2021
DOI: 10.1109/access.2021.3110762
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Preservation of User Identity in Contact Tracing for COVID-19-Like Pandemics Using Edge Computing

Abstract: Pandemic and infectious disease outbreaks put pressure on health authorities and require lockdowns. These outbreaks, which strain limited healthcare resources, must be swiftly controlled and monitored. A large number of healthcare authorities are currently investigating automated systems to support outbreak monitoring and control. However, current contact tracing systems face many privacy, participation, and power constraints. Furthermore, elderly or less financially able individuals often cannot participate i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 49 publications
0
5
0
Order By: Relevance
“…However, [33] and ours both do not consider any location data into the tracing framework and can only achieve passive security in the semi-honest model. Inspired by the work of [39] , where edge servers are utilized to assist medical authorities for contact tracing in the malicious model, we hope to take the public and private location (i.e., businesses, houses, and offices) data into tracing approach and achieve a much better tracing solution with higher-level security in the future.…”
Section: Discussionmentioning
confidence: 99%
“…However, [33] and ours both do not consider any location data into the tracing framework and can only achieve passive security in the semi-honest model. Inspired by the work of [39] , where edge servers are utilized to assist medical authorities for contact tracing in the malicious model, we hope to take the public and private location (i.e., businesses, houses, and offices) data into tracing approach and achieve a much better tracing solution with higher-level security in the future.…”
Section: Discussionmentioning
confidence: 99%
“…In [7], the focus was on health experts tracing users who opt out or are impotent to engage in contact locating, proposing a solution utilizing edge servers that reduces power usage by end-users up to 97%.…”
Section: Related Workmentioning
confidence: 99%
“…The process of simulation uses MATLAB software version 2018R. For the validation of the algorithm, it employed two intrusion detection datasets, such as the NSL-KDD 2015 and CIDDS-001 datasets[7]. The NSL-KDD dataset involves 125,973 instances with 41 characteristics and two classes, whereas the CIDDS-001 dataset encompasses 1,018,950 instances by 14 attributes and two classes.…”
mentioning
confidence: 99%
“…The proposed system uses edge servers to assist in tracking users that withdraw from using contact tracing. Edge computing devices are location-based data collectors; therefore they can be used in notifying users without disclosing the identities of the individuals [32]. Panja el al.…”
Section: Literature Reviewmentioning
confidence: 99%