New Prize Competition! Unlinkable Data Challenge

Advancing Methods In Differential Privacy.

Join this exciting de-identification prize competition where participants will propose a mechanism to enable the protection of personally identifiable information while maintaining a dataset’s utility for analysis!

Our increasingly digital world turns almost all our daily activities into data collection opportunities, from the more obvious entry into a webform to connected cars, cell phones, and wearables. Dramatic increases in computing power and innovations can also be used to the detriment of individuals through linkage attacks: auxiliary and possibly completely unrelated datasets in combination with records in the dataset that contain sensitive information can be used to determine unique identifiable individuals.

A man's torso in a suit selecting a lock off a transparent screen in front of them.

This valid privacy concern is unfortunately limiting the use of data for research, including datasets with the Public Safety sector that might otherwise be used to improve protection of people and communities. Due to the sensitive nature of information contained in these types of datasets and the risk of linkage attacks, these datasets can’t easily be made available to analysts and researchers. In order to make the best use of data that contains PII, it is important to disassociate the data from PII. There is a utility vs. privacy tradeoff; however, the more that a dataset is altered, the more likely that there will be a reduced utility of the de-identified dataset for analysis and research purposes.

Currently, popular de-identification techniques are not sufficient. Either PII is not sufficiently protected, or the resulting data no longer represents the original data. Additionally, it is difficult or even impossible to quantify the amount of privacy that is lost with current techniques.

This competition is about creating new methods or improving existing methods of data de-identification in a way that makes de-identification of privacy-sensitive datasets practical.  A first phase hosted on HeroX will ask for ideas and concepts, while later phases executed on Topcoder will focus on the performance of developed algorithms.

Visit HeroX to follow this challenge and be the first to know when it launches!

Source: NIST

Comment this news or article