Tag Archives: privacy

Made in IBM Labs: Advancing Privacy and Security in the Cloud

Patented cryptography invention enables unlimited analysis of encrypted data

ARMONK, N.Y. – 23 Dec 2013: IBM inventors have received a patent for a breakthrough data encryption technique that is expected to further data privacy and strengthen cloud computing security.

The patented breakthrough, called “fully homomorphic encryption,” could enable deep and unrestricted analysis of encrypted information —intentionally scrambled data — without surrendering confidentiality. IBM’s solution has the potential to advance cloud computing privacy and security by enabling vendors to perform computations on client data, such as analyzing sales patterns, without exposing or revealing the original data. (more…)

Read More

Smartphone users value their privacy and are willing to pay for it, CU-Boulder economists find

Average smartphone users are willing to pay up to $5 extra for a typical application—or “app”—that won’t monitor their locations, contact lists and other personal information, a study conducted by two economists at the University of Colorado Boulder has found.

The researchers believe theirs is the first economic study to gauge the monetary value smartphone users place on privacy. That value is measured in consumers’ “willingness to pay” for five different kinds of digital anonymity. (more…)

Read More

Study: Including Ads in Mobile Apps Poses Privacy, Security Risks

Researchers from North Carolina State University have found that including ads in mobile applications (apps) poses privacy and security risks. In a recent study of 100,000 apps in the official Google Play market, researchers noticed that more than half contained so-called ad libraries. And 297 of the apps included aggressive ad libraries that were enabled to download and run code from remote servers – which raises significant privacy and security concerns.

“Running code downloaded from the Internet is problematic because the code could be anything,” says Dr. Xuxian Jiang, an assistant professor of computer science at NC State and co-author of a paper describing the work. “For example, it could potentially launch a ‘root exploit’ attack to take control of your phone – as demonstrated in a recently discovered piece of Android malware called RootSmart.” (more…)

Read More