Summary of our discussion on k-anonymity and other de-identification frameworks


/ November 13, 2015

On November 6, we hosted a third RDF online discussion in our de-identifying data discussion series. This discussion was an introduction to k-anonymity and other de-identification frameworks and techniques with Max Shron, founder of Polynumeral.

Earlier discussions in the de-identification series introduced us to context, concept and background of de-identification and how it relates to social change work. Whereas this session was an opportunity to explore the more technical side of de-identifying data. We all came away with a better understanding of what the different frameworks are, why they matter and what the potential caveats are with each.

Max focuses his presentation on k-anonymity: a property possessed by an anonymous data set in which each collection of quasi-identifiers (i.e. zip code, birthdate, sex), in combination, occur at least k times. For example, a dataset is considered 2-anonymous when, for any combination of a dataset’s potentially identifying attributes found in any row of the table, there are always at least 2 rows with those exact attributes. Max explains how to strengthen the anonymity of a dataset using the k-anonymity techniques, while maintaining much of the accuracy of the dataset.

However, there are situations in which k-anonymity does not protect the individual from re-identification – there are a whole range of threats such as homogeneity, skewness, similarity, or background knowledge attacks. To address these threads, Max briefly explained l-diversity (each collection of quasi-identifiers, in combination, has at least l different sensitive values) and t-closeness (the distribution of sensitive data compared across whole table is no more than threshold of t).

We’re so grateful to Max Shron for sharing his time and expertise on this topic with the Responsible Data Forum! A recording of the presentation is embedded below:

More information about this presenter:

Max runs Polynumeral, a data science consultancy based in lower Manhattan. While at Polynumeral, he has worked with BRAC, the award-winning Bangladeshi NGO, and the World Bank, in addition to numerous media, education, and technology companies. Prior to founding Polynumeral, he was the data scientist at OkCupid, where he worked on the popular OkTrends blog. He is the author of Thinking with Data from O’Reilly media. His work has been featured in the New York Times, Chicago Tribune, WNYC, Huffington Post, and more.

More information on our discussion series on de-identifying data:

  1. Our first discussion was an introduction for advocacy organisations with Mark Elliot of the UK Anonymisation Network. We have a summary and a recording of the entire conversation on our website.
  2. Our second discussion with Sara-Jayne Terp of Thoughtworks focused on risk analysis and mitigation strategies. We have a recording of the presentation and a summary of the discussion on our website.
  3. Our third discussion featured Max Shron, of Polynumeral, who presented an introduction to k-anonymity and other de-identification frameworks.
  4. Upcoming: We’re thrilled to be facilitating a working session with Amy O’Donnell of Oxfam on developing a data-deposit decision-making framework on November 19 at 10am EST. More info here.

About the contributor

Kristin has a background in human rights and computer science, and has worked as a community-builder and technology problem-solver in the human rights community since 2007. As Director of Programmes at HURIDOCS, she strives to ensure the services and tools we provide to their partners truly help them achieve their human rights goals. She is passionate about peer-to-peer exchange and believes that if we do it well, we have so much to learn from each other.

See Kristin's Articles

One thought on "Summary of our discussion on k-anonymity and other de-identification frameworks"

Leave a Reply


Related /

/ December 15, 2022

Building an embodied approach to data – an interview with Anja Kovacs

/ October 11, 2022

Exploring fundamental flaws behind digital consent  – an interview with Georgia Bullen

/ June 1, 2022

Seven Essential Questions for Ethical War Crimes Documentation