An Empirical Evaluation of Bluetooth-Based Decentralized

Total Page:16

File Type:pdf, Size:1020Kb

An Empirical Evaluation of Bluetooth-Based Decentralized 1 An Empirical Evaluation of Bluetooth-based Decentralized Contact Tracing in Crowds Hsu-Chun Hsiao, Chun-Ying Huang, Bing-Kai Hong, Shin-Ming Cheng, Hsin-Yuan Hu, Chia-Chien Wu, Jian-Sin Lee, Shih-Hung Wang, Wei Jeng This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible. Abstract—Digital contact tracing is being used by many coun- duration of such exposure, their mobility trajectories over time, tries to help contain COVID-19’s spread in a post-lockdown whether masks were worn, and whether the contact occurred world. Among the various available techniques, decentralized indoors or outdoors. contact tracing that uses Bluetooth received signal strength indi- cation (RSSI) to detect proximity is considered less of a privacy With the escalating scale of the COVID-19 pandemic, the risk than approaches that rely on collecting absolute locations via vast numbers of new cases identified via testing each day GPS, cellular-tower history, or QR-code scanning. As of October exceed the capacity of traditional contact tracing, the failures 2020, there have been millions of downloads of such Bluetooth- of which have been extensively reported [1]. Some local based contract-tracing apps, as more and more countries officially health services have even abandoned their former practice of adopt them. However, the effectiveness of these apps in the real world remains unclear due to a lack of empirical research that directly communicating with the close contacts of a case. Thus, includes realistic crowd sizes and densities. This study aims to governments are turning to digital contact tracing that utilizes fill that gap, by empirically investigating the effectiveness of mobile providers or mobile applications to help identify po- Bluetooth-based contact tracing in crowd environments with a tential contacts by means of GPS data, cell-tower connection total of 80 participants, emulating classrooms, moving lines, and history, QR-code scanning, and so forth. other types of real-world gatherings. The results confirm that Bluetooth RSSI is unreliable for detecting proximity, and that this However, large-scale collection of citizens’ digital footprints inaccuracy worsens in environments that are especially crowded. by governments has sparked concerns about mass surveillance. In other words, this technique may be least useful when it is Accordingly, to enhance the privacy of digital contact tracing, most in need, and that it is fragile when confronted by low- a number of decentralized approaches have been developed, cost jamming. Moreover, technical problems such as high energy capable of detecting close proximity between phones (and consumption and phone overheating caused by the contact- tracing app were found to negatively influence users’ willingness thus, presumably, those phones’ owners) without needing to to adopt it. On the bright side, however, Bluetooth RSSI may report each phone’s location to a centralized server. Many still be useful for detecting coarse-grained contact events, for of them use Bluetooth received signal strength indication example, proximity of up to 20m lasting for an hour. Based on our (RSSI) as a proxy for distance. The core of these apps is the findings, we recommend that existing contact-tracing apps can be periodic broadcasting via Bluetooth of anonymized, frequently re-purposed to focus on coarse-grained proximity detection, and that future ones calibrate distance estimates and adjust broadcast changing tokens (e.g., broadcasting every 100-270 ms and frequencies based on auxiliary information. changing every 15 minutes [2], [3]). These tokens contain no information about the phone or its owner, and each phone Keywords-Private contact tracing, COVID-19, Bluetooth RSSI stores the sent as well as received tokens. Thus, a user, Alice, arXiv:2011.04322v2 [cs.CY] 24 May 2021 who has tested positive can voluntarily publish all the tokens her phone sent during her potential transmission period (e.g., I. INTRODUCTION the past 14 days), such that another user, Bob, can download For decades, contact tracing has been known as an effective the tokens published by infected people and determine for method for controlling the spread of infectious diseases. In himself whether he has encountered any of them, and for how the traditional