7 CONCLUSION
A method for linking biometric identity to self-
monitoring health data stored in a mobile device was
presented. It demonstrated how SIPPA secure
computation could be applied for biometric
verification that guaranteed private data comparison.
Verified biometric identity was then used to encrypt
a record consisting of self-health monitoring data,
location and time/date information. A preliminary
study was conducted to gain insights into its
feasibility for deployment to a mobile device. When
user behaviour could be modelled as semi-honest,
security and privacy assurance could be analysed and
verified. Our future research will focus on an
architectural solution that could extend user
behaviour assumption beyond semi-honest for use
cases beyond personal mobile computing
environment.
ACKNOWLEDGEMENTS
The author is indebted to the reviewers for their
valuable comments that help to improve this paper.
This research is conducted under the support of NSF
phase 2 grant 1831214 in the United States.
REFERENCES
Angulo, F.J., Finelli, L, Swerdlow, D.L., 2020. Reopening
Society and the Need for Real-Time Assessment of
COVID-19 at the Community Level. JAMA. 2020;
323(22):2247–2248. doi:10.1001/jama.2020.7872
Azra, H.A., Muhammad, M.A.J., and Radzi, A., 2017.
Design and Development of Patient Monitoring
System, IOP Conference Series: Materials Science and
Engineering, Vol 226, IOP Publishing. (last access:
Sept 13 2020) https://doi.org/10.1088/1757-
899x/226/1/012094
Chandler, N., 2019, How to Fake a GPS Location on Your
Phone, Nov 2019. (last access: Sept 13 2020)
https://electronics.howstuffworks.com/cell-phone-
apps/fake-gps-phone.htm
Clarke N.L., Furnell, S.M., Reynolds, P.L., 2002. Biometric
Authentication for Mobile Devices, Proc. of 3
rd
Australian Information Warfare and Security
Conference, 2002.
Freeman, D. K., 1989. The voice activity detector for the
Pan-European digital cellular mobile telephone
service. Proc. International Conference on Acoustics,
Speech, and Signal Processing (ICASSP-89). pp. 369-
372. doi:10.1109/ICASSP.1989.266442.
Hao, F., Anderson, R., and Daugman, J., 2005. Combining
cryptography with biometrics effectively, University of
Cambridge, Tech. Rep. UCAMCL-TR-640.
Kullback, S., Leibler, R.A., 1951. "On information and
sufficiency". Annals of Mathematical Statistics. 22 (1):
79–86. doi:10.1214/aoms/1177729694. JSTOR
2236703. MR 0039968.
ISO/IEEE 11073-20601, “11073-20601: health
informatics-personal health device communication,
application profile optimized exchange protocol,” IEEE
11073-20601. http://www.iso.org
Nicola, M., Alsafi, Z., Sohrabi, C., Kerwan, A., Al-Jabir,
A., Losifidis, C., Agha, M., Agha, R., 2020. The socio-
economic implications of the coronavirus pandemic
(COVID-19): A review, International Journal of
Surgery, Vol 78, June 2020, Pages 185-193, Elsevier.
OSHA, 2020. Guidance on Returning to Work, OSHA
4045-06-2020. (last access: Sept 13 2020)
https://www.osha.gov/Publications/OSHA4045.pdf
Parthasarathy, S., Zhang, C., Hansen, J., Busso, C., 2017. A
study of speaker verification performance with
expressive speech. Proc. International Conference on
Acoustics, Speech, and Signal Processing (ICASSP-
17).
Prakash Kumara Krishnan A., Sy, B., 2012. SIPPA-2.0 -
Secure Information Processing with Privacy Assurance
(version 2.0), Proc. of the 9
th
Annual Conference on
Privacy, Security, and Trust, Paris, France, July 2012.
Pfefferbaum, B., North, C. S. North, 2020. Mental Health
and the Covid-19 Pandemic, New England Journal of
Medicine, 383:510-512, August 6, 2020.
Sahidullah, M., Saha, G, 2012. Design, analysis and
experimental evaluation of block based transformation
in MFCC computation for speaker recognition, Speech
Communication, V 54, # 4, Pages 543-565, Elsevier.
Sathiamoorthy S., Ponnusamy, R., Visalakshi R., 2018.
Performance of Speaker Verification Using CSM and
TM, Asian Journal of Computer Science and
Technology, ISSN: 2249-0701 Vol.7 No.2, 2018, pp.
123-127.
Smith, J. O. III, 2011. Spectral Audio Signal Processing,
W3K Publishing, ISBN 978-0-9745607-3-1.
Sy, B., Prakash Kumara Krishnan A., 2012. Generation of
Cryptographic Keys from Personal Biometrics: An
Illustration based on Fingerprints, New Trends and
Developments in Biometrics, ISBN 980-953-307-576-
6, InTech.
Yap, K.Y., Xie, Q., 2020. Personalizing symptom
monitoring and contact tracing efforts through a
COVID-19 web-app. Infect Dis Poverty 9, 93.
https://doi.org/10.1186/s40249-020-00711-5
vlab.amrita.edu, 2011. Short Term Time Domain
Processing of Speech. Retrieved 14 September 2020,
https://vlab.amrita.edu/?sub=3&brch=164&sim=857&
cnt=1.