PriLok: Citizen-protecting distributed epidemic tracing
2020, arXiv (Cornell University)
Abstract
Contact tracing is an important instrument for national health services to fight epidemics. As part of the COVID-19 situation, many proposals have been made for scaling up contact tracing capacities with the help of smartphone applications, an important but highly critical endeavour due to the privacy risks involved in such solutions. Extending our previously expressed concern, we clearly articulate in this article, the functional and non-functional requirements that any solution has to meet, when striving to serve, not mere collections of individuals, but the whole of a nation, as required in face of such potentially dangerous epidemics. We present a critical information infrastructure, PriLok, a fully-open preliminary architecture proposal and design draft for privacy-preserving digital contact tracing, which we believe can be constructed in a way to fulfil the former requirements. Our architecture leverages the existing regulated mobile communication infrastructure and builds upon the concept of "checks and balances", requiring a majority of independent players to agree to effect any operation on it, thus preventing abuse of the highly sensitive information that must be collected and processed for efficient contact tracing. This is technically enforced with a largely decentralised layout and highly resilient state-of-the-art technology, which we explain in the paper, finishing by giving a security, dependability and resilience analysis, showing how it meets the defined requirements, even while the infrastructure is under attack.
References (38)
- Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, and Alexander Spiegelman. "Sol- ida: A blockchain protocol based on reconfigurable byzantine consensus". In: arXiv (2016).
- Elli Androulaki et al. "Hyperledger fabric: a distributed operating system for permissioned blockchains". In: EuroSys conference. 2018.
- Apache Storm. http://storm.apache.org/.
- Gennaro Avitabile, Vincenzo Botta, Vincenzo Iovino, and Ivan Visconti. Towards Defeat- ing Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System. Cryptology ePrint Archive, Report 2020/493. https://eprint. iacr.org/2020/493. 2020.
- Alysson Bessani, Miguel Correia, Bruno Quaresma, Fernando André, and Paulo Sousa. "DepSky: Dependable and Secure Storage in a Cloud-of-Clouds". In: ACM Trans. Storage 9.4 (Nov. 2013).
- Alysson Bessani, Ricardo Mendes, Tiago Oliveira, Nuno Neves, Miguel Correia, Marcelo Pasin, and Paulo Verissimo. "SCFS: A Shared Cloud-Backed File System". In: Proceed- ings of the 2014 USENIX Conference on USENIX Annual Technical Conference. USENIX ATC'14. Philadelphia, PA: USENIX Association, 2014.
- Alysson Bessani, Joao Sousa, and Eduardo Alchieri. State Machine Replication for the Masses with BFT-SMART. Tech. rep. TR-2013-07. http://hdl.handle.net/10451/14170. University of Lisbon, DI-FCUL, Nov. 2013.
- Ran Canetti, Ari Trachtenberg, and Mayank Varia. Anonymous Collocation Discovery: Harnessing Privacy to Tame the Coronavirus. 2020. arXiv: 2003.13670 [cs.CY].
- Miguel Castro and Barbara Liskov. "Practical Byzantine Fault Tolerance". In: Proceedings of the Third Symposium on Operating Systems Design and Implementation. OSDI '99. New Orleans, Louisiana, USA: USENIX Association, 1999.
- Justin Chan et al. PACT: Privacy Sensitive Protocols and Mechanisms for Mobile Contact Tracing. 2020. arXiv: 2004.03544 [cs.CR].
- Yves-Alexandre De Montjoye, César A Hidalgo, Michel Verleysen, and Vincent D Blondel. "Unique in the crowd: The privacy bounds of human mobility". In: Scientific reports 3 (2013).
- Yves-Alexandre De Montjoye, Laura Radaelli, Vivek Kumar Singh, et al. "Unique in the shopping mall: On the reidentifiability of credit card metadata". In: Science 347.6221 (2015).
- Cynthia Dwork. "Differential privacy: A survey of results". In: International conference on theory and applications of models of computation. Springer. 2008.
- Cynthia Dwork, Moni Naor, Toniann Pitassi, and Guy N Rothblum. "Differential privacy under continual observation". In: Proceedings of the forty-second ACM symposium on The- ory of computing. 2010.
- Cynthia Dwork, Moni Naor, Toniann Pitassi, Guy N Rothblum, and Sergey Yekhanin. "Pan-Private Streaming Algorithms." In: ICS. 2010.
- Ken TD Eames and Matt J Keeling. "Contact tracing and disease control". In: Proceedings of the Royal Society of London. Series B: Biological Sciences 270.1533 (2003).
- Edmond J. Safra Center for Ethics at Harvard University. https://ethics.harvard. edu/files/center-for-ethics/files/roadmaptopandemicresilience_final_0.pdf.
- "General Data Protection Regulation". In: Official Journal of the European Union L119 (2016).
- Ittay Eyal, Adem Efe Gencer, Emin Gün Sirer, and Robbert Van Renesse. "Bitcoin-ng: A scalable blockchain protocol". In: NSDI. 2016.
- Miguel Garcia, Nuno Ferreira Neves, and Alysson Bessani. "An intrusion-tolerant firewall design for protecting SIEM systems". In: Workshop on Systems Resilience in conjunction with the Conference on Dependable Systems and Networks. June 2013.
- Miguel Garcia, Nuno Ferreira Neves, and Alysson Bessani. "SieveQ: A Layered BFT Pro- tection System for Critical Services". In: IEEE Transactions on Dependable and Secure Computing 15.3 (June 2018).
- Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, and Nickolai Zeldovich. "Algo- rand: Scaling byzantine agreements for cryptocurrencies". In: SOSP. 2017.
- Guy Golan Gueta et al. "SBFT: a scalable and decentralized trust infrastructure". In: IEEE/IFIP DSN. 2019.
- Melissa Gymrek, Amy L McGuire, David Golan, Eran Halperin, and Yaniv Erlich. "Iden- tifying personal genomes by surname inference". In: Science 339.6117 (2013).
- R. W. Hamming. "Error detecting and error correcting codes". In: The Bell System Tech- nical Journal 29.2 (1950).
- Rüdiger Kapitza, Johannes Behl, Christian Cachin, Tobias Distler, Simon Kuhnle, Seyed Vahid Mohammadi, Wolfgang Schröder-Preikschat, and Klaus Stengel. "CheapBFT: resource- efficient byzantine fault tolerance". In: Proceedings of the 7th ACM european conference on Systems. 2012.
- Eleftherios Kokoris Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. "Enhancing bitcoin security and performance with strong consistency via collective signing". In: Usenix Security. 2016.
- Rebecca Levine. "Development of a Contact Tracing System for Ebola Virus Disease-Kambia District, Sierra Leone, January-February 2015". In: MMWR. Morbidity and mortality weekly report 65 (2016).
- Ninghui Li, Tiancheng Li, and Suresh Venkatasubramanian. "t-closeness: Privacy beyond k-anonymity and l-diversity". In: 2007 IEEE 23rd International Conference on Data Engi- neering. IEEE. 2007.
- Yongkang Liu, Lin X Cai, Xuemin Shen, and Hongwei Luo. "Deploying cognitive cellular networks under dynamic resource management". In: IEEE wireless communications 20.2 (2013).
- Ashwin Machanavajjhala, Daniel Kifer, Johannes Gehrke, and Muthuramakrishnan Venki- tasubramaniam. "l-diversity: Privacy beyond k-anonymity". In: ACM Transactions on Knowl- edge Discovery from Data (TKDD) 1.1 (2007).
- Leonie Reichert, Samuel Brack, and Björn Scheuermann. Privacy-preserving contact tracing of covid-19 patients. 2020.
- T. Rocket. "Snowflake to avalanche: A novel metastable consensus protocol family for cryptocurrencies". In: 2018.
- Adi Shamir. "How to Share a Secret". In: Commun. ACM 22.11 (Nov. 1979).
- SQL Stream. https://sqlstream.com/.
- Corien M Swaan, Rolf Appels, Mirjam EE Kretzschmar, and Jim E van Steenbergen. "Timeliness of contact tracing among flight passengers for influenza A/H1N1 2009". In: BMC infectious diseases 11.1 (2011).
- Latanya Sweeney. "k-anonymity: A model for protecting privacy". In: International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10.05 (2002).
- Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung, and Paulo Verissimo. "Efficient byzantine fault-tolerance". In: IEEE Transactions on Computers 62.1 (2011).