contact-tracing model, trained personnel use in- long, by matching them to his own phone’s received tokens. person or telephone interviews to identify and list those who Bob can then voluntarily seek help from health authorities have had meaningful exposure to diagnosed individuals during if his risk of exposure is considered high. Many apps of this a disease’s likely transmission period. The risk levels of those kind have built-in risk-estimation models, and may recommend contacts can then be determined based on factors such as the different measures (e.g., self-monitoring, commencing a 14- physical distances between them and the infected people, the day quarantine, or seeking medical attention) based on the risk levels they calculate. H.-C. Hsiao, H.-Y. Hu, C.-C. Wu J.-S. Lee, S.-H. Wang, W. Jeng are with As countries lift their lockdowns and reopen facilities, National Taiwan University, Taipei, Taiwan. there is a rush to deploy these Bluetooth-based decentralized C.-Y. Huang is with National Chiao Tung University, Hsinchu, Taiwan. S.-M. Cheng, B.-K. Hong are with National Taiwan University of Science contact-tracing apps. As of October 2020, some 20 countries and Technology, Taipei, Taiwan. and six U.S. states have adopted them. The EU is currently 2 planning a Europe-wide coronavirus-tracing network, based on example, contacts within 20m that last for at least an hour. The new infrastructure that will enable data-sharing between na- sampled phone users said they were more willing to use the tional contact-tracing apps [4]. In addition, Apple and Google similar apps 1) when in crowded environments and 2) while are planning to jointly release a new system called Exposure contact tracers from health departments were also using them. Notification Express, aimed at local health authorities that have not built their own apps [5]. II. BACKGROUND AND RELATED WORK Nevertheless, few studies have gauged the effectiveness of We summarize several representative privacy-preserving these apps in practice, with existing evaluations of Bluetooth- contact-tracing methods and previous studies that review them. based contact-tracing techniques relying on either simulation with mathematical models, or experiments involving either mobile devices only, or a very limited number of partici- A. Privacy-preserving contact tracing for COVID-19 pants. Accordingly, the present work empirically investigates There are two major approaches to privacy-preserving con- the effectiveness of Bluetooth-based contact tracing, in two tact tracing. The first adopts a decentralized design intended phases. In Phase 1, we will examine whether Bluetooth RSSI to minimize the amount of data that needs to be sent to a can reliably predict distance in a controlled experimental centralized server. The other applies cryptographic algorithms setting. Then, in Phase 2, based on estimated distances be- to protect sensitive user data. tween pairs of participants’ phones over time, we compare a) Decentralized design: The former approach is exem- detected proximity and contact events in a semi-controlled plified by Safe Path [6], DP3T [7], and Covid-Watch [3]. event: a real-world academic gathering, the ground truth of Safe Path logs a user’s movement routes in his/her mobile which will be carefully recorded. We recruited a total of 80 device and only exports that data to health authorities if that participants to use one Bluetooth-based contact-tracing app, user is diagnosed with the virus. When this happens, the which we modified from Covid-Watch-TCN, in our controlled exported dataset is first redacted to ensure privacy, and then (30 participants) and semi-controlled (50 participants) settings. is broadcast to other users to allow them to self-determine Our modifications allowed us to collect ground-truth data their likelihood of having been exposed. Rather than capturing and the phones’ usage logs. After both experimental phases and storing route information, DP3T and Covid-Watch contin- were completed, we also conducted a followup survey with uously broadcasts ephemeral Bluetooth identities, which are participants to enrich the data we had already obtained. published to other relevant users in the event of a positive This paper will address the following questions: diagnosis, again to aid their individual risk calculations. Many of them have been deployed in the wild, but their effectiveness • RQ1. Can the app reliably estimate the distance between is yet to be investigated, partially due to the lack of empirical its users based on Bluetooth RSSI under different crowd studies. parameters, e.g., standing still vs. walking, with or with- b) Cryptographic algorithms: The second, cryptography- out physical barriers, varying interpersonal distances, and based approach has been adopted by Private Set Intersection the presence of jamming? (PSI) [8] and TraceSecure [9]. PSI enables two parties to • RQ2. How accurately does the app detect proximity compute the intersection of their data in a privacy-preserving and contact events in realistic crowd environments, as way, with only the common data values being revealed. The compared with the ground truth of such
Recommended publications
  • Annual Report 2020
    Organization of the Petroleum Exporting Countries 2020 Annual Report 2020 Annual Report Organization of the Petroleum Exporting Countries Public Relations and Information Department Helferstorferstrasse 17 1010 Vienna, Austria Telephone: +43 1 211 12-0 Fax: +43 1 216 43 20 www.opec.org Chairman of the Editorial Board Mohammad Sanusi Barkindo, Secretary General Editor-in-Chief Head, PR and Information Department Hasan Hafidh Editors Maureen MacNeill Scott Laury Design Carola Bayer Production Andrea Birnbach Photographs Herwig Steiner Wolfgang Hammer Cover and illustrations: Shutterstock Copyright 2021 Organization of the Petroleum Exporting Countries ISSN 0474-6317 Printed in Austria by Wograndl Druck GmbH Table of Contents 1 Foreword 4 The world economy 4 14 Oil market developments 36 OPEC turns 60 14 46 COVID-19 turns oil market on its head in 2020 52 Activities of the Secretariat 36 86 Heads of Delegation 88 Board of Governors 90 Economic Commission Board 46 92 Officials of the Secretariat 94 Secretary General’s diary 100 Calendar 94 100 Annual Report 2020 Foreword Mohammad Sanusi Barkindo OPEC Secretary General Foreword The year 2020 was like no other in living history. Not since the ‘Spanish Flu’ 100 years ago has a pandemic struck our planet. COVID-19 is most certainly the distinguishing feature of the year, for both the oil market and mankind. At the World Economic Forum Meeting in Davos on 21–24 January, the feeling was overwhelmingly positive among leaders and commentators, and the outlook for the global economy in 2020 bright. This feeling and any belief that the spread of COVID-19 would be limited was shattered in Feb- ruary, as the virus started to appear worldwide and hot spots like IR Iran and Italy came into focus.
    [Show full text]
  • Slowing the Spread of Infectious Diseases Using Crowdsourced Data
    Slowing the Spread of Infectious Diseases Using Crowdsourced Data March 20, 2020 By Sydney Von Arx, Isaiah Becker-Mayer, Daniel Blank, Jesse Colligan, Rhys Fenwick, Mike Hittle, Mark Ingle, Oliver Nash, Victoria Nguyen, James Petrie, Jeff Schwaber, Zsombor Szabo, Akhil Veeraghanta, Mikhail Voloshin, Tina White, Helen Xue TABLE OF CONTENTS Introduction . 2 Covid Watch Mission Statement . 2 Privacy Focus . .. 2 Current Mobile Phone Interventions . 2 Making Interventions More Efficient). 3 Proposed System: Two Parts . 4 Part 1: Bluetooth Contact Tracing . 4 Part 2: User Recommendations . 6 Why You Should Care . 6 Incentives for Health Authorities . 6 Incentives for Individuals . .. 7 Quantitative Analysis of Impact . 7 Timeline to Deployment. 8 Conclusion . 9 Who Can Help . 9 Contributors, Advisors, and Acknowledgements . 10 This white paper was last updated with minor formatting alterations on April 8, 2020 . The last alterations to its content were made on April 26, 2020 . SLOWING THE SPREAD OF INFECTIOUS DISEASES USING CROWDSOURCED DATA INTRODUCTION invasive interventions carry significant human rights costs, includ- ing the temporary loss of personal freedom and fears around Covid Watch Mission Statement whether that freedom will be restored . We are a group of volunteers — researchers, software engineers, A mobile app with a strong privacy model may also have greater privacy and public health experts — who have developed a efficacy because people will be more likely to share accurate privacy-preserving mobile app intervention to reduce the spread data if they know that data is safe . Ensuring privacy prevents of COVID-19 . Our mobile app performs automatic decentralized COVID-19 patients from being ostracized or socially harmed on contact tracing using Bluetooth proximity networks .
    [Show full text]
  • Law, Technology, and Public Health in the COVID-19 Crisis
    Privacy in Pandemic: Law, Technology, and Public Health in the COVID-19 Crisis Tiffany C. Li* The COVID-19 pandemic has caused millions of deaths and disastrous consequences around the world, with lasting repercussions for every field of law, including privacy and technology. The unique characteristics of this pandemic have precipitated an increase in use of new technologies, including remote communications platforms, healthcare robots, and medical AI. Public and private actors alike are using new technologies, like heat sensing, and technologically influenced programs, like contact tracing, leading to a rise in government and corporate surveillance in sectors like healthcare, employment, education, and commerce. Advocates have raised the alarm for privacy and civil liberties violations, but the emergency nature of the pandemic has drowned out many concerns. This Article is the first comprehensive account of privacy in pandemic that maps the terrain of privacy impacts related to technology and public health responses to the COVID-19 crisis. Many have written on the general need for better health privacy protections, education privacy protections, consumer privacy protections, and protections against government and corporate surveillance. However, this Article is the first comprehensive article to examine these problems of privacy and technology specifically in light of the pandemic, arguing that the lens of the pandemic exposes the need for both wide-scale and small-scale reform of privacy law. This Article approaches these problems with a focus on technical realities and social * Visiting Clinical Assistant Professor, Boston University School of Law; Fellow, Yale Law School Information Society Project. The author thanks Tally Amir, Chinmayi Arun, Jack M.
    [Show full text]
  • REGULATING BIOMETRICS Global Approaches and Urgent Questions
    REGULATING BIOMETRICS Global Approaches and Urgent Questions Edited by Amba Kak September 2020 REGULATING BIOMETRICS Global Approaches and Urgent Questions Edited by Amba Kak September 2020 Cite as: Amba Kak, ed., “Regulating Biometrics: Global Approaches and Urgent Questions” AI Now Institute, September 1 2020, https://ainowinstitute.org/regulatingbiometrics.html. ACKNOWLEDGMENTS I would like to acknowledge and thank Luke Strathmann for his steadfast editorial support, without which this compendium would not have come together. Thanks also to Caren Litherland for her meticulous copyediting. I’m immensely grateful to the authors of the chapters in this compendium for their seamless collaboration, despite an unexpectedly challenging year in the midst of a pandemic. I’m equally grateful, as always, to my colleagues Meredith Whittaker, Alejandro Calcaño, Theodora Dryer, Sarah Myers West, Varoon Mathur, and Inioluwa Deborah Raji for their detailed feedback and edits; and to Jason Schultz and Kate Crawford for their guidance on an earlier draft. A special thank you to Carly Kind (Ada Lovelace Institute), Ella Jakubowska (EDRi), and Vidushi Marda (Article 19) for their generous feedback on the introductory chapter. ARTWORK The images used on the cover and throughout this compendium are by Heather Dewey-Hagborg, Visiting Assistant Professor of Interactive Media at NYU Abu Dhabi and Artist Fellow at AI Now. In How Do You See Me? Dewey-Hagborg developed custom software to produce a series of images that are detected as “faces” or are recognized as her. Starting from primitive curves and gradients, images evolve to more strongly elicit the algorithmic detection and recognition response. We see the face reduced to a white circle, laying bare the racial assumptions that underpin facial detection technologies.
    [Show full text]
  • The Next Pandemic COVID-19 Has Galvanized Tech Communities
    FOR THE TECHNOLOGY INSIDER | 10.20 A Special Report The Next Pandemic COVID-19 has galvanized tech communities. The tens of billions we’re spending on vaccines, antivirals, tests, robots, and devices are transforming how we will respond to future outbreaks of infectious disease. Your Qubits. Measured. Meet the next generation of quantum analyzers setting new standards for the readout of superconducting qubits. Your Benefits ∏Compact design Q1 Read out up to 64 superconducting qubits in real time: time-staggered or in parallel. ∏Efficient workflows Operate at up to 8.5 GHz in a clean bandwidth of 1 GHz, Q2 free of mixer calibration. ∏Strong performance Achieve optimal readout signal at minimal latency using matched filters and multi-state discrimination. ∏Turnkey feature set Characterize and calibrate your system quickly with fast resonator spectroscopy. Q ∏Scalable system approach 16 Shape your Zurich Instruments Quantum Computing Control System according to your requirements with our latest innovations. Zurich Contact us today Instruments www.zhinst.com CONTENTS_10.20 A robot, developed by Asimov Robotics to spread awareness about the coronavirus, holds a tray with face masks and sanitizer. P. 36 THE NEXT PANDEMIC COVID-19 HAS TAUGHT US THAT FORESIGHT AND TECH ARE A WINNING COMBINATION BY ELIZA STRICKLAND & GLENN ZORPETTE PAGE 20 24 AI TAKES ITS BEST SHOT 36 HOW ROBOTS BECAME 50 THE ULTRAVIOLET OFFENSE 60 THE RACE FOR A HERE- There are millions of molecules to sift ESSENTIAL WORKERS Germicidal UV lamps are shredding AND-NOW COVID-19 TEST through in the race for a coronavirus They disinfected hospital rooms, coronavirus in hospitals, subway Fast, high-tech, use-anywhere vaccine.
    [Show full text]
  • Applicability of Mobile Contact Tracing in Fighting Pandemic (COVID-19): Issues, Challenges and Solutions
    Applicability of Mobile Contact Tracing in Fighting Pandemic (COVID-19): Issues, Challenges and Solutions Aaqib Bashir Dara, Auqib Hamid Loneb,∗, Saniya Zahoorb, Afshan Amin Khanb, Roohie Naazb aIndependent Researcher, Jammu and Kashmir,India,190015 bDepartment of Computer Science and Engineering, NIT Srinagar, Jammu and Kashmir, India,190006 Abstract Contact Tracing is considered as the first and the most effective step towards containing an outbreak, as resources for mass testing and large quantity of vaccines are highly un- likely available for immediate utilization. Effective contact tracing can allow societies to reopen from lock-down even before availability of vaccines. The objective of mobile contact tracing is to speed up the manual interview based contact tracing process for containing an outbreak efficiently and quickly. In this article, we throw light on some of the issues and challenges pertaining to the adoption of mobile contact tracing solu- tions for fighting COVID-19. In essence, we proposed an Evaluation framework for mobile contact tracing solutions to determine their usability, feasibility, scalability and effectiveness. We evaluate some of the already proposed contact tracing solutions in light of our proposed framework. Furthermore, we present possible attacks that can be launched against contact tracing solutions along with their necessary countermeasures to thwart any possibility of such attacks. Keywords: COVID-19, Contact Tracing, Security, Privacy, Scalability. 1. Introduction Severe Acute Respiratory Syndrome (SARS) is an atypical pneumonia that is char- acterized by a high rate of transmission, which began in Guangdong Province, China, in November 2002 [1]. One of the largest SARS outbreaks to date began in Singapore in mid-March 2003 [1] and was traced to a traveler returning from Hong Kong.
    [Show full text]
  • Arxiv:2005.08502V2 [Cs.CR] 27 Jul 2020 Promoting a Different App for Decentralized Contact Tracing
    COVI White Paper - Version 1.1 Hannah Alsdurf1, Edmond Belliveau, Yoshua Bengio2;3, Tristan Deleu2;3, Prateek Gupta2;4;5, Daphne Ippolito6, Richard Janda7, Max Jarvie8, Tyler Kolody7, Sekoul Krastev9, Tegan Maharaj2;3, Robert Obryk, Dan Pilat9, Valerie´ Pisano2, Benjamin Prud’homme2, Meng Qu,2;10 Nasim Rahaman2;11, Irina Rish2;3, Jean-Franc¸ois Rousseau12, Victor Schmidt2;3, Abhinav Sharma7, Brooke Struck9, Jian Tang2;10, Martin Weiss2;3, Yun William Yu13 Abstract The SARS-CoV-2 (Covid-19) pandemic has resulted in significant strain on health care and public health institutions around the world. Contact tracing is an essential tool for public health officials and local communities to change the course of the Covid-19 pandemic. Standard manual contact tracing of people infected with Covid-19, while the current gold standard, has significant challenges that limit the ability of public health authorities to minimize community infections. Personalized peer-to-peer contact tracing through the use of mobile applications has the potential to shift the paradigm of Covid-19 community spread. Although some countries have deployed centralized tracking systems through either GPS or Bluetooth, more privacy-protecting decentralized systems offer much of the same benefit without concentrating data in the hands of a state authority or in for-profit corporations. Additionally, machine learning methods can be used to circumvent some of the limitations of standard digital tracing by incorporating many clues (including medical conditions, self-reported symptoms, and numerous encounters with people at different risk levels, for different durations and distances) and their uncertainty into a more graded and precise estimation of infection and contagion risk.
    [Show full text]
  • A Systematic Adversarial Threat Analysis of Contact Tracing Apps
    Western University Scholarship@Western Electronic Thesis and Dissertation Repository 12-18-2020 10:45 AM Protecting Health Data in a Pandemic: A Systematic Adversarial Threat Analysis of Contact Tracing Apps Leah Krehling, The University of Western Ontario Supervisor: Essex, Aleksander, The University of Western Ontario A thesis submitted in partial fulfillment of the equirr ements for the Master of Engineering Science degree in Electrical and Computer Engineering © Leah Krehling 2020 Follow this and additional works at: https://ir.lib.uwo.ca/etd Part of the Other Electrical and Computer Engineering Commons Recommended Citation Krehling, Leah, "Protecting Health Data in a Pandemic: A Systematic Adversarial Threat Analysis of Contact Tracing Apps" (2020). Electronic Thesis and Dissertation Repository. 7586. https://ir.lib.uwo.ca/etd/7586 This Dissertation/Thesis is brought to you for free and open access by Scholarship@Western. It has been accepted for inclusion in Electronic Thesis and Dissertation Repository by an authorized administrator of Scholarship@Western. For more information, please contact [email protected]. Abstract In this thesis centralized, decentralized, Bluetooth, and GPS based applications of digital contact tracing were reviewed and assessed. Using privacy principles created by a contingent of security and privacy experts from across Canada, a metric of assessing an application’s privacy was created. An attack tree was built to assess the security of the contact tracing applications. Eighteen attacks were theorized against contact tracing applications currently in use. An application’s vulnerability to the attacks was measured using a scoring system developed for this purpose. The results of the security scores were used to create a metric for assessing the security of contact tracing systems.
    [Show full text]
  • Technologies of Pandemic Control: Privacy and Ethics for COVID-19 Surveillance // 2
    TECHNOLOGIES OF PANDEMIC CONTROL // Privacy and Ethics for COVID-19 Surveillance S.E. Freeman October 2020 Technologies of Pandemic Control // Privacy and Ethics for COVID-19 Surveillance S.E. Freeman October 2020 Contents Executive Summary 1 01 // INTRODUCTION 3 02 // TECHNOLOGICAL INTERVENTIONS 7 EXPOSURE NOTIFICATION AND DIGITAL PROXIMITY TRACING 8 How does it work? 9 Why use these interventions? 12 What concerns are raised? 13 Questionable effectiveness 13 Data could be re-identified 17 Could exacerbate existing inequalities 19 What requirements are needed to protect user privacy? 22 AGGREGATED LOCATION DATA 25 How does it work? 25 Why use this intervention? 26 What concerns are raised? 27 What requirements are needed to protect user privacy? 29 SYMPTOM-TRACKING APPLICATIONS 30 How does it work? 31 Why use this intervention? 32 What concerns are raised? 33 What requirements are needed to protect user privacy? 33 IMMUNITY PASSPORTS 34 How does it work? 34 Why use this intervention? 35 What concerns are raised? 35 What requirements are needed to protect user privacy? 38 03 // EXISTING REGULATORY FRAMEWORKS 40 APPLICABLE U.S. DATA PRIVACY REGULATIONS: A SNAPSHOT 41 FEDERAL LEGISLATION INTRODUCED FOR COVID-19 DATA 44 04 // CONCLUSIONS 47 05 // RECOMMENDATIONS 51 ACKNOWLEDGMENTS 56 ADDITIONAL RESOURCES 57 ABOUT THE CITRIS POLICY LAB & THE HUMAN RIGHTS CENTER 60 Executive Summary In response to the rapid spread of COVID-19 and its devastating effect on communities across the United States, private companies, state and local governments, nonprofits, and epidemiologists have been harnessing the powers of big data and technology in an attempt to better understand and contain the spread of the virus.
    [Show full text]
  • Decentralized Privacy-Preserving Proximity Tracing
    Decentralized Privacy-Preserving Proximity Tracing Carmela Troncoso1, Mathias Payer1, Jean-Pierre Hubaux1, Marcel Salathe´1, James Larus1, Wouter Lueks1, Theresa Stadler1, Apostolos Pyrgelis1, Daniele Antonioli1, Ludovic Barman1, Sylvain Chatel1, Kenneth Paterson2, Srdjan Capkun2, David Basin2, Jan Beutel2, Dennis Jackson2, Marc Roeschlin2, Patrick Leu2, Bart Preneel3, Nigel Smart3, Aysajan Abidin3, Seda Gurses¨ 4, Michael Veale5, Cas Cremers6, Michael Backes6, Nils Ole Tippenhauer6, Reuben Binns7, Ciro Cattuto8, Alain Barrat9, Dario Fiore10, Manuel Barbosa11, Rui Oliveira11, and Jose´ Pereira11 1EPFL 2ETH Zurich 3KU Leuven 4TU Delft 5University College London 6CISPA Helmholtz Center for Information Security 7University of Oxford 8University of Torino / ISI Foundation 9Aix Marseille Univ, Universite´ de Toulon, CNRS, CPT 10IMDEA Software Institute 11INESC TEC / FCUP 11INESC TEC / UMinho Copyright 2020 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Bulletin of the IEEE Computer Society Technical Committee on Data Engineering 36 Executive Summary This document describes and analyzes a system for secure and privacy-preserving proximity tracing at large scale. This system provides a technological foundation to help slow the spread of SARS-CoV-2 by simplifying and accelerating the process of notifying people who might have been exposed to the virus so that they can take appropriate measures to break its transmission chain. The system aims to minimise privacy and security risks for individuals and communities and guarantee the highest level of data protection.
    [Show full text]
  • Artificial Intelligence and Machine Learning Approaches to Covid-19 Outbreak : a Survey
    Turkish Journal of Physiotherapy and Rehabilitation; 32(3) ISSN 2651-4451 | e-ISSN 2651-446X ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING APPROACHES TO COVID-19 OUTBREAK : A SURVEY Sowmya H.K1, Jesy Janet Kumari J2, Dr. R. Ch. A. Naidu3, K.Vengatesan4 1,2,3 Department of CSE, The Oxford College of Engineering Bommanahalli, Bangalore-560068 Professor, Computer Engineering, Sanjivani College of Engineering, Kopargaon [email protected],[email protected],[email protected], [email protected] ABSTRACT Corona viruses are group of viruses which may cause illness in both animals and humans. A person can easily get COVID-19 from the other people who have the virus. It is a serious disease, which disseminates through tiny water droplets from the nose or mouth, which are thrown out when a COVID-19 infected person coughs, sneezes, or speaks. This disease was first discovered in China and has since spread throughout the world at breakneck speed. At this pandemic time, the entire world should take an adequate and efficient step to analyze the disease and get rid of the effects of this epidemic. The applications of Machine Learning (ML) and Artificial Intelligence (AI) techniques play an important role to detect and predict potential effect of this virus in future by gathering and examining most recent and past data. Furthermore, it can be used in realizing and recommending the enhancement of a vaccine for COVID-19. This paper focuses on reviewing the role of AI and ML approaches used for examining, analyzing, predicting, contact tracking of existing patients and potential patients. Keywords: Corona virus, Machine Learning, Artificial Intelligence, contact tracking, epidemic I.
    [Show full text]
  • Etsi Gr E4p 002 V1.1.1 (2021-02)
    ETSI GR E4P 002 V1.1.1 (2021-02) GROUP REPORT Europe for Privacy-Preserving Pandemic Protection (E4P); Comparison of existing pandemic contact tracing systems Disclaimer The present document has been produced and approved by the Europe for Privacy-Preserving Pandemic Protection ETSI Industry Specification Group (ISG) and represents the views of those members who participated in this ISG. It does not necessarily represent the views of the entire ETSI membership. 2 ETSI GR E4P 002 V1.1.1 (2021-02) Reference DGR/E4P-002 Keywords covid, eHealth, emergency services, identity, mobility, pandemic, privacy, security, smartphone ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice The present document can be downloaded from: http://www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI deliverable is the one made publicly available in PDF format at www.etsi.org/deliver. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https://portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI.
    [Show full text]