IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Mitigating Risks in the Cloud-Based Metaverse Access Control Strategies and Techniques

Mitigating Risks in the Cloud-Based Metaverse Access Control Strategies and Techniques
View Sample PDF
Author(s): Utsav Upadhyay (Sir Padampat Singhania University, India), Alok Kumar (Sir Padampat Singhania University, India), Gajanand Sharma (JECRC University, Sitapura, India), Ashok Kumar Saini (Manipal University Jaipur, India), Varsha Arya (Department of Business Administration, Asia University, Taiwan, & Department of Electrical and Computer Engineering, Lebanese American University, Beirut, Lebanon, & Center for Interdisciplinary Research, University of Petroleum and Energy Studies (UPES), Dehradun, India, & Chandigarh University, Chandigarh, India), Akshat Gaurav (Ronin Institute, USA)and Kwok Tai Chui (Hong Kong Metropolitan University, Hong Kong)
Copyright: 2024
Volume: 14
Issue: 1
Pages: 30
Source title: International Journal of Cloud Applications and Computing (IJCAC)
Editor(s)-in-Chief: B. B. Gupta (Asia University, Taichung City, Taiwan)
DOI: 10.4018/IJCAC.334364

Purchase

View Mitigating Risks in the Cloud-Based Metaverse Access Control Strategies and Techniques on the publisher's website for pricing and purchasing information.

Abstract

The advent of the metaverse has revolutionized virtual interactions and navigation, introducing intricate access control challenges. This paper addresses the need for effective access control models in the cloud-based metaverse. It explores its distinct characteristics, including its dynamic nature, diverse user base, and shared spaces, highlighting privacy concerns and legal implications. The paper analyzes access control principles specific to the cloud-based metaverse, emphasizing least privilege, separation of duties, RBAC, defense-in-depth, and auditability/accountability. It delves into identity verification and authorization methods, such as biometrics, multi-factor authentication, and role-based/attribute-based authorization. Advanced access control technologies for the cloud-based metaverse are examined, including SSO solutions, blockchain-based access control, ABAC, adaptive access control, and VMI for isolation. Risk mitigation strategies encompass IDS/IPS, SIEM, and user education programs.

Related Content

Muath AlShaikh, Waleed Alsemaih, Sultan Alamri, Qusai Ramadan. © 2024. 19 pages.
Anna M. Segooa, Billy M. Kalema. © 2024. 27 pages.
Utsav Upadhyay, Alok Kumar, Gajanand Sharma, Ashok Kumar Saini, Varsha Arya, Akshat Gaurav, Kwok Tai Chui. © 2024. 30 pages.
Yuan Ren. © 2024. 8 pages.
Jon A. Chilingerian, Mitchell P. V. Glavin. © 2024. 27 pages.
Hadeel Al-Obaidy, Aysha Ebrahim, Ali Aljufairi, Ahmed Mero, Omar Eid. © 2024. 19 pages.
Ahmad Althunibat, Bayan Alsawareah, Siti Sarah Maidin, Belal Hawashin, Iqbal Jebril, Belal Zaqaibeh, Haneen A. Al-khawaja. © 2024. 19 pages.
Body Bottom