78. Federated learning with bayesian differential privacy, in: 2019 IEEE International Conference on Big Data (IEEE BigData), Los Angeles, CA, USA, December 9-12, 2019, pp. 2587–2596. URL: https://doi.org/10.1109/BigData47090.2019.9005465, doi:10.1109/BigData47090.2019.9005465.
  79. A hybrid approach to privacy-preserving federated learning, in: Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, AISec@CCS 2019, London, UK, November 15, 2019, pp. 1–11. URL: https://doi.org/10.1145/3338501.3357370, doi:10.1145/3338501.3357370.
  80. Towards to an open and interoperable virtual learning enviroment using metaverse at university of panama. 2012 Technologies Applied to Electronics Teaching (TAEE) , 320–325.
  81. The EU General Data Protection Regulation (GDPR). URL: http://dx.doi.org/10.1007/978-3-319-57959-7, doi:10.1007/978-3-319-57959-7.
  82. Rise of the metaverse’s immersive virtual reality malware and the man-in-the-room attack & defenses. Computers & Security 127, 102923.
  83. Non-fungible token (nft): Overview, evaluation, opportunities and challenges. arXiv preprint arXiv:2105.07447 .
  84. A brief survey on secure multi-party computing in the presence of rational parties. J. Ambient Intell. Humaniz. Comput. 6, 807–824. URL: https://doi.org/10.1007/s12652-015-0299-2, doi:10.1007/s12652-015-0299-2.
  85. A survey on metaverse: Fundamentals, security, and privacy. IEEE Communications Surveys & Tutorials .
  86. A survey on metaverse: Fundamentals, security, and privacy. IEEE Commun. Surv. Tutorials 25, 319–352.
  87. Ldp-based social content protection for trending topic recommendation. IEEE Internet of Things Journal 8, 4353–4372.
  88. A privacy-preserving data aggregation scheme for fog/cloud-enhanced iot applications using a trusted execution environment, in: IEEE International Systems Conference, SysCon 2022, Montreal, QC, Canada, April 25-28, 2022, pp. 1–5. URL: https://doi.org/10.1109/SysCon53536.2022.9773838, doi:10.1109/SysCon53536.2022.9773838.
  89. From augmented reality location-based games to the real-world metaverse, in: Extended Abstracts of the Annual Symposium on Computer-Human Interaction in Play, CHI PLAY 2022, Bremen, Germany, November 2-5, 2022, pp. 364–366. URL: https://doi.org/10.1145/3505270.3558363, doi:10.1145/3505270.3558363.
  90. The research of medical metaverse application under the background of the normalization of the new crown epidemic, in: Metaverse - METAVERSE 2022 - 18th International Conference, Held as Part of the Services Conference Federation, SCF 2022, Honolulu, HI, USA, December 10-14, 2022, Proceedings, pp. 68–80.
  91. Unleashing the power of edge-cloud generative ai in mobile networks: A survey of aigc services. arXiv preprint arXiv:2303.16129 .
  92. A trustless architecture of blockchain-enabled metaverse. High-Confidence Computing 3, 100088.
  93. Metaverse space ecological scene design based on multimedia digital technology. Mobile Information Systems 2022.
  94. A secure authentication framework to guarantee the traceability of avatars in metaverse. arXiv preprint arXiv:2209.08893 .
  95. Federated machine learning: Concept and applications. ACM Transactions on Intelligent Systems and Technology (TIST) 10, 1–19.
  96. Fusing blockchain and ai with metaverse: A survey. IEEE Open Journal of the Computer Society 3, 122–136.
  97. Homomorphic encryption. Springer.
  98. Hfedms: Heterogeneous federated learning with memorable data semantics in industrial metaverse. arXiv preprint arXiv:2211.03300 .
  99. Batchcrypt: Efficient homomorphic encryption for cross-silo federated learning, in: Proceedings of the 2020 USENIX Annual Technical Conference (USENIX ATC 2020).
  100. Fedsens: A federated learning approach for smart health sensing with class imbalance in resource constrained edge computing, in: IEEE INFOCOM 2021-IEEE Conference on Computer Communications, IEEE. pp. 1–10.
  101. Privacy-preserving data aggregation for mobile crowdsensing with externality: An auction approach. IEEE/ACM Transactions on Networking 29, 1046–1059.
  102. Llakep: A low-latency authentication and key exchange protocol for energy internet of things in the metaverse era. Mathematics 10, 2545.
  103. Secure multi-party computation: theory, practice and applications. Information Sciences 476, 357–372.
  104. Federated learning with non-iid data. arXiv preprint arXiv:1806.00582 .
  105. Resource allocation of federated learning for the metaverse with mobile augmented reality. arXiv preprint arXiv:2211.08705 .
  106. Deep leakage from gradients. Advances in neural information processing systems 32.
Citations (12)

Summary

We haven't generated a summary for this paper yet.