Abstract
In this paper we present our institute’s vision towards the introduction of privacy respecting innovative ICT services in the Greek educational sector and, gradually, to other sectors of public interest as well. This vision was shaped during our work within the scope of the EU funded research project ABC4Trust in which our institute implemented a pilot system, based on Privacy-ABCs (Attribute Based Credentials) for the support of anonymous course evaluations in Universities. Privacy-ABCs support cryptographic primitives and tools for eIdentity management that allow users to take full control of what personal information they reveal towards the services they use, providing only the information required to satisfy the service policy. We, first, discuss the set-up of the ABC4Trust pliot and then we explain how we plan to extend the pilot scenarios and characteristics in order to boost eParticipation of members of the educational community of Greece, through the Greek School Network (GSN), in a privacy respecting manner. In particular, we discuss a number of scenarios in which Privacy-ABCs play an important role in ascertaining that users of the GSN only reveal their identity elements which are necessary in order to use a school service. Finally, based on the experiences gathered from our pilot, we present our views with respect to the factors that can inhibit or advance the widespread use of innovations, such as the Privacy-ABCs and the systems based on them, in society. We argue that there are two key factors that affect widespread adoption of innovations: (i) initial introduction of the innovation within groups whose members are linked, somehow, with each other and (ii) gradual introduction to more user groups, of progressively increasing size. This was the model the ABC4Trust project actually adopted in the case of the pilot we discuss in this paper.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Benenson, Z., Krontiris, I., Liagkou, V., Rannenberg, K., Schopf, A., Schröder, D., Stamatiou, Y.: Understanding and Using Anonymous Credentials. In: 9th Symposium on Usable Privacy and Security (SOUPS 2013) (2013)
Bjones, R., Krontiris, I., Paillier, P., Rannenberg, K.: Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Authentication. In: Preneel, B., Ikonomou, D. (eds.) APF 2012. LNCS, vol. 8319, pp. 111–124. Springer, Heidelberg (2014)
Brands, S.: Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy, 1st edn. (August 2000)
Brands, S., Demuynck, L., De Decker, B.: A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 400–415. Springer, Heidelberg (2007)
Camenisch, J.L., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93–118. Springer, Heidelberg (2001)
Camenisch, J., Van Herreweghen, E.: Design and Implementation of the Idemix Anonymous Credential System. Research Report RZ 3419, IBM Research Division. In: Also appeared in ACM Computer and Communication Security (June 2002)
Camenisch, J.L., Lysyanskaya, A.: Signature Schemes and Anonymous Credentials from Bilinear Maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56–72. Springer, Heidelberg (2004)
Camenisch, J.: Protecting (Anonymous) Credentials with the Trusted Computing Group’s TPM V1.2. In: Proc. SEC 2006, pp. 135–147 (2006)
Camenisch, J., Groß, T.: Efficient attributes for anonymous credentials. To appear in ACM Transactions on Information and System Security (TISSEC) (2011)
Cavoukian, A.: Privacy by Design and the Emerging Personal Data Ecosystem (October 2012), http://privacybydesign.ca/content/uploads/2012/10/pbd-pde.pdf
Hildebrandt, M.: The Dawn of a Critical Transparency Right for the Profiling Era. In: Bus, J., et al. (eds.) Digital Enlightenment Yearbook 2012, pp. 41–56. IOS Press (2012)
Kerschbaum, F.: Privacy-Preserving Computation (Position Paper). Annual Privacy Forum (APF) (2012)
Liagkou, V., Metakides, G., Pyrgelis, A., Raptopoulos, C., Spirakis, P., Stamatiou, Y.C.: Privacy preserving course evaluations in Greek higher education institutes: an e-Participation case study with the empowerment of Attribute Based Credentials. In: Preneel, B., Ikonomou, D. (eds.) APF 2012. LNCS, vol. 8319, pp. 140–156. Springer, Heidelberg (2014)
Manolopoulos, C., Sofotassios, D., Spirakis, P., Stamatiou, Y.C.: A Framework for Protecting Voters’ Privacy In Electronic Voting Procedures. Journal on Cases on Information Technology 15(2) (2013)
Young, P.: The Diffusion of Innovations in Social Network. In: Blume, L.E., Durlauf, S.N. (eds.) The Economy as a Complex Evolving System, vol. III. Oxford University Press (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 IFIP International Federation for Information Processing
About this paper
Cite this paper
Stamatiou, Y.C. (2014). Privacy Respecting ICT Innovations in Education: Electronic Course Evaluations in Higher Education and Beyond. In: Hansen, M., Hoepman, JH., Leenes, R., Whitehouse, D. (eds) Privacy and Identity Management for Emerging Services and Technologies. Privacy and Identity 2013. IFIP Advances in Information and Communication Technology, vol 421. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55137-6_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-55137-6_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-55136-9
Online ISBN: 978-3-642-55137-6
eBook Packages: Computer ScienceComputer Science (R0)