{"id":7557,"date":"2024-06-30T11:38:32","date_gmt":"2024-06-30T10:38:32","guid":{"rendered":"https:\/\/icertpublication.com\/?page_id=7557"},"modified":"2024-07-07T09:35:14","modified_gmt":"2024-07-07T08:35:14","slug":"decentralized-identity-verification-in-metaverse-auditing-using-blockchain-technology","status":"publish","type":"page","link":"https:\/\/icertpublication.com\/index.php\/shodh-sari-2\/shodh-sari-vol-3-issue-3\/decentralized-identity-verification-in-metaverse-auditing-using-blockchain-technology\/","title":{"rendered":"Decentralized Identity Verification in Metaverse Auditing Using Blockchain Technology"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"7557\" class=\"elementor elementor-7557\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b5f2b09 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b5f2b09\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ff6eb05\" data-id=\"ff6eb05\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d48de84 elementor-widget elementor-widget-heading\" data-id=\"d48de84\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Decentralized Identity Verification in Metaverse Auditing Using Blockchain Technology\n<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aa9821c elementor-widget elementor-widget-text-editor\" data-id=\"aa9821c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Arial,sans-serif; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Ganapathy, Venkatasubramanian<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Arial,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Faculty in Auditing Department, Southern India Regional Council of the Institute of Chartered Accountants of India (SIRC of ICAI), Chennai, Tamil Nadu, Bharat<\/span><\/p>\n<p><b id=\"docs-internal-guid-f69d7576-7fff-fac7-ffc4-e4caa0acafa1\" style=\"font-weight: normal;\">&nbsp;<\/b><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Arial,sans-serif; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Abstract<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Arial,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">This research paper presents a comprehensive review of decentralized identity verification in the context of metaverse auditing, leveraging blockchain technology. With the rapid evolution of virtual environments and the emergence of the metaverse, ensuring trust, transparency, and security becomes paramount. Traditional centralized identity verification systems face challenges in such decentralized and dynamic environments. Blockchain technology offers promising solutions by providing a transparent, immutable, and decentralized ledger for identity management and verification. Conceptual Analysis research methodology used in this research paper because theoretical and conceptual clarity are crucial for understanding complex phenomena. The paper begins by exploring the concept of decentralized identity management systems and their significance in virtual environments. It discusses various challenges associated with traditional identity verification methods and highlights the potential of blockchain-based solutions in addressing these challenges. Through a systematic literature review, the paper examines existing research and developments in decentralized identity verification, metaverse auditing, and blockchain technology. Key topics covered include the architecture of decentralized identity systems, consensus mechanisms for identity verification on blockchain networks, privacy-preserving techniques, and interoperability standards for cross-platform identity management. Furthermore, the paper investigates the role of smart contracts and decentralized applications (DApps) in facilitating identity verification processes within the metaverse. The review also discusses the potential implications of decentralized identity verification in enhancing trust and security in virtual economies, enabling seamless user experiences, and fostering innovation in digital asset management. Moreover, it identifies current gaps and challenges in the field and proposes future research directions to address these issues. Overall, this research paper contributes to the understanding of decentralized identity verification in metaverse auditing using blockchain technology. It serves as a valuable resource for researchers, practitioners, and policymakers interested in exploring the intersection of decentralized identity, virtual environments, and blockchain technology. The insights provided aim to stimulate further research and innovation in this rapidly evolving domain.&nbsp;<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Arial,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"><br><\/span><\/p>\n<p>&nbsp;<span style=\"font-style: italic; font-size: 12pt; text-align: justify; background-color: transparent; font-family: Arial, sans-serif; color: rgb(0, 0, 0); font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Keywords:<\/span><span style=\"font-style: italic; text-align: justify; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; background-color: var(--ast-global-color-5);\"> <\/span><span style=\"font-size: 12pt; text-align: justify; background-color: transparent; font-family: Arial, sans-serif; color: rgb(0, 0, 0); font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Decentralized Identity Verification (DIV), Metaverse Auditing, Blockchain Technology, Virtual Environments, Smart Contracts, Decentralized Applications (DApps), Digital Asset Management, Privacy-preserving techniques<\/span><\/p>\n<p><b style=\"font-weight: normal;\">&nbsp;<\/b><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.7999999999999998; margin-left: -0.1pt; text-align: center; margin-top: 0pt; margin-bottom: 10pt;\"><span style=\"font-size: 12pt; font-family: Arial,sans-serif; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Impact Statement<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.7999999999999998; margin-left: -0.1pt; text-align: justify; margin-top: 0pt; margin-bottom: 10pt;\"><span style=\"font-size: 12pt; font-family: Arial,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">This research paper explores the integration of decentralized identity verification within the context of metaverse auditing, leveraging blockchain technology to enhance security, privacy, and trust. As the metaverse becomes an increasingly significant aspect of digital interaction, ensuring robust and reliable identity verification mechanisms is crucial. Traditional centralized systems are fraught with vulnerabilities, such as single points of failure, susceptibility to hacks, and privacy concerns. By employing blockchain technology, this research addresses these issues, offering a decentralized approach that distributes trust and verification processes across a secure, immutable ledger. The proposed solution not only fortifies the integrity of identity verification in virtual environments but also aligns with the growing demand for user-controlled data privacy. Blockchain&#8217;s inherent characteristics of transparency, immutability, and decentralization provide a resilient framework that mitigates risks associated with identity theft and fraud. Furthermore, this research contributes to the broader adoption of decentralized technologies, demonstrating their practical applications and benefits in emerging digital landscapes. Implementing decentralized identity verification in metaverse auditing could revolutionize various sectors, including gaming, virtual commerce, education, and social interaction. By enhancing trust and security, this approach paves the way for safer, more reliable virtual experiences, fostering greater user confidence and engagement. The findings and methodologies outlined in this paper not only advance academic discourse but also offer actionable insights for developers, policymakers, and stakeholders seeking to navigate and harness the potential of the metaverse securely and ethically.<\/span><\/p>\n<p><b style=\"font-weight: normal;\">&nbsp;<\/b><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.7999999999999998; margin-left: -0.1pt; text-align: center; margin-top: 0pt; margin-bottom: 10pt;\"><span style=\"font-size: 12pt; font-family: Arial,sans-serif; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">About Author<\/span><\/p>\n<p><span style=\"font-size: 12pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Mr. Venkatasubramanian Ganapathy, M.Phil., B.Ed., M. Com, D.P.C.S.<\/span><span style=\"font-size: 12pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\"> is a faculty in Auditing Department, Southern India Regional Council of the Institute of Chartered Accountants of India (SIRC of ICAI), Chennai, Tamil Nadu, Bharat. He had over 18+ years\u2019 academic experience and 9 years corporate experience. He has presented many research papers in International and National Conference also; he has published many research papers in National and International Journals. He also participated in 10 National Conferences, 7 International Conferences, 260 National Webinars, 341 International Webinars and many FDPs. His area of interest are Auditing, Finance and Accounting, Taxation, AI, ML, DL, Cloud Computing, Osmotic Computing, Blockchain Technology, Big Data Analytics, Python, RDBMS, Serverless Computing, Forensic Auditing, Cyber Security etc., He has been recognized with many Awards. His focus on implementation of latest technologies in his field.&nbsp; <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-df1255d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"df1255d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ab9c3fb\" data-id=\"ab9c3fb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bb445c8 elementor-widget elementor-widget-text-editor\" data-id=\"bb445c8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: center;margin-top:0pt;margin-bottom:0pt;\"><span style=\"font-size:12pt;font-family:Arial,sans-serif;color:#000000;background-color:transparent;font-weight:700;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">References<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span id=\"docs-internal-guid-72b7da08-7fff-1c54-172b-e7f2cdbb6cf7\"><\/span><\/p><ol style=\"margin-top:0;margin-bottom:0;padding-inline-start:48px;\"><li dir=\"ltr\" style=\"list-style-type:decimal;font-size:12pt;font-family:Arial,sans-serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height:1.7999999999999998;margin-top:0pt;margin-bottom:0pt;\" role=\"presentation\"><span style=\"font-size:12pt;font-family:Arial,sans-serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Blockchain Council. The Ultimate guide to decentralized identity in blockchain. https:\/\/www.blockchain-council.org\/blockchain\/decentralized-identity-in-blockchain\/<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type:decimal;font-size:12pt;font-family:'Times New Roman',serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height:1.7999999999999998;margin-top:0pt;margin-bottom:0pt;\" role=\"presentation\"><span style=\"font-size:12pt;font-family:Arial,sans-serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Decentralized identity management. <\/span><span