Cisco + Pioneers Innovation Challenge Winner 2015

Anonymized Analytics:
Unleash the Power of User Data with Aircloak

Organizations lock up their user data to keep it safe. Aircloak’s private-by-design technology anonymously unlocks user data analytics, creating new opportunities for business intelligence and data monetization, and eliminating the cost of compliance.

User analytics, whether for business, health, or government, is hampered by inadequate protections for user privacy, making it risky and costly to share. Using sensitive user data, like location, can involve a lengthy government approval process as well as classical anonymization that weakens the value of the data. Organizations are missing valuable information that could otherwise be used to improve health, streamline government operations, reduce fraud, or enable better marketing insights. Aircloak is here to change this.

New Use Cases

New Use Cases for
User Data Analytics

Aircloak’s Cloaked Analytics Data Engine can be deployed to satisfy a wide variety of business use cases.

Read more
Secure User Data

Secure User Data

Aircloak’s unique anonymization technology protects users while providing high–fidelity analytics.

Read more
Unprecedented Transparency


Auditors and data sources can examine cloak software and obtain cryptographic proof of software operation.

Read more

Aircloak Use Cases

Aircloak's core anonymization technology supports a variety of deployment scenarios. The service can be deployed in-house or in Aircloak's secure cloud. Both real-time and historic data can be analyzed. Data sources can be sensors or user devices, or can be existing databases. Here are a few of the many possible use cases that Aircloak is exploring with customers.

Smart City / Transport

Smart city technology promises to reduce cities' operating and infrastructure costs, make them more attractive for citizens and businesses, and even provide new revenue sources. With Aircloak, cities can:

  • Improve intelligence for both real-time services (safety and law enforcement) and city planning by combining data from different sources: public transportation and taxi services, car-sharing, socio-demographic data, city web services, indoor geo-location tracking, and smart streetlights.
  • Safely provide data to third parties for monetization or Open Data initiatives.
  • Instantly comply with national data privacy laws and reduce citizens' concerns over a "surveillance society".
Medical Research

Medical Research

Sharing medical data for research is a costly and risky process. Huge opportunities for improved medical research are lost because medical institutions leave data locked-up in protected silos. Aircloak enables:

  • Safe and anonymous transmission of hospital and clinical research data to central research repositories.
  • Improved quality of analytics by preventing the loss of data accuracy normally associated with traditional forms of anonymization.
  • Compliance with medical research anonymization requirements, thus eliminating the need for new patient opt-ins.

Monetization of Geolocation Data

Cellular operators obtain outdoor geolocation data over a wide area from cell towers. Many businesses, for instance malls or airports, collect indoor geolocation data from WiFi access points. By combining indoor and outdoor geolocation data, Aircloak can:

  • Improve insights for businesses using indoor geolocation applications by providing information about where customers live and work, as well as their demographics.
  • Provide better monetization opportunities for cellular operators that offer aggregate marketing data.
  • Avoid the need for indoor geolocation user opt-in, and provide compliance for cellular operators.

Aircloak Cloaked Database

At the core of all Aircloak solutions is the Cloaked Database, or "Cloak" for short. The Cloak utilizes "Trusted Computing" secure hardware and Security Enhanced Linux (SELinux). The result is a zero-access, zero-password secure system with enforced oversight and cryptographically proven transparency.

Cloaked Analytics Data Engine Cloaked Analytics Data Engine

Scalable Database

  • Sharded SQL Database
  • In-house or As-a-service
  • Upload from Customer Database or
  • Upload from User Device

Rich Analytics

  • Power of SQL
  • Streamed or Batch Data Upload
  • Real-time or Historic Queries
  • Structured and Unstructed Data

Hardware-Based Trust

  • Secure Trusted Platform (TPM)
  • TPM-based Third-party Oversight
  • TPM-based Remote Attestation
  • Tamper-proof Query Logging

Aircloak promises a unique level of privacy.

Handling personal data correctly is as hard as it is important. At Aircloak, we strongly believe that by making what we do absolutely open and clear to everybody, we can not only create an environment of trust, but also use the wisdom of the crowd to keep improving user privacy.

But promises are easily made – so why would you simply trust Aircloak?

That's the beauty of it:
You don't have to.
Instead, you can verify.

Unprecedented Transparency

Cryptographic Proof

Data sources can examine cloak software and obtain cryptographic proof of software operation.

 Oversight with teeth

Enforced Oversight

Cloak software cannot decrypt user data unless approved by third-party auditors.

Aircloak uses the "sealing" and "remote attestation" features of the Trusted Platform Module (TPM) secure hardware. TPM sealing gives auditors technical – not just political – authority to approve our software. Without approval, Cloaks cannot decrypt user data. TPM remote attestation provides data sources with cryptographic proof that Cloaks have been approved.

That is why we call it "Oversight with Teeth".

Download more bundled
information about Aircloak:

Contact us


Paul-Ehrlich-Str. 26
67663 Kaiserslautern

Phone: +49 631 9303 6248

Subscribe to our Mailing List

It's just a few times a year and always very interesting – promise.

Follow us on Twitter