1. Privacy-preserving contact tracing in 5G-integrated and blockchain-based medical applications.
- Author
-
Zhang, Can, Xu, Chang, Sharif, Kashif, and Zhu, Liehuang
- Subjects
- *
CONTACT tracing , *CELL phones , *BLOCKCHAINS , *5G networks , *COVID-19 , *COMMUNICABLE diseases , *PRODUCTIVE life span - Abstract
• A Privacy-preserving contact Tracing scheme in 5G-integrated and Blockchain-based Medical applications, named PTBM, is proposed. • Everyone can perform location checking with his mobile phones to find whether they have been in possible contact with a diagnosed patient without violating their privacy. • A trusted medical center can effectively trace the patients and their corresponding close contacts. • Security and performanc e analysis show that the proposed PTBM scheme achieves privacy protection, traceability, reliability, and authentication, with high efficiency and low latency. The current pandemic situation due to COVID-19 is seriously affecting our daily work and life. To block the propagation of infectious diseases, an effective contact tracing mechanism needs to be implemented. Unfortunately, existing schemes have severe privacy issues that jeopardize the identity-privacy and location-privacy for both users and patients. Although some privacy-preserving systems have been proposed, there remain several issues caused by centralization. To mitigate this issues, we propose a P rivacy-preserving contact T racing scheme in 5G-integrated and B lockchain-based M edical applications, named PTBM. In PTBM, the 5G-integrated network is leveraged as the underlying infrastructure where everyone can perform location checking with his mobile phones or even wearable devices connected to 5G network to find whether they have been in possible contact with a diagnosed patient without violating their privacy. A trusted medical center can effectively trace the patients and their corresponding close contacts. Thorough security and performance analysis show that the proposed PTBM scheme achieves privacy protection, traceability, reliability, and authentication, with high computation & communication efficiency and low latency. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF