MetaSSI: A Framework for Personal Data Protection, Enhanced Cybersecurity and Privacy in Metaverse Virtual Reality Platforms
Abstract
:1. Introduction
- This article investigates the security and privacy concerns prevalent in the Metaverse, with a particular focus on the limitations and challenges of existing centralized identity systems and certificate-based authentication methods.
- We explore the concept of SSI and its potential applications, highlighting its advantages over traditional identity systems, and propose a novel SSI-based authentication mechanism for the Metaverse, named MetaSSI, designed to enhance user control and interoperability.
- We demonstrate the practicality and effectiveness of MetaSSI through rigorous proof of work and mathematical formulation. Finally, we propose a comparative analysis of the existing authentication methods and our proposed SSI model against standard SSI evaluation frameworks, validating the superiority of MetaSSI.
2. Background
2.1. Components of SSI
2.2. Standards Related to the Metaverse
- IEEE 2888: A set of rules for communicating across the digital and physical worlds; these standards form a family. For example, 2888.1, 2888.2, 2888.3, 2888.4, 2888.5, and 2888.6 are all part of the standard set. Generally speaking, these standards provide the language, criteria, metrics, data formats, or application programming interfaces (APIs) for collecting data from sensors, which allows for the creation of cyber–physical interfaces. The development and operation of the Metaverse are anticipated to be greatly impacted by the IEEE 2888 standard [20].
- ISO/IEC 23005: The purpose of this standard is to allow interactions between digital contents and the actual environment by providing an architecture and defining related information representations. As a result, virtual worlds are able to work together more easily. This standard has the potential to improve a number of Metaverse-based applications, including those that deal with audiovisual content and rendered sensory effects [19].
2.3. Drawbacks of Certificate-Based Asymmetric Authentication
- Centralized points of failure are produced when certificate issuance and management are left to Certificate Authorities (CAs). A CA’s certificates are all at risk if the CA itself is compromised.
- Digital certificate acquisition and management can be expensive and complicated, particularly for smaller businesses or individuals. The process of renewing certificates contributes to continuous maintenance.
- It can be difficult to revoke compromised certificates and make sure the network recognizes the revocation. There may be additional latency when checking Online Certificate Status Protocols (OCSPs) or Certificate Revocation Lists (CRLs).
- Identity data found in certificates may be exposed during the authentication procedure. Users’ ability to control when and how their identity information is shared is restricted.
2.4. How Self-Sovereign Identity Addresses These Issues
- By using decentralized networks like blockchains, SSI reduces its dependency on a single authority. Decentralization improves security and resilience to disruptions and attacks.
- Users are in total control of the information about themselves. They choose what details they want to share and to whom. To improve privacy, SSI employs zero-knowledge proofs and selective disclosure.
- By doing away with the need for intermediaries like CAs, SSI reduces the cost of issuing and managing certificates. Identity verification becomes easier to use and more efficient.
- SSI frameworks are designed to work with various networks and systems. This enables users to interact with different services and platforms more seamlessly.
- Revocation and identity credential recovery mechanisms can be implemented more effectively by SSI systems. Even if a user loses their device or login credentials, they can still retrieve their identity using decentralized recovery mechanisms.
- Systems for SSI based on blockchain technology can effectively manage a large volume of identity verifications. Numerous identity-management-related procedures can be automated through the use of smart contracts and decentralized applications (DApps).
3. Literature Review
4. Proposed Framework
- Credential Issuance: Verifiable Credentials (VCs) are granted to users by trusted organizations, such as academic institutions. These documents may serve as identification or as proof of a professional qualification. The issuer’s public key allows third parties to independently verify the VCs, which are signed using the issuer’s private key. These VCs are given to users, who keep complete control over who can access them by storing them in their Identity Wallet.
- Authentication Request: The service provider asks for authentication when a user wants to use a service inside the Metaverse. The credentials that are needed to gain access are listed in this request (e.g., age verification and membership status). The request reaches the user’s Identity Wallet, which asks for permission to share particular VCs.
- Consent and Privacy Management: Users can examine the authentication request and decide which credentials to share using the Identity Wallet as a Consent Layer. Users have the option to divulge only the information required to complete the transaction. By using zero-knowledge proofs, the framework enables users to validate identity claims without disclosing the actual credentials.
