{"609858":{"#nid":"609858","#data":{"type":"news","title":"Students Seek \u0022People\u2019s Choice\u0022 Votes in National Privacy Engineering Contest","body":[{"value":"\u003Cp\u003EA team of students from the Colleges of Computing, Engineering, and Sciences is asking for your vote. They\u0026rsquo;re concerned about privacy \u0026ndash; but not at the polls. They\u0026rsquo;re campaigning to protect personal data from unnecessary disclosure during research and also to protect researchers\u0026rsquo; access to meaningful data.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThey\u0026rsquo;re one of four national finalists for the People\u0026rsquo;s Choice award of $5,000 in a contest by the National Institute of Standards and Technology (NIST) Public Safety Communications Research Division (PSCR) and TopCoder, called \u0026ldquo;\u003Ca href=\u0022https:\/\/www.herox.com\/UnlinkableDataChallenge\u0022\u003EThe Unlinkable Data Challenge: Advancing Methods in Differential Privacy\u003C\/a\u003E.\u0026rdquo;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThe big problem? Dramatic increases in computing power make it possible to combine and utilize data from multiple sources which may contain sensitive information about individuals. Once unrelated datasets are combined, previously \u0026ldquo;private\u0026rdquo; facts can be linked to easily identify the person behind them. A \u003Ca href=\u0022https:\/\/dataprivacylab.org\/people\/sweeney\/index.html\u0022\u003E2002 study by Latanya Sweeney\u003C\/a\u003E of Harvard\u0026rsquo;s Data Privacy Lab found that the combination of just three \u0026ldquo;quasi-identifiers\u0026rdquo; (date of birth, five-digit postal code, and gender) could uniquely identify 87 percent of the U.S. population. Making minor changes to birth dates and other personally identifiable information still does not provide adequate protection against linkage attacks.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EContest organizers say this valid privacy concern is unfortunately limiting the use of data for research. Privacy engineers have been asked to create a new solution.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026ldquo;Our proposed solution is to generate differentially private synthetic data using Generative Adversarial Networks (GANs),\u0026quot; explains \u003Ca href=\u0022http:\/\/cyber.gatech.edu\/faculty\/rachel-cummings\u0022\u003E\u003Cstrong\u003ERachel Cummings\u003C\/strong\u003E\u003C\/a\u003E, assistant professor in the H. Milton Stewart School of Industrial and Systems Engineering at Georgia Tech, and organizer of the Georgia Tech team. \u0026ldquo;This synthetic data can then be used for a variety of analysis tasks, including classification, regression, clustering, and answering unknown research questions. If the synthetic data are statistically similar to the original (sensitive) data, then analysis on the synthetic data should be accurate with respect to the original database.\u0026rdquo;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EShe says it can be achieved by privately training neural networks inside a GAN to generate new data points (drawn from the same distribution as the original data).\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026ldquo;By generating synthetic data privately, any future analysis on the data also would be private, due to the post-processing guarantees of differential privacy,\u0026rdquo; she says.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThe idea builds from previous work on differentially private GANs to add further optimizations that will enhance performance across a wide variety of data types and analysis tasks.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThe team includes: \u003Cstrong\u003EDigvijay Boob\u003C\/strong\u003E (PhD ISyE-ACO), \u003Cstrong\u003EUthaipon Tantitongpipat\u003C\/strong\u003E (PhD CS-ACO), \u003Cstrong\u003EKyle Zimmerman\u003C\/strong\u003E (MS Cybersecurity), \u003Cstrong\u003EDhamma Kimpara\u003C\/strong\u003E (BS Math), and \u003Cstrong\u003EChris Waites\u003C\/strong\u003E (BS CS).\u0026nbsp; Students are members of Cummings\u0026rsquo; weekly privacy reading group, and they worked together over the summer to submit their idea to the NIST contest.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EIn addition to the $5,000 People\u0026#39;s Choice Award, the Georgia Tech team is eligible for a $40,000 Judges\u0026#39; Choice Award and, if successful, would advance to future rounds with the potential to win an additional $140,000 toward their research.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003EVoting is live now through Aug. 28\u003C\/strong\u003E: \u003Ca href=\u0022https:\/\/www.herox.com\/UnlinkableDataChallenge\u0022\u003Ehttps:\/\/www.herox.com\/UnlinkableDataChallenge\u003C\/a\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EA Georgia Tech team is one of four national finalists working toward as much as $45,000 from the National Institute of Standards and Technology (NIST) and TopCoder in a contest called \u0026ldquo;The Unlinkable Data Challenge: Advancing Methods in Differential Privacy.\u0026quot;\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"A team of privacy engineering students from the Colleges of Computing, Engineering, and Sciences proposes a new way to protect personal data used in research."}],"uid":"27490","created_gmt":"2018-08-16 17:59:53","changed_gmt":"2018-08-16 19:55:34","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2018-08-16T00:00:00-04:00","iso_date":"2018-08-16T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"609865":{"id":"609865","type":"image","title":"Prof. Rachel Cummings and Dhamma Kimpara","body":null,"created":"1534445513","gmt_created":"2018-08-16 18:51:53","changed":"1534445513","gmt_changed":"2018-08-16 18:51:53","alt":"","file":{"fid":"232259","name":"Cummings IMG_2082.jpg","image_path":"\/sites\/default\/files\/images\/Cummings%20IMG_2082.jpg","image_full_path":"http:\/\/tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/Cummings%20IMG_2082.jpg","mime":"image\/jpeg","size":315620,"path_740":"http:\/\/tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/Cummings%20IMG_2082.jpg?itok=GiR3vL27"}}},"media_ids":["609865"],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[{"id":"129","name":"Institute and Campus"},{"id":"134","name":"Student and Faculty"},{"id":"8862","name":"Student Research"},{"id":"135","name":"Research"},{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"145","name":"Engineering"}],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"3221","name":"privacy"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ETara La Bouff, \u003Ca href=\u0022http:\/\/mailto:tara.labouff@iisp.gatech.edu\u0022\u003Etara.labouff@iisp.gatech.edu,\u003C\/a\u003E 404.769.5408\u003C\/p\u003E\r\n","format":"limited_html"}],"email":["tara.labouff@iisp.gatech.edu"],"slides":[],"orientation":[],"userdata":""}}}