Digital identities in the metaverse: Privacy, security, and user authentication in virtual financial systems

被引:1
|
作者
Garg, Kapil [1 ]
机构
[1] Birla Inst Management Technol, Greater Noida 201306, Uttar Pradesh, India
关键词
Digital identities; metaverse; virtual financial system; digital finance; blockchain;
D O I
10.1142/S242478632442009X
中图分类号
F8 [财政、金融];
学科分类号
0202 ;
摘要
The advent of the metaverse has ushered in a new era of digital interaction, commerce, and finance. As users increasingly immerse themselves in virtual spaces, the need for robust digital identities becomes paramount. This study investigates the intricate interplay of privacy, security, and user authentication within the context of digital identities in the metaverse, with a particular focus on virtual financial systems. Employing a cross-case analysis method within the qualitative research paradigm, the study extensively examines real-world instances to extract valuable insights, identify challenges, and propose potential solutions in navigating this dynamic landscape. This approach allows for a comprehensive examination of overarching patterns and trends across case studies, revealing persistent challenges in digital identity management. The study delves into the complexities of pseudonymity in virtual engagement, emphasizing the crucial balance required for user trust and accountability. Furthermore, it uncovers commonalities in successful implementations, spotlighting the transformative role of blockchain technology, exemplified by IBM Blockchain World Wire, and the growing trend of biometric authentication, as seen in the FIDO use case. The successful cases examined demonstrate that a user-friendly experience and scalability are integral to the adoption of advanced security technologies. Industry leaders should take note of the global trends in digital transactions, emphasizing efficiency, transparency and cross-border security. Additionally, the study offers forward-looking insights with implications for future research and practice, advocating for continued exploration of the nuanced dynamics between user privacy, trust-building mechanisms and accountability in the ever-evolving metaverse landscape.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] User-empowered secure privacy-preserving authentication scheme for Digital Twin
    Patel, Chintan
    Pasikhani, Aryan
    Gope, Prosanta
    Clark, John
    COMPUTERS & SECURITY, 2024, 140
  • [22] A privacy and delegation-enhanced user authentication protocol for Portable Communication Systems
    Wang, Ren-Chiun
    Juang, Wen-Shenq
    Lei, Chin-Laung
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2010, 6 (03) : 183 - 190
  • [23] Unlocking Security for Comprehensive Electroencephalogram-Based User Authentication Systems
    Khalil, Adnan Elahi Khan
    Perez-Diaz, Jesus Arturo
    Cantoral-Ceballos, Jose Antonio
    Antelis, Javier M.
    Sensors, 2024, 24 (24)
  • [24] Statistical Basics for Testing and Security of Digital Systems for Identity Authentication
    Acken, John M.
    Nelson, Leslie E.
    IMETI 2008: INTERNATIONAL MULTI-CONFERENCE ON ENGINEERING AND TECHNOLOGICAL INNOVATION, VOL II, PROCEEDINGS, 2008, : 122 - +
  • [25] Privacy in Digital Identity Systems: Models, Assessment, and User Adoption
    Khatchatourov, Armen
    Laurent, Maryline
    Levallois-Barth, Claire
    ELECTRONIC GOVERNMENT (EGOV 2015), 2015, 9248 : 273 - 290
  • [26] Security Analysis and Improvement of a Privacy Authentication Scheme for Telecare Medical Information Systems
    Wu, Fan
    Xu, Lili
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (04)
  • [27] Security analysis and Improvement of a Privacy Authentication Scheme for Telecare Medical Information Systems
    Fan Wu
    Lili Xu
    Journal of Medical Systems, 2013, 37
  • [28] Security, Privacy, and Reliability in Digital Healthcare Systems Using Blockchain
    Ali, Aitizaz
    Rahim, Hasliza A.
    Pasha, Muhammad Fermi
    Dowsley, Rafael
    Masud, Mehedi
    Ali, Jehad
    Baz, Mohammed
    ELECTRONICS, 2021, 10 (16)
  • [29] Extended Chaotic-Map-Based User Authentication and Key Agreement for HIPAA Privacy/Security Regulations
    Hsieh, Yi-Pei
    Lee, Kuo-Chang
    Lee, Tian-Fu
    Su, Guo-Jun
    APPLIED SCIENCES-BASEL, 2022, 12 (11):
  • [30] On the Security of Two Remote User Authentication Schemes for Telecare Medical Information Systems
    Kee-Won Kim
    Jae-Dong Lee
    Journal of Medical Systems, 2014, 38