Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Modelling Memory for Individual Re-identification in Decentralised Mobile Contact Tracing Applications

Published: 30 March 2021 Publication History

Abstract

In 2020 the coronavirus outbreak changed the lives of people worldwide. After an initial time period in which it was unclear how to battle the virus, social distancing has been recognised globally as an effective method to mitigate the disease spread. This called for technological tools such as Mobile Contact Tracing Applications (MCTA), which are used to digitally trace contacts among people, and in case a positive case is found, people with the application installed which had been in contact will be notified. De-centralised MCTA may suffer from a novel kind of privacy attack, based on the memory of the human beings, which upon notification of the application can identify who is the positive individual responsible for the notification. Our results show that it is indeed possible to identify positive people among the group of contacts of a human being, and this is even easier when the sociability of the positive individual is low. In practice, our simulation results show that identification can be made with an accuracy of more than 90% depending on the scenario. We also provide three mitigation strategies which can be implemented in de-centralised MCTA and analyse which of the three are more effective in limiting this novel kind of attack.

References

[1]
Nadeem Ahmed, Regio A. Michelin, Wanli Xue, Sushmita Ruj, Robert Malaney, Salil S. Kanhere, Aruna Seneviratne, Wen Hu, Helge Janicke, and Sanjay K. Jha. 2020. A Survey of COVID-19 Contact Tracing Apps. IEEE Access 8 (2020), 134577--134601. https://doi.org/10.1109/access.2020.3010226
[2]
T. Altuwaiyan, M. Hadian, and X. Liang. 2018. EPIC: Efficient Privacy-Preserving Contact Tracing for Infection Detection. In 2018 IEEE International Conference on Communications (ICC). IEEE, 1--6.
[3]
Apple. 2020. Exposure Notification. https://developer.apple.com/documentation/exposurenotification. Accessed: 2020-07-13.
[4]
Jason Bay, Joel Kek, Alvin Tan, Chai Sheng Hau, Lai Yongquan, Janice Tan, and Tang Anh Quy. 2020. BlueTrace: A privacy-preserving protocol for community-driven contact tracing across borders. Government Technology Agency-Singapore, Tech. Rep (2020).
[5]
James Bell, David Butler, Chris Hicks, and Jon Crowcroft. 2020. TraceSecure: Towards Privacy Preserving Contact Tracing. (2020). arXiv:2004.04059 [cs.CR]
[6]
Samuel Brack, Leonie Reichert, and Björn Scheuermann. 2020. Decentralized Contact Tracing Using a DHT and Blind Signatures. IACR Cryptol. ePrint Arch. 2020 (2020), 398.
[7]
Ran Canetti, Yael Tauman Kalai, Anna Lysyanskaya, Ronald L. Rivest, Adi Shamir, Emily Shenk, Ari Trachtenberg, Mayank Varia, and Daniel J. Weitzner. 2020. Privacy-Preserving Automated Exposure Notification. IACR.org. (July 2020). https://www.microsoft.com/enus/research/publication/privacy-preserving-automated-exposure-notification/
[8]
Francesco Casella. 2021. Can the COVID-19 Epidemic Be Controlled on the Basis of Daily Test Reports? IEEE Control Systems Letters 5, 3 (Jul 2021), 1079--1084. https://doi.org/10.1109/lcsys.2020.3009912
[9]
Hyunghoon Cho, Daphne Ippolito, and Yun William Yu. 2020. Contact Tracing Mobile Apps for COVID-19: Privacy Considerations and Related Trade-offs. (2020). arXiv:2003.11511 [cs.CR]
[10]
EU Commission. 2020. Coronavirus: a common approach for safe and efficient mobile tracing apps across the EU. https://ec.europa.eu/digital-single-market/en/news/coronavirus-common-approach-safe-and-efficient-mobile-tracing-apps-across-eu. Last Update: 2020-05-15.
[11]
EU Commission. 2020. Mobile applications to support contact tracing in the EU's fight against COVID-19: Progress reporting June 2020. https://ec.europa.eu/health/sites/health/files/ehealth/docs/mobileapps_202006progressreport_en.pdf.
[12]
Aaqib Bashir Dar, Auqib Hamid Lone, Saniya Zahoor, Afshan Amin Khan, and Roohie Naaz. 2020. Applicability of Mobile Contact Tracing in Fighting Pandemic (COVID-19): Issues, Challenges and Solutions. Cryptology ePrint Archive, Report 2020/484. (2020). https://eprint.iacr.org/2020/484.
[13]
Ken TD Eames and Matt J Keeling. 2003. Contact tracing and disease control. Proceedings of the Royal Society of London. Series B: Biological Sciences 270, 1533 (2003), 2565--2571.
[14]
Khaled El Emam and Fida Dankar. 2012. Re-identification risk in de-identified databases containing personal information. US Patent 8,316,054.
[15]
Luca Ferretti, Chris Wymant, Michelle Kendall, Lele Zhao, Anel Nurtay, Lucie Abeler-Dörner, Michael Parker, David Bonsall, and Christophe Fraser. 2020. Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing. Science 368, 6491 (2020).
[16]
German government. 2020. Corona Warn App. https://www.coronawarn.app/en/. Accessed: 2020-07-13.
[17]
Italian government. 2020. Immuni. https://www.immuni.italia.it. Accessed: 2020-07-13.
[18]
Swiss government. 2020. SwissCovid App. https://ethz.ch/services/en/news-and-events/solidarity/pilot-swiss-covid-app.html. Accessed: 2020-07-13.
[19]
Singaporean government. 2020. TraceTogether. https://www.tracetogether.gov.sg/. Accessed: 2020-07-13.
[20]
Roxana Gutiérrez-Romero. 2020. Conflict in Africa during COVID-19: social distancing, food vulnerability and welfare response. arXiv:2006.10696 [econ.EM]
[21]
Google Inc. 2020. Exposure Notification. https://www.google.com/covid19/exposurenotifications. Accessed: 2020-07-13.
[22]
Mahabir Prasad Jhanwar and Sumanta Sarkar. 2020. PHyCT: Privacy preserving Hybrid Contact Tracing. IACR Cryptol. ePrint Arch. 2020 (2020), 793.
[23]
Nattiya Kanhabua, Tu Ngoc Nguyen, and Claudia Niederée. 2014. What triggers human remembering of events? A large-scale analysis of catalysts for collective memory in Wikipedia. In IEEE/ACM Joint Conference on Digital Libraries. IEEE, 341--350.
[24]
Philipp H. Kindt, Trinad Chakraborty, and Samarjit Chakraborty. 2020. How Reliable is Smartphone-based Electronic Contact Tracing for COVID-19? arXiv:2005.05625 [cs.NI]
[25]
Don Klinkenberg, Christophe Fraser, and Hans Heesterbeek. 2006. The effectiveness of contact tracing in emerging epidemics. PloS one 1, 1 (2006), e12.
[26]
South Korea. [n.d.]. South Korea Mobile Contact Tracing. http://global.seoul.go.kr/
[27]
Robert E. Clark Larry R. Squire, John T. Wixted. 2007. Recognition memory and the medial temporal lobe: a new perspective. Nature reviews. Neuroscience 8, 11 (2007), 872--883.
[28]
Douglas J. Leith and Stephen Farrell. 2020. Coronavirus Contact Tracing: Evaluating The Potential Of Using Bluetooth Received Signal Strength For Proximity Detection. arXiv:2006.06822 [eess.SP]
[29]
Ming Li, Shucheng Yu, Ning Cao, and Wenjing Lou. 2013. Privacy-preserving distributed profile matching in proximity-based mobile social networks. IEEE Transactions on Wireless Communications 12, 5 (2013), 2024--2033.
[30]
Joseph K Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, and Li Li. 2020. Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach. IACR Cryptol. ePrint Arch. 2020 (2020), 528.
[31]
Anmol Madan, Manuel Cebrian, Sai Moturu, Katayoun Farrahi, et al. 2011. Sensing the" health state" of a community. IEEE Pervasive Computing 11, 4 (2011), 36--45.
[32]
World Health Organization. [n.d.]. Opening remarks at the media briefing on COVID-19. https://www.who.int/dg/speeches/detail/who-director-general-s-opening-remarks-at-the-media-briefing-on-covid-19-11-march-2020. Released: 2020-03-11.
[33]
Andrew Paverd and A. Martin. 2014. Modelling and Automatically Analysing Privacy Properties for Honest-but-Curious Adversaries.
[34]
Piotr Sapiezynski, Arkadiusz Stopczynski, David Dreyer Lassen, and Sune Lehmann. 2019. Interaction data from the copenhagen networks study. Scientific Data 6, 1 (2019), 1--10.
[35]
Sanjay Sareen, Sandeep K Sood, and Sunil Kumar Gupta. 2018. IoT-based cloud framework to control Ebola virus outbreak. Journal of Ambient Intelligence and Humanized Computing 9, 3 (2018), 459--476.
[36]
Jun She, Jinjun Jiang, Ling Ye, Lijuan Hu, Chunxue Bai, and Yuanlin Song. 2020. 2019 novel coronavirus of pneumonia in Wuhan, China: emerging attack and management strategies. Clinical and translational medicine 9, 1 (2020), 1--7.
[37]
Manish Shukla, Rajan M A, Sachin Lodha, Gautam Shroff, and Ramesh Raskar. 2020. Privacy Guidelines for Contact Tracing Applications. (2020). arXiv:2004.13328 [cs.LG]
[38]
Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James Larus, Edouard Bugnion, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth Paterson, Srdjan Čapkun, David Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel Smart, Aysajan Abidin, Seda Gürses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, and José Pereira. 2020. Decentralized Privacy-Preserving Proximity Tracing. (2020). arXiv:2005.12273 [cs.CR]
[39]
Endel Tulving. 2002. Episodic memory: From mind to brain. Annual review of psychology 53, 1 (2002), 1--25.
[40]
Benton J Underwood. 1957. Interference and forgetting. Psychological review 64, 1 (1957), 49.
[41]
Bo Wang. 2014. Effect of Time Delay on Recognition Memory for Pictures: The Modulatory Role of Emotion. PLOS ONE 9, 6 (06 2014), 1--9. https://doi.org/10.1371/journal.pone.0100238
[42]
Rui Zhang, Jinxue Zhang, Yanchao Zhang, Jinyuan Sun, and Guanhua Yan. 2013. Privacy-preserving profile matching for proximity-based mobile social networking. IEEE Journal on Selected Areas in Communications 31, 9 (2013), 656--668.

Cited By

View all
  • (2024)Mobility Data Science: Perspectives and ChallengesACM Transactions on Spatial Algorithms and Systems10.1145/365215810:2(1-35)Online publication date: 1-Jul-2024
  • (2022)Re-identification Attack based on Few-Hints Dataset Enrichment for Ubiquitous Applications2022 IEEE 8th World Forum on Internet of Things (WF-IoT)10.1109/WF-IoT54382.2022.10152275(1-6)Online publication date: 26-Oct-2022

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 5, Issue 1
March 2021
1272 pages
EISSN:2474-9567
DOI:10.1145/3459088
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 March 2021
Published in IMWUT Volume 5, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. datasets
  2. digital contact tracing
  3. mobile computing
  4. privacy preserving

Qualifiers

  • Research-article
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)12
  • Downloads (Last 6 weeks)2
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Mobility Data Science: Perspectives and ChallengesACM Transactions on Spatial Algorithms and Systems10.1145/365215810:2(1-35)Online publication date: 1-Jul-2024
  • (2022)Re-identification Attack based on Few-Hints Dataset Enrichment for Ubiquitous Applications2022 IEEE 8th World Forum on Internet of Things (WF-IoT)10.1109/WF-IoT54382.2022.10152275(1-6)Online publication date: 26-Oct-2022

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media