EPIC: Efficient Privacy-Preserving Contact Tracing for Infection Detection

@article{Altuwaiyan2018EPICEP,
  title={EPIC: Efficient Privacy-Preserving Contact Tracing for Infection Detection},
  author={Thamer Altuwaiyan and Mohammad Hadian and Xiaohui Liang},
  journal={2018 IEEE International Conference on Communications (ICC)},
  year={2018},
  pages={1-6}
}
The world has experienced many epidemic diseases in the past, SARS, H1N1, and Ebola are some examples of these diseases. When those diseases outbreak, they spread very quickly among people and it becomes a challenge to trace the source in order to control the disease. In this paper, we propose an efficient privacy-preserving contact tracing for infection detection (EPIC) which enables users to securely upload their data to the server and later in case of one user got infected other users can… 

Figures and Tables from this paper

Lattice Cryptography based Geo-encrypted Contact Tracing for Infection Detection

TLDR
The main aim of the work is to design an algorithm in such a way that the encrypted transferred data can only be decrypted at the server and in-between data leakage can be prevented.

A Privacy-Protecting Framework of Autonomous Contact Tracing for SARS-CoV-2 and Beyond

TLDR
A Bluetooth based contact tracing hardware with anonymous IDs to solve both the drawbacks of the existing approaches and highlight the effectiveness of the technique to curb the spread of any contagious disease.

ContactChaser: A Simple yet Effective Contact Tracing Scheme with Strong Privacy

TLDR
This paper proposes ContactChaser, a simple but effective contact tracing scheme based on group signature that is able to prevent most attacks, especially relay and replay attacks, so that it can effectively avoid false alerts and reduce unreported contacts.

CoAvoid: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases

TLDR
CoAvoid is a decentralized, privacy-preserved contact tracing system that features good dependability and usability, and can reduce upload data by at least 90% and simultaneously resist wormhole and replay attacks in various scenarios.

Privacy-Preserving Automated Exposure Notification

TLDR
This work is among the first to focus on the privacy aspects of automated exposure notification, and introduces two privacy-preserving exposure notification schemes based on proximity detection that provide strong privacy for non-diagnosed individuals and some privacy for diagnosed individuals.

CONTAIN: Privacy-oriented Contact Tracing Protocols for Epidemics

TLDR
The goal of CONTAIN is to allow users to determine with complete privacy if and when they have been within a short distance of someone that is infected, and the privacy guarantees provided by CONTAIN are identified and proved.

Review and Critical Analysis of Privacy-Preserving Infection Tracking and Contact Tracing

TLDR
A comprehensive review on the key enabling methods used to realize the infrastructure around these infection tracking and contact tracing methods is presented, and recommendations are made for the most effective way to develop such a practice.

A Privacy-Preserving Solution for Proximity Tracing Avoiding Identifier Exchanging

TLDR
A solution leveraging GPS to detect proximity, and BLE only to improve accuracy, with no exchange of identifiers is proposed, while ensuring that the server does not learn anything about locations of users.

Privacy-Preserving Contact Tracing of COVID-19 Patients

TLDR
This work proposes a system for privacy-preserving contact tracing, which automates tracing processes and quarantining everyone who came in contact with infected people, as well as arriving travelers, to slow down infection rates and loosen lockdown measures.

ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized - Decentralized Divide for Stronger Privacy

TLDR
Among other additional security measures, this work detail how the use of secret sharing can prevent the unnecessary and potentially panic-inducing warning of contacts that have only been around the infected person for a very brief time period.
...

References

SHOWING 1-10 OF 19 REFERENCES

Exploiting Social Network to Enhance Human-to-Human Infection Analysis without Privacy Leakage

TLDR
This paper proposes a privacy-preserving data query method based on conditional oblivious transfer to guarantee that only the authorized entities can query users’ social data and the social cloud server cannot infer anything during the query.

Infection tracing in smart hospitals

TLDR
A systematic infection detection framework utilizing mobile communication technologies including mobile networking and encounter statistics during infection breakouts is introduced, targeting smart connected hospitals using Internet of things.

Effective epidemic control and source tracing through mobile social sensing over WBANs

TLDR
This paper designs a mobile phone capability driven hierarchical social interaction detection framework integrated with WBANs and proposes a set of epidemic source tracing and control algorithms including genetic algorithm based search and dominating set identification algorithms to effectively identify epidemic sources and inhibit epidemic spread.

IoT-based cloud framework to control Ebola virus outbreak

TLDR
A novel architecture based on Radio Frequency Identification Device (RFID), wearable sensor technology, and cloud computing infrastructure is proposed for the detection and monitoring of Ebola infected patients to prevent the spreading of the infection at the early stage of the outbreak.

Privacy-Preserving Distributed Profile Matching in Proximity-Based Mobile Social Networks

TLDR
In FindU, an initiating user can find from a group of users the one whose profile best matches with his/her; to limit the risk of privacy exposure, only necessary and minimal information about the private attributes of the participating users is exchanged.

SPICE: Secure Proximity-based Infrastructure for Close Encounters

TLDR
A crowdsourcing system that extends the capabilities of location-based applications and allows users to connect and exchange information with users in spatial and temporal proximity and describes the challenges in implementing the protocol in a real-world application.

Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking

TLDR
This paper designs novel fine-grained private matching protocols for proximity-based mobile social networking that allow finer differentiation between PMSN users and can support a wide range of matching metrics at different privacy levels.

We saw each other on the subway: secure, anonymous proximity-based missed connections

There is an inherent tension between the value provided by Location-Based Services (LBSs) and the location-privacy concerns they raise. Unfortunately, users are often forced to either boycott LBS

Can homomorphic encryption be practical?

TLDR
A proof-of-concept implementation of the recent somewhat homomorphic encryption scheme of Brakerski and Vaikuntanathan, whose security relies on the "ring learning with errors" (Ring LWE) problem, and a number of application-specific optimizations to the encryption scheme, including the ability to convert between different message encodings in a ciphertext.

Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs

TLDR
This paper constructs a flexible framework for secure encounter-based social networks, which can be used to construct networks that offer different security, privacy, and availability guarantees, and describes two example constructions derived from this framework.