<<

electronics

Article Blockchain Use in IoT for Privacy-Preserving Anti-Pandemic Home Quarantine

Jinxin Zhang and Meng Wu * School of Computer Science & Technology, Nanjing University of Posts and Telecommunications, Nanjing 210023, China; [email protected] * Correspondence: [email protected]

 Received: 3 September 2020; Accepted: 18 October 2020; Published: 21 October 2020 

Abstract: The outbreak of the respiratory disease caused by the new coronavirus (COVID-19) has caused the world to face an existential health crisis. To contain the infectious disease, many countries have quarantined their citizens for several weeks to months and even suspended most economic activities. To track the movements of residents, the governments of many states have adopted various novel technologies. Connecting billions of sensors and devices over the Internet, the so-called Internet of Things (IoT), has been used for outbreak control. However, these technologies also pose serious privacy risks and security concerns with regards to data transmission and storage. In this paper, we propose a blockchain-based system to provide the secure management of home quarantine. The privacy and security attributes for various events are based on advanced cryptographic primitives. To demonstrate the application of the system, we provide a case study in an IoT system with a desktop computer, laptop, Raspberry Pi single-board computer, and the Ethereum smart contract platform. The obtained results prove its ability to satisfy security, efficiency, and low-cost requirements.

Keywords: COVID-19; IoT; blockchain; smart contract; authentication; privacy

1. Introduction Coronavirus disease 2019 (COVID-19) [1] is an infectious disease caused by the coronavirus SARS-2. The infection broke out and spread rapidly in various countries around the world. As of 5 October 2020, more than 35 million cases have been reported across 188 countries and territories, resulting in more than 1 million deaths [2]. The fatality rate of COVID-19 is 2–5%, and the virus has caused many deaths worldwide as it is highly infectious [3]. All countries have made considerable efforts to deal with the pandemic. Hsiang et al. believe that anti-contagion policies (closing schools and restricting people to their homes) have significantly and substantially slowed this growth. The policy packages now deployed are achieving large, beneficial, and measurable health outcomes [4]. Approaches in different countries have been diverse [5]. As the most common measure, home segregation (stay-at-home or shelter-in-place) refers to managing residents in a home environment. The purpose of home segregation is to prevent the spread of infection by the movement of physically diagnosed patients or patients who may be in a latent period through physical quarantine. During the outbreak, many people were infected with the virus unconsciously, and home segregation became an effective way to stop the spread of the virus. However, it was still necessary to put relevant quarantine restrictions in place for multinational travelers. To adopt an anti-infectious policy against the COVID-19 pandemic, including managing family isolation, governments used police patrols, CCTV, drones, geo-fences, and other measures [6]. However, these measures take up a lot of social resources. Some companies have developed alternative mobile apps, which use GPS to track and locate, and Bluetooth to monitor distance [7]. There are defects in using the mobile phone’s GPS and Bluetooth as the monitoring method, as it does not guarantee that the mobile phone corresponds to the owner at

Electronics 2020, 9, 1746; doi:10.3390/electronics9101746 www.mdpi.com/journal/electronics Electronics 2020, 9, 1746 2 of 16 all times, and there is a possibility of human–machine separation. Even people use wearable devices such as smart bracelets, it is difficult to eradicate the above situation at all. With the use of the IoT in the home, the condition of the home can be sensed in real-time. One service supported by the IoT is the smart home system, which is also an option for the supervision and management of home segregation. The most practical and essential home control functions in the smart home system include smart home appliance control, security system, intercom access control, etc. Notably, the location data of each resident is private information, and protecting personal privacy is a concern that needs attention during this pandemic. Besides, the analysis and processing of private data are highly centralized at present. It has the hidden danger of a single point of failure and is vulnerable to targeted attacks [8]. To address this issue, blockchain technology [9] may be an alternative suggestion. The combination of blockchain and IoT is promising and leads to notable changes in many industries, paving the way for new business models and novel distributed applications. In their work [10], they describe that the combination of blockchain and IoT can promote resource sharing and make the service market between devices possible. Tosh et al. [11] pointed out that the public and distributed peer-to-peer ledger capabilities of the blockchain will benefit cloud computing services, which need to include functions such as assured data provenance, auditing, management of digital assets, and distributed consensus. The underlying consensus mechanism of the blockchain allows the construction of a tamper-proof environment. By using encryption methods, transaction blocks are chained together to enable the immutability of records. Mengelkamp et al. [12] combine blockchain with smart grids to create a more efficient system. As the grid evolves, intermittent energy and micro-grids will become a significant part of the energy supply. By balancing electricity demand and supply through micro-transactions, power resources distributed throughout the network can be utilized more appropriately. Scenarios such as logistics and transportation and sensor data are an important part of the Internet of Things. Lucena et al. [13] analyze the feasibility of a blockchain-based fresh goods quality tracking system in actual transportation chain application scenarios. The application of blockchain technology to save and transmit data enables suppliers, transportation units, and food companies to grasp the status of fresh goods in transit in real-time. The system also realizes the immutability of sensor data and the traceability of supply chain data, ensuring the security of the food supply. The blockchain was initially a distributed and immutable ledger of transactions for cryptocurrency systems. Thanks to the contraption of smart contracts [14], the blockchain has now strengthened into a promising platform for developing distributed and trustworthy applications. In this manuscript, we propose a scheme to show the potential of the combination of the Internet of Things and blockchain to provide applications for segregation management and implementation. Our scheme, while realizing the decentralized supervision of home segregation, also ensures the security requirements of personal data integrity and privacy protection. In summary, the contributions of this work are threefold:

Use the security system in a Smart Home to record the daily in and out status of quarantined • personnel and report it after processing. The Centers for Disease Control (CDC) officer designs and issues virtual house numbers and attaches digital signatures to make a light authentication for IoT devices. The purpose is to create a reliable virtual community easy to manage. Apply smart contracts in the blockchain to examine the reported segregation according to definite • rules. Write the abnormal data that does not meet the segregation requirements in the low-cost log of the blockchain. The public–private pair of the blockchain system is used to design security protection measures • in a targeted manner. The system uses the community as the basic unit to report the segregation and does not involve specific household information. Using the public keys of some other devices in the same community to complete the ring signature can ensure the anonymity of residents and Electronics 2020, 9, 1746 3 of 16

maintain data integrity. As for infection events that require special handling, household-specific information with a virtual house number is encrypted with an officer’s public key to ensure data authenticity and security before it is sent to the pandemic prevention workers.

The rest of this paper is organized as follows: Section2 describes the background. Section3 describes the overall design. We present the system implementation and the performance evaluation results in Section4. Open issues are discussed in Section5. Section6 concludes this paper and presents some future work.

2. Background

2.1. The Internet of Things The Internet of Things (IoT) refers the ability to use various information sensors to collect information about any object that needs to be monitored, connected, and interact in real time, and to transmit data through the network to realize the ubiquitous connection of things and other things, and things and people. This results in intelligent perception, recognition, and management. The IoT digitizes the real world, and its application scope is immense, mainly including the following sectors: smart environments [15] (homes, offices, and factories), personal and social fields [16], etc. Connectivity, perception, and intelligence are the three major characteristics of the development of the IoT. The Internet of Things achieves an all-round perception through the integration and convergence of network communications, big data analysis, edge computing, deep learning, artificial intelligence, and blockchain. Normalized management can effectively aggregate all links, share resources and data, and provide objects with one-step and all-round services. A smart home represents the IoT application that is close to life. It can control lights, windows, temperature, and humidity, etc., and may also include home security, such as access control or alarms [17]. When connected to the internet, the system connects via a hub (or gateway) that can connect smart security devices such as access control, smart locks, and cameras with internet big data and cloud services to achieve home protection. In this paper, we assume that the relevant devices can accurately sense the entry and exit of people.

2.2. Blockchain Blockchain technology was introduced in 2008 by Takemoto [9] and has since attracted much attention due to its decentralization, anonymity, and the inability to rewrite over it. Blockchain breaks through the limitations of traditional central technology, and thus has many potential applications. For example, blockchain can create decentralized cryptocurrency, representing a revolution in financial and other industries. Unlike traditional digital currency systems, individuals can trade directly with each other on untrusted networks without relying on third-party agencies. The operation of the blockchain mainly relies on four components: the encryption , transaction processing, consensus , and distributed ledger technology [18], as shown in Figure1. Encryption algorithms ensure the data of the entire network are transparent and verifiable while preserving the anonymity of personal information. Transactions continuously generated from the blockchain nodes describe the current state of the blockchain and are then assembled into new blocks. The distributed ledger records transactions between network participants. This shared ledger reduces the time and expense incurred by mediating different ledgers. Using the consensus algorithm eliminates the possibility of data modification, replacing third-party agents in traditional applications. Electronics 2020, 9, 1746 4 of 16 Electronics 2020, 9, x FOR PEER REVIEW 4 of 16

Figure 1.1. Blockchain is mainly operated by four components.

Each blockblock contains contains the the following following information: information: the the hash hash value value of the of currentthe current block, block, the hash the valuehash ofvalue the previousof the previous block, the block, timestamp the timestamp when the when consensus the consensus is reached, is and reached, the transaction and theinformation. transaction information. 2.3. Smart Contract 2.3. SmartThe concept Contract of smart contracts can be traced back to the 1990s [14], which is much earlier than the blockchainThe concept technology. of smart contracts Szabo pushed can be thetraced concept back to of the a contract 1990s [14], from which a paper is much relationship earlier than to a confirmedthe blockchain digital technology. relationship. Szabo However, pushed the due concep to thet lack of a of contract a credible from performance a paper relationship environment, to a theconfirmed smart contractdigital relationship. could not initially However, be useddue to for th practicale lack of a applications. credible performance Blockchain environment, can provide the a crediblesmart contract execution could environment not initially forbe used smart for contracts practical and applications. forms the Blockchain most crucial can piece provide of the a credible system forexecution the application environment of smart for smart contracts. contracts Narrowly, and form a smarts the contractmost crucial is an piece algorithmic of the system program for code the thatapplication digitizes of the smart complex contracts. relationship Narrowly, between a smart people, contract legal is agreements, an algorith andmic computerprogram networks.code that Adigitizes smart contract the complex is a computer relationship protocol between that canpeople, achieve legal autonomous agreements, execution and computer and the resultnetworks. can beA checkedsmart contract after deployment. is a computer Its applicationprotocol that is notcan onlyachieve limited autonomous to the financial execution field; and it can the also result be used can be in distributedchecked after computing, deployment. the Its Internet application of Things, is not and only other limited fields. to the financial field; it can also be used in distributedSmart contracts computing, can perform the Internet reliable of Things, transactions and other and fields. operations in the blockchain ecosystem withoutSmart third contracts parties, relyingcan perform on the communicationreliable transactions and consensus and operations between in blockchain the blockchain nodes. ecosystem Once the contractwithout third starts, parties, it will relying execute on under the communication the terms of the and computer consensus code, between and the blockchain execution nodes. status Once will automaticallythe contract starts, check it thewill other execute nodes under sothat the terms it can trackof thethe computer progress code, and and tampering the execution is impossible. status will automaticallySmart contracts check the can other be applied nodes inso manythat it fields,can track such the as progress the medical and field,tampering knowledge is impossible. copyright protection,Smart importantcontracts can data be certification, applied in andmany the fields, IoT, and such their as employmentthe medical field, can achieve knowledge positive copyright results inprotection, all these areas.important Smart data contracts certification, spread and through the IoT, the peer-to-peerand their employment (P2P) network can in achieve the blockchain positive ecosystem.results in all The these verification areas. Smart node savescontracts the receivedspread through contract inthe the peer-to-peer memory and (P2P) waits network for the triggerin the toblockchain process the ecosystem. contract. The In the verifica consensustion node stage, saves the verification the received node contract packages in the all memory contracts and saved waits in thefor mostthe trigger recent to period process into the a contract. contract set,In the calculates consensu thes stage, hash the value verification of this contract node packages set, assembles all contracts it into blocks,saved in and the spreads most recent it to the period entire into network. a contract After set, receiving calculates the verification the hash value set, the of otherthis contract verification set, nodesassembles compare it into and blocks, verify and the spreads received it to information the entire network. with the contractAfter receiving set saved the by verification them and set, send the a copyother ofverification the approved nodes contract compare set toand further verify verification the received nodes. information Through with many the rounds contract of sendingset saved and by comparison,them and send all thea copy verification of the approved nodes finally contract reach set an agreementto further onverification the latest nodes. contract Through set within many the specifiedrounds of time. sending and comparison, all the verification nodes finally reach an agreement on the latest contractEthereum set within is a the smart specified contract time. and electronic payment system [19]. Like Bitcoin, Ethereum is a distributedEthereum ledger is a smart based contract on blockchain. and electronic However, payment as itsystem is not [19]. limited Like to Bitcoin, the digital Ethereum currency is a attributesdistributed of ledger Bitcoin, based Ethereum on blockchain. provides aHowever, platform as for itdeveloping is not limited secure to the and digital verifiable currency decentralized attributes applicationsof Bitcoin, Ethereum (dapps). provides a platform for developing secure and verifiable decentralized applications (dapps).

Electronics 2020, 9, x 1746 FOR PEER REVIEW 55 of of 16 16

2.4. Ring Signature 2.4. Ring Signature A ring signature is a scheme originally proposed by Rivest et al. [20]. It is a simplifiedA ring group signature signature. is a digital In the signaturering signat schemeure, there originally are ring proposedmembers bybut Rivest no managers. et al. [20 ]. It is a simplifiedRing signatures group signature. can meet In the following ring signature, security there requirements: are ring members but no managers. Ring signatures can meet the following security requirements: 1. Correctness: If the message is signed according to the correct signature steps and no one tampers 1. withCorrectness: the signature If the during message the is signedpropagation according proces tos, the then correct the signaturering signature steps meets and no the one signature tampers verificationwith the signature equation. during the propagation process, then the ring signature meets the signature 2. Anonymity:verification equation.Even if the adversary illegally obtains the private keys of all signers, they can 2. determineAnonymity: the Evenprobability if the that adversary the true illegally signer does obtains not theexceed private , where keys ofn is all the signers, number they of ring can 1 members.determine the probability that the true signer does not exceed n , where n is the number of 3. Unforgeability:ring members. Without knowing the private keys of any members, even if an external attacker 3. canUnforgeability: obtain the signature Without of knowing any message the private m from keys a random of any oracle members, that evengenerates if an externala ring signature, attacker thecan probability obtain the signaturethat they will of any successfully message m forgefrom a a legal random signature oracle is that negligible. generates a ring signature, 4. Spontaneous:the probability A thatring theysignature will successfully can realize forgethe pr aimary legal function signature of is the negligible. group signature but does 4. notSpontaneous: require trusted A ring third signature parties canor group realize administrators the primary function to participate. of the group signature but does Thenot main require process trusted is thirdas follows: parties or group administrators to participate. Setup:The main The process message is as follows:sender selects several members to form a ring member set 𝑅=  𝑅,𝑅Setup:, …,𝑅 The and message ring members’ sender selects public several keys membersconstitute to a formring public a ring memberkey set 𝐾=𝐾 set R =,𝐾R,1,…,𝐾R2, ... ,. Rn  and ringSignature: members’ Using public message keys m constitute, the private a ring key public 𝑘 of key the setM messageK = K1, sendersK2, ... , K andn . public key set 𝐾 are employedSignature: to Using generate message digitalm signature, the private σ. key kM of the M message senders and public key set K are employedVerify: The to message generate receiver digital signature verifies theσ. validity of 𝑚, 𝜎. Verify: The message receiver verifies the validity of (m, σ). 3. Proposed Overall Architecture 3. Proposed Overall Architecture As shown in Figure 2, the households’ homes are equipped with a security system, such as cameras,As shown infrared in sensors, Figure2, and the households’smart magnetic homes door are suction equipped devices, with which a security are connected system, such to the as outsidecameras, world infrared through sensors, smart and gateway smart magnetic devices. door The system suction does devices, not whichallow unauthorized are connected device to the outside access toworld prevent through malicious smart gatewaybehavior devices.from consuming The system so doescial resources. not allow unauthorizedSmart gateways device in the access same to communityprevent malicious form a behavior cluster and from have consuming the same social cluster resources. name. Smart gateways in the same community form a cluster and have the same cluster name.

Figure 2. IllustrationIllustration of of the the considered considered smart smart home home system. system.

Each household’s smart gateway collects related information and completes formatting and aggregation. It regularly sends the complete information to the relevant smart contract. This smart Electronics 2020, 9, 1746 6 of 16 contract is issued by the officer and is related to the quarantine regulations. The specific manifestation is the threshold of the associated indicator. No one can edit contracts after deployment. To protect the privacy of households, the ring signature can be created using the public keys of other users in the same community. The smart contract analyzes the reported data. If the value exceeds the specified threshold (such as multiple entries and exits or going outside for a lengthy period), the smart contract notifies the management department of the related data, along with the digital signature in the form of an event. The officer verifies the authenticity of the data through the signature. In this way, the officer can learn about an abnormal situation in the community and take relevant countermeasures. In the case of an emergency, the smart gateway directly sends a rescue request to the pandemic prevention personnel. Because the reported data are not confidential information and considering the actual situation of the limited resources of smart devices, the data are not encrypted. Except for the request for assistance, all data in the household should be anonymous, and privacy is preserved for the entire overlay network. To deploy this system, we rely on a public blockchain that can implement smart contracts. Relatively, private blockchains are suitable for mostly restricted environments. Once the system is deployed, it is hard to add new users. However, public blockchains have considerable scalability and flexibility in the system. We can deploy our system under the IoT smart home architecture. As shown in Figure2, the smart home system includes the following components: Smart Home: A family-aware ecosystem based on IoT devices. The IoT devices in the system mainly include sensors that can sense environmental data and send these data to service providers or users. The public blockchain is open to any user. Pandemic prevention workers (W): Frontline staff who handle emergencies accordingly. CDC officer (O): Managers of the fight against the pandemic who set the basic requirements for quarantine and publish them in the form of smart contracts. They check the essential local conditions. Next, we describe the entire life cycle of the system.

3.1. Initialization Phase Our scheme can be applied to management of the community, which requires an initialization phase. The IoT devices considered in the smart home include storage devices, smart gateways, actuators, sensors, etc. These devices are massive, heterogeneous, and have limited resources, which contradicts the basic storage capacity and computing power requirements needed by blockchain technology. To solve this contradiction, our design uses computers and smart gateways as the major participants of the blockchain. The officer (O) transfers a certain fee to the wallet of the device in advance for the system construction. In the system, the device is introduced into the blockchain to obtain a unique public/private key pair and blockchain address in the blockchain. The initialization process is similar to issuing certificates (virtual house numbers). The virtual house number of each set of equipment includes the community number, blockchain address, and issues after being signed by the officer (O)’s private key ko f f icer. Once the blockchain verifies the authenticity of all devices, it has completed the establishment of a virtual community. Virtual house number (Vhm) Community ID: AA Blockchain Add: BB Signature by ko f f icer

3.2. Operation Phase In the system, only devices with virtual house numbers issued by officers are legal. The smart contract sets the threshold of data involved in quarantine management (access times, the maximum Electronics 2020, 9, x FOR PEER REVIEW 7 of 16

3.2. Operation Phase ElectronicsIn the2020 system,, 9, 1746 only devices with virtual house numbers issued by officers are legal. The smart7 of 16 contract sets the threshold of data involved in quarantine management (access times, the maximum time to go out from the home, etc.). The sensors in the smart home (A1, A2) send perceived time to go out from the home, etc.). The sensors in the smart home (A1, A2) send perceived information information to the smart gateway. The smart gateway can select the public keys of some devices in to the smart gateway. The smart gateway can select the public keys of some devices in the same the same community to sign the information and send it to the corresponding smart contract for community to sign the information and send it to the corresponding smart contract for analysis. analysis. The threshold determines the standard of the quarantine policy. If the data exceed the The threshold determines the standard of the quarantine policy. If the data exceed the threshold, threshold, the smart contract creates an event and sends the abnormal data with a ring signature to the smart contract creates an event and sends the abnormal data with a ring signature to the officer. the officer. We assume that the perceived data are final and there is no need to use cloud devices to We assume that the perceived data are final and there is no need to use cloud devices to store data, store data, as shown in Figure 3. as shown in Figure3.

Figure 3. Logical flow flow of the system execution.

