DOI QR코드

DOI QR Code

Analysis of Information Security Issues and Classification through Metaverse Infringement Cases

  • Mi-Na, Shim (Department of Computer Engineering, Sungkyul University)
  • Received : 2022.11.05
  • Accepted : 2022.11.12
  • Published : 2023.02.28

Abstract

In the age of Web 3.0, the metaverse is emerging as a new innovative element to replace the Internet. Leading major ICT companies, it is striving to become a metaverse platform or infrastructure-oriented company. Along with the expansion of the VR and AR market, governments of each country are investing large budgets in this field. However, security concerns about metaverse are also growing. In addition to potential damage to infrastructure, platform and services, personal information leakage and privacy damage are expected to increase further. In this study, we investigated and closely analyzed cases of infringement on the infrastructure, platform, and service of Metaverse. We have clearly identified the current state of metaverse security and the characteristics of the risks of greatest concern. The research procedure is composed of a method of determining the metaverse security area for case analysis first and deriving the type of threat by area through the type of infringement. In particular, the results were mapped into Domain, Case, and Threat, and the implications of the results were analyzed. Through these results, researchers want to contribute to finding the right direction of research by clearly understanding the latest metaverse security status.

Keywords

References

  1. ASF's Metaverse Roadmap. https://www.metaverseroadmap.org/overview/.
  2. Y. J. Oh, "The metaverse is coming again," AI Future Strategy Center, 2021.
  3. Statista. XR/AR/VR/MR market size 2021-2028. https://www.statista.com/statistics/591181/global - augmentedvirtual-reality-market-size/.
  4. ZDNET Korea. https://zdnet.co.kr/view/?no=20211217135045.
  5. Korean Government's Brief of Policy. https://www.korea.kr/news/policyNewsView.do? newsId=156523436.
  6. Perkins Coie LLP, "2020 Augmented and Virtual Reality Survey Report," 2020.
  7. Ministry of Science and ICT, "'21 cyber threat analysis and '22 forecast analysis," Dec 2021.
  8. J. H. Yoon and G. E. Kim, "The Outlook and Innovation Strategy for the Metaverse Virtual World Ecosystem," STEPI Insight, No. 284, pp. 1-53, Dec 2021.
  9. K. M. Shon, "Matrix world metaverse created by web 2.0 and online games," ETRI CEO Information, No. 47, 2006.
  10. S. K. Kim, "Metaverse-Digital Earth, the world of floating things", PlanB Design, 2020
  11. N. Huq, R. Reyes, and P. Lin et al., "METAVERSE OR METAWORSE? Cybersecurity Threats Against the Internet of Experiences," Trend Micro Research, 2022.
  12. S. Yoo, "A Study on AI Business Ecosystem," The Journal of The Institute of Internet, Broadcasting and Communication (JIIBC), Vol. 20, No. 2, pp. 21-27, Apr 2020. DOI: https://doi.org/10.7236/JIIBC.2020.20.2.21
  13. K. S. Min, K. Y. Kim, and J. S. Park et al., "Forecast and analysis of cyber security threats, Metaverse, NFTs," KISA Insight, Vol. 4, 2022.
  14. Akamai, "Security Trends to Address now our way to the Metaverse," CEO Insights, Dec 2021.
  15. S. Y. Jeong, C. H. Seo, and J. M. Jo et al., "Security threat analysis in Metaverse, an extended virtual reality," Journal of Information Security, Vol. 31, No. 6, pp. 47-57, Dec 2021.
  16. H. S. Na and D. S. Choi, "Review of metaverse security threats and countermeasures," Journal of Information Security, Vol. 32, No. 4, pp. 19-32, Aug 2022.
  17. J. H. Lee, H. R. Jeong, and K. W. Park, "Derivation of metaverse platform threat vector through metaverse infringement response case analysis," Journal of Information Security, Vol. 32, No. 4, pp. 33-40, Aug 2022.
  18. S. Y. Jeong, C. H. Seo, and J. M. Jo et al., "Current status of ID management technology according to the evolution of the metaverse," Journal of Information Security Society, Vol. 32, No. 4, pp. 49-59, Aug 2022.
  19. D. H. Lee, "Attribute-level Privacy Protection Mechanism for a Secure Metaverse Environment," Journal of the Korean Society of Information Technology (JKIIT), Vol. 20, No. 9, pp. 1-11, Sep 2022. DOI: https://doi.org/10.14801/jkiit.2022.20.9.1
  20. S. W. Hong and J. P. Park, "A Security Model for information Security and Personal information Security in the metaverse environment," Journal of the Korean Society of Industrial Science and Technology (JKAIS), Vol. 23, No. 9, pp. 32-38, Sep 2022. DOI: https://doi.org/10.5762/KAIS.2022.23.9.32
  21. D. H. Lee and N. J. Park, "Eye Tracking Obfuscation Method to Improve Metaverse Security," Journal of the Society for Next Generation Convergence Technology (JNCTA), Vol. 6, No. 11, pp. 2086-2095, Nov 2022. DOI: https://doi.org/10.33097/JNCTA.2022.06.11.2086
  22. W. B. Kim, Y. J. Cho and, D. M. Shin, "A Technique for Proof of Ownership of Metaverse Works without Providing Source Data," Journal of the Korea Software Appraisal Society, Vol. 18, No. 2, pp. 37-46, Dec
  23. D. E. Jo, "A Study on the Metaverse Framework Security Service Model," Journal of Platform Technology (JPT), Vol. 10, No. 4, pp. 82-90, Dec 2022. DOI: https://doi.org/10.23023/JPT.2022.10.4.082
  24. Y. S. Shim, "A Study on Utilization Methods and Problems according to Metaverse Platform Analysis," Journal of the Convergence on Culture Technology (JCCT), Vol. 8, No. 6, pp. 855-860, Nov 2022. DOI: https://doi.org/10.17703/JCCT.2022.8.6.855