PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection
Identifier Matching
- URL: http://arxiv.org/abs/2112.02855v1
- Date: Mon, 6 Dec 2021 08:26:08 GMT
- Title: PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection
Identifier Matching
- Authors: William Abramson, William J. Buchanan, Sarwar Sayeed, Nikolaos
Pitropakis, Owen Lo
- Abstract summary: The spread of COVID-19 has highlighted the need for a robust contact tracing infrastructure.
The existing approaches comprise severe flaws in terms of privacy and security.
This paper outlines the PAN-DOMAIN infrastructure that allows for citizen identifiers to be matched amongst the trusted entities.
- Score: 0.13124513975412253
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The spread of COVID-19 has highlighted the need for a robust contact tracing
infrastructure that enables infected individuals to have their contacts traced,
and followed up with a test. The key entities involved within a contact tracing
infrastructure may include the Citizen, a Testing Centre (TC), a Health
Authority (HA), and a Government Authority (GA). Typically, these different
domains need to communicate with each other about an individual. A common
approach is when a citizen discloses his personally identifiable information to
both the HA a TC, if the test result comes positive, the information is used by
the TC to alert the HA. Along with this, there can be other trusted entities
that have other key elements of data related to the citizen. However, the
existing approaches comprise severe flaws in terms of privacy and security.
Additionally, the aforementioned approaches are not transparent and often being
questioned for the efficacy of the implementations. In order to overcome the
challenges, this paper outlines the PAN-DOMAIN infrastructure that allows for
citizen identifiers to be matched amongst the TA, the HA and the GA. PAN-DOMAIN
ensures that the citizen can keep control of the mapping between the trusted
entities using a trusted converter, and has access to an audit log.
Related papers
- Data Cooperatives for Identity Attestations [3.924955534956978]
We propose the use of a legal entity to countersign the blinded attestation.
There are several use-cases for this feature, including the Funds Travel Rule in transactions in digital assets, and the protection of privacy in decentralized social networks.
arXiv Detail & Related papers (2023-10-29T15:54:02Z) - The Design and Implementation of a National AI Platform for Public
Healthcare in Italy: Implications for Semantics and Interoperability [62.997667081978825]
The Italian National Health Service is adopting Artificial Intelligence through its technical agencies.
Such a vast programme requires special care in formalising the knowledge domain.
Questions have been raised about the impact that AI could have on patients, practitioners, and health systems.
arXiv Detail & Related papers (2023-04-24T08:00:02Z) - DeID-GPT: Zero-shot Medical Text De-Identification by GPT-4 [80.36535668574804]
We develop a novel GPT4-enabled de-identification framework (DeID-GPT")
Our developed DeID-GPT showed the highest accuracy and remarkable reliability in masking private information from the unstructured medical text.
This study is one of the earliest to utilize ChatGPT and GPT-4 for medical text data processing and de-identification.
arXiv Detail & Related papers (2023-03-20T11:34:37Z) - How Do Input Attributes Impact the Privacy Loss in Differential Privacy? [55.492422758737575]
We study the connection between the per-subject norm in DP neural networks and individual privacy loss.
We introduce a novel metric termed the Privacy Loss-Input Susceptibility (PLIS) which allows one to apportion the subject's privacy loss to their input attributes.
arXiv Detail & Related papers (2022-11-18T11:39:03Z) - Unraveling the Connections between Privacy and Certified Robustness in
Federated Learning Against Poisoning Attacks [68.20436971825941]
Federated learning (FL) provides an efficient paradigm to jointly train a global model leveraging data from distributed users.
Several studies have shown that FL is vulnerable to poisoning attacks.
To protect the privacy of local users, FL is usually trained in a differentially private way.
arXiv Detail & Related papers (2022-09-08T21:01:42Z) - A Blockchain-Based Consent Mechanism for Access to Fitness Data in the
Healthcare Context [0.966840768820136]
This study introduces an architecture for a human-centric, legally compliant, decentralized and dynamic consent system based on blockchain and smart contracts.
The security properties of the proposed system were evaluated using the formal security modeling framework SeMF.
arXiv Detail & Related papers (2022-02-25T09:51:02Z) - User-Centric Health Data Using Self-sovereign Identities [69.50862982117127]
This article presents the potential use of the issuers Self-Sovereign Identities (SSI) and Distributed Ledger Technologies (DLT) to improve the privacy and control of health data.
The paper lists the prominent use cases of decentralized identities in the health area, and discusses an effective blockchain-based architecture.
arXiv Detail & Related papers (2021-07-26T17:09:52Z) - A Review-based Taxonomy for Secure Health Care Monitoring: Wireless
Smart Cameras [9.4545147165828]
This research focuses on the secure storage of patient and medical records in the healthcare sector.
A potential solution comes from biometrics, although their use may be time-consuming and can slow down data retrieval.
This research aims to overcome these challenges and enhance data access control in the healthcare sector through the addition of biometrics in the form of fingerprints.
arXiv Detail & Related papers (2021-07-05T11:59:10Z) - Privacy and Trust Redefined in Federated Machine Learning [5.4475482673944455]
We present a privacy-preserving decentralised workflow that facilitates trusted federated learning among participants.
Only entities in possession of Verifiable Credentials issued from the appropriate authorities are able to establish secure, authenticated communication channels.
arXiv Detail & Related papers (2021-03-29T16:47:01Z) - When Physical Unclonable Function Meets Biometrics [0.5156484100374058]
Electrocardiogram (ECG) based biometric has become popular as it can authenticate patients and monitor the patient's vital signs.
volatile memory-based (NVM) PUF can be easily placed in the device to avoid counterfeit.
Our aim is to provide a comprehensive study on the state-of-the-art developments papers based on biometrics enabled hardware security.
arXiv Detail & Related papers (2020-12-14T20:00:40Z) - Second layer data governance for permissioned blockchains: the privacy
management challenge [58.720142291102135]
In pandemic situations, such as the COVID-19 and Ebola outbreak, the action related to sharing health data is crucial to avoid the massive infection and decrease the number of deaths.
In this sense, permissioned blockchain technology emerges to empower users to get their rights providing data ownership, transparency, and security through an immutable, unified, and distributed database ruled by smart contracts.
arXiv Detail & Related papers (2020-10-22T13:19:38Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.