Autors: Vladimirov, I. H., Nenova, M. V., Nikolova, D. V., Terneva, Z. A.
Title: Security and Privacy Protection Obstacles with 3D Reconstructed Models of People in Applications and the Metaverse: A Survey
Keywords: 3D Reconstructed Models, Security, Privacy Protection, Inter

Abstract: In this scientific research, a survey of different security and privacy protection issues and flaws in the context of the reconstruction of 3D models of real people is made. The intent of this analysis the threats that a realistic digital clone AKA avatar of a person can have in the wrong hands. This paper will also offer different approaches that can be used in overcoming this privacy problem.

References

  1. Gunn, A., 2020, Living in A Digital World: The Causes and the Consequences, A Medium Corp., <https://medium.com/digital-society/living-in-a-digital-world-the-causes-and-the-consequences-4c5aca11b03a>, Дата на последен преглед (Last accessed on): 08.11.2022
  2. Prantosh, P., Aithal, P.S., 2018, Digital Society: Its Foundation and Towards an Interdisciplinary Field, Mangalore, India, 22 December 2018, <Online>,
  3. Montag, C. and Diefenbach, S., 2018, Towards Homo Digitalis: Important Research Issues for Psychology and the Neurosciences at the Dawn of the Internet of Things and the Digital Society, Sustainability, Volume 10(2), pp. p.415
  4. Grider, D., Maximo, M., 2021, The Metaverse: Web 3.0 Virtual Cloud Economies, Online, Grayscale Company Research
  5. Moy, C., Gadgil, A., 2022, Opportunities in the Metaverse: How Businesses Can Explore the Metaverse and Navigate the Hype Vs. Reality, Onyx by J. P. Morgan Company, <https://www.jpmorgan.com/content/dam/jpm/treasury-services/documents/opportunities-in-the-metaverse.pdf>, Дата на последен преглед (Last accessed on): 08.11.2022
  6. Sahmim, S., Gharsellaoui, H., 2017, Privacy and security in internetbased computing: Cloud computing, internet of things, cloud of things: A review, Marseille, France, 6-8 September 2017, <Procedia Computer Science open access journal>, Elsevier
  7. Abba Ari, A.A., Ngangmo, O.K., Titouna, C., Thiare, O., Kolyang, M.A., Gueroui, A.M., 2020, Enabling privacy and security in Cloud of Things: Architecture, applications, security & privacy challenges, Applied Computing and Informatics Journal, Volume , pp.
  8. ISO/IEC 27001:2005, 2005, Specification for an Information Security Management System
  9. Kosinski, M., Stillwell, D. and Graepel, T., 2013, Private traits and attributes are predictable from digital records of human behavior, Proceedings of the National Academy of Sciences, Volume 110(15), pp. pp. 5802–5805
  10. Di Pietro, R. and Cresci, S., 2021, Metaverse: Security and Privacy Issues, Atlanta, GA, USA, 13-15 December 2021, <USA>, IEEE
  11. Falchuk, B., Loeb, S. and Neff, R., 2018, The Social Metaverse: Battle for Privacy, IEEE Technology and Society Magazine, Volume 37(2), pp. pp. 52–61
  12. Snyder, P., Kanich, C., Doerfler, P., McCoy, D., 2017, Fifteen minutes of unwanted fame: Detecting and characterizing doxing, London, United Kingdom, 1-3 November 2017, <>, ACM
  13. Conti, M., Dragoni, N., Lesyk, V., 2016, A Survey of Man in the Middle Attacks, IEEE Communications Surveys and Tutorials, Volume 18(3), pp. pp. 2027-2051
  14. Vladimirov, I., Nikolova, D., Terneva, Z., 2020, Hardware Implementation and Comparison of CRA and TRA when Trying to Recover the AES-128 Key, Nis, Serbia, 10-12 September 2020, <>, IEEE
  15. Nikolova, D., Vladimirov, I., Terneva, Z., 2020, Software Implementation of CRA and TRA to Recover the AES-128 Key using Side-Channel Signals with Python3, Nis, Serbia, 10-12 September 2020, <>, IEEE
  16. Alkhalil, Z., Hewage, C., Nawaf, L. and Khan, I., 2021, Phishing Attacks: A Recent Comprehensive Study and a New Anatomy, Frontiers in Computer Science, Volume 3(1), pp.
  17. Rodríguez, G.E., Torres, J.G., Flores, P. and Benavides, D.E., 2020, Cross-site scripting (XSS) attacks and mitigation: A survey, Computer Networks, Volume 166, pp. p. 106960
  18. Li, C., Lalani, F., 2022, How to address digital safety in the metaverse, the World Economic Forum, <https://www.weforum.org/agenda/2022/01/metaverse-risks-challenges-digital-safety/>, Дата на последен преглед (Last accessed on): 08.11.2022
  19. Shone, N., Ngoc, T.N., Phai, V.D., Shi, Q., 2018, A Deep Learning Approach to Network Intrusion Detection, IEEE Transactions on Emerging Topics in Computational Intelligence, Volume 2(1), pp. pp. 41-50
  20. Dutta, I.K., Ghosh, B., Carlson, A., Totaro, M., Bayoumi, M., 2020, Generative Adversarial Networks in Security: A Survey, Virtual, 28-31 October 2020, <>, IEEE
  21. Yang, J., Li, T., Liang, G., He, W., Zhao, Y., 2019, A simple recurrent unit model based intrusion detection system with DCGAN, IEEE Access, Volume 7, pp. pp. 83286-83296
  22. Bojjagani, S., Brabin, D.R.D., Rao, P.V.V., 2020, PhishPreventer: A Secure Authentication Protocol for Prevention of Phishing Attacks in Mobile Environment with Formal Verification, Procedia Computer Science, Volume 171, pp. pp. 1110-1119
  23. Dalton, M., Kozyrakis, C., Zeldovich, N., 2009, Nemesis: Preventing authentication & access control vulnerabilities in web applications, Monreal, Canada, 10-14 August 2009, <>, ACM
  24. Goswami, U., Wang, K., Nguyen, G., Lagesse, B., 2020, Privacy-Preserving Mobile Video Sharing using Fully Homomorphic Encryption, Austin, TX, USA, 23-27 August 2020, <>, IEEE
  25. Lagesse, B., Nguyen, G., Goswami, U., Wu, K., 2021, You Had to Be There: Private Video Sharing for Mobile Phones using Fully Homomorphic Encryption, Kassel, Germany, 22-26 March 2021, <>, IEEE
  26. Li, Q., Zheng, Z., Wu, F., Chen, G., 2020, Generative Adversarial Networks-based Privacy-Preserving 3D Reconstruction, Virtual, 15-17 June 2020, <>, IEEE
  27. Chen, L.C., Papandreou, G., Schroff, F., Adam, H., 2017, Rethinking atrous convolution for semantic image segmentation, Honolulu, HI, USA, 21-26 July 2017, <>, IEEE
  28. Yang, K., Yau, J., Fei-Fei, L., Deng, J., Russakovsky, O., 2021, A Study of Face Obfuscation in Imagenet, Stanford Vision Lab, Stanford University, Princeton University, <https://arxiv.org/abs/2103.06191>, Дата на последен преглед (Last accessed on): 08.11.2022
  29. Vladimirov, I., Nikolova, D., Terneva, Z., 2021, Overview of Methods for 3D Reconstruction of Human Models with Applications in Fashion E-Commerce, Sozopol, Bulgaria, 16-18 June 2021, <>, IEEE

Issue

ICEST Conference, issue 57, 2022, Macedonia, IEEE, DOI 10.1109/ICEST55168.2022.9828791

Copyright IEEE

Full text of the publication

Цитирания (Citation/s):
1. Vadlamudi, Sailaja. "The Taxonomy of Security issues and Countermeasures in the Metaverse World." 2022 International Conference on Recent Trends in Microelectronics, Automation, Computing and Communications Systems (ICMACC). IEEE, 2022. - 2022 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
2. Al-Ghaili, Abbas M., et al. "A Review of Metaverse’s Definitions, Architecture, Applications, Challenges, Issues, Solutions, and Future Trends." IEEE Access (2022). - 2022 - в издания, индексирани в Scopus или Web of Science
3. Fernandes, Filipe A., and Cláudia ML Werner. "A Scoping Review of the Metaverse for Software Engineering Education: Overview, Challenges and Opportunities." PRESENCE: Virtual and Augmented Reality (2023): 1-56. - 2023 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
4. Gupta, Ankur, et al. "Metaverse Security: Issues, Challenges and a Viable ZTA Model." Electronics 12.2 (2023): 391. - 2023 - в издания, индексирани в Scopus или Web of Science
5. Nikolova, D., Vladimirov, I., & Manolova, A. (2023, June). An Experimental Analysis of Deep Learning Models for Human Activity Recognition with Synthetic Data. In 2023 58th International Scientific Conference on Information, Communication and Energy Systems and Technologies (ICEST) (pp. 277-280). IEEE. - 2023 - в издания, индексирани в Scopus или Web of Science
6. Deng, M., Zhai, H., & Yang, K. (2023, July). Social engineering in metaverse environment. In 2023 IEEE 10th International Conference on Cyber Security and Cloud Computing (CSCloud)/2023 IEEE 9th International Conference on Edge Computing and Scalable Cloud (EdgeCom) (pp. 150-154). IEEE. - 2023 - в издания, индексирани в Scopus или Web of Science
7. Hossain, M. I., & Hasan, R. (2023, June). Threat Model-based Security Analysis and Mitigation Strategies for a Trustworthy Metaverse. In 2023 IEEE International Conference on Metaverse Computing, Networking and Applications (MetaCom) (pp. 33-40). IEEE. - 2023 - в издания, индексирани в Scopus или Web of Science
8. Cui, L., & Liu, J. (2023). Virtual Human: A Comprehensive Survey on Academic and Applications. IEEE Access. - 2023 - в издания, индексирани в Scopus или Web of Science
9. Asad, M., Otoum, S., & Al Fandi, O. (2023, September). Edge Computing for the Metaverse: Balancing Security and Privacy Concerns. In 2023 International Conference on Intelligent Metaverse Technologies & Applications (iMETA) (pp. 1-8). IEEE. - 2023 - в издания, индексирани в Scopus или Web of Science
10. Al Shehhi, F., & Otoum, S. (2023, September). On the Feasibility of Zero-Trust Architecture in Assuring Security in Metaverse. In 2023 International Conference on Intelligent Metaverse Technologies & Applications (iMETA) (pp. 1-8). IEEE. - 2023 - в издания, индексирани в Scopus или Web of Science
11. Bhardwaj, A., & Kaushik, K. (2023). Metaverse or Metaworst with Cybersecurity Attacks. IT Professional, 25(3), 54-60. - 2023 - в издания, индексирани в Scopus или Web of Science
12. Far, S. B., Rad, A. I., Bamakan, S. M. H., & Asaar, M. R. (2023). Toward Metaverse of everything: Opportunities, challenges, and future directions of the next generation of visual/virtual communications. Journal of Network and Computer Applications, 103675. - 2023 - в издания, индексирани в Scopus или Web of Science
13. Lu, R., Wei, L., Zhu, S., Hu, C., & Wang, D. (2023, October). Pagoda: Privacy Protection for Volumetric Video Streaming through Poisson Diffusion Model. In Proceedings of the 31st ACM International Conference on Multimedia (pp. 1689-1697). - 2023 - в издания, индексирани в Scopus или Web of Science
14. Kuru, K.; Kuru, K. Blockchain-Based Decentralised Privacy-Preserving Machine Learning Authentication and Verification With Immersive Devices in the Urban Metaverse Ecosystem. Preprints 2024, 2024020317. https://doi.org/10.20944/preprints202402.0317.v1 - 2024 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
15. Fernandes, F. A. (2023). METASEE: AN APPROACH TO ENABLE THE METAVERSE-BASED SOFTWARE ENGINEERING EDUCATION (Doctoral dissertation, Universidade Federal do Rio de Janeiro). - 2023 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
16. CESMELİ, A. The Metaverse: A Brave New" World". Journal of AI, 7(1), 32-51. - 2023 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
17. Faggin, C. (2023). Unveiling the metaverse: a qualitative analysis exploring its feasibility for digital marketing strategies. - 2023 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
18. YAĞCI, A., & ŞENTÜRK, C. Fen Bilimleri (Fizik-Kimya-Biyoloji) Eğitiminde Metaverse. EDUCATIONE, 2(2), 264-290. - 2023 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
19. Hernández-Manrique, V., González-Mendoza, M., Vilchis, C., Méndez-Ruiz, M., & Pérez-Guerrero, C. Modelos 3D de reconstrucción facial: Una breve revisión. - 2023 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science

Вид: пленарен доклад в международен форум, публикация в реферирано издание, индексирана в Scopus