论文标题
任务:使用WiFi数据集的COVID-19的实用和遗忘缓解策略
Quest: Practical and Oblivious Mitigation Strategies for COVID-19 using WiFi Datasets
论文作者
论文摘要
接触追踪已成为防止大流行病(例如Covid-19)传播的主要缓解策略之一。最近,已经开始了几项努力,以跟踪使用技术,例如蓝牙信标,蜂窝数据记录和智能手机应用程序的个人,动作和互动。这种解决方案通常是侵入性的,可能侵犯了个人隐私权,并且通常受到法规(例如GDPR和CCPR)的规定,该法规要求选择选择加入政策来收集和使用个人信息。在本文中,我们介绍了Quest,该系统使组织能够观察个人和空间,以使用WiFi连接数据以被动和隐私的方式实施社交距离和联系跟踪的政策。目的是确保组织中员工和居住者的安全,同时保护各方的隐私。 Quest在理论上和信息上包含了防止对手了解个人位置历史记录的知识(基于WiFi数据);它包括支持准确识别已确认患者附近的用户,然后通过选择加入机制通知他们。 Quest支持一系列支持隐私的应用程序,以确保遵守社会疏远,监视人们在空间中的流动,确定潜在影响的地区并提高暴露警报。我们描述了任务中提出的安全/隐私技术的架构,设计选择和实施。我们还通过在UC Irvine的实际校园规模部署中对Quest的实用性进行了验证,并在超过50m的分组中进行了彻底的校园规模部署。
Contact tracing has emerged as one of the main mitigation strategies to prevent the spread of pandemics such as COVID-19. Recently, several efforts have been initiated to track individuals, their movements, and interactions using technologies, e.g., Bluetooth beacons, cellular data records, and smartphone applications. Such solutions are often intrusive, potentially violating individual privacy rights and are often subject to regulations (e.g., GDPR and CCPR) that mandate the need for opt-in policies to gather and use personal information. In this paper, we introduce Quest, a system that empowers organizations to observe individuals and spaces to implement policies for social distancing and contact tracing using WiFi connectivity data in a passive and privacy-preserving manner. The goal is to ensure the safety of employees and occupants at an organization, while protecting the privacy of all parties. Quest incorporates computationally- and information-theoretically-secure protocols that prevent adversaries from gaining knowledge of an individual's location history (based on WiFi data); it includes support for accurately identifying users who were in the vicinity of a confirmed patient, and then informing them via opt-in mechanisms. Quest supports a range of privacy-enabled applications to ensure adherence to social distancing, monitor the flow of people through spaces, identify potentially impacted regions, and raise exposure alerts. We describe the architecture, design choices, and implementation of the proposed security/privacy techniques in Quest. We, also, validate the practicality of Quest and evaluate it thoroughly via an actual campus-scale deployment at UC Irvine over a very large dataset of over 50M tuples.