TY - JOUR
T1 - Data Privacy in Wearable IoT Devices
T2 - Anonymization and Deanonymization
AU - Park, Semi
AU - Kim, Riha
AU - Yoon, Hyunsik
AU - Lee, Kyungho
N1 - Publisher Copyright:
© 2021 Semi Park et al.
PY - 2021
Y1 - 2021
N2 - With the development of IoT devices, wearable devices are being used to record various types of information. Wearable IoT devices are attached to the user and can collect and transmit user data at all times along with a smartphone. In particular, sensitive information such as location information has an essential value in terms of privacy, and therefore some IoT devices implement data protection by introducing methods such as masking. However, masking can only protect privacy to a certain extent in logs having large numbers of recorded data. However, the effectiveness may decrease if we are linked with other information collected from within the device. Herein, a scenario-based case study on deanonymizing anonymized location information based on logs stored in wearable devices is described. As a result, we combined contextual and direct evidence from the collected information. It was possible to obtain the result in which the user could effectively identify the actual location. Through this study, not only can a deanonymized user location be identified but we can also confirm that cross-validation is possible even when dealing with modified GPS coordinates.
AB - With the development of IoT devices, wearable devices are being used to record various types of information. Wearable IoT devices are attached to the user and can collect and transmit user data at all times along with a smartphone. In particular, sensitive information such as location information has an essential value in terms of privacy, and therefore some IoT devices implement data protection by introducing methods such as masking. However, masking can only protect privacy to a certain extent in logs having large numbers of recorded data. However, the effectiveness may decrease if we are linked with other information collected from within the device. Herein, a scenario-based case study on deanonymizing anonymized location information based on logs stored in wearable devices is described. As a result, we combined contextual and direct evidence from the collected information. It was possible to obtain the result in which the user could effectively identify the actual location. Through this study, not only can a deanonymized user location be identified but we can also confirm that cross-validation is possible even when dealing with modified GPS coordinates.
UR - http://www.scopus.com/inward/record.url?scp=85120866532&partnerID=8YFLogxK
U2 - 10.1155/2021/4973404
DO - 10.1155/2021/4973404
M3 - Article
AN - SCOPUS:85120866532
SN - 1939-0122
VL - 2021
JO - Security and Communication Networks
JF - Security and Communication Networks
M1 - 4973404
ER -