COVID-19接触者追踪解决方案:应用程序、数据隐私和安全

Gustavo Betarte, J. Campo, Andrea Delgado, Laura González, Álvaro Martín, R. Martínez, Bárbara Muracciole
{"title":"COVID-19接触者追踪解决方案:应用程序、数据隐私和安全","authors":"Gustavo Betarte, J. Campo, Andrea Delgado, Laura González, Álvaro Martín, R. Martínez, Bárbara Muracciole","doi":"10.19153/cleiej.25.2.4","DOIUrl":null,"url":null,"abstract":"\n \n \nSince the beginning of 2020, COVID-19 has had a strong impact on the health of the world population. The mostly used approach to stop the epidemic is the application of controls of a classic epidemic such as case isolation, contact monitoring, and quarantine, as well as physical distancing and hygienic measures. Tracing the contacts of infected people is one of the main strategies for controlling the pandemic. Manual contact tracing is a slow, error-prone (by omission or forgotten) process, and vulnerable in terms of security and privacy. Furthermore, it needs to be carried out by specially trained personnel and it is not effective in identifying contacts with strangers (for example in public transport, supermarkets, etc). Given the high rates of contagion, which makes difficult an effective manual contact tracing, multiple initiatives arose for developing digital proximity tracing technologies. In this paper, we discuss in depth the security and personal data protection requirements that these technologies must satisfy, and we present an exhaustive and detailed list of the various applications that have been deployed globally, as well as the underlying infrastructure models and technologies they used. In particular, we identify potential threats that could undermine the satisfaction of the analyzed requirements, violating hegemonic personal data protection regulations. \n \n \n","PeriodicalId":418941,"journal":{"name":"CLEI Electron. J.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Contact tracing solutions for COVID-19: applications, data privacy and security\",\"authors\":\"Gustavo Betarte, J. Campo, Andrea Delgado, Laura González, Álvaro Martín, R. Martínez, Bárbara Muracciole\",\"doi\":\"10.19153/cleiej.25.2.4\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\\n \\n \\nSince the beginning of 2020, COVID-19 has had a strong impact on the health of the world population. The mostly used approach to stop the epidemic is the application of controls of a classic epidemic such as case isolation, contact monitoring, and quarantine, as well as physical distancing and hygienic measures. Tracing the contacts of infected people is one of the main strategies for controlling the pandemic. Manual contact tracing is a slow, error-prone (by omission or forgotten) process, and vulnerable in terms of security and privacy. Furthermore, it needs to be carried out by specially trained personnel and it is not effective in identifying contacts with strangers (for example in public transport, supermarkets, etc). Given the high rates of contagion, which makes difficult an effective manual contact tracing, multiple initiatives arose for developing digital proximity tracing technologies. In this paper, we discuss in depth the security and personal data protection requirements that these technologies must satisfy, and we present an exhaustive and detailed list of the various applications that have been deployed globally, as well as the underlying infrastructure models and technologies they used. In particular, we identify potential threats that could undermine the satisfaction of the analyzed requirements, violating hegemonic personal data protection regulations. \\n \\n \\n\",\"PeriodicalId\":418941,\"journal\":{\"name\":\"CLEI Electron. J.\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-05-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"CLEI Electron. J.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.19153/cleiej.25.2.4\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"CLEI Electron. J.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.19153/cleiej.25.2.4","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

自2020年初以来,COVID-19对世界人口的健康产生了重大影响。制止疫情的最常用方法是应用典型流行病的控制措施,如病例隔离、接触者监测和检疫,以及保持身体距离和卫生措施。追踪感染者的接触者是控制大流行的主要战略之一。手动接触追踪是一个缓慢、容易出错(由于遗漏或遗忘)的过程,并且在安全和隐私方面容易受到攻击。此外,它需要由受过专门培训的人员进行,并且在识别与陌生人的接触(例如在公共交通工具,超市等)方面效果不佳。鉴于传染率高,很难进行有效的人工接触追踪,因此出现了开发数字接近追踪技术的多种举措。在本文中,我们深入讨论了这些技术必须满足的安全性和个人数据保护要求,并提供了已在全球部署的各种应用程序的详尽和详细列表,以及它们使用的底层基础设施模型和技术。特别是,我们确定了可能破坏所分析要求的满足的潜在威胁,违反了主导的个人数据保护法规。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Contact tracing solutions for COVID-19: applications, data privacy and security
Since the beginning of 2020, COVID-19 has had a strong impact on the health of the world population. The mostly used approach to stop the epidemic is the application of controls of a classic epidemic such as case isolation, contact monitoring, and quarantine, as well as physical distancing and hygienic measures. Tracing the contacts of infected people is one of the main strategies for controlling the pandemic. Manual contact tracing is a slow, error-prone (by omission or forgotten) process, and vulnerable in terms of security and privacy. Furthermore, it needs to be carried out by specially trained personnel and it is not effective in identifying contacts with strangers (for example in public transport, supermarkets, etc). Given the high rates of contagion, which makes difficult an effective manual contact tracing, multiple initiatives arose for developing digital proximity tracing technologies. In this paper, we discuss in depth the security and personal data protection requirements that these technologies must satisfy, and we present an exhaustive and detailed list of the various applications that have been deployed globally, as well as the underlying infrastructure models and technologies they used. In particular, we identify potential threats that could undermine the satisfaction of the analyzed requirements, violating hegemonic personal data protection regulations.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信