Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Stakeholders’ Perspectives on Malleable Signatures in a Cloud-based eHealth Scenario
Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). (PriSec)ORCID iD: 0000-0002-6509-3792
Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). (PriSec)ORCID iD: 0000-0002-6938-4466
Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Centre for HumanIT (from 2013).ORCID iD: 0000-0001-6826-3358
Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Service Research Center (from 2013).ORCID iD: 0000-0001-8102-8168
2016 (English)In: Proceedings of the International Symposium on Human Aspects of Information Security & Assurance / [ed] Nathan Clarke & Steven Furnell, 2016, p. 220-230Conference paper, Published paper (Refereed)
Abstract [en]

In this paper, we discuss end user requirements that we elicited for the use of malleable signatures in a Cloud-based eHealth scenario. The concept of a malleable signature, which is a privacy enhancing cryptographic scheme that enables the redaction of personal information from signed documents while preserving the validity of the signature, might be counter- intuitive to end users as its functionality does not correspond to the one of a traditional signature scheme. A qualitative study via a series of semi-structured interviews and focus groups has been conducted to understand stakeholders’ opinions and concerns in regards to the possible applications of malleable signatures in the eHealth area, where a medical record is first digitally signed by a doctor and later redacted by the patient in the cloud. Results from this study yielded user requirements such as the need for suitable metaphors and guidelines, usable templates, and clear redaction policies. 

Place, publisher, year, edition, pages
2016. p. 220-230
Keywords [en]
HCI Requirements, Malleable Signatures, Usable Privacy, Cloud tools, eHealth
National Category
Computer Sciences Human Computer Interaction
Research subject
Computer Science
Identifiers
URN: urn:nbn:se:kau:diva-43016ISBN: 978-1-84102-413-4 (print)OAI: oai:DiVA.org:kau-43016DiVA, id: diva2:937554
Conference
HAISA 2016 - the International Symposium on Human Aspects of Information Security & Assurance, Frankfurt Germany, 19th - 21st July 2016
Funder
EU, Horizon 2020, 4805Available from: 2016-06-15 Created: 2016-06-15 Last updated: 2019-12-05Bibliographically approved
In thesis
1. The Wicked Problem of Privacy: Design Challenge for Crypto-based Solutions
Open this publication in new window or tab >>The Wicked Problem of Privacy: Design Challenge for Crypto-based Solutions
2018 (English)Licentiate thesis, comprehensive summary (Other academic)
Abstract [en]

Data privacy has been growing in importance in recent years, especially with the continuous increase of online activity. Researchers study, design, and develop solutions aimed at enhancing users’ data privacy. The wicked problem of data privacy is a continuous challenge that defies straightforward solutions. Since there are many factors involved in data privacy, such as technological, legal, and human aspects, we can only aim at mitigating rather than solving this wicked problem. Our aim was to focus on human aspects for designing usable crypto-based privacy-enhancing solutions.  In this thesis, we followed a user centered design method by using empirical qualitative means for investigating user’s perceptions and opinions of our solutions. Most of our work has focused on redactable signatures in the cloud context within the eHealth use-case. Redactable signatures are  a privacy enhancing scheme allowing to remove parts of a signed document by a specified party for achieving data minimization without invalidating the respective signature.

We mainly used semi-structures interviews and focus groups in our investigations. Our results yielded key HCI considerations as well as guidelines of different means for supporting the design of future solutions.

Abstract [en]

Data privacy has been growing in importance in recent years, especially with the continuous increase of online activity. Researchers continuously study, design, and develop solutions aimed at enhancing users’ data privacy. The wicked problem of data privacy is the continuous challenge that defies straightforward solutions. Since there are many factors involved in data privacy, such as technological, legal, and human aspects, we can only aim at mitigating rather than solving this wicked problem.

Our aim was to focus on human aspects for designing usable crypto-based privacy-enhancing solutions.  In this thesis, we followed a user centered design method by using empirical qualitative means for investigating user’s perceptions and opinions of our solutions. Most of our work has focused on redactable signatures in the cloud context within an eHealth use-case. Redactable signatures are a privacy-enhancing scheme, which allow the removal of parts of a signed document by a specified party without invalidating the respective signature. Our results yielded key HCI considerations as well as guidelines of different means for supporting the design of future solutions.

Place, publisher, year, edition, pages
Karlstad: Karlstads universitet, 2018. p. 14
Series
Karlstad University Studies, ISSN 1403-8099 ; 2018:23
Keywords
Data privacy, wicked problems, user-centered design, crypto-based solutions, usability, data minimization, redactable signatures
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-67134 (URN)978-91-7063-856-5 (ISBN)978-91-7063-951-7 (ISBN)
Presentation
2018-06-11, 10:15 (English)
Opponent
Supervisors
Note

Paper 3 was included as manuscript in the thesis.

Available from: 2018-05-23 Created: 2018-04-23 Last updated: 2019-02-07Bibliographically approved

Open Access in DiVA

fulltext(667 kB)2 downloads
File information
File name FULLTEXT02.pdfFile size 667 kBChecksum SHA-512
8fd5727c140bad2ce5912e91e9db3a1c3de8183dcbea360a102c026b8e9f19e249a88e1175c626c2024728d4925cf83552f64865fbc5f9f9ed409fa73b5f864c
Type fulltextMimetype application/pdf

Other links

Open access repository

Authority records BETA

Alaqra, AlaaFischer-Hübner, SimonePettersson, JohnWästlund, Erik

Search in DiVA

By author/editor
Alaqra, AlaaFischer-Hübner, SimonePettersson, JohnWästlund, Erik
By organisation
Department of Mathematics and Computer Science (from 2013)Centre for HumanIT (from 2013)Service Research Center (from 2013)
Computer SciencesHuman Computer Interaction

Search outside of DiVA

GoogleGoogle Scholar
Total: 2 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 880 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf