Author:
Banaeian Far Saeed,Hosseini Bamakan Seyed Mojtaba
Abstract
AbstractA considerable number of people worldwide start their second lives in the digital world soon. The 3D Internet reflects the digital world. Metaverse, the most famous example of the 3D Internet, is very popular and practical in people’s daily lives. However, combining Metaverse with newly-emerging technologies (e.g., blockchain) provides new user-friendly features such as autonomy, accessibility, removing central authorities, etc. Despite the mentioned attractive features, blockchain-based metaverses suffer various challenges, such as one user with multiple identities, certificate issuing for users in Metaverse, authentication-related issues, and arresting malicious users. Generally, identity management in a distributed environment where no central authority exists is a challenging issue. This study focuses on the challenge of distributed identity management in Metaverses to strike a balance between users’ privacy and regulation. The study proposes the use of Non-Fungible Tokens (NFTs) as a tool for managing identities in metaverses, as they are considered an excellent choice for this purpose. In addition to explaining the importance of this idea, this paper identifies its challenges, including distributed identity management, authentication issues, and security and privacy aspects. It then proposes possible solutions (e.g., using cryptographic tools). Despite existing challenges, there are many opportunities in the popularization of Metaverse, such as relying on blockchain technology, emerging many Metaverse-related jobs, in-Metaverse investments for huge revenues, and applying digital twins to provide realistic senses. This study also highlights the critical role of artificial intelligence (AI) in metaverses.
Publisher
Springer Science and Business Media LLC
Subject
General Earth and Planetary Sciences,General Physics and Astronomy,General Engineering,General Environmental Science,General Materials Science,General Chemical Engineering
Reference42 articles.
1. Burrows Michael, Abadi Martin, Needham Roger (1990) A logic of authentication. ACM Trans Comput Syst (TOCS) 8(1):18–36
2. Abelson, Hal, Lessig, Lawrence, Covell, Paul, Gordon, Steve, Hochberger, Alex, Kovacs, James (1998) Digital identity in cyberspace. White Paper Submitted for 6.805/Law of Cyberspace: Social Protocols
3. Kemp, Jeremy, Livingstone, Daniel (2006) Putting a Second Life “metaverse” skin on learning management systems. In Proceedings of the Second Life education workshop at the Second Life community convention, vol. 20. CA, San Francisco: The University of Paisley
4. Ellemers Naomi (1993) The influence of socio-structural variables on identity management strategies. Eur Rev Soc Psychol 4(1):27–57
5. Ouaddah, Aafaf, Elkalam, Anas Abou, Ouahman, Abdellah Ait (2017) Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In Europe and MENA cooperation advances in information and communication technologies, pp. 523-533. Springer International Publishing
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献