style=\"font-size:12pt;font-family:Arial,sans-serif;color:#000000;background-color:transparent;font-weight:700;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">https:\/\/www.dock.io\/post\/decentralized-identity<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type:decimal;font-size:12pt;font-family:Arial,sans-serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height:1.7999999999999998;margin-top:0pt;margin-bottom:0pt;\" role=\"presentation\"><span style=\"font-size:12pt;font-family:Arial,sans-serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Ganapathy, V. (2023). AI in auditing: A comprehensive review of applications, benefits and challenges. <\/span><span style=\"font-size:12pt;font-family:Arial,sans-serif;color:#000000;background-color:transparent;font-weight:400;font-style:italic;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Shodh Sari-An International Multidisciplinary Journal<\/span><span style=\"font-size:12pt;font-family:Arial,sans-serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">, <\/span><span style=\"font-size:12pt;font-family:Arial,sans-serif;color:#000000;background-color:transparent;font-weight:400;font-style:italic;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">02<\/span><span style=\"font-size:12pt;font-family:Arial,sans-serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">(4), 328\u2013343. <\/span><a href=\"https:\/\/doi.org\/10.59231\/SARI7643\" style=\"text-decoration:none;\"><span style=\"font-size:12pt;font-family:Arial,sans-serif;color:#0000ff;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:underline;-webkit-text-decoration-skip:none;text-decoration-skip-ink:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">https:\/\/doi.org\/10.59231\/SARI7643<\/span><\/a><\/p><\/li><li dir=\"ltr\" style=\"list-style-type:decimal;font-size:12pt;font-family:Arial,sans-serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height:1.7999999999999998;margin-top:0pt;margin-bottom:0pt;\" role=\"presentation\"><span style=\"font-size:12pt;font-family:Arial,sans-serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Information Systems Audit and Control Association (Information Systems Audit and Control System): Auditing in a Virtual Universe. https:\/\/www.isaca.org\/resources\/news-and-trends\/isaca-now-blog\/2022\/auditing-in-a-virtual-universe<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type:decimal;font-size:12pt;font-family:Arial,sans-serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height:1.7999999999999998;margin-top:0pt;margin-bottom:0pt;\" role=\"presentation\"><span style=\"font-size:12pt;font-family:Arial,sans-serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">KPMG (Klynveld Peat Marwick Goerdeler): Digital Internal Audit. https:\/\/kpmg.com\/us\/en\/articles\/2023\/upsides-risks-extended-reality-metaverse.html<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type:decimal;font-size:12pt;font-family:'Times New Roman',serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height:1.7999999999999998;margin-top:0pt;margin-bottom:0pt;\" role=\"presentation\"><span style=\"font-size:12pt;font-family:Arial,sans-serif;color:#000000;background-color:transparent;font-weight:700;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">MDPI<\/span><span style=\"font-size:12pt;font-family:Arial,sans-serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\"> (Multidisciplinary Digital Publishing Institute). <\/span><span style=\"font-size:12pt;font-family:Arial,sans-serif;color:#000000;background-color:transparent;font-weight:700;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">https:\/\/www.mdpi.com\/1999-4893\/16\/1\/4<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type:decimal;font-size:12pt;font-family:Arial,sans-serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height:1.7999999999999998;margin-top:0pt;margin-bottom:0pt;\" role=\"presentation\"><span style=\"font-size:12pt;font-family:Arial,sans-serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Verifiable credentials data model v2.0. https:\/\/www.w3.org\/TR\/vc-data-model-2.0\/<\/span><\/p><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2e664be elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2e664be\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c8a58ab\" data-id=\"c8a58ab\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Decentralized Identity Verification in Metaverse Auditing Using Blockchain Technology Ganapathy, Venkatasubramanian Faculty in Auditing Department, Southern India Regional Council of the Institute of Chartered Accountants of India (SIRC of ICAI), Chennai, Tamil Nadu, Bharat &nbsp; Abstract This research paper presents a comprehensive review of decentralized identity verification in the context of metaverse auditing, leveraging blockchain [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":7443,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-7557","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/icertpublication.com\/index.php\/wp-json\/wp\/v2\/pages\/7557","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icertpublication.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/icertpublication.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/icertpublication.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/icertpublication.com\/index.php\/wp-json\/wp\/v2\/comments?post=7557"}],"version-history":[{"count":19,"href":"https:\/\/icertpublication.com\/index.php\/wp-json\/wp\/v2\/pages\/7557\/revisions"}],"predecessor-version":[{"id":8248,"href":"https:\/\/icertpublication.com\/index.php\/wp-json\/wp\/v2\/pages\/7557\/revisions\/8248"}],"up":[{"embeddable":true,"href":"https:\/\/icertpublication.com\/index.php\/wp-json\/wp\/v2\/pages\/7443"}],"wp:attachment":[{"href":"https:\/\/icertpublication.com\/index.php\/wp-json\/wp\/v2\/media?parent=7557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}