Adding Location and Global Context to the Google/Apple Exposure Notification Bluetooth API
Authors:
Ramesh Raskar,
Abhishek Singh,
Sam Zimmerman,
Shrikant Kanaparti
Abstract:
Contact tracing requires a strong understanding of the context of a user, and location with other sensory data could provide a context for any infection encounter. Although Bluetooth technology gives a good insight into the proximity aspect of an encounter, it does not provide any location context related to it which helps to make better decisions. Using the ideas presented in this paper, one shal…
▽ More
Contact tracing requires a strong understanding of the context of a user, and location with other sensory data could provide a context for any infection encounter. Although Bluetooth technology gives a good insight into the proximity aspect of an encounter, it does not provide any location context related to it which helps to make better decisions. Using the ideas presented in this paper, one shall be able to obtain this valuable information that could address the problem of false-positive and false-negative to a certain extent. All of this within the purview of Google/Apple Exposure Notification (GAEN) specification, while preserving complete user privacy. There are four ways of propagating context between any two users. Two such methods allow private location logging, without revealing the location history within an app. The other two are encryption-based methods. The first encryption method is a variant of Apple's FindMy protocol, that allows nearby Apple devices to capture the GPS location of a lost Apple device. The second encryption is a minor modification of the existing GAEN protocol so that global context is available to a healthy phone only when it is exposed - this is a better option comparatively. It will still be the role of Public Health smartphone app to decide, on how to use the location-time context, to build a full-fledged contact tracing and public health solution. Lastly, we highlight the benefits and potential privacy issues with each of these context propagation methods proposed here.
△ Less
Submitted 25 July, 2020; v1 submitted 1 July, 2020;
originally announced July 2020.
Apps Gone Rogue: Maintaining Personal Privacy in an Epidemic
Authors:
Ramesh Raskar,
Isabel Schunemann,
Rachel Barbar,
Kristen Vilcans,
Jim Gray,
Praneeth Vepakomma,
Suraj Kapa,
Andrea Nuzzo,
Rajiv Gupta,
Alex Berke,
Dazza Greenwood,
Christian Keegan,
Shriank Kanaparti,
Robson Beaudry,
David Stansbury,
Beatriz Botero Arcila,
Rishank Kanaparti,
Vitor Pamplona,
Francesco M Benedetti,
Alina Clough,
Riddhiman Das,
Kaushal Jain,
Khahlil Louisy,
Greg Nadeau,
Steve Penrod
, et al. (7 additional authors not shown)
Abstract:
Containment, the key strategy in quickly halting an epidemic, requires rapid identification and quarantine of the infected individuals, determination of whom they have had close contact with in the previous days and weeks, and decontamination of locations the infected individual has visited. Achieving containment demands accurate and timely collection of the infected individual's location and cont…
▽ More
Containment, the key strategy in quickly halting an epidemic, requires rapid identification and quarantine of the infected individuals, determination of whom they have had close contact with in the previous days and weeks, and decontamination of locations the infected individual has visited. Achieving containment demands accurate and timely collection of the infected individual's location and contact history. Traditionally, this process is labor intensive, susceptible to memory errors, and fraught with privacy concerns. With the recent almost ubiquitous availability of smart phones, many people carry a tool which can be utilized to quickly identify an infected individual's contacts during an epidemic, such as the current 2019 novel Coronavirus crisis. Unfortunately, the very same first-generation contact tracing tools have been used to expand mass surveillance, limit individual freedoms and expose the most private details about individuals. We seek to outline the different technological approaches to mobile-phone based contact-tracing to date and elaborate on the opportunities and the risks that these technologies pose to individuals and societies. We describe advanced security enhancing approaches that can mitigate these risks and describe trade-offs one must make when developing and deploying any mass contact-tracing technology. With this paper, our aim is to continue to grow the conversation regarding contact-tracing for epidemic and pandemic containment and discuss opportunities to advance this space. We invite feedback and discussion.
△ Less
Submitted 21 December, 2022; v1 submitted 19 March, 2020;
originally announced March 2020.