- End-to-end Encryption: Every exchange of credentials and personal data within the framework, in particular, is end-to-end encrypted. This prevents information from being intercepted or accessed by unauthorized parties because only the intended recipient can decrypt and view the data.
- Zero-Knowledge Proofs: A party can prove to another that a statement is true without revealing any information except that the statement is true by employing cryptography. Within the framework of SSI, it permits users to authenticate themselves or certain aspects of their identity without disclosing their personal information.
- Blockchain Technology: A decentralized, unchangeable ledger is made possible by using blockchain technology to record DIDs and VCs. This stops historical records from being altered or tampered with, in addition to guaranteeing the authenticity and non-repudiation of the identity data.
- Minimising Data and Obtaining Consent: The framework processes personal data only to the extent necessary for the specific purpose for which the user has granted consent, in accordance with the data minimization principle. Users are guaranteed fine-grained control over what data they share and with whom thanks to the Consent Layer.
- Anonymity and Pseudonymity: Pseudonyms are a convenient way for users to communicate in the Metaverse without having to reveal their true identities. This makes it possible to engage in digital activities while protecting one’s privacy. Interoperability and Standardization: The framework conforms to the World Wide Web Consortium’s (W3C) global standards for DIDs and VCs in order to guarantee a seamless user experience throughout the Metaverse. Open protocols and APIs make it simple for service providers to be integrated. Cross-chain interoperability is present to enable DIDs and VC verification between various blockchain networks governed by international laws. Standardization and interoperability are essential to the SSI framework’s functionality and broad acceptance across various Metaverse platforms. The following measures are proposed:
- Adherence to W3C Standards: The framework will be developed in accordance with the standards for DIDs and VCs set forth by the World Wide Web Consortium (W3C), guaranteeing a standardized and open model for digital identities that is suitable for widespread adoption.
- Open APIs and Protocols: The framework makes it simple for different service providers to integrate with the Metaverse by offering open APIs and standardized protocols, which promotes a consistent user experience across platforms and services.
- Cross-Chain Compatibility: Cross-chain interoperability will be supported by the framework, making it possible to verify DIDs and VCs between various blockchain networks. This guarantees that users, irrespective of the blockchain technology utilized, can preserve a singular identity on various platforms.Governance and EvolutionThe framework will be governed by a decentralized autonomous organization (DAO), in which decision-making will involve participation from stakeholders from all over the Metaverse. The development of protocols and standards will be supervised by the DAO. New, reliable organizations will be added to the Trust Registry.
- Policy and Compliance: The DAO will be in charge of making sure the framework complies with international rules, such as identity standards and privacy laws. Additionally, it will create guidelines for how the framework should be used and operated.
- Continuous Improvement: Through user feedback and adaptation to technological advancements, the DAO will support ongoing framework improvement. This entails maintaining the Trust Registry and revising protocols and standards.
- Stakeholder Engagement: All stakeholders will be encouraged to actively participate in the framework to make sure it satisfies the wide range of needs of the Metaverse community. This involves transparent channels of communication, feedback systems, and frequent consultations.The suggested SSI-based authentication framework seeks to offer a user-centric, secure, private, and interoperable identity solution for the Metaverse that can adjust to its changing needs and dynamic nature through these governance structures and considerations.Ongoing Identity Management:As they engage with various services and entities in the Metaverse, users can keep receiving and managing new venture capital. The Identity Wallet makes it possible to renew and revoke login credentials, guaranteeing that the user’s identity is safe and current.
- Audit and Compliance: The framework incorporates mechanisms for conducting compliance checks and auditing transactions to guarantee that all operations comply with the set privacy and security standards. To keep the Trust Registry as a trustworthy source of verification and to preserve the integrity of the authentication procedure, audits are carried out regularly. By allowing the user to maintain control over, give permission for use of, and manage their identity throughout the Metaverse, this operational flow guarantees that the user stays at the center of the authentication process. A secure foundation is provided by the application of blockchain technology and cryptographic proofs, and interoperability and a seamless user experience are enabled by the architecture of the framework.
- Regular Security Audits: Independent third-party security firms will regularly audit the framework to ensure that the highest security standards are maintained. By locating and fixing possible vulnerabilities, these audits contribute to the framework’s resistance to changing cyber threats.
- Security and Privacy Considerations: Security and privacy are given top priority by the framework, which encrypts identity data from beginning to end. Zero-knowledge proofs allow for verification while hiding the underlying information. Blockchain technology is used for tamper identification and consistent DID and VC recording. Frequent framework updates and security audits are necessary to handle new threats. Security and privacy are given top priority in the design of the suggested SSI-based authentication framework, guaranteeing that users can trust the system with their digital identities. A secure, user-controlled, and interoperable identity management system is essential, and this need is met by the suggested SSI-based authentication framework for the Metaverse. The framework makes sure that users can navigate the Metaverse with confidence in the security and privacy of their digital identities by utilizing blockchain technology and abiding by international standards.
4.1. Mathematical Formulation
Algorithm 1 Detailed Self-Sovereign Identity (SSI)-based authentication |
|
4.1.1. Functions
4.1.2. Relations
4.1.3. Process Overview
4.2. Simulation
- Setting Up the Simulation EnvironmentFirst, we install Git, Python, and Docker. In containerized environments, Docker is essential for navigating Hyperledger Aries and streamlining the setup and deployment process. Next, we use Git to clone the essential Hyperledger Aries repositories. The hardware and scripts required for our simulation are contained in these repositories.
- Launching Aries AgentsDocker Compose, which is found inside the cloned repositories, is used to launch multiple Aries sellers. Within the SSI version, each agent represents a unique entity, such as an identity holder, issuer, or verifier. We set each agent up to perform specific tasks within the SSI environment. For example, one agent acts on behalf of the identity company, another acts as the verifier, and a third represents an individual within the Metaverse.
- Simulating SSI ScenariosUsing the issuer agent and their attractiveness via the user agent, we simulate the issuance of digital credentials. This is an essential step in verifying the credential issuance procedure within the Metaverse. The integrity and validity of the SSI model are then confirmed through testing the verification process of these credentials with the help of the verifier agent. Furthermore, we replicate credential revocation and confirm that the verifier agent can properly encounter and handle revoked credentials.
- Integration with the Metaverse We combine the Aries retailers to control authentication inside a digital environment (such as one created in Unity or Unreal Engine) for the Metaverse. Through APIs or SDKs, this integration makes it possible for the Metaverse utility and the Aries dealers to communicate with one another.
- Development and TestingWe expand custom scripts or applications that utilize Aries dealers to model accurate interactions in the Metaverse, specifically designed to meet the requirements of the SSI version. The marketers are controlled programmatically by the Hyperledger Aries APIs, which replicate different SSI operations relevant to the Metaverse.
- Performance Monitoring and AnalysisTo gain insight into the SSI interactions and transactions, we monitor the Aries sellers’ logs and outputs throughout the simulation. The scalability and efficiency of the SSI version in a Metaverse environment are assessed using key performance metrics like response time, throughput, and aid utilization.
- Utilizing Community ResourcesWe refer to the Hyperledger Aries documentation when looking for exact instructions and best practices. Part of our strategy involves interacting with the Hyperledger community, especially for troubleshooting and obtaining insights unique to the current state of the Metaverse.
5. Comparative Analysis and Results
5.1. Discussion
5.2. Demonstrating the Excellence of MetaSSI
6. Conclusions
Future Work
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Fernandez, P. Facebook, Meta, the metaverse and libraries. Libr. Hi Tech. News 2022, 39, 1–5. [Google Scholar] [CrossRef]
- Jungherr, A.; Schlarb, D.B. The extended reach of game engine companies: How companies like epic games and Unity technologies provide platforms for extended reality applications and the metaverse. Soc. Media Soc. 2022, 8, 20563051221107641. [Google Scholar] [CrossRef]
- Rymaszewski, M. Second Life: The Official Guide; John Wiley & Sons: Hoboken, NJ, USA, 2007. [Google Scholar]
- Vitón-Castillo, A.A.; Fajardo Quesada, A.J.; Romero Valdes, Y.d.l.C.; Batista Rivero, L. Metaverse: An Emerging Research Area. Available online: https://mr.saludcyt.ar/index.php/mr/article/view/3 (accessed on 15 May 2024).
- Ball, M. The Metaverse: What It Is. Where Find It, Who Will Build It, Fortnite. Available online: https://www.matthewball.co/all/themetaverse (accessed on 15 May 2024).
