INTRODUCTION

Coined in the 1992 book Snow Crash, the term "metaverse" gained traction in 2021 when Mark Zuckerberg staked Meta's (formerly Facebook's) future on it. It outlines a new generation of online social spaces and explains a virtual area that everyone may access over the Internet. Metaverse, according to the Times Journal, is the next great digital revolution. It is prudent to exercise caution when dealing with any new cyber technology and to think about potential privacy and security concerns right from the start. Similarly, before the Metaverse becomes an integral part of our life, we need to make sure it is secure and private. To pull it off, one must first do research on the present state of Metaverse and have a firm grasp on what it is.

The Metaverse and its place in the modern internet have been the subject of much debate. Unlike previous virtual places, Metaverse aims to create a digital replica of our actual world with the addition of imagined features. We are only starting to build the Metaverse at the moment. A plethora of upcoming technological developments will define the immersive virtual environment. As a result, finding a precise academic definition of this phrase is difficult. Metaverse, on the other hand, has to have four features socialization, immersive interaction, imitation of the real world, and scalability if it hopes to become the next wave of online cyberspace, our observations. Socialisation (#1): The Metaverse offers a chat room for everyone with an Internet connection.  People may interact and communicate with each other in the Metaverse. information about themselves via social media. (2) users may engage in more immersive and natural machine-human interactions via technologies like brain-computer interfaces and extended Reality (XR), which are superior to the old ways of interacting with computers that relied on text, pictures, and videos. (3) Building actual worlds: Metaverse can provide virtual environments for a wide variety of actual activities, such as getting together, playing, shopping, travelling, and so forth (4) The opportunity to grow and change: In the realms of science fiction and fantasy, the metaverse offers greater room for imagination and development than the actual reality. More features, such digital modeling and virtual educational scientific investigation, are available to users in Metaverse than they would have in the actual world. On top of including all four of these features, Metaverse takes user experiences to the next level by reinforcing each other. A "cyber-life," as shown in the film, is one possible reality for players in the virtual realm. "Ready Player One," where they can engage in real-life and fictitious activities with immersive interactions, such as making friends, playing, and doing business.

LITERATURE REVIEW

Canbay (2022) The term "metaverse" has recently become popular in the IT industry. Integrating This innovative online platform and social setting incorporates state-of-the-art technologies such as Blockchain (BC), AI, VR, AR, and XR. The term "metaverse" refers to a kind of virtual environment that aims to mimic the real one. Among the many real-world activities that the metaverse provides a fresh spin on are: shopping, meeting new people, going to concerts, playing games, and so on. However, a person's digital representation of themselves is made possible by the personal data they provide while they are physically present in real-life conditions.  Due to this, the Metaverse uses user data for the purpose of building and maintaining this virtual environment. Now that people are starting to worry about their privacy in the Metaverse, MSPs need on these problems.  Explored in this article are the privacy issues with Metaverse, some potential remedies to these issues, and a comprehensive list of the personal data collected and processed inside the platform.

Chen (2022) The metaverse is a hybrid cyberspace and living room that brings the idea of digitalizing and virtualizing the physical world to fruition. In an effort to map the actual world and beyond it incorporates a myriad of current technology. The future of metaverse is bright, and it will likely find numerous uses in many different contexts. As a number of associated technologies reach maturity, the Metaverse will be able to continue operating. Therefore, it's safe to say that creating the Metaverse might raise more serious security issues significant and intricate. We go over a few technologies that are connected to the Metaverse and discuss some possible concerns with privacy and security in the Metaverse. Based on these technologies, we provide present-day possibilities for enhancing the Metaverse's security and privacy. Furthermore, we also bring up certain open-ended questions about the prospective Metaverse. All things considered, this study examines the privacy and security concerns brought up by important technologies used in Metaverse applications in great detail. When it comes to the safety and confidentiality of Metaverse users' information, we are hoping that this poll can point researchers in the right direction and give some exciting new possibilities for the future of the Metaverse.

Huang (2022) Since its introduction in 2021, the term "metaverse" has become popular, since it characterizes a novel kind of internet. Many have sought to define Metaverse formally and offered various interpretations of what Meterverse is. But these explanations were never going to be accepted by everyone. Instead of attempting to define the Metaverse formally, we will outline its four essential features: the capacity to socialize, engage in immersive interaction, construct real-world environments, and expand. All the security and privacy threats, including as eavesdropping, data injection, phishing, unauthorized access, There are several security issues in the Metaverse, including faulty authentication and unsafe architecture. features, which also make it unique and fantastical. After introducing the four traits, this article surveys the present state of the Metaverse and its usual uses before classifying them into four economic sectors. Investigating Concerns about privacy and security in the Metaverse are grounded on these four characteristics, and the findings of the present state of affairs. We continue by outlining the four traits and their possible combinations, before moving on to more serious security and privacy concerns. Finally, various societal and humane issues are also brought up in the study.

