1,152
Views
3
CrossRef citations to date
0
Altmetric
Special Issue: Advacnced security on software and systems

A multi-dimension traceable privacy-preserving prevention and control scheme of the COVID-19 epidemic based on blockchain

ORCID Icon, , ORCID Icon &
Pages 1654-1677 | Received 16 Nov 2021, Accepted 05 May 2022, Published online: 14 Jun 2022

References

  • Ahamad, S. S., & Pathan, A. S. K. (2021). A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic. Connection Science, 33(3), 532–554. https://doi.org/10.1080/09540091.2020.1854180
  • Apple & Google. (2020, April). Privacy-preserving contact tracing (Tech. Rep.). https://covid19.apple.com/contacttracing
  • Australian Government, D.o.H. (2020). Covidsafe app. https://www.health.gov.au/resources/apps-and-tools/covidsafe-app
  • Baek, J., Safavi-Naini, R., & Susilo, W. (2008). Public key encryption with keyword search revisited. In International conference on computational science and its applications (pp. 1249–1259).
  • Bethencourt, J., Sahai, A., & Waters, B. (2007). Ciphertext-policy attribute-based encryption. In 2007 IEEE symposium on security and privacy (SP'07) (pp. 321–334).
  • Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. In International conference on the theory and applications of cryptographic techniques (pp. 506–522).
  • Boneh, D., & Franklin, M. (2003). Identity-based encryption from the Weil pairing. SIAM Journal on Computing, 32(3), 586–615. https://doi.org/10.1137/S0097539701398521
  • Choudhury, H., Goswami, B., & Gurung, S. K. (2020). CovidChain: An anonymity preserving blockchain based framework for protection against Covid-19. Preprint arXiv:2005.10607.
  • De Carli, A., Franco, M., Gassmann, A., Killer, C., Rodrigues, B., Scheid, E., & Stiller, B. (2020). WeTrace: A privacy-preserving mobile COVID-19 tracing approach and application. Preprint arXiv:2004.08812.
  • Government, S. (2021). Tracetogether. https://www.tracetogether.gov.sg/
  • Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on computer and communications security (pp. 89–98).
  • Ibraimi, L., Asim, M., & Petković, M. (2009). Secure management of personal health records by applying attribute-based encryption. In Proceedings of the 6th international workshop on wearable, micro, and nano technologies for personalized health (pp. 71–74).
  • Ibraimi, L., Tang, Q., Hartel, P., & Jonker, W. (2009). Efficient and provable secure ciphertext-policy attribute-based encryption schemes. In International conference on information security practice and experience (pp. 1–12).
  • Ji, H., Zhang, H., Shao, L., He, D., & Luo, M. (2021). An efficient attribute-based encryption scheme based on SM9 encryption algorithm for dispatching and control cloud. Connection Science, 33(4), 1094–1115. doi:10.1080/09540091.2020.1858757
  • Lazarovich, A. (2015). Invisible ink: Blockchain for data privacy (Unpublished doctoral dissertation). Massachusetts Institute of Technology.
  • Li, J., Yu, Y., Hu, S., Shi, Y., Zhao, S., & Zhang, C. (2021). A blockchain-based authority management framework in traceability systems. International Journal of Computational Science and Engineering, 24(1), 42. doi:10.1504/ijcse.2021.113639
  • Li, M., Yu, S., Ren, K., & Lou, W. (2010). Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings. In International conference on security and privacy in communication systems (pp. 89–106).
  • Liang, K., & Susilo, W. (2015). Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Transactions on Information Forensics and Security, 10(9), 1981–1992. https://doi.org/10.1109/TIFS.2015.2442215
  • Liu, J. K., Au, M. H., Yuen, T. H., Zuo, C., Wang, J., Sakzad, A., Luo, X., Li, L., & Choo, K.-K. R. (2020). Privacy-preserving COVID-19 contact tracing app: A zero-knowledge proof approach. IACR Cryptology ePrint Archive, 2020, 528. https://eprint.iacr.org/2020/528
  • Lynn, B. (2010). The pairing-based cryptography (PBC) library. https://crypto.stanford.edu/pbc/
  • Ministry, I. G. H. (2020). Hamagen. https://govextra.gov.il/ministry-of-health/hamagen-app/download-en/
  • Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system (Tech. Rep.). Manubot.
  • Reardon, J. (2021, April). Why google should stop logging contact-tracing data. https://blog.appcensus.io/2021/04/27/why-google-should-stop-logging-contact-tracing-data/
  • Risius, M., & Spohrer, K. (2017). A blockchain research framework. Business & Information Systems Engineering, 59(6), 385–409. https://doi.org/10.1007/s12599-017-0506-0
  • Sedghi, S., van Liesdonk, P., Doumen, J. M., Hartel, P. H., & Jonker, W. (2009). Adaptively secure computationally efficient searchable symmetric encryption. (CTIT Technical Report Series; No. TR-CTIT-09-13). Centre for Telematics and Information Technology (CTIT). https://research.utwente.nl/en/publications/adaptively-secure-computationally-efficient-searchable-symmetric-
  • Song, D. X., Wagner, D., & Perrig, A. (2000). Practical techniques for searches on encrypted data. In Proceeding 2000 IEEE symposium on security and privacy. S&P 2000 (pp. 44–55).
  • Sydney, V. A., Isaiah, B. M., Daniel, B., Jesse, C., & Rhys Fenwick, E. A. (2020, March). Slowing the spread of infectious diseases using crowdsourced data (Tech. Rep.). COVID WATCH. https://f.hubspotusercontent30.net/hubfs/7663287/covid_watch_whitepaper.pdf
  • Tahir, S., Ruj, S., Rahulamathavan, Y., Rajarajan, M., & Glackin, C. (2017). A new secure and lightweight searchable encryption scheme over encrypted cloud data. IEEE Transactions on Emerging Topics in Computing, 7(4), 530–544. https://doi.org/10.1109/TETC.6245516
  • Torky, M., & Hassanien, A. E. (2020). COVID-19 blockchain framework: Innovative approach. Preprint arXiv:2004.06081.
  • Wang, H., & Song, Y. (2018). Secure cloud-based EHR system using attribute-based cryptosystem and blockchain. Journal of Medical Systems, 42(8), 152. https://doi.org/10.1007/s10916-018-0994-6
  • Xhafa, F., Li, J., Zhao, G., Li, J., Chen, X., & Wong, D. S. (2015). Designing cloud-based electronic health record system with attribute-based encryption. Multimedia Tools and Applications, 74(10), 3441–3458. https://doi.org/10.1007/s11042-013-1829-6
  • Xia, Q., Sifah, E. B., Asamoah, K. O., Gao, J., Du, X., & Guizani, M. (2017). MeDShare: Trust-less medical data sharing among cloud service providers via blockchain. IEEE Access, 5, 14757–14767. https://doi.org/10.1109/ACCESS.2017.2730843.
  • Xia, Q., Sifah, E. B., Smahi, A., Amofa, S., & Zhang, X. (2017). BBDS: Blockchain-based data sharing for electronic medical records in cloud environments. Information, 8(2), 44. https://doi.org/10.3390/info8020044
  • Xiao, L., Xie, S., Han, D., Liang, W., Guo, J., & Chou, W. K. (2021). A lightweight authentication scheme for telecare medical information system. Connection Science, 33(3), 769–785. doi:10.1080/09540091.2021.1889976
  • Xiao, T., Han, D., He, J., Li, K. C., & de Mello, R. F. (2020, April). Multi-Keyword ranked search based on mapping set matching in cloud ciphertext storage system. Connection Science, 33(1), 95–112. doi:10.1080/09540091.2020.1753175
  • Xiong, A. P., Gan, Q. X., He, X. X., & Zhao, Q. (2013). A searchable encryption of CP-ABE scheme in cloud storage. In 2013 10th international computer conference on wavelet active media technology and information processing (ICCWAMTIP) (pp. 345–349).
  • Zhang, A., & Lin, X. (2018). Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain. Journal of Medical Systems, 42(8), 140. https://doi.org/10.1007/s10916-018-0995-5
  • Zhang, R., & Liu, L. (2010). Security models and requirements for healthcare application clouds. In 2010 IEEE 3rd international conference on cloud computing (pp. 268–275).
  • Zhang, S., Yao, T., Sandor, V. K. A., Weng, T. H., Liang, W., & Su, J. (2021). A novel blockchain-based privacy-preserving framework for online social networks. Connection Science, 33(3), 555–575. doi:10.1080/09540091.2020.1854181
  • Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017). An overview of blockchain technology: Architecture, consensus, and future trends. In 2017 IEEE international congress on big data (BigData congress) (pp. 557–564).