- Tian, X. Scanning the literature–from ar/vr to metaverse. IEEE Netw. 2021, 35, 8–9. [Google Scholar] [CrossRef]
- Ning, H.; Wang, H.; Lin, Y.; Wang, W.; Dhelim, S.; Farha, F.; Ding, J.; Daneshmand, M. A Survey on the Metaverse: The State-of-the-Art, Technologies, Applications, and Challenges. IEEE Internet Things J. 2023, 10, 14671–14688. [Google Scholar]
- Cheong, B.C. Avatars in the metaverse: Potential legal issues and remedies. Int. Cybersecur. Law Rev. 2022, 3, 467–494. [Google Scholar] [CrossRef]
- Park, S.M.; Kim, Y.G. A metaverse: Taxonomy, components, applications, and open challenges. IEEE Access 2022, 10, 4209–4251. [Google Scholar] [CrossRef]
- Saleem, B.; Zia, M.M.; Zahra, M.; Ahmad, F.; Muhammad, Z. Smart Cities: A Novel Framework for Energy Production and Harvesting using Renewable Energy. In Proceedings of the 2023 International Conference on IT and Industrial Technologies (ICIT), Orlando, FL, USA, 4–6 April 2023; IEEE: New York, NY, USA, 2023; pp. 1–6. [Google Scholar]
- Iesar, H.; Iqbal, W.; Abbas, Y.; Umair, M.Y.; Wakeel, A.; Illahi, F.; Saleem, B.; Muhammad, Z. Revolutionizing Data Center Networks: Dynamic Load Balancing via Floodlight in SDN Environment. In Proceedings of the 2024 5th International Conference on Advancements in Computational Sciences (ICACS), Lahore, Pakistan, 19–20 February 2024; IEEE: New York, NY, USA, 2024; pp. 1–8. [Google Scholar]
- Design, J.; Cover, D.; de Villiers, L.L.; Miller, E.T.; Rowles, H.G.; Shadows, O. Sue McFadden, MLS Beth South, MLS. Available online: https://scholarworks.iu.edu/journals/index.php/jsriue/issue/download/2305/266 (accessed on 15 May 2024).
- Han, E.; Miller, M.R.; DeVeaux, C.; Jun, H.; Nowak, K.L.; Hancock, J.T.; Ram, N.; Bailenson, J.N. People, places, and time: A large-scale, longitudinal study of transformed avatars and environmental context in group interaction in the metaverse. J. Comput.-Mediat. Commun. 2023, 28, zmac031. [Google Scholar] [CrossRef]
- Irfan, M.; Ali, S.T.; Ijlal, H.S.; Muhammad, Z.; Raza, S. Exploring The Synergistic Effects of Blockchain Integration with IOT and AI for Enhanced Transparency and Security in Global Supply Chains. Int. J. Contemp. Issues Soc. Sci. 2024, 3, 1326–1338. [Google Scholar]
- Reed, D.; Sporny, M.; Longley, D.; Allen, C.; Grant, R.; Sabadello, M.; Holt, J. Decentralized identifiers (dids) v1.0. In Draft Community Group Report; W3C: Cambridge, MA, USA, 2020. [Google Scholar]
- Truong, V.T.; Le, L.; Niyato, D. Blockchain meets metaverse and digital asset management: A comprehensive survey. IEEE Access 2023, 11, 26258–26288. [Google Scholar] [CrossRef]
- Lai, Y.; Yang, J.; Liu, M.; Li, Y.; Li, S. Web3: Exploring Decentralized Technologies and Applications for the Future of Empowerment and Ownership. Blockchains 2023, 1, 111–131. [Google Scholar] [CrossRef]
- Maesa, D.D.F.; Lisi, A.; Mori, P.; Ricci, L.; Boschi, G. Self sovereign and blockchain based access control: Supporting attributes privacy with zero knowledge. J. Netw. Comput. Appl. 2023, 212, 103577. [Google Scholar] [CrossRef]
- Ghirmai, S.; Mebrahtom, D.; Aloqaily, M.; Guizani, M.; Debbah, M. Self-sovereign identity for trust and interoperability in the metaverse. In Proceedings of the 2022 IEEE Smartworld, Ubiquitous Intelligence & Computing, Scalable Computing & Communications, Digital Twin, Privacy Computing, Metaverse, Autonomous & Trusted Vehicles (SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta), Haikou, China, 15–18 December 2022; IEEE: New York, NY, USA, 2022; pp. 2468–2475. [Google Scholar]
