Overview and purpose of realistic content security model. Realistic content security model. Metaverse, Digital Twin.

Metaverse 1329 58378

Immersive content refers to next-generation content that maximizes human five senses to provide experiences similar to reality. New content in the 5G era, realistic content has begun. Realistic contents represented by immersion, interaction, and intelligence are typical examples. Examples include virtual reality (VR), augmented reality (AR), mixed reality (MR), and hologram.

□ Overview and purpose of realistic content security model

Sensory content refers to content that maximizes human senses and interacts with users based on data by utilizing sensory technologies such as virtual reality, augmented reality, and hologram. These immersive contents provide a high sense of reality and experience through features such as immersion, interaction, and intelligence.

The immersive content industry ecosystem is composed of content, platform, network, and devices, and immersive content is based on the development of ICT technology, such as the expansion of the spread of smartphones and the evolution of devices, and the active investment of world-class IT companies such as Facebook, Google, and Apple. is growing rapidly

In addition, as the sensory content industry is a major future growth engine, many countries are promoting policies to foster the sensory content industry. The immersive content industry is in the limelight due to its high utilization through convergence with industries in various fields such as education, defense, and medical as well as culture, art, and tourism. As a result, the importance of realistic content has been further highlighted. The Korean government is also promoting various policies to lead the realistic content industry.

The immersive content industry, which is rapidly developing due to these environmental and policy factors, is also becoming a reality as various security threats such as information leakage and user privacy invasion through security vulnerabilities of each component of platform, network, and device.

In addition, the metaverse-related industry that provides new experiences through the new virtual world is also active, and many problems are observed that new threats occurring in the virtual world lead to the real world, so caution is required. In order to support the development of the safe sensory content industry, a ‘realistic content security model’ was developed and distributed. Using this, it is necessary to improve the applicability of security by supporting vulnerability checks and consulting at industrial sites and to enhance the reality of the security model.

□ Realistic content security model

The government supports the development of security guidelines, the establishment of a secure living lab, the development of standard security models, institutionalization, and diffusion to strengthen security for the convergence industry. The immersive content security sector, which was selected as one of the five convergence industries and continuously developed, was provided in various ways, from immersive content security living labs to security models and consulting support, depending on the stage.

In order to support the development of a safe sensory content industry, the sensory content industry was classified and its components and structure analyzed to develop a ‘realistic content security model’ that presented security requirements to respond to possible security threats.

□ Realistic Contents Security Model PART2: Metaverse, Digital Twin


Metaverse, Digital Twin
Metaverse, Digital Twin

Metaverse, Digital Twin’ analyzes the service structure and flow from production to transmission and use of the area to identify possible security threats and suggests countermeasures.

In order to present specific measures to prevent and remove the identified security threats, the security requirements to be applied in the metaverse and digital twin environments are described. The security requirements to be applied in the metaverse and digital twin service environment were divided into seven categories (administrative security, information system, content application, content API, MEC cloud management console, device used, source code, and personal information). Inspection and countermeasures for the corresponding security requirements can be found in Chapter 5 of the Realistic Contents Security Model Part 1, and can be referred to by the item number of each security requirement.

□Realistic content (Metaverse, Digital Twin) service components and subject to protection

▶ Simulation production

 Simulation production server

 Simulation distribution server

 Test server

 Configuration management server

 NAS server

 DBMS for development

 Digital Twin DB

 Simulation DB

 Analysis DB

 PC for simulation production

 Business PC

 Simulation content

 Simulation source code, etc.

▶ 5G network

 5G MEC cloud management console

 Cloud storage

 Cloud container

 Cloud instance (server)

 Cloud DBMS, etc.

▶ Simulation system

 Simulation API Server

 Application server providing simulation

 Digital twin main server

 Digital twin virtual server

 Simulation transmission server

 Web server providing simulation

 Digital twin virtualization server

 Simulation API

 Simulation provision application

 Simulation DB

 Network Equipment

 Information protection system

 Operator PC, etc.

▶ Device used

 Devices using holograms

 Administrator HMD

 Administrator PC

 Administrator terminal, etc.

□ Realistic content (metaverse, digital twin) security architecture

Based on the configuration of the metaverse and digital twin services, protection targets and security threat scenarios were derived, and based on this, a security architecture was derived and presented. The area is divided into ‘production environment, transmission environment, and use environment’, and security technologies and solutions are mapped and presented to respond to security threats.

▶ Metaverse Security Model

The metaverse security model presents more detailed security requirements by classifying the realistic content security model PART2: Metaverse and Digital Twin, developed in 21, by classifying the structure of the ‘Metaverse Ecosystem’, service flow, and stakeholders in the ecosystem. It is divided into ‘Metabus operators’, ‘Metabus content creators’, and ‘Metabus service users’, and the security rules to be followed by each stakeholder are presented and detailed so that they can be used immediately.

In the metaverse security model, the life cycle of the metaverse is classified, and stakeholders are guided to implement security accordingly. Therefore, the subject of protection here must be interpreted including the components and life cycle activities in the metaverse structure included in the life cycle.

▶ Metaverse Security Architecture

After analyzing the security threats identified through metaverse structure, life cycle, and role analysis among stakeholders, and countermeasures against them, the metaverse security architecture was presented as follows.

Metaverse Security Architecture
Metaverse Security Architecture

Source : Ministry of Science and ICT, Korea Internet & Security Agency

답글 남기기

이메일 주소는 공개되지 않습니다. 필수 필드는 *로 표시됩니다