Parlar, Tuba. (2023). The metaverse is an idealized notion that bridges the divide that exists between the actual and digital worlds. Users' right to privacy and the security of their data are becoming more apparent as the Metaverse gains traction. A user's personal information is multiplied by the number of users. identifiable information gathered about them. Users' physiological reactions, facial expressions, voice tones, and vital qualities make up biometric information, which is a part of metaverse data. Data security and privacy are major issues with AI algorithms that use biometric data. The quantity, kind, and use of personally identifiable information that is gathered must be strictly limited. Wearable gear also opens up new avenues for the already-existent dangers in the virtual world to have a greater impact. The security procedures in place for apps in the Metaverse are inadequate at the moment. This section introduces the concerns and risks associated with data privacy and security in Metaverse applications and then analyses the solutions that have been created to address these core issues.

Schulmeyer, Julia & Hess, Thomas. (2023). New possibilities for bringing one's real-life identity into the digital realm have arisen thanks to the metaverse, which is defined as the merger of both the real and the digital realms.  Blockchain technology tokens allows for the mapping of identities into the metaverse. Thus, we call the collection of metaverse services linked to blockchains "blockchain-based metaverse" (BM). While it's true that blockchain apps have a reputation for being more private than centralized ones, we contend that this notion no longer holds water in the BM setting. The fact that blockchain transactions are pseudonymous makes it easy to associate them with actual people. The privacy situation has been drastically altered as a result of this probability's rise in the BM, which makes inferences about identities more probable. We provide four hypotheses to show how the privacy level evolves in the BM and conceptually reevaluate blockchains' privacy assumption in our article. In addition to outlining a course of action for future study, we provide organizational and technological solutions to the privacy issues.

METAVERSE

Advantages from Metaverse

Because it provides the Metaverse will play an essential role in a variety of one-of-a-kind encounters to human existence in the years to come. We shall detail its many benefits and the doors it offers to new opportunities below:

Strong virtual identity: The potential of virtual identity replacement in the Metaverse is unparalleled. On top of that, participating in Metaverse virtual activities may aid users in fortifying their sense of identity. In the Metaverse, one's virtual identity remains constant no matter where they go, and a personalized avatar may give them a feeling of exclusivity and realism.

Immersive experience: The Metaverse may now be experienced in a fully immersive manner via the use of AR2 and VR3 in some scenarios of a fire, for instance, users may see its brightness with their eyes, its smoke with their noses, its roar with their ears, and its rising warmth with their hands.

Include more types of social events: By removing physical barriers, the Metaverse may host vibrant virtual communities where physical distance is irrelevant. while individuals have a solid foundation in who they are and have had deep experiences, they are less likely to stick to the same old things while they're out with friends and more likely to try something completely new. Furthermore, such social events are accessible to friends regardless of their location, even if they are far away in another nation.

Virtual economic widely circulate: We can't yet withdraw or use most of our virtual coins since they are only used in games. A real-world-like economic system exists in the Metaverse. Without the limitations of the platform, Virtual property ownership by the user is more easily ensured and may be distributed freely.

The ability to freely create: the Metaverse is all-encompassing and everything. Therefore, the next version of the Metaverse relies heavily on user-generated content and innovations. Users' creations take center stage in the Metaverse. This causes the content in the Metaverse to become more colorful and striking.

SECURITY AND PRIVACY CONCERNS

Metaverse development is no different from any other development in that it brings with it inherent privacy and security problems. More specifically, these issues fall into four groups:

User information: One feature of the metaverse is multi-sensor fusion, which allows for the collection of a great deal of user data. Users are able to enhance their experience and fully immerse themselves in the metaverse with the assistance of sensors, which are undeniably essential. Although many users may not even be aware of the issue, there is too much personal data gathered from users by sensors. The security and privacy of users would be severely compromised in the event that it was to be exposed. Protecting user information is, therefore, of the utmost importance.

Communication: There is certain to be a great deal of communication in the metaverse due to its high level of involvement and sociality. Without communication, it is impossible to engage in many activities in the metaverse, such as sharing, collaborating, and building mutual trust and understanding. Most users are reluctant to share it with noncommunications due to the sensitive nature of communication material, even if it may not include the aforementioned user information. Thus, communication must be protected in a manner that only authorized communicators may understand and retrieve its contents; non-communicators must be stopped from doing so.

Scenario: Due to the surreal nature of the metaverse, it is possible to have security and privacy issues similar to those in the actual world. Think about the situation and any avatars in it. Those are the two most important things. With respect to the former, given the concentration of users on a single metaverse platform (and the scarcity of viable alternatives), there will always be differences in their perceptions of other faiths and civilizations. So, the situation won't satisfy everyone's expectations and could possibly lead to confusion for certain avatars. Regarding the second, it's inevitable that some bad people will join the masses of users in the metaverse; these people have been known to insult, stalk, or even sexually harass other avatars; incidents like these have even surfaced in video games.

Goods: Imagined, creative, very liberated, and highly customizable—these are the traits of the metaserve. Avatars may design their own look, clothing, buildings, artworks, and character models to suit their own tastes. Because these products may be used or sold, they are either made with work or bought with money (though they can also be given freely by friends), suggesting that they have both material and immaterial worth. For example, when an avatar makes a unique outfit for themselves, they may not want anyone else to view it because they don't want the worth to be unlawfully devalued. Avatars also want the ability to conceal their identities while buying and selling products, and bad actors may ruin deals. Products and transactions in the metaserve rely on it for safe protection.

METAVERSE SECURITY AND PRIVACY TECHNOLOGY

All of humanity's wants and needs will be significantly impacted by the Metaverse. Therefore, it is imperative that we deal with the privacy and security of the Metaverse concerns. "The Metaverse will fundamentally alter people's ways of living, interacting, and doing business, thus presenting new security challenges in the ever-changing digital world," said Henry Bagdasarian and the Identity Management Institute were founded by him. As the new digital environment emerges to fully digitise our physical world, experts in the field will be understandably concerned about the security risks that are emerging in the Metaverse. These include, but are not limited to, new forms of fraud, identity theft, and data protection breaches. The privacy and security of Metaverse are really implemented on four distinct layers. According to the current technological make-up of the Metaverse, Figure 1 identifies eight main areas that provide security risks and dangers. Using the five main related technologies as a prism, the following sections analyse the Metaverse's security and privacy.


Figure 1: In the virtual world of Metaverse, there are four levels and eight main dangers.

Blockchain Security

Big data is kept by the top internet giants like Google and Facebook. Facebook's market value has decreased by more than $50 billion since the data crisis.  Regarding blockchain technology, Facebook is emphasising secure payments, while Google is concentrating on cloud storage services.  Blockchain technology uses encryption methods, consensus processes, and point-to-point transmission to guarantee the security and dependability of user data.  The system's insufficient architecture, which includes its encryption algorithm, smart contract, and consensus process, leaves it vulnerable to attacks and destruction:

Consensus mechanism: The consensus method aids in achieving data consistency and accuracy across many nodes in the blockchain, a decentralized ledger. Algorithms such as PBFT, PoW, PoS, and DPoS are often used for consensus mechanisms. Nevertheless, these algorithms pose security vulnerabilities. If an attacker's computer power surpasses 51% of the whole blockchain, they may control the entire blockchain—a problem that PoW may face due to the double spend attack.

Smart contract: Users may manage their own resources and take in resources from outside parties using of smart contracts. Transparency and the prevention of fraud are aided by the contract's openness and transparency. Nevertheless, not all parties are in favor of disclosing the sensitive details of the deal. It also becomes unchangeable once uploaded on the blockchain, so engineers can't fix the protocol's flaws. It is believed that hackers stole at least $320 million from Wormhole, the network that links the Ethereum and Solana blockchains.

Cryptographic algorithm: The immutability of the blockchain is guaranteed via encryption. Ellipstic curve encryption techniques (ECDSA, RSA, and DSA) are the main tools used by blockchain to create digital signatures for safe transactions. Since traditional methods are no longer able to provide security in the age of quantum computing, increasing numbers of researchers are focusing on ways to withstand quantum attacks.

Metaverse Architecture

The integration of enduring virtual spaces with enhanced physical reality resulted in the metaverse, an autonomous, hyper-spatiotemporal, three-dimensional immersive shared world.  In succinct terms, the metaverse is a computer-generated environment where users may interact with digital objects, virtual worlds, and avatars. In this world, users can use their smart devices to converse using their virtual identities.


Figure 2: The framework of the MPEG-V (ISO/IEC 23005) standards. The transformation of sensory information from the actual world (RW) into the attributes of virtual objects (VW) is what is meant by R → V adaptation. The transformation of sensory input from VW into orders for the RW actuator is what is meant by the V → R adaptation. V → V adaption refers to the process of transforming the native data formats of a VW into the standard format.


Figure 3: The architecture of IEEE 2888 standards. IEEE 2888.1, IEEE 2888.2, and IEEE 2888.3 specify the standards on sensor interface, actuator interface, and coordination of electronic synchronization

work together and bond socially. The building of the metaverse unites the three dimensions of reality: the physical, the human, and the digital, which depicts its overall construction. Here we’ll go into more depth about the metaverse’s components, the information flow inside it, and the links between the three realms.

CONCLUSIONS

The Metaverse, a hot subject in the next years, offers many opportunities for the evolution over the web.  Even in the Metaverse, worries about privacy and security will persist.  We go over all you need to know about the Metaverse in this review, including its advantages, the ways it alters people, its potential applications, and the technologies that enable it to expand.  We also go over the five technologies that have helped the Metaverse expand in great detail in terms of security and privacy. Also covered extensively are a number of critical open challenges and possibilities. At last, this paper comes to a close. Our goal in conducting this poll is to increase interest in the Metaverse among academics and businesses.