The public data only include basic personnel a accessccess information information and and do do not not require require encryption. encryption. However, from from the the perspective perspective of of protecting protecting privacy, privacy, data data protection protection must must be considered, be considered, so the so ring the ringsignature signature method method is used. is On used. the blockchain, On the blockchain, the public the keys public of other keys devices of other in the devices same incommunity the same communitycan be easily can captured be easily and captured combined and with combined the devic withe’s the key device’s to create key ring to createsignatures ring signaturesas shown asin shownAlgorithm in Algorithm 1. The ring 1. signature’s The ring signature’s features are features suitable are for suitable this application for this application scenario. It scenario.can ensure It that can ensureinformation that information has not been has tampered not been tamperedwith and withallow and signers allow to signers sign messages to sign messages anonymously. anonymously. After Aftermixing mixing with the with public the public keys keysof other of other devices, devices, it is impossible it is impossible to recognize to recognize which which member member signed signed the themessage. message.

Algorithm 1 1Ring Ring Signature Signature 1: functionfunction SIGNATURESIGNATURE (data (data) ) 2: ifif smartsmart gateway chose chose anonymity anonymity on on blockchain blockchainthen then 3: hash_d ← calculate hash of the data 3: hash_d ← calculate hash of the data 4: CreateCreate the digitaldigital Signature Signature using usinghash_d hash_dand and signers signers private private key sks key sks 5: MixMix the the signature with with another another smart smart gateway gateway group group to form to aform ring a ring 6: endend if if 7: end function 7: end function

Considering the different quarantine policies in different regions, the thresholds of the related parameters (frequency and duration of going out) in the smart contract are set by the officer following the requirements. The smart gateway gathers the relevant information within an interval (for example, Electronics 2020, 9, 1746 8 of 16 per day) and sends it to the smart contract created using Algorithm 2 by the officer. The officer’s equipment monitors events and verifies the ring signature to determine the authenticity of the data. After the verification is complete, the officer can learn about the violation of a quarantine order in the community and promptly develop an appropriate response (increasing the number of patrols, increasing public awareness, etc.).

Algorithm 2 The smart contract home quarantine rules Input: quarantine state h_state, ring signature ring_s Output: result Require: policyCheck false, ← policyThreshold list policies 1: if this request is from the smart gateway then 2: p policies ← 3: if p.policy = “meet” then 4: policyCheck true. ← 5: else 6: policyCheck false. ← 7: end if 8: result policyCheck ← 9: end if 10: Trigger event reportResult (h_state, ring_s).

We can also consider the occurrence of public health events. In response to the occurrence of infection symptoms in A2 and the necessity for targeted treatment (sample collection, the concentration of quarantine, etc.), the home gateway will use the public key Kw of the pandemic prevention worker (W) to encrypt personal information and the virtual house number. Only the private key of the pandemic prevention worker (W) can decrypt the information.

3.3. Summary After the smart contract is created, the officer sends it to the blockchain in the form of transactions, where it is verified by the miners. If the verification is successful, the contract is deployed, and the officer will receive an address. This smart contract address is public, and any user can use it without restrictions. The public blockchain is a flexible and decentralized system that has enough scalability. It has powerful resistance to forging and tampering. Similarly, no one can change it after the smart contract is deployed in the blockchain. Using ring signatures for information prevents tampering while ensuring the privacy of the users. The important information encrypted with the relevant party’s public key can protect the data security and the virtual house number ensures the authenticity of the identity.

4. Experiments and Results As mentioned above, the proposed system uses an Internet of Things device to perceive the state of home quarantine of the households, and then uses smart contracts for analysis and processing. In this section, we evaluate the safety, time, and operating costs of our method.

4.1. Use Case Scenarios The use cases considered in the home quarantine case study are as follows:

(1) Strong home quarantine: In the initial stage of the infection outbreak, the state of the spread of the virus is undiscovered, so strict quarantine measures are introduced in areas with severe outbreaks. The policy prohibits visits to avoid cross-infection. It also prohibits all family members from leaving the home. The pandemic prevention staff provide for the necessities of the family. Electronics 2020, 9, x FOR PEER REVIEW 9 of 16

4.1. Use Case Scenarios The use cases considered in the home quarantine case study are as follows: (1) Strong home quarantine: In the initial stage of the infection outbreak, the state of the spread of the virus is undiscovered, so strict quarantine measures are introduced in areas with severe Electronicsoutbreaks.2020, 9, 1746 The policy prohibits visits to avoid cross-infection. It also prohibits all family9 of 16 members from leaving the home. The pandemic prevention staff provide for the necessities of the family. (2)(2) Moderate home quarantine: In the general period at the beginningbeginning ofof thethe pandemic,pandemic, aa briefbrief amount of time outside ofof one’sone’s household isis allowed,allowed, suchsuch asas forfor dumpingdumping garbagegarbage andand pickingpicking up takeout food, but thisthis isis restricted.restricted. (3)(3) General home quarantine:quarantine: Many Many regions have issued more reasonablereasonable quarantinequarantine policies.policies. Residents are not allowedallowed toto leaveleave theirtheir residenceresidence unlessunless theythey areare engagedengaged inin necessarynecessary workwork oror must go out to purchase requiredrequired items.items. InIn thesethese application application cases, cases, the the CDC CDC worker worker needs needs to grasp to grasp the relevant the relevant information information of each of family. each Iffamily. malicious If malicious forgery or forgery modification or modification of this information of this occurs, information it will haveoccurs, serious it will consequences have serious for pandemicconsequences prevention for pandemic work. This prevention information work. is private. This Therefore, information the authentication,is private. Therefore, integrity, andthe privacyauthentication, of these integrity, messages and are critical.privacy of these messages are critical.

4.2.4.2. EvaluationEvaluation FrameworkFramework ToTo evaluateevaluate thethe timetime andand energyenergy consumptionconsumption ofof ourour method,method, wewe usedused threethree typestypes ofof endend nodes:nodes: aa desktopdesktop computer, computer, laptop, laptop, and and Raspberry Raspberry Pi single-board Pi single-board computer. computer. As the As offi thecer’s officer’s device, device, the laptop the waslaptop mainly was usedmainly to used issue to virtual issue housevirtual numbers, house numbers, createsmart create contracts, smart contracts, and monitor and monitor the logs the in logs the blockchain.in the blockchain. As a smart As gateway,a smart gateway, the Raspberry the Raspberry Pi was responsible Pi was responsible for collecting for and collecting aggregating and information,aggregating completinginformation, ring completing signatures, ring connecting signatures, to connecting the blockchain, to the and blockchain, encrypting and emergencies. encrypting Theemergencies. desktop computer The desktop was computer used for decryption was used for as thedecryption worker’s as device. the worker’s device. WeWe used used EthereumEthereum as as a a blockchainblockchain toto developdevelop aa smartsmart contractcontract thatthat meetsmeets ourour approachapproach functionfunction usingusing SoliditySolidity language.language. For writingwriting andand compilingcompiling thethe smartsmart contract,contract, wewe usedused Remix,Remix, whichwhich isis aa browser-basedbrowser-based integrated integrated development development environment environm (IDE)ent (IDE) for Solidity for Solidity (i.e., the (i.e., programming the programming language forlanguage writing for smart writing contracts) smart [contracts)21]. We chose [21]. web3.js We chose to communicateweb3.js to communicate with the corresponding with the corresponding geth client throughgeth client HTTP through connections HTTP connections for deploying for and deploying monitoring and the monitoring states of thethe smartstates contract.of the smart The contract. frame is illustratedThe frame inis Figureillustrated4. in Figure 4.

Figure 4. Figure 4. SoftwareSoftware usedused inin thethe casecase study.study. 4.3. Evaluation Results

The adversary may be a sensing device in a smart home, a smart gateway, or other nodes in the P2P network. It can tamper with or delete stored information, create false events, etc. Considering the above situation, our purpose is to respond to such security threats. Our attention is placed on the overall macro security situation. For an independent node, we assume that after issuing a virtual house number, it will be regarded as an honest one that can truly reflect the actual isolation status in the house. Table1 summarizes the solution that allows our method to meet the safety requirements. Electronics 2020, 9, 1746 10 of 16

Table 1. Safety requirements solution.

Requirement Solution State Each new block contains the hash of the previous Integrity Hashing of data blocks block, which guarantees that the information has not been modified Encrypt the data with the other party’s public key Confidentiality Public-private key pair in the blockchain, and only the corresponding private key can decrypt the data Automated continuous verification ensures that the data quality is more reliable and trustworthy Availability Smart contracts so that decisions can be more transparent, efficient, and refined When mixed with other public keys, the receiver Anonymity Ring signature cannot tell which member signed the message P2P networks are one of the best solutions for Scalability P2P network meeting scalability at a large scale

4.3.1. Security Requirements Evaluation Designers need to consider three major security requirements: confidentiality, integrity, and availability. Confidentiality guarantees that only authorized users can participate in the system. Integrity is responsible for messages sent to the destination with no changes, and availability means that users can always handle the data when needed. We evaluated the security margin of our proposed method under various threats. Some potential attack scenarios are as follows: Sybil attack: A Sybil attack is a means of attacking data redundancy mechanisms. Malicious nodes • pretend to be multiple nodes by creating multiple identifiers in the P2P network. The data that needs to be backed up by various nodes are fraudulently backed up by the same malicious node. In our design, each smart gateway can only have one virtual house number. Each time the information is reported, a virtual house number should be attached to it to identify the community to which it belongs. The officer approves all virtual house numbers with the private key, so attackers cannot use fake virtual house numbers. Denial of Service (DoS)/Distributed DoS (DDoS): Attackers try to block the authentic users from • accessing services in the network. Here, the attackers increase the traffic in the network by initiating an enormous amount of useless information to cause network congestion. The decentralized architecture of the blockchain can be resistant to DoS/DDoS attacks. Even if the attackers block some nodes successfully, they cannot block all nodes of the network. Furthermore, transactions in the blockchain require payments. For example, in Ethereum, the cost of a transaction is related to the size of the packet transmitted. For this reason, the attackers are prevented from transmitting transactions endlessly. Spoofing attack: A spoofing attack, in cybersecurity, refers to an object pretending to be the • identity of another object in an attempt to gain one’s trust, enter the system, and steal data or funds or spread malware. In our design, an attacker cannot spoof another object’s identity since they cannot spoof its private key. Linking attack: A linking attack occurs when the opponent collects auxiliary information of an • object from multiple data sources and then combines these data to determine the overall picture of the target. In the blockchain, the attacker establishes a link between multiple transactions or data ledgers with the same public key to find the target. Since the virtual house number only contains general community information and does not contain the actual residential address, all relevant information only exists in the blockchain log and cannot connect to other information. Even for public health incidents, the personal information of households needed in the design is encrypted Electronics 2020, 9, 1746 11 of 16

using the public key of the worker. Under the premise that the worker’s private key does not leak, the encrypted data cannot contact an object.

4.3.2. Time Consumption The specifications of these devices are listed in Table2. The computer corresponds to the user devices in the system and the single-board computers correspond to the local gateways. In the system, Raspberry Pi uses the public keys of other devices to execute ring signatures and the laptop verifies the signatures. From the experiment, we observed that for the Raspberry Pi, the time required to verify the signature is directly proportional to the number of public keys used. In comparison, when using a laptop with a better performance to verify the signature, the slope of the time-consuming curve is relatively low. In both cases, the standard deviation is low, which proves the stability of the calculation.

Table 2. Specifications of devices.

Device CPU Operating System Memory Hard Disk Dell OptiPlex 7050 Intel Core i7, 3.4 GHz Windows 7 Home (64 bit) 8 GB 128 GB SSD + 2 TB Lenovo k4450 Intel Core i5, 1.9 GHz Windows 10 Home (64 bit) 12 GB 1 TB quad-core ARM Cortex Raspberry Pi 4 Model B Raspbian (buster-full) 2 GB SD RAM 32 GB (micro SD card) A72, 1.5 GHz

Figure5 presents the average and standard deviation of the ring signature using di fferent numbers of public keys employed in the 50 conducted experiments. We use Rivest-Shamir-Adleman (RSA) algorithm to construct a one-way trapdoor function. The abscissa represents the number of other devices (Xi) in the same community that uses the public key to ring signatures. In (a), the average time of ring signature increases approximately linearly as the number of public keys used by other devices increases. In (b), the standard deviation of the ring signature fluctuates slightly, but it also shows a trend of rising with the number of public keys used. For encrypted transmission for emergencies, we verified the time consumption of the encryption with Raspberry Pi and decryption with the computer. The encryption and decryption algorithm are written by Python 3.7. And the encryption required about Electronics380 ms and 2020, decryption 9, x FOR PEER about REVIEW 50 ms. 12 of 16

(a) (b)

FigureFigure 5. 5. Time-consumingTime-consuming mean mean and and standard standard deviation deviation of of ring ring signatures. signatures. ( (aa)) Average Average time time of of ring ring signature.signature. ( (bb)) Standard Standard deviation deviation of of ring ring signature. signature.

4.3.3. WeFinancial did not Cost consider the time the event consumes in communication because this relies on network technology and protocols. Notably, the event execution time in the blockchain also needs to consider We employed the Ethereum verification platform, which uses “gas” to measure the amount of the different block generation times of the different consensus algorithms. For example, Bitcoin takes work required to complete certain tasks. Gas has a price, so the amount of gas consumed represents about 10 min to generate blocks, whereas Ethereum takes about 15 s. Taking Ethereum as an example, the cost of executing tasks. When using remix to draft smart contracts, we estimated the gas according to the Ethereum protocol, it charges fees for each calculation step performed in a contract consumption of the smart contract in the various cases mentioned above. As shown in Table 3, the essential consumption is only a calculated value. The specific cost is affected by the number of reports, the bytes of reports, and other factors. For various numbers of public keys participating in the signature, we conducted the comparison shown in Figure 6. The results revealed that following the same premise, the gas consumption positively correlates with the number of public keys used. The essential reason for this is that the storage of ring signature public key information requires gas. The Ethereum Yellow Book [22] states that events generate logs and the logs are stored on the blockchain. The gas charge stored in the log is much cheaper than in the contract (the log costs 8 Gas per byte, and the contract storage is 20,000 Gas per 32 bytes).

CodeDeposit Execution Total

88,141 82,935 76,929 79,135 71,711 73,911 20,341 20,335 20,329 20,335 20,111 20,111

67,800 58,800 62,600 51,600 53,800 56,600 Gas Consumption

51020304050 Number of public keys used for ring signature

Figure 6. The smart contract gas consumption in a general home quarantine case.

Electronics 2020, 9, 1746 12 of 16 Electronics 2020, 9, x FOR PEER REVIEW 12 of 16

or transaction. A smart contract is executed when triggered by a message or transaction, and the operation of each instruction has a specified cost, expressed in “gas” as the unit. Each process of a smart contract consumes a certain amount of gas according to its complexity. The execution of smart contracts also needs to consider the order of event execution. The more gas prices bid, the higher the execution priority, and the shorter the execution time.

4.3.3. Financial Cost We employed the Ethereum verification platform, which uses “gas” to measure the amount of work required to complete certain tasks. Gas has a price, so the amount of gas consumed represents the cost of executing tasks. When using remix to draft smart contracts, we estimated the gas consumption of the smart contract in the various cases mentioned above. As shown in Table3, the essential consumption is only a calculated value. The specific cost is affected by the number of reports, the bytes of reports, and other factors. For( variousa) numbers of public keys participating in(b the) signature, we conducted the comparisonFigure 5. Time-consuming shown in Figure mean6 and. The standard results deviation revealed of thatring followingsignatures. ( thea) Average same premise, time of ring the gas consumptionsignature. positively(b) Standard correlates deviation with of ring the signature. number of public keys used. The essential reason for this is that the storage of ring signature public key information requires gas. The Ethereum Yellow Book [22] 4.3.3.states Financial that events Cost generate logs and the logs are stored on the blockchain. The gas charge stored in the log is much cheaper than in the contract (the log costs 8 Gas per byte, and the contract storage is We employed the Ethereum verification platform, which uses “gas” to measure the amount of 20,000 Gas per 32 bytes). work required to complete certain tasks. Gas has a price, so the amount of gas consumed represents the cost of executing tasks.Table When 3. Estimated using remix financial to costdraft of asmart smart contract.contracts, we estimated the gas consumption of the smart contract in the various cases mentioned above. As shown in Table 3, the essential consumption is only a Signcalculated with Five value. Public The Keys specific cost is affected by the numberCost Estimate of reports,1 the bytes of reports,Case and other Code factors. Deposit For Cost vari Executionous numbers Cost of Totalpublic Cost keys (Gas) participating Price (USD) in the signature,General we home conducted quarantine the comparison shown in Figure 6. The results revealed that following the 51,600 20,111 71,711 4.35618509 same premise,(report the times) gas consumption positively correlates with the number of public keys used. The Moderate home essential reason for this is that the storage of ring signature public key information requires gas. The quarantine (report times, 70,800 40,135 110,935 6.738901884 Ethereum Yellowduration) Book [22] states that events generate logs and the logs are stored on the blockchain. Strong home quarantine The gas charge stored in the log is 51,400much cheaper than 105in the contract (the 51,505 log costs 8 3.128743332 Gas per byte, and the contract(hair-trigger) storage is 20,000 Gas per 32 bytes). 1 Eth: USA$368.16, Proposed Gas Price: 165 gwei, https://etherscan.io/gastracker (accessed on 16 September 2020).

CodeDeposit Execution Total

88,141 82,935 76,929 79,135 71,711 73,911 20,341 20,335 20,329 20,335 20,111 20,111

67,800 58,800 62,600 51,600 53,800 56,600 Gas Consumption

51020304050 Number of public keys used for ring signature Figure 6. The smart contract gas consumption in a general home quarantine case. Figure 6. The smart contract gas consumption in a general home quarantine case.

Electronics 2020, 9, 1746 13 of 16

4.3.4. Comparison with Related Work The amount of data generated by smart devices has experienced explosive growth, and due to the requirements of the Internet of Things for availability, scalability, security, and flexibility, cloud-based storage and computing solutions cannot handle such large-scale data. With the help of P2P network architecture and consensus algorithm, blockchain can be used as an alternative to centralized cloud storage and computing [23]. Before the large-scale explosion of COVID-19, some papers presented research on the medical Internet of Things (MIoT) and related fields. The outbreak of the pandemic has prompted scientists, researchers, and organizations from all over the world to conduct many studies on vaccine development and pandemic prevention. However, we found that research articles are lacking in the use of blockchain technology and other scientific and technological methods as pandemic prevention methods. A paper [24] proposed a blockchain-based security and privacy protection Personal health information (PHI) sharing (BSPP) scheme to improve the diagnosis of electronic medical systems. By designing the data structure and consensus mechanism of the blockchain, two types of blockchains, a private blockchain and consortium blockchain, are constructed. The private blockchain is responsible for storing PHI, whereas the consortium blockchain stores the safe index records of PHI to achieve data security, access control, privacy protection, and safe searches. The author proposed a secure and lightweight mutual RFID authentication (SecLAP) protocol [25], which realizes secure communication and privacy protection in the MIoT system. Security analysis showed that the SecLAP protocol is robust in anti-synchronization, replay, reader/marker simulations, and traceability attacks. It ensures the security of forward and backward data communications. By comparing and verifying its performance, the study showed that it is lightweight and consumes fewer resources. In [6], Chamola et al. explore the feasibility of using technologies such as the Internet of Things, drones, blockchain, artificial intelligence, and 5G to help alleviate and control the COVID-19 pandemic. The article believes that before a vaccine for this disease comes out, managing and restricting the development of the pandemic depends on the use of these technologies. Others [26] analyzed the role of blockchain in pandemic prevention and control and summarized it in terms of four aspects. First, the infection report data are stored in the blockchain without going through any intermediary parties. This increases the efficiency of data transmission regarding infectious disease outbreaks. Second, the use of donations in kind and money becomes transparent. The entire donation process, including logistics, warehousing, and distribution, can be stored on the blockchain. Third, the information in the blockchain is open and transparent, which can prevent the spread of infectious diseases and wrong information. Fourth, the use of the blockchain to transfer diagnostic information can reduce the risk of infection through face-to-face contact. Torky and Hassanien [27] proposed a blockchain-based framework that uses the advantages of blockchain point-to-point, timestamps, and decentralized storage to build an alternative system to verify and detect cases of unknown COVID-19 virus infection. The system includes four components: an infection verification program subsystem, a blockchain platform, a P2P mobile application, and a large-scale surveillance system. It can help governments and health authorities to detect suspected cases of coronavirus (COVID-19) and obtain the location of patients, as well as autonomously estimate and predict the risk of infection. The authors introduced the concept of digital health passports (DHP) to verify that individuals are free from disease risks and how to use them to restore international tourism [28]. The article presents the DHP Framework, which uses a private blockchain and proof of authority for issuing digital health passports. A distributed infrastructure is employed to support the issuance of the DHP by foreign health systems and used by relevant stakeholders (such as airlines and border control authorities) for verification. To summarize Table4 describes the studied works. From the table, we can find that their functions are mainly focused on personnel management and data traceability. It can be found that avoiding the Electronics 2020, 9, x FOR PEER REVIEW 14 of 16

