A Survey on Metaverse: Fundamentals, Security, and Privacy

被引:336
|
作者
Wang, Yuntao [1 ]
Su, Zhou [1 ]
Zhang, Ning [2 ]
Xing, Rui [1 ]
Liu, Dongxiao [3 ]
Luan, Tom H. [1 ]
Shen, Xuemin [3 ]
机构
[1] Xi An Jiao Tong Univ, Sch Cyber Sci & Engn, Xian 710049, Peoples R China
[2] Univ Windsor, Dept Elect & Comp Engn, Windsor, ON N9B 3P4, Canada
[3] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
来源
关键词
Metaverse; Security; Privacy; Artificial intelligence; Blockchains; Spatiotemporal phenomena; Scalability; security; privacy; distributed virtual worlds; extended reality; artificial intelligence; blockchain; SITUATIONAL AWARENESS; BLOCKCHAIN; NETWORKS; MANAGEMENT; FORENSICS; RESOURCE; INTERNET; SYSTEMS; SCHEME; MODEL;
D O I
10.1109/COMST.2022.3202047
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Metaverse, as an evolving paradigm of the next-generation Internet, aims to build a fully immersive, hyper spatiotemporal, and self-sustaining virtual shared space for humans to play, work, and socialize. Driven by recent advances in emerging technologies such as extended reality, artificial intelligence, and blockchain, metaverse is stepping from science fiction to an upcoming reality. However, severe privacy invasions and security breaches (inherited from underlying technologies or emerged in the new digital ecology) of metaverse can impede its wide deployment. At the same time, a series of fundamental challenges (e.g., scalability and interoperability) can arise in metaverse security provisioning owing to the intrinsic characteristics of metaverse, such as immersive realism, hyper spatiotemporality, sustainability, and heterogeneity. In this paper, we present a comprehensive survey of the fundamentals, security, and privacy of metaverse. Specifically, we first investigate a novel distributed metaverse architecture and its key characteristics with ternary-world interactions. Then, we discuss the security and privacy threats, present the critical challenges of metaverse systems, and review the state-of-the-art countermeasures. Finally, we draw open research directions for building future metaverse systems.
引用
收藏
页码:319 / 352
页数:34
相关论文
共 50 条
  • [21] A survey on indoor positioning security and privacy
    Sartayeva, Yerkezhan
    Chan, Henry C. B.
    [J]. COMPUTERS & SECURITY, 2023, 131
  • [22] Security and Privacy Issues: A Survey on FinTech
    Gai, Keke
    Qiu, Meikang
    Sun, Xiaotong
    Zhao, Hui
    [J]. SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 236 - 247
  • [23] Security and Privacy in Cloud Computing: A Survey
    Shankarwar, Mahesh U.
    Pawar, Ambika V.
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 1 - 11
  • [24] A Survey on Security and Privacy in Social Networks
    Jayaram, B.
    Jayakumar, C.
    [J]. COMPUTATIONAL VISION AND BIO-INSPIRED COMPUTING ( ICCVBIC 2021), 2022, 1420 : 807 - 822
  • [25] A survey on privacy and security of Internet of Things
    Ogonji, Mark Mbock
    Okeyo, George
    Wafula, Joseph Muliaro
    [J]. COMPUTER SCIENCE REVIEW, 2020, 38
  • [26] A Survey on Security and Privacy Issues of Bitcoin
    Conti, Mauro
    Kumar, E. Sandeep
    Lal, Chhagan
    Ruj, Sushmita
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04): : 3416 - 3452
  • [27] A brief survey on RFID privacy and security
    Aragones-Vilella, J.
    Martinez-Balleste, A.
    Solanas, A.
    [J]. WORLD CONGRESS ON ENGINEERING 2007, VOLS 1 AND 2, 2007, : 1488 - +
  • [28] RFID security and privacy: A research survey
    Juels, A
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) : 381 - 394
  • [29] Privacy Preserving and Data Security - A Survey
    Nagaraja, Arun
    Mangathayaru, N.
    Rajashekar, N.
    [J]. 2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,
  • [30] A Survey of Security and Privacy in Big Data
    Ye, Haina
    Cheng, Xinzhou
    Yuan, Mingqiang
    Xu, Lexi
    Gao, Jie
    Cheng, Chen
    [J]. 2016 16TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES (ISCIT), 2016, : 268 - 272