Security and Privacy Threats and Requirements for the Centralized Contact Tracing System in Korea

Author:

Park SungchaeORCID,Youm Heung-Youl

Abstract

As COVID-19 became a pandemic worldwide, contact tracing technologies and information systems were developed for quick control of infectious diseases in both the private and public sectors. This study aims to strengthen the data subject’s security, privacy, and rights in a centralized contact tracing system adopted for a quick response to the spread of infectious diseases due to climate change, increasing cross-border movement, etc. There are several types of contact tracing systems: centralized, decentralized, and hybrid models. This study demonstrates the privacy model for a centralized contact tracing system, focusing on the case in Korea. Hence, we define security and privacy threats to the centralized contact tracing system. The threat analysis involved mapping the threats in ITU-T X.1121; in order to validate the defined threats, we used LIDDUN and STRIDE to map the threats. In addition, this study provides security requirements for each threat defined for more secure utilization of the centralized contact tracing system.

Funder

Institute of Information and Communications Technology Planning and Evaluation (IITP) of Korea

the Ministry of Science and ICT of Korea

Publisher

MDPI AG

Subject

Artificial Intelligence,Computer Science Applications,Information Systems,Management Information Systems

Reference36 articles.

1. COVID-19 digital contact tracing applications and techniques: A review post initial deployments;Transp. Eng.,2021

2. (2022, September 25). World Health Organization. Available online: https://innov.afro.who.int/global-innovation/robert-robust-and-privacy-preserving-proximity-tracing-protocol-1827.

3. (2022, September 25). Github. Available online: https://github.com/DP-3T/documents.

4. Contact Tracing Apps: Lessons Learned on Privacy, Autonomy, and the Need for Detailed and Thoughtful Implementation;JMIR Med. Inform.,2021

5. Desire: Leveraging the Best of Centralized and Decentralized Contact Tracing Systems;Digit. Threat. Res. Pract.,2022

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Managing Cybersecurity Threats and Increasing Organizational Resilience;Big Data and Cognitive Computing;2023-11-22

2. Cybersecurity for Industrial IoT, Threats, Vulnerabilities, and Solutions: A Brief Review;Proceedings of Eighth International Congress on Information and Communication Technology;2023

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3