Electronics 2020, 9, x FOR PEER REVIEWlarge-scaleElectronics 2020 surveillance, 9, x FORElectronics PEER system. REVIEW 2020, 9 ,It x canFOR PEERhelp REVIEWgovern ments and health14 of 16 authorities to detect suspected14 of 16 14 of 16 Electronics 2020, 9, x FORcases PEER of REVIEWcoronavirus Electronics (COVID-19) 2020, 9, x FORand PEER obtain REVIEW the location of patients, as well14 of 16as autonomously 14 of 16 large-scale surveillance system.large-scale It can help surveillance governlarge-scalements system. and surveillance health It can authoritieshelp system. govern to Itments detectcan helpand suspected governhealth authoritiesments and healthto detect authorities suspected to detect suspected estimateElectronics 2020and, 9predict, x FORElectronics PEER the risk REVIEW 2020 of, 9infection., x FOR PEER REVIEW 14 of 16 14 of 16 cases of coronaviruslarge-scale (COVID-19) surveillancecases and of system. coronavirusobtain It the cancaseslarge-scale location help(COVID-19) of governcoronavirus surveillanceof patients,ments and obtain(COVID-19)and system.as healthwell the It as location authorities can andautonomously help obtain of govern topatients, thedetect ments location suspectedas andwell of health aspatients, autonomously authorities as well to as detect autonomously suspected The authors introduced the concept of digital health passports (DHP) to verify that individuals estimate and predictcases ofthe coronavirus risk ofestimate infection. (COVID-19) and predict estimatecasesand the obtain ofrisk andcoronavirus of theinfection.predict location the (COVID-19) risk of ofpatients, infection. and as obtain well asthe autonomously location of patients, as well as autonomously Electronics 2020, 9,Electronics x FOR PEER 2020 REVIEW, 9, x FORarelarge-scale PEERfree REVIEWfrom surveillance disease large-scale risks system. and surveillance Ithow can to help use system. govern them Itmentsto can restore helpand internationalgovernhealth14 of 16 authoritiesments tourism and14 of healthto 16 detect[28]. authorities The suspected article to detect suspected The authorsestimate introduced and predict the concept theThe risk authors of ofdigital infection. introducedestimate healthThe passports andauthors the predict concept introduced (DHP) the of risk digitalto verify ofthe infection. healthconcept that individualspassports of digital (DHP) health to passports verify that (DHP) individuals to verify that individuals casespresents of thecoronavirus DHP casesFramework, (COVID-19) of coronavirus which and uses obtain(COVID-19) a private the location blockchainand obtain of patients, andthe prooflocation as ofwell authorityof aspatients, autonomously for asissuing well as autonomously are free from diseaseThe risks authors andare introduced how free to from use the themdisease conceptare to freerisksrestoreThe of fromdigitalauthorsand international diseasehow health introduced to risksusepassports tourismthem and the howto(DHP)concept [28]. restore to Theto useof verify international digital articlethem that healthto individualsrestore tourism passports international [28]. (DHP) The totourismarticle verify [28].that individualsThe article large-scale surveillancelarge-scale system. surveillanceestimatedigital It can healthsystem.help and govern predictpassports. It canestimatements the help Arisk anddistributed governand of healthinfection.predictments authoritiesinfrastructure the and risk health of toinfection. detectauthoritiesis employed suspected to to detect support suspected the issuance of the DHP presents the DHPare freeFramework, from diseasepresents which risks uses the and aDHP private how presentsareFramework, to freeblockchain use from thethem DHP whichdisease toand restoreFramework, usesproof risks a international of privateand authority whichhow blockchain to uses for tourismuse issuinga them private and [28]. toproof blockchainrestoreThe ofarticle authority international and prooffor issuingtourism of authority [28]. forThe issuing article cases of coronaviruscases of (COVID-19) coronavirusby foreign and The(COVID-19) authorsobtain health the introduced systemsand location Theobtain andauthors the of theused conceptpatients, locationintroduced by relevantof as digitalof well thepatients, stakeholders healthconceptas autonomously as passports ofwell digital (such as (DHP) autonomously healthas airlines to passports verify and that border (DHP) individuals controlto verify that individuals estimatedigital health and predictpassports.presentsestimate the andthe Arisk distributed DHPpredict ofaredigital infection. Framework, freethe healthinfrastructure riskfrom of passports. diseaseinfection.whichdigitalpresentsare isusesfreerisks employed A health distributed from atheand private DHP passports.diseasehow to supportblockchain Framework, toinfrastructure risksuse A distributedthemthe and andissuance whichhowto is proofrestore employed toinfrastructureuses of useof the internationalauthoritya them DHPprivate to support to is blockchainrestorefor employed tourism issuingthe issuanceinternational toand[28]. support proofofThe the tourismarticle theofDHP authority issuance [28]. offorThe the issuing article DHP Electronics 2020, 9, 1746 authorities) for verification. 14 of 16 by foreign healthdigital systems health and passports.by used foreign by A relevantdistributed health digitalbysystemsstakeholders infrastructureforeign health and health usedpassports.(such is systemsby employedas relevantairlines A distributedand to andstakeholdersused support border by infrastructure relevantthe control issuance(such stakeholders as is ofairlines employed the DHP and (such to border support as airlines control the issuanceand border of the control DHP The authors introducedThe authors thepresents introduced conceptTo summarizethe of thedigitalDHP concept presentsFramework, healthTable of passports digital4the describes DHPwhich health (DHP)Framework, usesthe passports studiedtoa privateverify which (DHP) works. that blockchain usesindividuals to From verify a private andthe that prooftable, individualsblockchain ofwe authority can and find prooffor that issuing oftheir authority for issuing authorities) forby verification. foreign health authorities) systems and for usedverification.authorities)by by foreign relevant health for stakeholders verification. systems and (such used as airlinesby relevant and stakeholdersborder control (such as airlines and border control are free from aredisease free risksfrom anddiseasefunctionsdigital how risks tohealth useare and passports.mainlythem howdigital to tofocused restore useA health distributed them oninternational passports. personnel to restore infrastructure A manageme tourism internationaldistributed is[28]. employednt infrastructure andThetourism dataarticle to [28]. traceability.support is The employed the article issuanceIt can to supportbe offound the theDHP that issuance of the DHP To summarizeauthorities) Table for4 describesverification.To summarizethe studiedauthorities) Tableworks.To summarize4 Fromdescribes for verification. the Tabletable,the studied 4 we describes can works. find the thatFrom studied their the table,works. we From can thefind table, that wetheir can find that their presents the DHPpresents Framework, the DHPbyavoiding which Framework, foreign uses the health ainterference privatewhich bysystems foreign usesblockchain of anda human privatehealth used and factors systemsblockchainby proof relevant (trick ofand authorityand systems,stakeholdersused proof by for identityrelevantof issuingauthority (such forgery,stakeholders as forairlines andissuing dataand (such bordermanipulation) as airlines control and border control interferencefunctions ofare human mainlyTo focused factorssummarize onfunctions (trick personnel Table systems, are4 describesmanageme mainlyfunctions identity focused theTont andsummarizestudied are on forgery,data mainly personnel works. traceability. Table focused and From manageme 4 data describes on Itthe canpersonnel manipulation)table, ntbe andthefound we studieddatamanageme can that traceability. find works. is ntthat contradictory and Fromtheir It data can the traceability.be table,found we that Itcan can find be found that their that digital health passports.digital health A distributed passports.authorities)is contradictory infrastructureA distributed for verification. to authorities)privacy infrastructureis employed protection. for verification.to is support employed the toissuance support of the the issuance DHP of the DHP to privacybyavoiding foreign protection. the health interferencebyfunctions foreignsystems are healthof and mainlyhumanavoiding used systems Tofocusedfactors by summarize the relevantand (trickoninterference used personnel avoidingfunctionssystems,stakeholders TablebyTo relevant of summarize4 manageme the identity arehumandescribes interferencemainly (suchstakeholders factorsforgery, nt asTable thefocused andairlines studied (trickof and4data (such humandescribes on dataandsystems, traceability. personnel works.as bordermanipulation)factors airlines the identityFrom controlstudied(trickmanageme Itand canthe forgery, systems,border betable,works. foundnt andcontrol we identityFrom that datacan the findmanipulation)traceability.forgery, table, that andwetheir Itdatacan can find manipulation)be found that their that avoiding the interference of humanavoiding factors (trick the interference systems, identity of human forgery, factors and (trick data systems, manipulation) identity forgery, and data manipulation) authorities)is contradictory forauthorities) verification. to privacy forprotection. verification.functionsis contradictory are mainly to functionsisprivacy contradictory focused protection. are on Tablemainly personnel to privacy 4. focusedSummary manageme protection. on of thepersonnel relatednt and works.datamanageme traceability. nt and It data can traceability.be found that It can be found that To summarizeis contradictoryTo Table summarize 4 describes toavoiding privacy Table the the protection.4 describesstudied interferenceavoidingis contradictory works. the ofstudied thehumanFrom interference totheworks. factors privacy table, From (trickof protection.we human thesystems,can table, findfactors identity thatwe (trick cantheir forgery, systems,find that and identity their data manipulation)forgery, and data manipulation) Table 4. Summary of the related works.Technolog Authentic Priva Human Decentraliz functions are mainlyfunctions focused are mainly onisTable contradictorypersonnel focused 4.Approach Summary managemeon topersonnel ofisprivacy contradictorythe relatednt andprotection.manageme Equipmentworks.dataTable to traceability. privacy 4.nt Summary and protection.data Itof Tabletraceability.can the relatedbe 4. foundSummary works. It thatcan of bethe found related that works. Table 4. Summary of the related works.Table y 4. Summaryation of thecy related Factors works. ation avoidingApproach the interferenceavoiding Equipment the of interference human factors of Technology human (trickTechnolog systems, factors Patient Authentication(trick identityAuthentic Managementsystems, forgery,Priva identity Privacy andTechnologHuman data forgery, manipulation) HumanDecentraliz andAuthentic data FactorsTechnolog manipulation) Priva DecentralizationAuthenticHuman PrivaDecentralizHuman Decentraliz Approach EquipmentApproachBSPP [24] ApproachEquipment BlockchainEquipment √ √ ✕ √ is contradictoryis tocontradictory privacy protection. to privacy protection.y ationTechnologTableSystem 4. Summarycy AuthenticFactors ofTable ythe Priva related 4. Summaryation ationworks.Human Technolog of ythe cyDecentraliz related AuthenticFactors ationworks. Privacyation HumanFactors Decentralization PatientApproach Equipment Approach Equipment Patient Management Patient Managementy ationPatientBluetooth Managementcy + Factors y ation ation cy Factors ation BSPP [24]BSPP [24] Management ContactBSPPBlockchain Tracing [24] Blockchain [7] BSPP Phone [24]√ + App √ √BlockchainTechnolog✕ Authentic√✕√ BlockchainTechnologPriva√ AuthenticHuman✕√ PrivaDecentraliz√ ✕√ Human✕ Decentraliz√ System ApproachPatient ManagementApproach EquipmentSystem PatientEquipmentGPSSystem Management SystemBSPP [24] Table 4. SummaryTable of the 4. Summary relatedBSPP works. Blockchain[24] of the related works.√ y √ ation✕ Blockchainy cy √ Factorsation√ cy√ ation Factors✕ ation√ Health code System[29]Bluetooth + Phone + App Bluetooth QRSystem code + √ Bluetooth✕ + √ ✕ Contact TracingContact [Tracing7] [7] Phone + App Phone Contact+ App Bluetooth Tracing+ [7]GPS ContactPatient Tracing Phone✕ Management + [7] App √ Patient√ Phone✕ Management + App ✕✕ √ ✕ √ ✕ ✕ ✕ BSPP [24] TechnologGPS BSPPInternetAuthentic BluetoothTechnolog[24] of Medical +Priva AuthenticBlockchainHumanGPS Priva DecentralizHuman√ BluetoothBlockchain GPS Decentraliz√ + ✕√ √ √ ✕ √ Health codeApproach [29] Contact PhoneApproach Tracing+ App Equipment [7] SecLAP QRPhone Equipment[25] code + AppContact Tracing√System [7] ✕ PhoneRFIDSystem + App√ √ ✕ √ ✕ ✕ √ ✕ ✕ ✕ Health code [29] Phone + HealthApp code [29] QR ycode Health Thingscode Phoneation√ GPS[29] y(IoMT)+ App cy ✕ ationFactors Phone QR √ code + cyApp ation✕Factors√ QR GPS code✕ ation √ ✕ ✕ √ ✕ Internet of Medical Bluetooth + Bluetooth + SecLAP [25] Health codePatientInternet [29] Management COVID-19ofContact MedicalPatient Tracing blockchain RFID Phone Management [7] + App Contact Health Internet Tracingcode Phone√ QR [29]of code+ [7]Medical App Internet √ Phone of + Medical App✕ ✕ √ QR code√ ✕ ✕√ ✕√ ✕ ✕√ ✕ SecLAPBSPP [24] [25] ThingsBSPP (IoMT) [24] SecLAP [25]Blockchain RFID P2P-MobileSecLAPBlockchain √[25] Application √ √ BlockchainRFID✕GPS √ ✕√✕√ ✕ RFIDGPS✕ √ √ ✕√ √ ✕√ ✕ ✕ ThingsSystem (IoMT)framework Internet [27]System of Medical Things (IoMT) InternetThings of (IoMT) Medical COVID-19 SecLAP [25] Health code [29] HealthSecLAP code Phone [25]RFID [29] + App √ Phone QR code + App √ √ ✕ QRRFID code✕ ✕ √ ✕√ ✕ ✕√ ✕ COVID-19 blockchainP2P-Mobile COVID-19 blockchainThingsBluetooth (IoMT) COVID-19 + Smart blockchainBluetooth home Security + Things (IoMT) blockchainContact Tracing [7]Contact TracingP2P-Mobile Phone [7] Application+ AppOur ProposedBlockchain Phone Blockchain + App P2P-MobileInternet✕ of Application Medical✕√ P2P-Mobile Internet✕ Blockchain✕√ of Application Medical√ ✕√✕ √ ✕ Blockchain✕√ ✕ ✕ √ ✕ √ √ √ framework [27]COVID-19 Application blockchain frameworkSecLAP [25] [27] GPSCOVID-19 frameworkSecLAP blockchain [25]System [27]GPS RFID √ RFID√ ✕√ √ ✕ ✕ ✕ framework [27] P2P-Mobile Application Things Blockchain (IoMT) P2P-Mobile✕ Things Application(IoMT)✕ √ Blockchain √ ✕ ✕ √ √ Health code [29] Healthframework codeSmart [27][29] Phone home + AppSecurity Phone QR + App code framework Smart QRhome√ [27] code Security ✕ Smart√ home√ ✕Security ✕ √ ✕ Our Proposed Smart home COVID-19Our Proposed blockchainBlockchain COVID-19Our Proposed blockchain√ √ Blockchain√ √√ Blockchain√ √ √ √ √ √ Our Proposed InternetSystem of Medical SmartBlockchainInternet home of Medical SecurityP2P-Mobile √System Application P2P-Mobile Smart √ Blockchain homeSystem Application Security ✕√ Blockchain✕ ✕ √ ✕ √ √ √ SecLAP [25] SecurityOurSecLAP Proposed System [25]5. Openframework Issue [27] RFID frameworkOur ProposedBlockchain√ RFID[27] √ √ ✕ √ ✕ ✕√ Blockchain ✕√ √ √ √ √ Things (IoMT) ThingsSystem (IoMT) System Smart home Security Smart home Security COVID-19 blockchainCOVID-19 blockchain OurOur approach Proposed suffersOur from Proposed two main issues:Blockchain √ Blockchain√ √ √ √ √ √ 5. Open Issue P2P-Mobile5. Open Application IssueP2P-Mobile Blockchain 5.Application Open Issue Blockchain✕System ✕ ✕ √System ✕ √ √ √ framework5. [27] Open framework Issue [27] Not suitable 5.for Open real-time Issue corresponding quarantine scenarios: our method uses public 5. OpenOur Issue approach suffers fromSmart hometwoOur mainSecurity approachSmart issues: home suffers SecurityOur from approach two main suffers issues: from two main issues: Our Proposed Our Proposed5.blockchain. Open Issue According Blockchain5. Open to the Issue consensusBlockchain√ protocol √ √ in √the blockchain,√ √ √ each transaction√ (block) is verified Not suitable Ourfor approachreal-timeSystem sufferscorrespondingNot fromsuitable twoSystem quarantine formain NotOurreal-time issues: approachsuitable scenarios: corresponding forsuffers real-timeour from method quarantinetwo corresponding main uses issues: scenarios:public quarantine our method scenarios: uses our public method uses public in each determined period. Therefore, the transaction (message) sent by the device will be performed blockchain.Our approach According suNotff to erssuitable the from consensusblockchain. for two real-time protocol main According issues:incorrespondingblockchain. the to Notblockchain, the suitableconsensus According quarantine each for protocol transaction toreal-time the scenarios: consensus in the (block)corresponding blockchain, our protocol is verifiedmethod each in quarantine the usestransaction blockchain, public scenarios: (block) each transaction is ourverified method (block) uses is verified public after Ourthis period.approach This suffers limitsOur from approachthe applicationtwo main suffers issues: of from this twoscheme main in issues:real-time scenarios. in5. Openeach determined Issue blockchain.5. Open period. Issue According Therefore, in each to thedetermined the transaction consensusinblockchain. period. each (message)protocol determined Therefore, According in sent the by blockchain,period.the the to transaction thedevice Therefore, consensus each will (message) transaction be the protocolperformed transaction sent (block) in by the the(message) blockchain, is deviceverified willsent each beby performedtransactionthe device will (block) be performed is verified Not suitable for real-time correspondingTheNot evolutionsuitable offor quarantine the Notreal-time cryptocurrency suitable corresponding scenarios: for exchangereal-time our quarantine rate: methodcorresponding Our method scenarios: uses quarantine publicrelies our on blockchain.themethod scenarios: public uses blockchain, our public method uses public after this period.in eachThis determinedlimits theafter application period. this period. Therefore, of this Thisafterin scheme each the limits this transaction determined in period.the real-time application This (message) period. scenarios. limits of Therefore, thisthe sent applicationscheme by the the devicein transaction real-time of this will scheme be scenarios. (message) performed in real-time sent by scenarios. the device will be performed AccordingOur to approach the consensus Oursuffers approach from protocolandblockchain. two suffers its main cost from issues: inAccordingdepends thetwo blockchain. main blockchain, on to the theissues: cryptocurrency consensus According each protocol to transaction theused consensus in by the the blockchain, blockchain protocol (block) each in system. is the verifiedtransaction blockchain, Security in (block) serviceseach each transaction is verified require (block) is verified The evolutionafter ofthis the period. cryptocurrency This Thelimits evolution exchange the applicationafter of rate: the Thethis Ourcryptocurrency of evolutionperiod. thismethod scheme This ofrelies thelimits exchangein cryptocurrency onreal-time thethe application publicrate: scenarios. Our blockchain, exchange method of this scheme reliesrate: Ouron in the methodreal-time public relies blockchain,scenarios. on the public blockchain, determinedNot period.suitable Not Therefore,for real-timesuitableain thecost, eachforcorresponding transactionreal-time asdetermined long as corresponding itin quarantineperiod.is (message)each less determined than Therefore, scenarios:the quarantine sent potential period.the by transactionour the loss,Therefore,scenarios: method device it is (message) feasible. theuses willour transaction method bepublic However,sent performed by uses the(message) at device publicthe aftertime willsent we bethisby performedwrotethe device this will be performed and its cost dependsThe on evolution the cryptocurrencyand of its the cost cryptocurrency depends used byand onthe itsThe the exchangeblockchain cost evolutioncryptocurrency depends rate: system. of onOur the the usedcryptocurrency methodSecurity cryptocurrency by therelies services blockchain on exchange the requireused public system.by rate: the blockchain, blockchainOur Security method services system. relies requireon Security the public services blockchain, require blockchain. Accordingblockchain. to the According consensuspaper,after this to the protocolthe period. exchange consensus Thisinafter the rate limits protocol blockchain,this of period.Ethereum’sthe inapplication the eachThis blockchain, transactioncryptoculimits of thisthe rrencyeach applicationscheme (block) transaction Eth in is continued real-timeverified of this (block) scheme scenarios.to isfluctuate verified in real-time enormously. scenarios. We period.a cost, This as long limitsand as it theits is costless application dependsthana the cost, onpotential ofasthe longthis cryptocurrency loss,as scheme itaand it iscost, is lessits feasible. ascost in thanused long real-time depends the by However,as the potentialit is blockchainon less scenarios. the at than loss, thecryptocurrency time theitsystem. is potential feasible.we wroteSecurity used loss,However, this byservices it theis feasible. blockchainat require the time However, system.we wrote at Security the this time services we wrote require this in each determinedin each period. determined Therefore,judge period.The that the evolution Therefore,thistransaction phenomenon of thethe (message)The transactioncryptocurrency evolution is affected sent (message) byof by thethe exchange the cryptocurrencydevice pandemic sent willrate: by the be Ourand performeddevice exchange methodis not will normal. relies rate:be performed Our on the method public relies blockchain, on the public blockchain, paper, the exchangea cost, rateas long of Ethereum’s aspaper, it is less the cryptocuthan exchange therrency paper,apotential cost, rate Ethastheof Ethereum’slong loss,exchangecontinued asit isit feasible.is rate tocryptoculess fluctuate of than Ethereum’sHowever,rrency the enormously. potential Eth at cryptocu thecontinued loss,time Werrency it we isto wrote feasible.fluctuate Eth continued this However, enormously. to fluctuateat the We time enormously. we wrote thisWe afterThe this evolution period.after Thisof this thelimits period. cryptocurrency the and Thisapplication its Privatelimits cost thedepends blockchainof applicationthis exchangeand scheme on its maythe cost of incryptocurrency rate:solve thisreal-timedepends scheme these Our onscenarios. issues methodin the used real-time cryptocurrency but by at reliesthe the scenarios. blockchain expense on used the of system.by publicscalability. the blockchain Security blockchain, services system. require Security services require judgeThe that evolution thispaper, phenomenon Theof thethe evolution exchangecryptocurrency is affectedajudge cost, of rate the that as bycryptocurrencyof long exchangethis theEthereum’s phenomenonaspandemic itajudgepaper, israte:cost, less cryptocu thatexchange Ourastheand than long isthis exchange methodis affected thenotrrency phenomenonas rate: potentialnormal.it reliesis ratebyOurEth less the continued ofonmethod thanloss, pandemic Ethereum’stheis affected theitpublic reliesis potential tofeasible. andfluctuate blockchain, by oncryptocu theisthe notloss,However, pandemicpublic enormously.normal.rrency it is blockchain, feasible. at Eth and the continued isWe time notHowever, normal.we towrote fluctuateat the this time enormously. we wrote thisWe and its cost dependsjudge onthat thethis cryptocurrencyphenomenon is affected usedjudge by that by the the thispandemic phenomenon blockchain and is not is system. affected normal. by Security the pandemic services and is require not normal. a and itsPrivate cost depends blockchainand its on cost maythe depends cryptocurrency solve6.paper, Conclusions these onPrivate thethe issues exchangecryptocurrency blockchainused but bypaper, at ratethe thePrivate may blockchain theofexpense used Ethereum’s solveexchange blockchain by ofthese the system. scalability. blockchainrate cryptocuissues may of Security Ethereum’s butsolve rrency system.at theseservicesthe Eth expense cryptocuissuesSecurity continued require butof rrencyservices scalability. at tothe fluctuate Eth expense require continued enormously.of scalability. to fluctuate We enormously. We cost,a as cost, long as long as ita as iscost, it lessPrivate is as less thanlong thanblockchain as thejudge theit is potentialpotential less that may than this solve loss,phenomenonthe loss, these judge potentialit is it Privateissuesfeasible. that is feasible. loss,isthis but blockchainaffected However, phenomenon itat is the feasible.However, by expense maythe at thepandemic However,issolve of affectedtime scalability. at these thewe and atby issueswrote time the theis not timepandemic butthis we normal. atwe wrote the wrote andexpense this isthis not paper,of normal. scalability. The pandemic is still expanding rapidly. To cope with its spread, person-to-person contact must the exchange6.paper, Conclusions the exchange ratepaper, of Ethereum’s ratethe exchangeof Ethereum’s6. Conclusions cryptocurrencyratePrivate ofcryptocu Ethereum’s blockchain rrency6. Conclusions Private cryptocu Ethmay Eth continuedsolvecontinued blockchainrrency these Eth toissues tomayfluctuate continued fluctuate butsolve at enormously. thesethe to expensefluctuate enormously. issues butofWe enormously. scalability. at the We expense judge We of thatscalability. 6. Conclusions be diminished, and6. Conclusions social distance maintained. Therefore, we proposed a home quarantine this phenomenonjudgeThe that pandemic thisjudge phenomenon is is athat ffstillected this expanding isphenomenon byaffected theThe rapidly. pandemicby pandemic theis affectedTo pandemic cope is andstill bywithThe andtheexpanding is pandemicits pandemic notis spread, not normal. normal. rapidly. is person-to-person andstill expandingis To not cope normal. with rapidly. contact its spread, Tomust cope person-to-person with its spread, contact person-to-person must contact must 6.management Conclusions system 6. Conclusionsbased on the blockchain’s security and privacy protection. First, the officer uses be diminished,Private blockchain andThePrivate social pandemicmay blockchain solvedistancebe is thesediminished, still maymaintained. expandingissues solve butand thesebe at rapidly. Therefore, diminished,thesocial Theissues expense pandemic Todistance but copewe atofand thewithscalability. proposed ismaintained. stillexpensesocial its expanding spread, distance aof homescalability. Therefore,person-to-person rapidly. maintained.quarantine Towe cope proposed contactTherefore, with its musta spread, homewe proposed person-to-personquarantine a home contact quarantine must Private blockchain may solvethe blockchain these issuespublic and but private at the keys expense system ofto scalability.issue virtual house numbers to households in the management systembe diminished, based on themanagementand bl ockchain’ssocial distance system securitymanagementbe baseddiminished,maintained. and on privacy the system bl andTherefore,ockchain’s pr otection.basedsocial on securitywedistance First,the proposed bl theockchain’s and maintained.officer privacy a uses homesecurity pr otection.Therefore, quarantine and privacy First, we the prproposed officerotection. uses First,a home the officerquarantine uses community.The pandemic Then, the is still householdThe expanding pandemic access rapidly. is stillinformation expanding To cope is with perceived rapidly. its spread, To by cope sensors person-to-person with of its the spread, smart contact person-to-personhome. Aftermust contact must 6.the Conclusions blockchain6.management public Conclusions and private system the keysblockchain based system on the public to blthemanagement issueockchain’s blockchainand virtual private security systemhouse public keys numbersand basedsystem and privacy private on to tothe issue householdspr blkeysotection.ockchain’s virtual system First,inhouse securitytothe theissue numbers officer andvirtual privacy usesto househouseholds pr numbersotection. in the toFirst, households the officer in uses the 6. Conclusions bethe diminished,information isandbe signed diminished,social by distancea ring and signature, maintained. social distancethe smartTherefore, maintained. gateway we transmitsproposed Therefore, ita to home wea smart proposed quarantine contract a home quarantine community. Then,the blockchain the household publiccommunity. access and information private Then, keys community.thethe is blockchainhousehold systemperceived toThen, issue accesspublicby sensorsthe virtual information andhousehold ofprivate house the smart access iskeysnumbers perceived home. systeminformation to After by householdsto sensorsissue is perceived virtual of in the the housesmart by sensors home.numbers of After the to smarthouseholds home. in After the The pandemic Theis still pandemic expandingmanagementcreated is still rapidly. according expanding system To copemanagement to rapidly. based withquarantine onits To thespread, copesystem blpolicy.ockchain’s with person-to-person based itsThe spread, on securitysmar the blperson-to-persont ockchain’scontract and contact privacy mustrecords security pr otection.contact the and process mustprivacy First, theresults pr officerotection. in uses the First, the officer uses the informationcommunity. is signed byThen, athe ring the information householdsignature, accessisthethecommunity. signed smart information information bygateway a Then, ring is is transmitsthesignature, signedperceived household by it thebya to ring sensors accesssmarta smart signature, information gatewayof contract the smart the transmits smartis home. perceived gateway Afterit to bya smart sensorstransmits contract of itthe to smart a smart home. contract After beThe diminished, pandemicbe anddiminished, is stillsocial expanding distance theblockchainand blockchain social maintained. rapidly. logdistance publicandthe To the Therefore, blockchainandmaintained. cope officer private with listens wepublic keysTherefore, itsproposed tospread,system and the private log wetoa person-to-person issue tohomeproposed keysgrasp virtual quarantinesystem the ahouse quarantine hometo issue numbers contactquarantine virtual state. to musthouse householdsHowever, benumbers forin the anto households in the created accordingthe information to quarantine createdis signed policy. according by The a ring smarcreatedthe tosignature, tinformation quarantinecontract according the records policy.issmart signedto quarantine thegatewayThe byprocess smara ringtransmits tpolicy. resultscontractsignature, The itin torecords thesmarthea smart smartt thecontract contract gatewayprocess records resultstransmits the in process itthe to a smartresults contract in the diminished,management and systemmanagement social based distance onsystem thecommunity.emergency, bl maintained. basedockchain’s on Then,the the securitysmart bl community.theockchain’s Therefore, household gateway and privacy security Then, weinaccess the prthe proposed andotection. information smarthousehold privacy home First, a praccess homeis otection.the encryptsperceived officer information quarantine First, the usesby sensorseventsthe is officer perceived management andof the uses sends smart by sensors them home. toof After thethe smart home. After blockchain logcreated and the according officerblockchain listens to quarantine to thelog logand policy.blockchaincreated tothe grasp officer Theaccording the logsmar listens quarantineandt tocontract theto quarantine theofficer state. logrecords listens toHowever, policy.grasp the to processthetheThe for quarantine log smaran resultstot graspcontract state.in the the recordsHowever,quarantine the for state.process an However, results forin thean the blockchainthe public blockchain and private publicthepandemic keysinformation and system privateprevention tois keysthe issuesigned workersinformation system virtual by awithto ringhouse issue isthe signature,signed numbersvirtual by hohouse thetoause ringhouseholds smart number.numbers signature, gateway Pandemic toin households thethe transmits smart prevention gateway init theto workers a smart transmits respondcontract it to a smart contract systemcommunity.emergency, based on Then,thecommunity.blockchain the smart the blockchain’s household gateway log Then, andcreatedemergency, theinaccess the securitythehousehold officeraccording informationsmart the listens and homeaccesssmartcreatedemergency,blockchain to is privacy quarantine to encryptsinformationperceivedgateway theaccording logthe protection. thein by toandpolicy.smart is the sensorseventsgrasp perceivedto the smart quarantine gateway Theofficer the andof First, thehome smarquarantineby sends listens smartsensorsin t policy.the encryptsthecontract them home. too smartofffistate. the Thethe certo Aftertherecords smartlogthehomeHowever,smar uses events to thome. graspencryptsthe contract and forprocess blockchain Afterthe sendsan therecordsquarantine results eventsthem the into and state.process the sends However, results them forinto thean publicthepandemic and information private preventiontheemergency, is keysinformation signed workers system bythe a withblockchainpandemicissmart ring signed to the issuesignature,gateway virtual byprevention log virtuala horing and intheuseblockchainpandemicemergency, the signature,thesmart number.workers house smartofficer gateway prevention log numbersPandemicwithhomethethe listens and smartthe transmitsencrypts virtualthe toworkers prevention gateway totheofficer households ho logtheit usewithto listenstotransmitsevents in workersanumber. thegraspsmartthe virtual tosmartand thein respondcontract thePandemicit thetosends hoquarantine log homeause community.smart to themnumber. preventiongraspencrypts contract state.to the Pandemicthe the However,quarantineworkers Then, events prevention respond for andstate. an sends However,workers them respond forto thean pandemic prevention workers with pandemicthe virtual prevention house number. workers Pandemic with the prevention virtual ho workersuse number. respond Pandemic prevention workers respond the householdcreated according accesscreated to information accordingquarantineemergency, topolicy. quarantine is perceived Thethe smarsmart policy.emergency,t by gatewaycontract sensorsThe thesmar recordsin smart t ofthe contract the smart thegateway smart process recordshome in home. encryptstheresults the smart process After in the thehome events the results encrypts information andin thesends the eventsthem is toand the sends them to the blockchain logblockchain and the officer log andpandemic listens the officerto prevention the listenslogpandemic to workers graspto the prevention the logwith quarantineto the grasp virtual workers the state. ho quarantine usewith However, number. the virtual state. Pandemic for ho However,anuse number. prevention for Pandemic an workers prevention respond workers respond signedemergency, by a ring theemergency, signature,smart gateway the the smart in smart the gateway smart gateway homein the encrypts transmitssmart home the iteventsencrypts to a and smart the sends events contract them and to sends createdthe them according to the to quarantinepandemic policy. preventionpandemic The workers smart prevention with contract the workers virtual records with house the thenumber. virtual process ho Pandemicuse number. results prevention Pandemic in the workers blockchain prevention respond workers log and respond the officer listens to the log to grasp the quarantine state. However, for an emergency, the smart gateway in the smart home encrypts the events and sends them to the pandemic prevention workers with the virtual house number. Pandemic prevention workers respond to the emergency after decryption and verification. The evaluation of the system shows that it meets the security and application requirements. In future work, besides using ring signature technology on the data generation side, we will consider using aggregation technology to process the data and facilitate its use and transmission. On the data usage side, we will implement data access control, incorporating authentication and authorization to provide secure access to the data. For the blockchain that acts as a bridge between the two sides, we will consider blockchain sharing technology and double-blockchain [30] for reducing the resources consumed and the transaction processing time of the blockchain. Many countries have proposed rescue plans for after the pandemic has stabilized. We consider using the properties of the digital currency of the blockchain to distribute rewards and punishments based on the degree of policy coordination of residents during the pandemic. Linking with the rescue plan will expand the scope of application of the system. Electronics 2020, 9, 1746 15 of 16

