Research on Highly Secure Metaverse Based on Extended Reality Under Edge Computing

  • Conference paper
  • First Online:
Wireless Internet (WiCON 2023)

Abstract

With the explosion of ChatGPT, the development of artificial intelligence technology ushered in another explosion. Similarly, with the rapid development of extended reality technology and Internet of Things technology, Metaverse will also usher in greater breakthroughs. However, in the development of the extended reality metaverse under edge computing, many security issues will arise. This paper focuses on data security, considering that data will be transmitted and processed between multiple devices and nodes instead of being concentrated in the cloud, which may bring To solve data security issues, relying on the integrated architecture of Metaverse educational applications based on edge computing (MEC), it provides an identity verification and access with higher security and scalability, better performance, and service requirements that meet the current environment Control mechanism solutions, while analyzing other problems that will arise during the development of the extended reality metaverse. Aiming at the security problem on the edge side, a signature authentication scheme is designed based on Elliptic Curve Cryptography (ECC) integrated blockchain encryption technology and the effectiveness of the method is proved. In order to promote the extended reality metaverse under edge computing, it provides a mirror for the application in the field of education under the condition of ensuring data security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hu, Z., Wen, J.: What is the metaverse? Why should you care about it? **nhua Daily Telegraph 2021–11–21,004

    Google Scholar 

  2. Jiang, Y.: Orphans in the metaverse?——Why video games serve as an educational platform for the next generation of children’s philosophy. J. Guizhou Univ. (Soc. Sci.) 39(05), 21–29+120 (2021). doi:https://doi.org/10.15958/j.cnki.gdxbshb.2021.05.03.

  3. Zhong, B.: Essential Issues and Education Innovation Towards Online Teaching in Primary and Secondary School. China Educational Technology No.413.06, pp. 15–22 (2021)

    Google Scholar 

  4. Halabi, O., Balakrishnan, S., Dakua, S.P., Navab, N., Warfa, M.: Virtual and augmented reality in surgery. In: Doorsamy, W., Paul, B., Marwala, T. (eds.) The Disruptive Fourth Industrial Revolution. LNEE, vol. 674, pp. 257–285. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-48230-5_11

  5. Digital Intelligent Human: a fundamental unit in the meta-universe, and a new manifestation of service intelligence [EB/OL], 19 March 2022. https://www.shangyexinzhi.com/article/4684994.html. Accessed 14 June 2022

  6. Cotton, D.R.E., Cotton, P.A., Shipway, J.R.: Chatting and Cheating. Ensuring Academic Integrity in the Era of ChatGPT. https://edarxiv.org/mrz8h/

  7. Zhao, X., Lu, Q.W.: Governance of the metaverse: a vision for agile governance in the future data intelligence world. J. Libr. Sci. China 48(1), 52–61 (2022)

    Google Scholar 

  8. Alhalabi, W.: Virtual reality systems enhance students’ achievements in engineering education. Behav. Inf. Technol. 35(11), 919–925 (2016)

    Article  Google Scholar 

  9. Digital Human. https://wiki.mbalib.com/wiki/%E6%95%B0%E5%AD%97%E4%BA%BA

  10. Survey on data security and privacy-preserving for the research of edge computing. https://zhuanlan.zhihu.com/p/142914592

  11. Microsoft Entra-Secure Authentication and Access Control | Microsoft Security. https://www.microsoft.com/zh-cn/security/business/microsoft-entra

  12. Lee, L.-H., et al.: All one needs to know about metaverse: a complete survey on technological singularity, virtual ecosystem, and research agenda. J. Latex Class Files 14(8) (2021)

    Google Scholar 

  13. Paper Reading: A Summary of Key Technologies in the Metaverse. https://www.zhihu.com/column/c_1511365369852305410

  14. Zhang, J., et al.: Survey on data security and privacy-preserving for the research of edge computing. J. Commun. 39(03), 1–21 (2018)

    Google Scholar 

  15. MUD underlying technology and future development. https://www.sohu.com/a/664038489_120538525

  16. Research on the Development Status of the Metaverse and Research on Security Risks. https://www.secrss.com/articles/45265

  17. Zhang, H., Zeng, X., Liang, Z.: Exploring the Metaverse: conceptual connotation, form development and evolution mechanism. Studies in Science of Science, 09 August 2022. https://doi.org/10.16192/j.cnki.1003-2053.20220808.001

  18. Zhang, H., Zeng, X., Liang, Z.: Exploring the Metaverse: Conceptual Connotation, Form Development and Evolution Mechanism. http://aiig.tsinghua.edu.cn/info/1368/1629.htm

  19. Computing of the Eight Cores of the Metaverse. https://zhuanlan.zhihu.com/p/438835959

  20. Liu, D., Wu, X., Cao, Z., Liu, M., Li, Y., Hou, M.: CD-MAC: a contention detectable MAC for low duty-cycled wireless sensor networks. SECON, pp. 37–45 (2015)

    Google Scholar 

  21. Cai, S., Jiao, X., Song, B.: Opening another door to education——applications, challenges and prospects of the educational metaverse. Mod. Educ. Technol. 32(01), 16–26 (2022)

    Google Scholar 

  22. Pu, Q., Wang, X.: Metaverse and its influence and change on human society. J. Chongqing Univ. (Soc. Sci. Edit.) 1–12 (2022)

    Google Scholar 

  23. Vallor, S.: Technology and the Virtues: a Philosophical Guide to a Future Worth Wanting. Oxford University Press, Oxford (2016)

    Google Scholar 

  24. Lanier, J.: Ten Arguments for Deleting Your Social Media Accounts Right Now. Random House, New York (2018)

    Google Scholar 

  25. Flintham, M., Karner, C., Bachour, K., Creswick, H., Gupta, N., Moran, S.: Falling for fake news: investigating the consumption of news via social media. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, p. 376. ACM (2018)

    Google Scholar 

  26. Buck, L., McDonnell, R.: Security and privacy in the metaverse: the threat of the digital human. In: Proceedings of the 1st Workshop on Novel Challenges of Safety, Security and Privacy in Extended Reality (2022)

    Google Scholar 

  27. Shahriari, K., Shahriari, M.: IEEE standard review—ethically aligned design: a vision for prioritizing human wellbeing with artificial intelligence and autonomous systems. In: 2017 IEEE Canada International Humanitarian Technology Conference (IHTC), pp. 197–201. IEEE (2017)

    Google Scholar 

Download references

Acknowledgements

This work was supported in part by the Scientific Research Project of Hunan Provincial Department of Education (No. C0497), Aid Program for Science and T-echnology Innovative Research Team in Higher Educational Institutions of Hunan Pro-vince, the Huaihua University Double First-Class initiative Applied Characteristic Discipline of Control Science and Engineering (No. ZNKZN2021-10), and Nationa-l Training Program Project of Innovation and Entrepreneurship for Undergraduates (No. S202310548083) and the Teaching Reform Research Project of Hunan Province “POA-based Research on College English Teaching Reform among Local Colleges and Uni-versities of Hunan” (HNJG-2019-825).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yiwen Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fu, J. et al. (2024). Research on Highly Secure Metaverse Based on Extended Reality Under Edge Computing. In: Maglaras, L.A., Douligeris, C. (eds) Wireless Internet. WiCON 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 527. Springer, Cham. https://doi.org/10.1007/978-3-031-58053-6_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-58053-6_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-58052-9

  • Online ISBN: 978-3-031-58053-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation