EPIC: Efficient Privacy-Preserving Contact Tracing for Infection Detection

The world has experienced many epidemic diseases in the past, SARS, H1N1, and Ebola are some examples of these diseases. When those diseases outbreak, they spread very quickly among people and it becomes a challenge to trace the source in order to control the disease. In this paper, we propose an efficient privacy-preserving contact tracing for infection detection (EPIC) which enables users to securely upload their data to the server and later in case of one user got infected other users can check if they have ever got in contact with the infected user in the past. The process is done privately and without disclosing any unnecessary information to the server. Our scheme uses a matching score to represent the result of the contact tracing, and uses a weight-based matching method to increase the accuracy of the score. In addition, we have developed an adaptive scanning method to optimize the power consumption of the wireless scanning process. Further, we evaluate our scheme in real experiment and show that the user's privacy is preserved, and the accuracy achieves 93% in detecting the contact tracing based on the matching score in an energy efficient way.

[1]  David Liben-Nowell,et al.  The link-prediction problem for social networks , 2007 .

[2]  Katarzyna Wac,et al.  Getting closer: an empirical investigation of the proximity of user to their smart phones , 2011, UbiComp '11.

[3]  Xiaodong Lin,et al.  Effective epidemic control and source tracing through mobile social sensing over WBANs , 2013, 2013 Proceedings IEEE INFOCOM.

[4]  Ahmed Helmy,et al.  Proximity based trust-advisor using encounters for mobile societies: Analysis of four filters , 2010, Wirel. Commun. Mob. Comput..

[5]  Ahmed Helmy,et al.  Infection tracing in smart hospitals , 2016, 2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[6]  Justin Manweiler,et al.  SMILE: encounter-based trust for mobile social services , 2009, CCS.

[7]  Xiaohui Liang,et al.  SPICE: Secure Proximity-based Infrastructure for Close Encounters , 2017, CrowdSenSys@SenSys.

[8]  Paul A. Zandbergen,et al.  Accuracy of iPhone Locations: A Comparison of Assisted GPS, WiFi and Cellular Positioning , 2009 .

[9]  Xiaohui Liang,et al.  Exploiting Social Network to Enhance Human-to-Human Infection Analysis without Privacy Leakage , 2018, IEEE Transactions on Dependable and Secure Computing.

[10]  Justin Manweiler,et al.  We saw each other on the subway: secure, anonymous proximity-based missed connections , 2009, HotMobile '09.

[11]  Guanhua Yan,et al.  Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking , 2013, IEEE Journal on Selected Areas in Communications.

[12]  Navneet K Dhand,et al.  Adding the spatial dimension to the social network analysis of an epidemic: Investigation of the 2007 outbreak of equine influenza in Australia , 2012, Preventive Veterinary Medicine.

[13]  Anne Liu,et al.  Introduction of Mobile Health Tools to Support Ebola Surveillance and Contact Tracing in Guinea , 2015, Global Health: Science and Practice.

[14]  Fredson Kuti-George,et al.  Contact Tracing during an Outbreak of Ebola Virus Disease in the Western Area Districts of Sierra Leone: Lessons for Future Ebola Outbreak Response , 2016, Front. Public Health.

[15]  Sandeep K. Sood,et al.  IoT-based cloud framework to control Ebola virus outbreak , 2016, Journal of Ambient Intelligence and Humanized Computing.

[16]  Dong Xuan,et al.  A mobile phone-based physical-social location proof system for mobile social network service , 2016, Secur. Commun. Networks.

[17]  Vinod Vaikuntanathan,et al.  Can homomorphic encryption be practical? , 2011, CCSW '11.

[18]  Ming Li,et al.  Privacy-Preserving Distributed Profile Matching in Proximity-Based Mobile Social Networks , 2013, IEEE Transactions on Wireless Communications.

[19]  Aziz Mohaisen,et al.  Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs , 2013, IEEE Transactions on Dependable and Secure Computing.