- Yoon, K.; Kim, S.-K.; Jeong, S.P.; Choi, J.-H. Interfacing cyber and physical worlds: Introduction to IEEE 2888 standards. In Proceedings of the 2021 IEEE International Conference on Intelligent Reality (ICIR), Piscataway, NJ, USA, 12–13 May 2021; pp. 49–50. [Google Scholar]
- Ahmed, M.R.; Islam, A.M.; Shatabda, S.; Islam, S. Blockchain-based identity management system and self-sovereign identity ecosystem: A comprehensive survey. IEEE Access 2022, 10, 113436–113481. [Google Scholar] [CrossRef]
- Jaipong, P.; Siripipattanakul, S.; Sriboonruang, P.; Sitthipon, T.; Jaipong, P.; Siripipattanakul, S.; Sriboonruang, P.; Sitthipon, T. A Review of Metaverse and Cybersecurity in the Digital Era. Int. J. Comput. Sci. Res. 2023, 7, 1125–1132. [Google Scholar] [CrossRef]
- Metz, D.; Gurău, M.M. Emerging and Disruptive Technologies: The Metaverse. Implications on Global Security. Land Forces Acad. Rev. 2022, 27, 411–422. [Google Scholar] [CrossRef]
- Chow, Y.W.; Susilo, W.; Li, Y.; Li, N.; Nguyen, C. Visualization and Cybersecurity in the Metaverse: A Survey. J. Imaging 2022, 9, 11. [Google Scholar] [CrossRef] [PubMed]
- Cheng, R.; Chen, S.; Han, B. Towards Zero-trust Security for the Metaverse. IEEE Commun. Mag. 2023, 6, 156–162. [Google Scholar] [CrossRef]
- Canbay, Y.; Utku, A.; Canbay, P. Privacy concerns and measures in metaverse: A review. In Proceedings of the 2022 15th International Conference on Information Security and Cryptography (ISCTURKEY), Ankara, Turkey, 19–20 October 2022; IEEE: New York, NY, USA, 2022; pp. 80–85. [Google Scholar]
- Zelenyanszki, D.; Hóu, Z.; Biswas, K.; Muthukkumarasamy, V. A privacy awareness framework for NFT avatars in the metaverse. In Proceedings of the 2023 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, 20–22 February 2023; IEEE: New York, NY, USA, 2023; pp. 431–435. [Google Scholar]
- Kalyvaki, M. Navigating the Metaverse Business and Legal Challenges: Intellectual Property, Privacy, and Jurisdiction. J. Metaverse 2023, 3, 87–92. [Google Scholar] [CrossRef]
- Nair, V.; Garrido, G.M.; Song, D.; O’Brien, J. Exploring the privacy risks of adversarial VR game design. In Proceedings of the 24th Privacy Enhancing Technologies Symposium, Bristol, UK, 15–20 July 2024; pp. 238–256. [Google Scholar]
- Mitrushchenkova, A.N. Personal Identity in the Metaverse: Challenges and Risks. Kutafin Law Rev. 2023, 9, 793–817. [Google Scholar] [CrossRef]
- Saker, M.; Frith, J. Contiguous identities: The virtual self in the supposed metaverse. First Monday 2022, 27, 12471. [Google Scholar] [CrossRef]
- Giannini, T.; Bowen, J.P.; Michaels, C.A.; Smith, C.H. Digital art and identity merging human and artificial intelligence: Enter the metaverse. In Proceedings of the EVA London 2022, BCS Learning & Development, London, UK, 4–8 July 2022; pp. 1–7. [Google Scholar]
- Cambronero, M.L. Metaverse, Religions and Metahumans: A Window to a Hypercontrolled Post-pandemic World. Sci. Et Fides 2023, 11, 121–135. [Google Scholar] [CrossRef]
- Awadallah, A.M.; Damiani, E.; Zemerly, J.; Yeun, C.Y. Identity Threats in the Metaverse and Future Research Opportunities. In Proceedings of the 2023 International Conference on Business Analytics for Technology and Security (ICBATS), Dubai, United Arab Emirates, 7–8 March 2023; IEEE: New York, NY, USA, 2023; pp. 1–6. [Google Scholar]
- Wang, S.; Wang, W. A review of the application of digital identity in the Metaverse. IEEE Trans. Mob. Comput. 2023, 2, 2023009. [Google Scholar] [CrossRef]
- Wu, H.; Zhang, W. Digital identity, privacy security, and their legal safeguards in the Metaverse. Secur. Saf. 2023, 2, 2023011. [Google Scholar] [CrossRef]
- Yang, K.; Zhang, Z.; Tian, Y.; Ma, J. A secure authentication framework to guarantee the traceability of avatars in metaverse. IEEE Trans. Inf. Forensics Secur. 2023, 18, 3817–3832. [Google Scholar] [CrossRef]
- Patwe, S.; Mane, S. Blockchain Enabled Architecture for Secure Authentication in the Metaverse Environment. In Proceedings of the 2023 IEEE 8th International Conference for Convergence in Technology (I2CT), Pune, India, 7–9 April 2023; IEEE: New York, NY, USA, 2023; pp. 1–8. [Google Scholar]
- Ryu, J.; Son, S.; Lee, J.; Park, Y.; Park, Y. Design of secure mutual authentication scheme for metaverse environments using blockchain. IEEE Access 2022, 10, 98944–98958. [Google Scholar] [CrossRef]
- Satybaldy, A.; Nowostawski, M.; Ellingsen, J. Self-sovereign identity systems: Evaluation framework. In Privacy and Identity Management. Data for Better Living: AI and Privacy: 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2. 2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers 14; Springer: Berlin/Heidelberg, Germany, 2020; pp. 447–461. [Google Scholar]
- Kim, M.; Oh, J.; Son, S.; Park, Y.; Kim, J.; Park, Y. Secure and Privacy-Preserving Authentication Scheme Using Decentralized Identifier in Metaverse Environment. Electronics 2023, 12, 4073. [Google Scholar] [CrossRef]
- Kürtünlüoğlu, P.; Akdik, B.; Karaarslan, E. Security of virtual reality authentication methods in metaverse: An overview. arXiv 2022, arXiv:2209.06447. [Google Scholar]
- Stephenson, S.; Pal, B.; Fan, S.; Fernandes, E.; Zhao, Y.; Chatterjee, R. Sok: Authentication in augmented and virtual reality. In Proceedings of the 2022 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 22–26 May 2022; IEEE: New York, NY, USA, 2022; pp. 267–284. [Google Scholar]
SSI Requirements | MetaSSI | SMC | DIM | GBA | KBA |
---|---|---|---|---|---|
User control and consent | yes | No | No | No | No |
Privacy and protection | yes | No | No | yes | yes |
No trust in a central authority | yes | yes | No | yes | No |
Portability and persistence | yes | yes | No | No | No |
Transparency | yes | yes | yes | yes | yes |
Interoperability | yes | No | yes | yes | yes |
Scalability | yes | No | yes | yes | No |
Usability | yes | No | No | No | No |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Fiaz, F.; Sajjad, S.M.; Iqbal, Z.; Yousaf, M.; Muhammad, Z. MetaSSI: A Framework for Personal Data Protection, Enhanced Cybersecurity and Privacy in Metaverse Virtual Reality Platforms. Future Internet 2024, 16, 176. https://doi.org/10.3390/fi16050176
Fiaz F, Sajjad SM, Iqbal Z, Yousaf M, Muhammad Z. MetaSSI: A Framework for Personal Data Protection, Enhanced Cybersecurity and Privacy in Metaverse Virtual Reality Platforms. Future Internet. 2024; 16(5):176. https://doi.org/10.3390/fi16050176
Chicago/Turabian StyleFiaz, Faisal, Syed Muhammad Sajjad, Zafar Iqbal, Muhammad Yousaf, and Zia Muhammad. 2024. "MetaSSI: A Framework for Personal Data Protection, Enhanced Cybersecurity and Privacy in Metaverse Virtual Reality Platforms" Future Internet 16, no. 5: 176. https://doi.org/10.3390/fi16050176
APA StyleFiaz, F., Sajjad, S. M., Iqbal, Z., Yousaf, M., & Muhammad, Z. (2024). MetaSSI: A Framework for Personal Data Protection, Enhanced Cybersecurity and Privacy in Metaverse Virtual Reality Platforms. Future Internet, 16(5), 176. https://doi.org/10.3390/fi16050176