Review
PDF Zotero Mendeley EndNote BibTex Cite

Applying Digital Twins in Metaverse: User Interface, Security and Privacy Challenges

Year 2022, Volume 2, Issue 1, 8 - 15, 30.06.2022

Abstract

Digital Twins (DTs) are a conventional and well known concept, proposed in 70s, that are popular in a broad spectrum of sciences, industry innovations, and consortium alliances. However, in the last few years, the growth of digital assets and online communications has attracted attention to DTs as highly accurate twins of physical objects. Metaverse, as a digital world, is a concept proposed in 1992 and has also become a popular paradigm and hot topic in public where DTs can play critical roles. This study first presents definitions, applications, and general challenges of DT and Metaverse. It then offers a three-layer architecture linking the physical world to the Metaverse through a user interface. Further, it investigates the security and privacy challenges of using DTs in Metaverse. Finally, a conclusion, including possible solutions for mentioned challenges and future works, will be provided.

References

  • Garfinkel, S., Spafford, G., & Schwartz, A. (2003). Practical UNIX and Internet security. " O'Reilly Media, Inc."..
  • Pink, S. (2012). Visual ethnography and the internet. Advances in visual methodology, 113.
  • Thomas, P. J. (1999). Simulation of industrial processes for control engineers. Elsevier.
  • Tao, F., Zhang, H., Liu, A., & Nee, A. Y. (2018). Digital twin in industry: State-of-the-art. IEEE Transactions on Industrial Informatics, 15(4), 2405-2415, doi: 10.1109/TII.2018.2873186.
  • Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review, 21260.
  • Bhushan, B., Sinha, P., Sagayam, K. M., & Andrew, J. (2021). Untangling blockchain technology: A survey on state of the art, security threats, privacy services, applications and future research directions. Computers & Electrical Engineering, 90, 106897.
  • Damar, M. (2021). Metaverse Shape of Your Life for Future: A bibliometric snapshot. Journal of Metaverse, 1(1), 1-8.
  • Nalbant, K. G., & Uyanık, Ş. (2021). Computer Vision in the Metaverse. Journal of Metaverse, 1(1), 9-12.
  • MacCallum, K., & Parsons, D. (2019, September). Teacher perspectives on mobile augmented reality: The potential of metaverse for learning. In World Conference on Mobile and Contextual Learning (pp. 21-28). Retrieved February 11, 2022 from http- s://www.learntechlib.org/p/210597/
  • Khurana, A., Lohani, B. P., & Bibhu, V. (2019, April). AI Frame-Worked Virtual World Application-The Ramification of Virtual World on Real World. In 2019 International Conference on Automation, Computational and Technology Management (ICACTM) (pp. 582-585). IEEE. Doi: 10.1109/ICACTM.2019.8776724.
  • Merkle, R. C. (1987, August). A digital signature based on a conventional encryption function. In Conference on the theory and application of cryptographic techniques (pp. 369-378). Springer, Berlin, Heidelberg.
  • Sanka, A. I., Irfan, M., Huang, I., & Cheung, R. C. (2021). A survey of breakthrough in blockchain technology: Adoptions, applications, challenges and future research. Computer Communications, 169, 179-201. Doi: 10.1016/j.comcom.2020.12.028.
  • Mofokeng, N., & Fatima, T. (2018). Future tourism trends: Utilizing non-fungible tokens to aid wildlife conservation. African Journal of Hospitality, Tourism and Leisure, 7(4), 1-20.
  • Dowling, M. (2022). Is non-fungible token pricing driven by cryptocurrencies?. Finance Research Letters, 44, 102097. Doi:10.1016/j.frl.2021.102097.
  • Wang, Q., Li, R., Wang, Q., & Chen, S. (2021). Non-fungible token (NFT): Overview, evaluation, opportunities and challenges. arXiv preprint arXiv:2105.07447.
