Diese Präsentation wurde erfolgreich gemeldet.
Die SlideShare-Präsentation wird heruntergeladen. ×
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige

Hier ansehen

1 von 19 Anzeige

Weitere Verwandte Inhalte

Ähnlich wie Blockchain (20)

Aktuellste (20)

Anzeige

Blockchain

  1. 1. A decentralized authentication model for the metaverse using AI- Based blockchain technology RESEARCH TOPIC Muhammad Zeeshan Arshad 1
  2. 2. Table of Contents 1. Title Page 2. Introduction 3. Problem Statement 4. Research Questions 5. Scope of Research 6. Literature Review (Table) 7. Proposed Methodology of Research (framework) 8. Expected Results 9. Thesis Timeline 10. References 11. Curriculum Vitae of MS Scholar 12. Undertaking 2
  3. 3. 2-INTRODUCTION 1. Metaverse “Metaverse is the universe that lies beyond the real universe, virtual with persistent multiuser environment merging both digital and physical world.” 2. AI-Blockchain “Blockchain as a decentralized platform with distributed ledger database can bring a blend of centralized and distributed ecosystem. ” 3. Blockchain-Metaverse convergence “Many blockchain-based systems now use non-fungible tokens and cryptocurrency to create, own, and monetize decentralized digital assets. Due to the inherent flaws of centralized data storage, blockchain exists as a decentralized, distributed database secured by encryption, allowing users access to any digital place, particularly in a blockchain-based metaverse. ” 3
  4. 4. 2-INTRODUCTION • Title A decentralized authentication model for the metaverse using AI- Based blockchain technology • Significance Immutable AI models empower the authentication mechanism with better efficiency and seamless user experience to the metaverse users. [1] • Literature Review • Research Gap With respect to the above Literature Review centralized authentication framework needs to be formulated for metaverse users to provide Immersive and Continuous User experience. • Research Question How to integrate blockchain with AI in metaverse? No Category Factors 1 Knowledge Password [2] 2 Knowledge key [3] 3 Biometric physiology [4] 4 Biometric Behavior [5] 5 Knowledge+Biometric Multi-factor [6] 4
  5. 5. 3-PROBLEM STATEMENT 1. Authentication in re-logging in metaverse 2. Lack of immersive user experience 3. Different authentication mechanism for different metaverse enabled environments 4. Attacks on AI based frameworks (Adversarial AI) 5
  6. 6. 4-RESEARCH QUESTIONS 1. How to integrate blockchain with AI in metaverse? 2. How blockchain based strategy can be efficient with respect to authentication? 3. Which environment can be used to test the efficiency? 4. What ML model can be efficient for handling authentication issue in Blockchain assisted metaverse system? 5. What are the metrics that can be efficient for testing the proposed ML based methodology? 6. Which dataset is suitable to test in the environment of blockchain assisted metaverse application? 6
  7. 7. 5-STATEMENT OF OBJECTIVES 1. Integration of AI model with blockchain 2. Formulate an authentication framework which provide a seamless user experience for metaverse applications 3. Find which database is best suitable for the authentication for users in metaverse. 4. Find the best metrics for the proposed framework 7
  8. 8. 6-SCOPE OF RESEARCH A decentralized authentication model for the metaverse using AI-Based blockchain technology No Research Question Research Objective Methodology Outcome 1 How to integrate blockchain with AI in metaverse? Integration of AI model with blockchain (Objective 1) a. Literature search b. Systematic Literature Review c. Proof of concept Literature collected about the fusion of Blockchain and AI and integration with Metaverse 2 How blockchain based strategy can be efficient with respect to authentication? Formulate an authentication framework which provide a seamless user experience for metaverse applications (Objective 2) a. Data collection b. Initial Framework Design c. Final Framework Design d. Proof of concept AI-Blockchain based authentication framework 3 Which environment can be used to test the efficiency? Find which database is best suitable for the authentication for users in metaverse (Objective 3) a. Training of AI model b. Perform Simulation Setup of testing environment 4 What ML model can be efficient for handling authentication issue in Blockchain assisted metaverse system? Integration of AI model with blockchain (Objective 1) a. Literature search b. Systematic Literature Review c. Proof of concept Literature collected about the fusion of Blockchain and AI and integration with Metaverse 5 What are the metrics that can be efficient for testing the proposed ML based methodology? Find the best metrics for the proposed framework (Objective 4) a. Testing Framework using simulation b. Validating and Tunning Simulated Prototype of Authentication Framework for metaverse 6 Which dataset is suitable to test in the environment of blockchain assisted metaverse application? Find which database is best suitable for the authentication for users in metaverse (Objective 3) a. Training of AI model b. Perform Simulation Setup of testing environment 8
  9. 9. 7-LITERATURE REVIEW 03 04 05 Trusted AI with Blockchain to Empower Metaverse – Secure AI training and AI deployed model [1]. 01 02 Password-Authenticated Decentralized Identities - self- sovereign username-password pairs [2] OcuLock: Exploring Human Visual System for Authentication in Virtual Reality Headmounted Display – Authentication between devices [4] PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones. – Required Password and keep the system as a key [6] Design of Secure Mutual Authentication Scheme for Metaverse Environments Using Blockchain – Identity based Authentication [7] 9
  10. 10. 7-LITERATURE REVIEW (Table) No Category Factors Virtual Physical Immersive Continous Mutual session key 1 Knowledge Password [2] Yes No No No Yes Yes 2 Knowledge Key [3] No Yes Yes Yes Yes Yes 3 Biometric Physiology [4] Yes Yes Yes No No No 4 Biometric Behavior [5] Yes Yes Yes Yes No No 5 Knowledge + Biometric Multi-factor [6] Yes Yes No No Yes Yes 10
  11. 11. 8-PROPOSED SOLUTION AI BLOCKCHAIN METAVERSE 01 02 03 AUTHENTICATION 11
  12. 12. 12 12
  13. 13. 8.1-PROTOCOL FOR DATA COLLECTION • Best suitable ML model (Based on Performance and accuracy) • Finding best dataset for model training ( Kaggle ) • Integration of blockchain and AI ( SLR ) • Feature Extraction (Huggyfaces, SIFT, SURF and OpenCV) 13
  14. 14. 9-EXPECTED RESULTS 01 02 03 04 USER Authentication paramets AI MODEL Authentication For multiple metaverse environments METAVERSE Immersive user experience Prediction based auth 14
  15. 15. 10-TIMELINE Months/Stages Oct 2022 Nov. 2022 Dec. 2022 Jan. 2023 Feb. 2023 Mar. 2023 May. 2023 Literature review Literature review Problem formulation Problem formulation Solving Problem Solving Problem Paper Submission Paper Submission More extensions of problem More extensions of problem Write up and submission of thesis Write up Submission of thesis 15
  16. 16. 11-REFERENCES 1. Badruddoja, S., Dantu, R., He, Y., Thompson, M., Salau, A., & Upadhyay, K. (2022, September). Trusted AI with Blockchain to Empower Metaverse. In 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA) (pp. 237-244). IEEE. 2. Szalachowski, P. (2021). Password-Authenticated Decentralized Identities. IEEE Transactions on Information Forensics and Security, 16, 4801-4810.. 3. Gope, P., & Sikdar, B. (2018). Lightweight and privacy-preserving two-factor authentication scheme for IoT devices. IEEE Internet of Things Journal, 6(1), 580-589. 4. Luo, S., Nguyen, A., Song, C., Lin, F., Xu, W., & Yan, Z. (2020, January). OcuLock: Exploring human visual system for authentication in virtual reality head-mounted display. In 2020 Network and Distributed System Security Symposium (NDSS). 5. Lee, S., Choi, W., & Lee, D. H. (2021, November). Usable user authentication on a smartwatch using vibration. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (pp. 304-319). 6. Gunasinghe, H., & Bertino, E. (2017). PrivBioMTAuth: Privacy preserving biometrics-based and user centric protocol for user authentication from mobile phones. IEEE Transactions on Information Forensics and Security, 13(4), 1042-1057. 7. Ryu, J., Son, S., Lee, J., Park, Y., & Park, Y. (2022). Design of Secure Mutual Authentication Scheme for Metaverse Environments Using Blockchain. Ieee Access, 10, 98944-98958. 16
  17. 17. Curriculum Vitae of MS Scholar Name: Muhammad Zeeshan Arshad Father’s Name: Muhammad Arshad khokhar Registration Number: 211824 Contact Information: Address: Flat no A-38/12, PAF Complex E-9, Islamabad. Phone: 0334-5088829 E-mail(s): 211824@students.au.edu.pk Specialization Area: Blockchain, Machine Learning, Metaverse 17
  18. 18. Undertaking I certify that the research work titled “A decentralized authentication model for the metaverse using AI-Based blockchain technology” is my own work. The work has not been presented elsewhere for assessment in whole or in part, and where the material has been used from other sources, it has been properly acknowledged/referred. 18

Hinweis der Redaktion

  • [2] designed a password-authenticated decentralized identity by which users register their self-sovereign username-password pairs and use them as universal credentials. This kind of password-authenticated method can realize the security authentication between the device and the service provider. However, these methods require the user to enter a password during the authentication process, which fails to achieve immersive authentication
    [4] Current mutual authentication schemes primarily focus on onetime authentication between devices as in and have not yet considered dynamic authentication between avatars
    [6] introduces a three-factor authentication scheme based on a signed identity token that encodes the user’s biometric identifier and the password entered by the user into the token. Although this method requires users to enter a password during the authentication process
  • [2] designed a password-authenticated decentralized identity by which users register their self-sovereign username-password pairs and use them as universal credentials. This kind of password-authenticated method can realize the security authentication between the device and the service provider. However, these methods require the user to enter a password during the authentication process, which fails to achieve immersive authentication
    [4] Current mutual authentication schemes primarily focus on onetime authentication between devices as in and have not yet considered dynamic authentication between avatars
    [6] introduces a three-factor authentication scheme based on a signed identity token that encodes the user’s biometric identifier and the password entered by the user into the token. Although this method requires users to enter a password during the authentication process

×