A first look at privacy analysis of COVID-19 contact-tracing mobile applications

Azad, Muhammad Ajmal, Arshad, Junaid, Akmal, Syed Muhammad Ali , Riaz, Farhan, Abdullah, Sidrah, Imran, Muhammad and Ahmad, Farhan (2020) A first look at privacy analysis of COVID-19 contact-tracing mobile applications. IEEE Internet of Things Journal, 8 (21). pp. 15796-15806. ISSN 2327-4662

Full content URL: https://doi.org/10.1109/JIOT.2020.3024180

Full text not available from this repository.

Item Type:Article
Item Status:Live Archive


Today’s smartphones are equipped with a large number of powerful value-added sensors and features, such as a low-power Bluetooth sensor, powerful embedded sensors, such as the digital compass, accelerometer, GPS sensors, Wi-Fi capabilities, microphone, humidity sensors, health tracking sensors, and a camera, etc. These value-added sensors have revolutionized the lives of the human being in many ways, such as tracking the health of the patients and the movement of doctors, tracking employee's movement in large manufacturing units, monitoring the environment, etc. These embedded sensors could also be used for large-scale personal, group, and community sensing applications especially tracing the spread of certain diseases. Governments and regulators are turning to use these features to trace the people’s thoughts to have symptoms of certain diseases or viruses, e.g., COVID-19. The outbreak of COVID-19 in December 2019, has seen a surge of the mobile applications for tracing, tracking, and isolating the persons showing COVID-19 symptoms to limit the spread of the disease to the larger community. The use of embedded sensors could disclose private information of the users, thus potentially bring a threat to the privacy and security of users. In this article, we analyzed a large set of smartphone applications that have been designed to contain the spread of the COVID-19 virus and bring the people back to normal life. Specifically, we have analyzed what type of permission these smartphone apps require, whether these permissions are necessary for the track and trace, how data from the user devices are transported to the analytic center, and analyzing the security measures these apps have deployed to ensure the privacy and security of users.

Keywords:computer science
Subjects:G Mathematical and Computer Sciences > G400 Computer Science
Divisions:College of Science > School of Computer Science
ID Code:52381
Deposited On:16 Nov 2022 13:21

Repository Staff Only: item control page