| Literature DB >> 33728414 |
B Sowmiya1, V S Abhijith1, S Sudersan1, R Sakthi Jaya Sundar2, M Thangavel3, P Varalakshmi4.
Abstract
In response to the coronavirus (COVID-19) pandemic, Government and public health authorities around the world are developing contact tracing apps as a way to trace and slow the unfold of the virus. There is major divergence among nations, however, between a "privacy-first" approach that protects citizens' information at the price of very restricted access for public health authorities and a "data-first" approach that stores massive amounts of knowledge that, whereas of immeasurable price to epidemiologists. Contact tracing apps work by gathering information from people who have tested positive for the virus and so locating and notifying individuals with whom those people are in shut contact, oftentimes by use of GPS, Bluetooth, or wireless technology. All of the user's information is employed and picked up, the study found that users' information would be created anonymous, encrypted, secured, and can be transmitted on-line and stored solely in an aggregated format. Contact tracing apps use either a centralized or a decentralized approach to work the user's information. Apps that use a centralized approach have high privacy risks. In this paper, the researcher's contributions related to the security and privacy of Contact tracing apps have been discussed and, later research gaps have been identified with proposed solutions.Entities:
Keywords: AES encryption; Cloud storage; Data security; Tracing apps; User’s privacy
Year: 2021 PMID: 33728414 PMCID: PMC7951128 DOI: 10.1007/s42979-021-00520-z
Source DB: PubMed Journal: SN Comput Sci ISSN: 2661-8907
Fig. 1The centralized architecture of Covid Tracing Apps
Fig. 2The decentralized architecture of Covid Tracing App
Overview of the existing contact tracing solutions
| Country | App name | SSL | Transparency | Centralized/decentralized | Access control |
|---|---|---|---|---|---|
| India | Arogya Setu | N/A | Yes | Centralized | Location access,bio data |
| Singapore | TraceTogether | N/A | Yes | Centralized | Microphone, location, camera, storage, Wifi Connection, and Media access |
| Australia | CovidSafe | N/A | No | Centralized | Location access, Connects personal data to the server |
| Canada | CovidAlert | No | No | Centralized | Location access, Personal data connected to the health authority |
| Dubai | DXB Smart App | N/A | No | Centralized | Microphone, location, camera, storage, Wifi Connection, and Media access |
| United States | CovidWise | No | No | Decentralized | Microphone, location, camera, storage, Wifi Connection, and Media access |
| Pakistan | COVID-19 Gov PK | No | No | Centralized | Location access |
| Vietnam | Bluezone | N/A | No | Centralized | Microphone, location, camera, storage, Wifi Connection, and Media access |
| Malaysia | Mytrace | Yes | Yes | Centralized | Microphone, location, camera, storage, Wifi Connection, and Media access |
| Saudi Arabia | Covid-19KSA | N/A | No | Decentralized | Location access, Personal data connected to the health authority |
| UK | NHS Covid-19 | N/A | No | Centralized | Network access |
| Netherlands | CovidRadar | N/A | Yes | Decentralized | Location access, Personal data connected to the health authority |
Fig. 3Concerns of various existing solutions
Comparison of existing works
| Work | Methodology | Inferences |
|---|---|---|
| [ | Application using mobile and fog computing, privacy-preserving e-government framework to trace and prevent COVID-19 community transmission | Ensures data privacy, security, optimization of data communication, low power consumption, and also enhances efficiency in terms of cost, network delay, and energy consumption |
| [ | IoT-based tracing framework. Anonymized RFID contact tracing of Infection spread. Blockchain technology is used for data storage to ensure privacy | Secure and efficient for contact tracing The identity privacy problem is protected by the combination of zero-knowledge proof and key escrow. By the connection of unique cryptographic identity and on-chain proof-of-location commitment is decoupled such that it is almost impossible to track and identify the person |
| [ | A peer-to-peer system of a blockchain protocol, used for contact tracing. Provides users with a unique ID, transparent data storage, location proofing, and zero-knowledge proof-based data ownership authorization | Does not require trusted third-party services and centralized servers and ensures the anonymity of users |
| [ | A decentralized approach for contact tracing | Secure storage and Efficient for contact tracing. APIs used to support applications developed by governments, health workers intended to work seamlessly |
| [ | Machine learning used for screening, prediction, forecasting, contact tracing, and drug development for SARS-CoV-2 | Requires large amounts of data to achieve higher efficiency Training of data might take a long time |
Comparison between AES and DES
| Features | AES | DES |
|---|---|---|
| Developed by | Vincent Rijmen | Horst Feistel |
| Length of the Key | 128,192,256 bits | 56bits |
| Block Size | 128bits | 64bits |
| Rounds | 10,112,114 rounds | 16 rounds |
| Algorithm type | Symmetric Key | Symmetric Key |
| Encryption Time | Fast | Medium |
| Decryption Time | Fast | Medium |
| Power Consumption | Less | Less |
| Security | High | meet-in-the-middle attack |
| Scalability | No | Yes |
| Efficiency | High | Medium |
Fig. 4Architecture for storing user’s data
Fig. 5User’s Data Encryption and Storage