  • Ludlow, P., & Wallace, M. (2007). The Second Life Herald: The virtual tabloid that witnessed the dawn of the metaverse. MIT press.
  • Duan, H., Li, J., Fan, S., Lin, Z., Wu, X., & Cai, W. (2021, October). Metaverse for social good: A university campus prototype. In Proceedings of the 29th ACM International Conference on Multimedia (pp. 153-161).
  • Ning, H., Wang, H., Lin, Y., Wang, W., Dhelim, S., Farha, F., ... & Daneshmand, M. (2021). A Survey on Metaverse: the State-of-the-art, Technologies, Applications, and Challenges. arXiv preprint arXiv:2111.09673.
  • Yaqoob, I., Salah, K., Uddin, M., Jayaraman, R., Omar, M., & Imran, M. (2020). Blockchain for digital twins: Recent advances and future research challenges. IEEE Network, 34(5), 290-298. Doi: 10.1109/MNET.001.1900661.
  • Tao, F., & Qi, Q. (2019). Make more digital twins. Nature 573, 490-491. Doi: 10.1038/d41586-019-02849-1
  • ARasheed, A., San, O., & Kvamsdal, T. (2020). Digital twin: Values, challenges and enablers from a modeling perspective. IEEE Access, 8, 21980-22012. Doi: 10.1109/ACCESS.2020.2970143.
  • Fuller, A., Fan, Z., Day, C., & Barlow, C. (2020). Digital twin: Enabling technologies, challenges and open research. IEEE Access, 8, 108952-108971. Doi: 10.1109/ACCESS.2020.2998358.
  • Taherdoost, H., Chaeikar, S., Jafari, M., & Shojae Chaei Kar, N. (2013). Definitions and criteria of CIA security triangle in electronic voting system. International Journal of Advanced Computer Science and Information Technology (IJACSIT) Vol 1(1), 14-24. Available at SSRN: https://ssrn.com/abstract=2372782
  • Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of Things security: A survey. Journal of Network and Computer Applications, 88, 10-28. Doi: 10.1016/j.jnca.2017.04.002.
  • Zheleva, E., & Getoor, L. (2011). Privacy in social networks: A survey. In Social network data analytics (pp. 277-306). Springer, Boston, MA. Doi: 10.1007/978-1-4419-8462-3-10
  • Majeed, A., & Lee, S. (2020). Anonymization techniques for privacy preserving data publishing: A comprehensive survey. IEEE Access, 9, 8512-8545. Doi: 10.1109/ACCESS.2020.3045700.
  • Lin, C., He, D., Huang, X., Kumar, N., & Choo, K. K. R. (2020). BCPPA: A blockchain-based conditional privacy-preserving authentication protocol for vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 22(12), 7408-7420. Doi: 10.1109/TITS.2020.3002096.
  • Hatefi, Z., Bayat, M., Alaghband, M. R., Hamian, N., & Pournaghi, S. M. (2022). A conditional privacy-preserving fair electronic payment scheme based on blockchain without trusted third party. Journal of Ambient Intelligence and Humanized Computing, 1-14. Doi: 10.1007/s12652-021-03672-1
  • Banaeian Far, S., & Imani Rad, A. (2021). Distributed auditing protocol for blockchain‐based transactions using a distributed signature. Security and Privacy, 4(3), e156.
  • Banaeian Far, S., & Rajabzadeh Asaar, M. (2021). A blockchain-based quantum-secure reporting protocol. Peer-to-Peer Networking and Applications, 14(5), 2992-3011.
  • Miers, I., Garman, C., Green, M., & Rubin, A. D. (2013, May). Zerocoin: Anonymous distributed e-cash from bitcoin. In 2013 IEEE Symposium on Security and Privacy (pp. 397-411). IEEE, Doi: 10.1109/SP.2013.34.
  • Wang, J., Wu, L., Choo, K. K. R., & He, D. (2019). Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure. IEEE Transactions on Industrial Informatics, 16(3), 1984-1992. Doi: 10.1109/TII.2019.2936278.
  • Wang, H., Wang, Q., He, D., Li, Q., & Liu, Z. (2019). BBARS: Blockchain-based anonymous rewarding scheme for V2G networks. IEEE Internet of Things Journal, 6(2), 3676-3687. Doi: 10.1109/JIOT.2018.2890213.

Year 2022, Volume 2, Issue 1, 8 - 15, 30.06.2022

Abstract

References

  • Garfinkel, S., Spafford, G., & Schwartz, A. (2003). Practical UNIX and Internet security. " O'Reilly Media, Inc."..
  • Pink, S. (2012). Visual ethnography and the internet. Advances in visual methodology, 113.
  • Thomas, P. J. (1999). Simulation of industrial processes for control engineers. Elsevier.
  • Tao, F., Zhang, H., Liu, A., & Nee, A. Y. (2018). Digital twin in industry: State-of-the-art. IEEE Transactions on Industrial Informatics, 15(4), 2405-2415, doi: 10.1109/TII.2018.2873186.
  • Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review, 21260.
  • Bhushan, B., Sinha, P., Sagayam, K. M., & Andrew, J. (2021). Untangling blockchain technology: A survey on state of the art, security threats, privacy services, applications and future research directions. Computers & Electrical Engineering, 90, 106897.
  • Damar, M. (2021). Metaverse Shape of Your Life for Future: A bibliometric snapshot. Journal of Metaverse, 1(1), 1-8.
  • Nalbant, K. G., & Uyanık, Ş. (2021). Computer Vision in the Metaverse. Journal of Metaverse, 1(1), 9-12.
  • MacCallum, K., & Parsons, D. (2019, September). Teacher perspectives on mobile augmented reality: The potential of metaverse for learning. In World Conference on Mobile and Contextual Learning (pp. 21-28). Retrieved February 11, 2022 from http- s://www.learntechlib.org/p/210597/
  • Khurana, A., Lohani, B. P., & Bibhu, V. (2019, April). AI Frame-Worked Virtual World Application-The Ramification of Virtual World on Real World. In 2019 International Conference on Automation, Computational and Technology Management (ICACTM) (pp. 582-585). IEEE. Doi: 10.1109/ICACTM.2019.8776724.
  • Merkle, R. C. (1987, August). A digital signature based on a conventional encryption function. In Conference on the theory and application of cryptographic techniques (pp. 369-378). Springer, Berlin, Heidelberg.
  • Sanka, A. I., Irfan, M., Huang, I., & Cheung, R. C. (2021). A survey of breakthrough in blockchain technology: Adoptions, applications, challenges and future research. Computer Communications, 169, 179-201. Doi: 10.1016/j.comcom.2020.12.028.
  • Mofokeng, N., & Fatima, T. (2018). Future tourism trends: Utilizing non-fungible tokens to aid wildlife conservation. African Journal of Hospitality, Tourism and Leisure, 7(4), 1-20.
  • Dowling, M. (2022). Is non-fungible token pricing driven by cryptocurrencies?. Finance Research Letters, 44, 102097. Doi:10.1016/j.frl.2021.102097.
  • Wang, Q., Li, R., Wang, Q., & Chen, S. (2021). Non-fungible token (NFT): Overview, evaluation, opportunities and challenges. arXiv preprint arXiv:2105.07447.
  • Ludlow, P., & Wallace, M. (2007). The Second Life Herald: The virtual tabloid that witnessed the dawn of the metaverse. MIT press.
  • Duan, H., Li, J., Fan, S., Lin, Z., Wu, X., & Cai, W. (2021, October). Metaverse for social good: A university campus prototype. In Proceedings of the 29th ACM International Conference on Multimedia (pp. 153-161).
  • Ning, H., Wang, H., Lin, Y., Wang, W., Dhelim, S., Farha, F., ... & Daneshmand, M. (2021). A Survey on Metaverse: the State-of-the-art, Technologies, Applications, and Challenges. arXiv preprint arXiv:2111.09673.
  • Yaqoob, I., Salah, K., Uddin, M., Jayaraman, R., Omar, M., & Imran, M. (2020). Blockchain for digital twins: Recent advances and future research challenges. IEEE Network, 34(5), 290-298. Doi: 10.1109/MNET.001.1900661.
  • Tao, F., & Qi, Q. (2019). Make more digital twins. Nature 573, 490-491. Doi: 10.1038/d41586-019-02849-1
  • ARasheed, A., San, O., & Kvamsdal, T. (2020). Digital twin: Values, challenges and enablers from a modeling perspective. IEEE Access, 8, 21980-22012. Doi: 10.1109/ACCESS.2020.2970143.
  • Fuller, A., Fan, Z., Day, C., & Barlow, C. (2020). Digital twin: Enabling technologies, challenges and open research. IEEE Access, 8, 108952-108971. Doi: 10.1109/ACCESS.2020.2998358.
  • Taherdoost, H., Chaeikar, S., Jafari, M., & Shojae Chaei Kar, N. (2013). Definitions and criteria of CIA security triangle in electronic voting system. International Journal of Advanced Computer Science and Information Technology (IJACSIT) Vol 1(1), 14-24. Available at SSRN: https://ssrn.com/abstract=2372782
  • Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of Things security: A survey. Journal of Network and Computer Applications, 88, 10-28. Doi: 10.1016/j.jnca.2017.04.002.
  • Zheleva, E., & Getoor, L. (2011). Privacy in social networks: A survey. In Social network data analytics (pp. 277-306). Springer, Boston, MA. Doi: 10.1007/978-1-4419-8462-3-10
  • Majeed, A., & Lee, S. (2020). Anonymization techniques for privacy preserving data publishing: A comprehensive survey. IEEE Access, 9, 8512-8545. Doi: 10.1109/ACCESS.2020.3045700.
  • Lin, C., He, D., Huang, X., Kumar, N., & Choo, K. K. R. (2020). BCPPA: A blockchain-based conditional privacy-preserving authentication protocol for vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 22(12), 7408-7420. Doi: 10.1109/TITS.2020.3002096.
  • Hatefi, Z., Bayat, M., Alaghband, M. R., Hamian, N., & Pournaghi, S. M. (2022). A conditional privacy-preserving fair electronic payment scheme based on blockchain without trusted third party. Journal of Ambient Intelligence and Humanized Computing, 1-14. Doi: 10.1007/s12652-021-03672-1
  • Banaeian Far, S., & Imani Rad, A. (2021). Distributed auditing protocol for blockchain‐based transactions using a distributed signature. Security and Privacy, 4(3), e156.
  • Banaeian Far, S., & Rajabzadeh Asaar, M. (2021). A blockchain-based quantum-secure reporting protocol. Peer-to-Peer Networking and Applications, 14(5), 2992-3011.
  • Miers, I., Garman, C., Green, M., & Rubin, A. D. (2013, May). Zerocoin: Anonymous distributed e-cash from bitcoin. In 2013 IEEE Symposium on Security and Privacy (pp. 397-411). IEEE, Doi: 10.1109/SP.2013.34.
  • Wang, J., Wu, L., Choo, K. K. R., & He, D. (2019). Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure. IEEE Transactions on Industrial Informatics, 16(3), 1984-1992. Doi: 10.1109/TII.2019.2936278.
  • Wang, H., Wang, Q., He, D., Li, Q., & Liu, Z. (2019). BBARS: Blockchain-based anonymous rewarding scheme for V2G networks. IEEE Internet of Things Journal, 6(2), 3676-3687. Doi: 10.1109/JIOT.2018.2890213.

Details

Primary Language English
Subjects Computer Science, Information System
Journal Section Reviews
Authors

Saeed BANAEİAN FAR (Primary Author)
SRBIAU
0000-0003-2520-8492
Iran


Azadeh IMANİ RAD This is me
IAUSR
0000-0002-8532-9379
Iran

Early Pub Date March 17, 2022
Publication Date June 30, 2022
Application Date February 11, 2022
Acceptance Date March 31, 2022
Published in Issue Year 2022, Volume 2, Issue 1

Cite

APA Banaeian Far, S. & Imani Rad, A. (2022). Applying Digital Twins in Metaverse: User Interface, Security and Privacy Challenges . Journal of Metaverse , 2 (1) , 8-15 . Retrieved from https://dergipark.org.tr/en/pub/jmv/issue/67967/1072189