International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 186 - Number 50 |
Year of Publication: 2024 |
Authors: Radhika Ravindranath |
10.5120/ijca2024924225 |
Radhika Ravindranath . Ensuring Information Security and Data Governance in Cloud based Digital Contact Tracing Applications. International Journal of Computer Applications. 186, 50 ( Nov 2024), 26-30. DOI=10.5120/ijca2024924225
The Covid-19 pandemic has stimulated the use of Digital Contact Tracing Applications(DCTAs) around the world, often implemented at a national scale. A public health crisis at such an unprecedented scale has accelerated research in the area of contact tracing, and the efficacy of digital contact tracing techniques. Given that there is now an estimated 2-3% chance of a pandemic striking at any given year, and a nearly 50% chance of a recurrence in the next 25 years it is important to learn from the lessons of past DCTAs. When cloud technologies are integrated when developing these applications, additional complexities related to cybersecurity, privacy and data governance arise. This paper aims to identify and summarize the cybersecurity, privacy and ethical harms of cloud based centralized and decentralized DCTAs. The findings highlighted in this paper can help inform national and international security and privacy policies in the field of digital contact tracing, as well as allow organizations to embed security-by-design and privacy-by-design elements into their DCTA infrastructure. Numerous national contact tracing systems were reviewed and their computing infrastructure, data collection, use and retention policies were studied in this paper. Potential cybersecurity, privacy and ethical harms associated with DCTAs were enumerated. International security and privacy standards like GDPR, NIST, ISO, etc. were reviewed to develop recommendations to address identified harms. While DCTAs are essential for public health, they also come with significant risks to end user data security, privacy and ethical rights. Information security and privacy safeguards must be implemented in adherence to industry standards to minimize the risk. Especially when considering cloud based DCTAs, governments should prioritize platforms and libraries that offer strong technical features like encryption, access control, and compliance elements like regular auditing practices. Tailoring DCTAs to country or region specific needs is crucial. Carefully considering these factors will allow governing bodies to effectively utilize DCTAs while upholding end users’ rights and maintaining public trust.