Privacy computing meets metaverse: Necessity, taxonomy and challenges

被引:14
作者
Chen, Chuan [1 ]
Li, Yuecheng [1 ]
Wu, Zhenpeng [1 ]
Mai, Chengyuan [1 ]
Liu, Youming [1 ]
Hu, Yanming [1 ]
Kang, Jiawen [3 ]
Zheng, Zibin [2 ]
机构
[1] Sun Yat Sen Univ, Sch Comp Sci & Engn, GuangZhou, Peoples R China
[2] Sun Yat Sen Univ, Sch Software Engn, ZhuHai, Peoples R China
[3] Guangdong Univ Technol, Sch Automat, GuangZhou, Peoples R China
关键词
Metaverse; Data privacy; Privacy computing; Mobile edge computing; Blockchain; Extended reality; DIFFERENTIAL PRIVACY; VIRTUAL-REALITY; BLOCKCHAIN; MANAGEMENT; SECURITY;
D O I
10.1016/j.adhoc.2024.103457
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Metaverse, the core of the next -generation Internet, is a computer -generated holographic digital environment that simultaneously combines spatio-temporal, immersive, real-time, sustainable, interoperable, and datasensitive characteristics. It cleverly blends the virtual and real worlds, allowing users to create, communicate, and transact in virtual form. With the rapid development of emerging technologies including augmented reality, virtual reality and blockchain, the metaverse system is becoming more and more sophisticated and widely used in various fields such as social, tourism, industry and economy. However, the high level of interaction with the real world also means a huge risk of privacy leakage both for individuals and enterprises, which has hindered the wide deployment of metaverse. Then, it is inevitable to apply privacy computing techniques in the framework of metaverse, which is a current research hotspot. In this paper, we conduct comprehensive research on the necessity, taxonomy and challenges when privacy computing meets metaverse. Specifically, we first introduce the underlying technologies and various applications of metaverse, on which we analyze the challenges of data usage in metaverse, especially data privacy. Next, we review and summarize state-of-theart solutions based on federated learning, differential privacy, homomorphic encryption, and zero -knowledge proofs for different privacy problems in metaverse. Finally, we show the current security and privacy challenges in the development of metaverse and provide open directions for building a well -established privacy -preserving metaverse system. For easy access and reference, we integrate the related publications and their codes into a GitHub repository: https://github.com/6lyc/Awesome-Privacy-Computing-in-Metaverse.git.
引用
收藏
页数:13
相关论文
共 105 条
[1]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[2]  
Abouelrous A, 2023, Arxiv, DOI arXiv:2302.00484
[3]  
Addison A.C., 2007, New Heritage, P43
[4]   A Review of Metaverse's Definitions, Architecture, Applications, Challenges, Issues, Solutions, and Future Trends [J].
Al-Ghaili, Abbas M. ;
Kasim, Hairoladenan ;
Al-Hada, Naif Mohammed ;
Bin Hassan, Zainuddin ;
Othman, Marini ;
Tharik, Jakir Hussain ;
Kasmani, Rafiziana Md. ;
Shayea, Ibraheem .
IEEE ACCESS, 2022, 10 :125835-125866
[5]  
Altekar G, 2005, USENIX ASSOCIATION PROCEEDINGS OF THE 14TH USENIX SECURITY SYMPOSIUM, P287
[6]   A survey of augmented reality [J].
Azuma, RT .
PRESENCE-VIRTUAL AND AUGMENTED REALITY, 1997, 6 (04) :355-385
[7]  
Babel M., 2023, arXiv
[8]  
Berkman M.I., 2018, Encyclopedia of Computer Graphics and Games, DOI DOI 10.1007/978-3-319-08234-9_169-1
[9]   Botnets and Internet of Things Security [J].
Bertino, Elisa ;
Islam, Nayeem .
COMPUTER, 2017, 50 (02) :76-79
[10]  
Bi MN, 2020, CHINA COMMUN, V17, P50, DOI 10.23919/JCC.2020.09.005