BeeTrace: A Unified Platform for Secure Contact Tracing that Breaks Data
Silos
- URL: http://arxiv.org/abs/2007.02285v1
- Date: Sun, 5 Jul 2020 10:33:45 GMT
- Title: BeeTrace: A Unified Platform for Secure Contact Tracing that Breaks Data
Silos
- Authors: Xiaoyuan Liu, Ni Trieu, Evgenios M. Kornaropoulos, Dawn Song
- Abstract summary: Contact tracing is an important method to control the spread of an infectious disease such as COVID-19.
Current solutions do not utilize the huge volume of data stored in business databases and individual digital devices.
We propose BeeTrace, a unified platform that breaks data silos and deploys state-of-the-art cryptographic protocols to guarantee privacy goals.
- Score: 73.84437456144994
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Contact tracing is an important method to control the spread of an infectious
disease such as COVID-19. However, existing contact tracing methods alone
cannot provide sufficient coverage and do not successfully address privacy
concerns of the participating entities. Current solutions do not utilize the
huge volume of data stored in business databases and individual digital
devices. This information is typically stored in data silos and cannot be used
due to regulations in place. To successfully unlock the potential of contact
tracing, we need to consider both data utilization from multiple sources and
the privacy of the participating parties. To this end, we propose BeeTrace, a
unified platform that breaks data silos and deploys state-of-the-art
cryptographic protocols to guarantee privacy goals.
Related papers
- Improving Privacy-Preserving Techniques for Smart Grid using Lattice-based Cryptography [1.4856472820492366]
SPDBlock is a blockchain-based solution ensuring privacy, integrity, and resistance to attacks.
It detects and prosecutes malicious entities while efficiently handling multi-dimensional data transmission.
Performance tests reveal SPDBlock's superiority in communication and computational efficiency over traditional schemes.
arXiv Detail & Related papers (2024-04-17T19:51:52Z) - A Unified View of Differentially Private Deep Generative Modeling [60.72161965018005]
Data with privacy concerns comes with stringent regulations that frequently prohibited data access and data sharing.
Overcoming these obstacles is key for technological progress in many real-world application scenarios that involve privacy sensitive data.
Differentially private (DP) data publishing provides a compelling solution, where only a sanitized form of the data is publicly released.
arXiv Detail & Related papers (2023-09-27T14:38:16Z) - A Trajectory K-Anonymity Model Based on Point Density and Partition [0.0]
This paper develops a trajectory K-anonymity model based on Point Density and Partition (K PDP)
It successfully resists re-identification attacks and reduces the data utility loss of the k-anonymized dataset.
arXiv Detail & Related papers (2023-07-31T17:10:56Z) - Stop Uploading Test Data in Plain Text: Practical Strategies for
Mitigating Data Contamination by Evaluation Benchmarks [70.39633252935445]
Data contamination has become prevalent and challenging with the rise of models pretrained on large automatically-crawled corpora.
For closed models, the training data becomes a trade secret, and even for open models, it is not trivial to detect contamination.
We propose three strategies that can make a difference: (1) Test data made public should be encrypted with a public key and licensed to disallow derivative distribution; (2) demand training exclusion controls from closed API holders, and protect your test data by refusing to evaluate without them; and (3) avoid data which appears with its solution on the internet, and release the web-page context of internet-derived
arXiv Detail & Related papers (2023-05-17T12:23:38Z) - Preventing Unauthorized Use of Proprietary Data: Poisoning for Secure
Dataset Release [52.504589728136615]
We develop a data poisoning method by which publicly released data can be minimally modified to prevent others from train-ing models on it.
We demonstrate the success of our approach onImageNet classification and on facial recognition.
arXiv Detail & Related papers (2021-02-16T19:12:34Z) - Privacy-accuracy trade-offs in noisy digital exposure notifications [3.04585143845864]
There is interest in using the power of mobile phones to automate the contact-tracing process.
The rough idea is simple: use Bluetooth or other data-exchange technologies to record contacts between users, enable users to report positive diagnoses, and alert users who have been exposed to sick users.
Although designing practical protocols is of crucial importance, it is essential to realize that notifying users about exposure events may itself leak confidential information.
arXiv Detail & Related papers (2020-11-08T15:00:38Z) - Second layer data governance for permissioned blockchains: the privacy
management challenge [58.720142291102135]
In pandemic situations, such as the COVID-19 and Ebola outbreak, the action related to sharing health data is crucial to avoid the massive infection and decrease the number of deaths.
In this sense, permissioned blockchain technology emerges to empower users to get their rights providing data ownership, transparency, and security through an immutable, unified, and distributed database ruled by smart contracts.
arXiv Detail & Related papers (2020-10-22T13:19:38Z) - Confidential Computing for Privacy-Preserving Contact Tracing [0.18434042562191807]
We propose the use of the Intel SGX trusted execution environment to build a privacy-preserving contact tracing backend.
A prototype of a privacy-preserving contact tracing system based on SGX has been implemented by the authors in a hackathon.
arXiv Detail & Related papers (2020-06-25T08:06:23Z) - Mind the GAP: Security & Privacy Risks of Contact Tracing Apps [75.7995398006171]
Google and Apple have jointly provided an API for exposure notification in order to implement decentralized contract tracing apps using Bluetooth Low Energy.
We demonstrate that in real-world scenarios the GAP design is vulnerable to (i) profiling and possibly de-anonymizing persons, and (ii) relay-based wormhole attacks that basically can generate fake contacts.
arXiv Detail & Related papers (2020-06-10T16:05:05Z) - A Note on Cryptographic Algorithms for Private Data Analysis in Contact
Tracing Applications [7.734726150561088]
Contact tracing is an important measure to counter the COVID-19 pandemic.
We focus on various cryptographic techniques that can help in addressing the Private Set Intersection problem.
arXiv Detail & Related papers (2020-05-19T06:18:13Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.