Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2020 Apr 7;8(4):e18936.
doi: 10.2196/18936.

Peer-to-Peer Contact Tracing: Development of a Privacy-Preserving Smartphone App

Affiliations

Peer-to-Peer Contact Tracing: Development of a Privacy-Preserving Smartphone App

Tyler M Yasaka et al. JMIR Mhealth Uhealth. .

Abstract

Background: The novel coronavirus disease 2019 (COVID-19) pandemic is an urgent public health crisis, with epidemiologic models predicting severe consequences, including high death rates, if the virus is permitted to run its course without any intervention or response. Contact tracing using smartphone technology is a powerful tool that may be employed to limit disease transmission during an epidemic or pandemic; yet, contact tracing apps present significant privacy concerns regarding the collection of personal data such as location.

Objective: The aim of this study is to develop an effective contact tracing smartphone app that respects user privacy by not collecting location information or other personal data.

Methods: We propose the use of an anonymized graph of interpersonal interactions to conduct a novel form of contact tracing and have developed a proof-of-concept smartphone app that implements this approach. Additionally, we developed a computer simulation model that demonstrates the impact of our proposal on epidemic or pandemic outbreak trajectories across multiple rates of adoption.

Results: Our proof-of-concept smartphone app allows users to create "checkpoints" for contact tracing, check their risk level based on their past interactions, and anonymously self-report a positive status to their peer network. Our simulation results suggest that higher adoption rates of such an app may result in a better controlled epidemic or pandemic outbreak.

Conclusions: Our proposed smartphone-based contact tracing method presents a novel solution that preserves privacy while demonstrating the potential to suppress an epidemic or pandemic outbreak. This app could potentially be applied to the current COVID-19 pandemic as well as other epidemics or pandemics in the future to achieve a middle ground between drastic isolation measures and unmitigated disease spread.

Keywords: COVID-19; contact tracing; coronavirus; epidemic; mobile phone; pandemic; peer-to-peer; personal data; privacy; smartphone.

PubMed Disclaimer

Conflict of interest statement

Conflicts of Interest: None declared.

Figures

Figure 1
Figure 1
A network of interactions over time represented as a transmission graph. The rows represent units of time, and the columns represent individuals. By time t=3, all individuals have contact points with possible transmission paths. t: time point.
Figure 2
Figure 2
User flow diagrams for the three primary user flows in the peer-to-peer contact tracing app: creating checkpoints, checking risk, and reporting positive status. QR: Quick Response.
Figure 3
Figure 3
Comparison of infection curves from simulations at varying rates of peer-to-peer contact tracing application adoption. The proportion of the population with active infection is plotted across time for multiple adoption rates. Time is an arbitrary unit that represents the sequence of events in the simulation. The results of 10 random simulations per adoption rate are given.
Figure 4
Figure 4
Disease spread scenario modeled as a transmission graph. (A) Graphical representation of a disease spread scenario across time. Contact points with infected individuals are denoted as exposures. Uninfected individuals may become infected at exposure points according to some probability (the transmission rate); hence, b does not become infected at n6. (B) Transmission graph corresponding to the scenario in A, depicting the information that is available to the server and each individual’s smartphone app. Only one node, n3, is associated with a reported diagnosis. The infection risk level at the other contact points can be inferred by checking for possible transmission paths. n: node; t: time point.

Comment in

Similar articles

Cited by

References

    1. Ferguson NM, Laydon D, Nedjati-Gilani G, Imai N, Ainslie K, Baguelin M, Bhatia S, Boonyasiri A, Cucunubá Z, Cuomo-Dannenburg G, Dighe A, Dorigatti I, Fu H, Gaythorpe K, Green W, Hamlet A, Hinsley W, Okell LC, van Elsland S, Thompson H, Verity R, Volz E, Wang H, Wang Y, Walker PGT, Walters C, Winskill P, Whittaker C, Donnelly CA, Riley S, Ghani AC. Impact of non-pharmaceutical interventions (NPIs) to reduce COVID-19 mortality and healthcare demand. Imperial College. 2020 Mar 16; https://www.imperial.ac.uk/media/imperial-college/medicine/sph/ide/gida-...
    1. Armbruster B, Brandeau ML. Contact tracing to control infectious disease: when enough is enough. Health Care Manag Sci. 2007 Dec;10(4):341–55. doi: 10.1007/s10729-007-9027-6. http://europepmc.org/abstract/MED/18074967 - DOI - PMC - PubMed
    1. Sacks JA, Zehe E, Redick C, Bah A, Cowger K, Camara M, Diallo A, Gigo ANI, Dhillon RS, Liu A. Introduction of mobile health tools to support Ebola surveillance and contact tracing in Guinea. Glob Health Sci Pract. 2015 Nov 12;3(4):646–659. doi: 10.9745/ghsp-d-15-00207. - DOI - PMC - PubMed
    1. Isaak J, Hanna MJ. User data privacy: Facebook, Cambridge Analytica, and privacy protection. Computer. 2018 Aug;51(8):56–59. doi: 10.1109/mc.2018.3191268. - DOI
    1. Iyengar A, Kundu A, Pallis G. Healthcare informatics and privacy. IEEE Internet Comput. 2018 Mar;22(2):29–31. doi: 10.1109/mic.2018.022021660. - DOI

MeSH terms