Autors: Vladimirov, I. H., Nenova, M. V., Nikolova, D. V., Terneva, Z. A. Title: Security and Privacy Protection Obstacles with 3D Reconstructed Models of People in Applications and the Metaverse: A Survey Keywords: 3D Reconstructed Models, Security, Privacy Protection, Internet, MetaverseAbstract: In this scientific research, a survey of different security and privacy protection issues and flaws in the context of the reconstruction of 3D models of real people is made. The intent of this analysis the threats that a realistic digital clone AKA avatar of a person can have in the wrong hands. This paper will also offer different approaches that can be used in overcoming this privacy problem. References - Gunn, A., 2020, Living in A Digital World: The Causes and the Consequences, A Medium Corp., <https://medium.com/digital-society/living-in-a-digital-world-the-causes-and-the-consequences-4c5aca11b03a>, Дата на последен преглед (Last accessed on): 08.11.2022
- Prantosh, P., Aithal, P.S., 2018, Digital Society: Its Foundation and Towards an Interdisciplinary Field, Mangalore, India, 22 December 2018, <Online>,
- Montag, C. and Diefenbach, S., 2018, Towards Homo Digitalis: Important Research Issues for Psychology and the Neurosciences at the Dawn of the Internet of Things and the Digital Society, Sustainability, Volume 10(2), pp. p.415
- Grider, D., Maximo, M., 2021, The Metaverse: Web 3.0 Virtual Cloud Economies, Online, Grayscale Company Research
- Moy, C., Gadgil, A., 2022, Opportunities in the Metaverse: How Businesses Can Explore the Metaverse and Navigate the Hype Vs. Reality, Onyx by J. P. Morgan Company, <https://www.jpmorgan.com/content/dam/jpm/treasury-services/documents/opportunities-in-the-metaverse.pdf>, Дата на последен преглед (Last accessed on): 08.11.2022
- Sahmim, S., Gharsellaoui, H., 2017, Privacy and security in internetbased computing: Cloud computing, internet of things, cloud of things: A review, Marseille, France, 6-8 September 2017, <Procedia Computer Science open access journal>, Elsevier
- Abba Ari, A.A., Ngangmo, O.K., Titouna, C., Thiare, O., Kolyang, M.A., Gueroui, A.M., 2020, Enabling privacy and security in Cloud of Things: Architecture, applications, security & privacy challenges, Applied Computing and Informatics Journal, Volume , pp.
- ISO/IEC 27001:2005, 2005, Specification for an Information Security Management System
- Kosinski, M., Stillwell, D. and Graepel, T., 2013, Private traits and attributes are predictable from digital records of human behavior, Proceedings of the National Academy of Sciences, Volume 110(15), pp. pp. 5802–5805
- Di Pietro, R. and Cresci, S., 2021, Metaverse: Security and Privacy Issues, Atlanta, GA, USA, 13-15 December 2021, <USA>, IEEE
- Falchuk, B., Loeb, S. and Neff, R., 2018, The Social Metaverse: Battle for Privacy, IEEE Technology and Society Magazine, Volume 37(2), pp. pp. 52–61
- Snyder, P., Kanich, C., Doerfler, P., McCoy, D., 2017, Fifteen minutes of unwanted fame: Detecting and characterizing doxing, London, United Kingdom, 1-3 November 2017, <>, ACM
- Conti, M., Dragoni, N., Lesyk, V., 2016, A Survey of Man in the Middle Attacks, IEEE Communications Surveys and Tutorials, Volume 18(3), pp. pp. 2027-2051
- Vladimirov, I., Nikolova, D., Terneva, Z., 2020, Hardware Implementation and Comparison of CRA and TRA when Trying to Recover the AES-128 Key, Nis, Serbia, 10-12 September 2020, <>, IEEE
- Nikolova, D., Vladimirov, I., Terneva, Z., 2020, Software Implementation of CRA and TRA to Recover the AES-128 Key using Side-Channel Signals with Python3, Nis, Serbia, 10-12 September 2020, <>, IEEE
- Alkhalil, Z., Hewage, C., Nawaf, L. and Khan, I., 2021, Phishing Attacks: A Recent Comprehensive Study and a New Anatomy, Frontiers in Computer Science, Volume 3(1), pp.
- Rodríguez, G.E., Torres, J.G., Flores, P. and Benavides, D.E., 2020, Cross-site scripting (XSS) attacks and mitigation: A survey, Computer Networks, Volume 166, pp. p. 106960
- Li, C., Lalani, F., 2022, How to address digital safety in the metaverse, the World Economic Forum, <https://www.weforum.org/agenda/2022/01/metaverse-risks-challenges-digital-safety/>, Дата на последен преглед (Last accessed on): 08.11.2022
- Shone, N., Ngoc, T.N., Phai, V.D., Shi, Q., 2018, A Deep Learning Approach to Network Intrusion Detection, IEEE Transactions on Emerging Topics in Computational Intelligence, Volume 2(1), pp. pp. 41-50
- Dutta, I.K., Ghosh, B., Carlson, A., Totaro, M., Bayoumi, M., 2020, Generative Adversarial Networks in Security: A Survey, Virtual, 28-31 October 2020, <>, IEEE
- Yang, J., Li, T., Liang, G., He, W., Zhao, Y., 2019, A simple recurrent unit model based intrusion detection system with DCGAN, IEEE Access, Volume 7, pp. pp. 83286-83296
- Bojjagani, S., Brabin, D.R.D., Rao, P.V.V., 2020, PhishPreventer: A Secure Authentication Protocol for Prevention of Phishing Attacks in Mobile Environment with Formal Verification, Procedia Computer Science, Volume 171, pp. pp. 1110-1119
- Dalton, M., Kozyrakis, C., Zeldovich, N., 2009, Nemesis: Preventing authentication & access control vulnerabilities in web applications, Monreal, Canada, 10-14 August 2009, <>, ACM
- Goswami, U., Wang, K., Nguyen, G., Lagesse, B., 2020, Privacy-Preserving Mobile Video Sharing using Fully Homomorphic Encryption, Austin, TX, USA, 23-27 August 2020, <>, IEEE
- Lagesse, B., Nguyen, G., Goswami, U., Wu, K., 2021, You Had to Be There: Private Video Sharing for Mobile Phones using Fully Homomorphic Encryption, Kassel, Germany, 22-26 March 2021, <>, IEEE
- Li, Q., Zheng, Z., Wu, F., Chen, G., 2020, Generative Adversarial Networks-based Privacy-Preserving 3D Reconstruction, Virtual, 15-17 June 2020, <>, IEEE
- Chen, L.C., Papandreou, G., Schroff, F., Adam, H., 2017, Rethinking atrous convolution for semantic image segmentation, Honolulu, HI, USA, 21-26 July 2017, <>, IEEE
- Yang, K., Yau, J., Fei-Fei, L., Deng, J., Russakovsky, O., 2021, A Study of Face Obfuscation in Imagenet, Stanford Vision Lab, Stanford University, Princeton University, <https://arxiv.org/abs/2103.06191>, Дата на последен преглед (Last accessed on): 08.11.2022
- Vladimirov, I., Nikolova, D., Terneva, Z., 2021, Overview of Methods for 3D Reconstruction of Human Models with Applications in Fashion E-Commerce, Sozopol, Bulgaria, 16-18 June 2021, <>, IEEE
Issue
| ICEST Conference, issue 57, 2022, Macedonia, IEEE, DOI 10.1109/ICEST55168.2022.9828791 |
Copyright IEEE Full text of the publication |