Slice it up: Unmasking User Identities in Smartwatch Health Data

Publikation: Beitrag in Buch/Konferenzbericht/Sammelband/GutachtenBeitrag in KonferenzbandBeigetragenBegutachtung

Beitragende

Abstract

Wearables are widely used for health data collection due to their availability and advanced sensors, enabling smart health applications like stress detection. However, the sensitivity of personal health data raises significant privacy concerns. While user de-identification by removing direct identifiers such as names and addresses is commonly employed to protect privacy, the data itself can still be exploited to re-identify individuals. We introduce a novel framework for similarity-based Dynamic Time Warping (DTW) re-identification attacks on time series health data. Using the WESAD dataset and two larger synthetic datasets, we demonstrate that even short segments of sensor data can achieve perfect re-identification with our Slicing-DTW-Attack. Our attack is independent of training data and computes similarity rankings in about 2 minutes for 10,000 subjects on a single CPU core. These findings highlight that de-identification alone is insufficient to protect privacy. As a defense, we show that adding random noise to the signals significantly reduces re-identification risk while only moderately affecting usability in stress detection tasks, offering a promising approach to balancing privacy and utility.

Details

OriginalspracheEnglisch
TitelACM ASIA CCS 2025 - Proceedings of the 20th ACM ASIA Conference on Computer and Communications Security
Herausgeber (Verlag)Association for Computing Machinery
Seiten710-726
Seitenumfang17
ISBN (elektronisch)9798400714108
PublikationsstatusVeröffentlicht - 24 Aug. 2025
Peer-Review-StatusJa

Publikationsreihe

ReiheProceedings of the ACM Conference on Computer and Communications Security
ISSN1543-7221

Konferenz

Titel20th ACM ASIA Conference on Computer and Communications Security
KurztitelASIACCS 2025
Veranstaltungsnummer20
Dauer25 - 29 August 2025
Webseite
OrtMeliá Hanoi
StadtHa Noi
LandVietnam

Schlagworte

Schlagwörter

  • Attack, De-identification, Dynamic Time Warping, Privacy, Similarity, Time Series, User Re-identification