Contact tracing solutions for COVID-19: applications, data privacy and security

Gustavo Betarte, J. Campo, Andrea Delgado, Laura González, Álvaro Martín, R. Martínez, Bárbara Muracciole
{"title":"Contact tracing solutions for COVID-19: applications, data privacy and security","authors":"Gustavo Betarte, J. Campo, Andrea Delgado, Laura González, Álvaro Martín, R. Martínez, Bárbara Muracciole","doi":"10.19153/cleiej.25.2.4","DOIUrl":null,"url":null,"abstract":"\n \n \nSince the beginning of 2020, COVID-19 has had a strong impact on the health of the world population. The mostly used approach to stop the epidemic is the application of controls of a classic epidemic such as case isolation, contact monitoring, and quarantine, as well as physical distancing and hygienic measures. Tracing the contacts of infected people is one of the main strategies for controlling the pandemic. Manual contact tracing is a slow, error-prone (by omission or forgotten) process, and vulnerable in terms of security and privacy. Furthermore, it needs to be carried out by specially trained personnel and it is not effective in identifying contacts with strangers (for example in public transport, supermarkets, etc). Given the high rates of contagion, which makes difficult an effective manual contact tracing, multiple initiatives arose for developing digital proximity tracing technologies. In this paper, we discuss in depth the security and personal data protection requirements that these technologies must satisfy, and we present an exhaustive and detailed list of the various applications that have been deployed globally, as well as the underlying infrastructure models and technologies they used. In particular, we identify potential threats that could undermine the satisfaction of the analyzed requirements, violating hegemonic personal data protection regulations. \n \n \n","PeriodicalId":418941,"journal":{"name":"CLEI Electron. J.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"CLEI Electron. J.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.19153/cleiej.25.2.4","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Since the beginning of 2020, COVID-19 has had a strong impact on the health of the world population. The mostly used approach to stop the epidemic is the application of controls of a classic epidemic such as case isolation, contact monitoring, and quarantine, as well as physical distancing and hygienic measures. Tracing the contacts of infected people is one of the main strategies for controlling the pandemic. Manual contact tracing is a slow, error-prone (by omission or forgotten) process, and vulnerable in terms of security and privacy. Furthermore, it needs to be carried out by specially trained personnel and it is not effective in identifying contacts with strangers (for example in public transport, supermarkets, etc). Given the high rates of contagion, which makes difficult an effective manual contact tracing, multiple initiatives arose for developing digital proximity tracing technologies. In this paper, we discuss in depth the security and personal data protection requirements that these technologies must satisfy, and we present an exhaustive and detailed list of the various applications that have been deployed globally, as well as the underlying infrastructure models and technologies they used. In particular, we identify potential threats that could undermine the satisfaction of the analyzed requirements, violating hegemonic personal data protection regulations.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
COVID-19接触者追踪解决方案:应用程序、数据隐私和安全
自2020年初以来,COVID-19对世界人口的健康产生了重大影响。制止疫情的最常用方法是应用典型流行病的控制措施,如病例隔离、接触者监测和检疫,以及保持身体距离和卫生措施。追踪感染者的接触者是控制大流行的主要战略之一。手动接触追踪是一个缓慢、容易出错(由于遗漏或遗忘)的过程,并且在安全和隐私方面容易受到攻击。此外,它需要由受过专门培训的人员进行,并且在识别与陌生人的接触(例如在公共交通工具,超市等)方面效果不佳。鉴于传染率高,很难进行有效的人工接触追踪,因此出现了开发数字接近追踪技术的多种举措。在本文中,我们深入讨论了这些技术必须满足的安全性和个人数据保护要求,并提供了已在全球部署的各种应用程序的详尽和详细列表,以及它们使用的底层基础设施模型和技术。特别是,我们确定了可能破坏所分析要求的满足的潜在威胁,违反了主导的个人数据保护法规。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Cluster-based LSTM models to improve Dengue cases forecast Medium Access Control Techniques for Massive Machine-Type Communications in Cellular IoT Networks 2D Simplified Wildfire Spreading Model in Python: From NumPy to CuPy Preface to the CLTM-CLTD 2022 Special Issue On the specification and verification of the PCR parallel programming pattern in TLA+
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1