Author Contributions: J.Z. conceived the system model, performed simulations and data analyses; J.Z. and M.W. wrote the manuscript. All authors have read and agreed to the published version of the manuscript. Funding: This research received no external funding. Acknowledgments: We would like to thank the anonymous reviewers for their comments and suggestions that help us improve the paper. Conflicts of Interest: The authors declare no conflict of interest.

References

1. Wang, C.; Horby, P.W.; Hayden, F.G.; Gao, G.F. A novel coronavirus outbreak of global health concern. Lancet 2020, 395, 470–473. [CrossRef] 2. Johns Hopkins University. Coronavirus COVID-19 Global Cases by Johns Hopkins CSSE. Ph.D. Thesis, Johns Hopkins University, Baltimore, MD, USA, 2020. 3. Kucharski, A.J.; Russell, T.W.; Diamond, C.; Liu, Y.; Edmunds, J.; Funk, S.; Eggo, R.M.; Sun, F.; Jit, M.; Munday, J.D.; et al. Early dynamics of transmission and control of COVID-19: A mathematical modelling study. Lancet Infect. Dis. 2020, 20, 553–558. [CrossRef] 4. Hsiang, S.; Allen, D.; Annan-Phan, S.; Bell, K.; Bolliger, I.; Chong, T.; Druckenmiller, H.; Huang, L.Y.; Hultgren, A.; Krasovich, E.; et al. The effect of large-scale anti-contagion policies on the COVID-19 pandemic. Nature 2020, 584, 262–267. [CrossRef] 5. Hale, T.; Petherick, A.; Phillips, T.; Webster, S. Variation in government responses to COVID-19. In Blavatnik School of Government Working Paper; University of Oxford: Oxford, UK, 2020; Volume 31. 6. Chamola, V.; Hassija, V.; Gupta, V.; Guizani, M. A Comprehensive Review of the COVID-19 Pandemic and the Role of IoT, Drones, AI, Blockchain, and 5G in Managing its Impact. IEEE Access 2020, 8, 90225–90265. [CrossRef] 7. Li, J.; Guo, X. COVID-19 Contact-tracing Apps: A Survey on the Global Deployment and Challenges. arXiv 2020, arXiv:2005.03599. 8. Wu, M.; Wang, K.; Cai, X.; Guo, S.; Guo, M.; Rong, C. A Comprehensive Survey of Blockchain: From Theory to IoT Applications and Beyond. IEEE Internet Things J. 2019, 6, 8114–8154. [CrossRef] 9. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System; Manubot. 2008. Available online: https: //bitcoin.org/bitcoin.pdf (accessed on 20 October 2020). 10. Christidis, K.; Devetsikiotis, M. Blockchains and smart contracts for the internet of things. IEEE Access 2016, 4, 2292–2303. [CrossRef] 11. Tosh, D.K.; Shetty, S.; Liang, X.; Kamhoua, C.A.; Kwiat, K.A.; Njilla, L. Security implications of blockchain cloud with analysis of block withholding attack. In Proceedings of the 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), Madrid, Spain, 14–17 May 2017. 12. Mengelkamp, E.; Notheisen, B.; Beer, C.; Dauer, D.; Weinhardt, C. A blockchain-based smart grid: Towards sustainable local energy markets. Comput. Sci. Res. Dev. 2018, 33, 207–214. [CrossRef] 13. Lucena, P.; Binotto, A.P.; Momo, F.D.S.; Kim, H. A case study for grain quality assurance tracking based on a Blockchain business network. arXiv 2018, arXiv:1803.07877. 14. Szabo, N. Formalizing and Securing Relationships on Public Networks. First Monday 1997, 2. Available online: https://firstmonday.org/ojs/index.php/fm/article/view/548/469 (accessed on 20 October 2020). [CrossRef] 15. Khan, M.A.; Salah, K. IoT security: Review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 2018, 82, 395–411. [CrossRef] 16. Aghili, S.F.; Mala, H.; Shojafar, M.; Peris-Lopez, P. LACO: Lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT. Future Gener. Comput. Syst. 2019, 96, 410–424. [CrossRef] 17. Stojkoska, B.L.R.; Trivodaliev, K.V. A review of Internet of Things for smart home: Challenges and solutions. J. Clean. Prod. 2017, 140, 1454–1464. [CrossRef] 18. Puthal, D.; Malik, N.; Mohanty, S.P.; Kougianos, E.; Das, G. Everything You Wanted to know About the Blockchain. IEEE Consum. Electron. Mag. 2018, 7, 6–14. [CrossRef] 19. Buterin, V. A Next-Generation Smart Contract and Decentralized Application Platform. White Paper 2014, 3. Available online: https://cryptorating.eu/whitepapers/Ethereum/Ethereum_white_paper.pdf (accessed on 20 October 2020). Electronics 2020, 9, 1746 16 of 16

20. Rivest, R.L.; Shamir, A.; Tauman, Y. How to leak a secret. In International Conference on the Theory and Application of Cryptology and Information Security; Springer: Berlin/Heidelberg, Germany, 2001. 21. Dannen, C. Introducing Ethereum and Solidity; Springer: Berlin/Heidelberg, Germany, 2017; Volume 1. 22. Wood, G. Ethereum Yellow Paper. 2014. Available online: https://github.com/ethereum/yellowpaper (accessed on 20 October 2020). 23. Sharma, P.K.; Chen, M.-Y.; Park, J.H. A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Access 2017, 6, 115–124. [CrossRef] 24. Zhang, A.; Lin, X. Towards Secure and Privacy-Preserving Data Sharing in e-Health Systems via Consortium Blockchain. J. Med. Syst. 2018, 42, 140. [CrossRef] 25. Aghili, S.F.; Mala, H.; Kaliyar, P.; Conti, M. Seclap: Secure and lightweight rfid authentication protocol for medical iot. Future Gener. Comput. Syst. 2019, 101, 621–634. [CrossRef] 26. Chang, M.C.; Park, D. How Can Blockchain Help People in the Event of Pandemics Such as the COVID-19? J. Med. Syst. 2020, 44, 1–2. [CrossRef] 27. Torky, M.; Hassanien, A.E. COVID-19 blockchain framework: Innovative approach. arXiv 2020, arXiv:2004.06081. 28. Angelopoulos, C.M.; Damianou, A.; Katos, V. DHP Framework: Digital Health Passports Using Blockchain. arXiv 2020, arXiv:2005.08922. 29. Liang, F. COVID-19 and Health Code: How Digital Platforms Tackle the Pandemic in China. Soc. Media Soc. 2020, 6, 2056305120947657. [CrossRef] 30. Chen, S.; Yang, L.; Zhao, C.; Varadarajan, V.; Wang, K. Double-blockchain Assisted Secure and Anonymous Data Aggregation for Fog-enabled Smart Grid. Engineering 2020, in press. [CrossRef]

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).