Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements
Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). (PriSec)ORCID iD: 0000-0002-6509-3792
Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). (PriSec)ORCID iD: 0000-0002-6938-4466
Newcastle University, UK.
Austrian Institute of Technology, Austria.
Show others and affiliations
2015 (English)In: Privacy and Identity Management. Time for a Revolution?: 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers / [ed] David Aspinall, Jan Camenisch, Marit Hansen, Simone Fischer-Hübner, Charles Raab, Springer Publishing Company, 2015, Vol. 476, p. 79-96Conference paper, Published paper (Refereed)
Abstract [en]

This paper summarises the results of a workshop at the IFIP Summer School 2015 introducing the EU Horizon 2020 project PRISMACLOUD, that is, Privacy and Security Maintaining Services in the Cloud. The contributions of this summary are three-fold. Firstly, it provides an overview to the PRISMACLOUD cryptographic tools and use-case scenarios that were presented as part of this workshop. Secondly, it distills the discussion results of parallel focus groups. Thirdly, it summarises a ``Deep Dive on Crypto'' session that offered technical information on the new tools. Overall, the workshop aimed at outlining application scenarios and eliciting end-user requirements for PRISMACLOUD.

Place, publisher, year, edition, pages
Springer Publishing Company, 2015. Vol. 476, p. 79-96
Series
IFIP Advances in Information and Communication Technology, ISSN 1868-4238 ; 476
Keywords [en]
Privacy, Cloud Computing, Functional Signatures, Malleable Signatures, Graph Signatures, Anonymous Credentials, User Requirements
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
URN: urn:nbn:se:kau:diva-43022DOI: 10.1007/978-3-319-41763-9_6ISBN: 978-3-319-41762-2 (print)OAI: oai:DiVA.org:kau-43022DiVA, id: diva2:937594
Conference
IFIP Summer School, Edinburgh, 16.‐21. August 2015
Projects
PRISMACLOUD
Funder
EU, Horizon 2020, 4805Available from: 2016-06-15 Created: 2016-06-15 Last updated: 2019-12-16Bibliographically approved
In thesis
1. The Wicked Problem of Privacy: Design Challenge for Crypto-based Solutions
Open this publication in new window or tab >>The Wicked Problem of Privacy: Design Challenge for Crypto-based Solutions
2018 (English)Licentiate thesis, comprehensive summary (Other academic)
Abstract [en]

Data privacy has been growing in importance in recent years, especially with the continuous increase of online activity. Researchers study, design, and develop solutions aimed at enhancing users’ data privacy. The wicked problem of data privacy is a continuous challenge that defies straightforward solutions. Since there are many factors involved in data privacy, such as technological, legal, and human aspects, we can only aim at mitigating rather than solving this wicked problem. Our aim was to focus on human aspects for designing usable crypto-based privacy-enhancing solutions.  In this thesis, we followed a user centered design method by using empirical qualitative means for investigating user’s perceptions and opinions of our solutions. Most of our work has focused on redactable signatures in the cloud context within the eHealth use-case. Redactable signatures are  a privacy enhancing scheme allowing to remove parts of a signed document by a specified party for achieving data minimization without invalidating the respective signature.

We mainly used semi-structures interviews and focus groups in our investigations. Our results yielded key HCI considerations as well as guidelines of different means for supporting the design of future solutions.

Abstract [en]

Data privacy has been growing in importance in recent years, especially with the continuous increase of online activity. Researchers continuously study, design, and develop solutions aimed at enhancing users’ data privacy. The wicked problem of data privacy is the continuous challenge that defies straightforward solutions. Since there are many factors involved in data privacy, such as technological, legal, and human aspects, we can only aim at mitigating rather than solving this wicked problem.

Our aim was to focus on human aspects for designing usable crypto-based privacy-enhancing solutions.  In this thesis, we followed a user centered design method by using empirical qualitative means for investigating user’s perceptions and opinions of our solutions. Most of our work has focused on redactable signatures in the cloud context within an eHealth use-case. Redactable signatures are a privacy-enhancing scheme, which allow the removal of parts of a signed document by a specified party without invalidating the respective signature. Our results yielded key HCI considerations as well as guidelines of different means for supporting the design of future solutions.

Place, publisher, year, edition, pages
Karlstad: Karlstads universitet, 2018. p. 14
Series
Karlstad University Studies, ISSN 1403-8099 ; 2018:23
Keywords
Data privacy, wicked problems, user-centered design, crypto-based solutions, usability, data minimization, redactable signatures
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-67134 (URN)978-91-7063-856-5 (ISBN)978-91-7063-951-7 (ISBN)
Presentation
2018-06-11, 10:15 (English)
Opponent
Supervisors
Note

Paper 3 was included as manuscript in the thesis.

Available from: 2018-05-23 Created: 2018-04-23 Last updated: 2019-02-07Bibliographically approved
2. Tinkering the Wicked Problem of Privacy: Design Challenges and Opportunities for Crypto-based Services
Open this publication in new window or tab >>Tinkering the Wicked Problem of Privacy: Design Challenges and Opportunities for Crypto-based Services
2020 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

Data privacy has been growing in importance in recent years, especially with the constant increase of online activity. Consequently, researchers study, design, and develop solutions aimed at enhancing users' data privacy. The wicked problem of data privacy is a dynamic challenge that defies straightforward solutions. Since there are many factors involved in data privacy, such as technological, legal, and human aspects, we can only aim at mitigating rather than solving this wicked problem.

Our aim was to explore challenges and opportunities with a focus on human aspects for designing usable crypto-based privacy-enhancing technologies (PETs). Mainly, there were three PETs in the cloud context included in our studies: malleable signatures, secret sharing, and homomorphic encryption. Based on the three PETs, services were developed within European research projects that were the scope of our user studies. We followed a user-centered design approach by using empirical qualitative and quantitative means for collecting study data. Our results and tinkering conveyed (i) analysis of different categories of user's perspectives, mental models, and trade-offs, (ii) user requirements for PET services, and (iii) user interface design guidelines for PET services. In our contributions, we highlight considerations and guidelines for supporting the design of future solutions.

Abstract [en]

Data privacy has been growing in importance in recent years, especially with the constant increase of online activity. Consequently, researchers study, design, and develop solutions aimed at enhancing users' data privacy. The wicked problem of data privacy is a dynamic challenge that defies straightforward solutions. Since there are many factors involved in data privacy, such as technological, legal, and human aspects, we can only aim at mitigating rather than solving this wicked problem.

Our aim was to explore challenges and opportunities with a focus on human aspects for designing usable crypto-based privacy-enhancing technologies (PETs). Our results and tinkering conveyed (i) analysis of different categories of user's perspectives, mental models, and trade-offs, (ii) user requirements for PET services, and (iii) user interface design guidelines for PET services. In our contributions, we highlight considerations and guidelines for supporting the design of future solutions.

Place, publisher, year, edition, pages
Karlstads universitet, 2020. p. 22
Series
Karlstad University Studies, ISSN 1403-8099 ; 2020:5
Keywords
Data privacy, wicked problems, user-centered design, privacy enhancing technologies, human factors, malleable signatures, secret sharing, homomorphic encryption
National Category
Computer Sciences Human Computer Interaction
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-75992 (URN)978-91-7867-077-2 (ISBN)978-91-7867-087-1 (ISBN)
Public defence
2020-01-30, 21A342, Eva Eriksson, 10:15 (English)
Opponent
Supervisors
Available from: 2020-01-09 Created: 2019-12-16 Last updated: 2022-04-04Bibliographically approved

Open Access in DiVA

IFIP2015(178 kB)244 downloads
File information
File name FULLTEXT01.pdfFile size 178 kBChecksum SHA-512
dab70e478d2425632756d7edc7315f2fe715c8b1ec39633e948f29f8d07d9e299be6673e65822d43061111792465cf21ba77e678e96344719145afc675ef4d4a
Type fulltextMimetype application/pdf

Other links

Publisher's full textPresentationSummer school

Authority records

Alaqra, Ala(a)Fischer-Hübner, Simone

Search in DiVA

By author/editor
Alaqra, Ala(a)Fischer-Hübner, Simone
By organisation
Department of Mathematics and Computer Science (from 2013)
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 244 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 792 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf