Digitala Vetenskapliga Arkivet

Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Tinkering the Wicked Problem of Privacy: Design Challenges and Opportunities for Crypto-based Services
Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013). (Privacy and Security)ORCID-id: 0000-0002-6509-3792
2020 (Engelska)Doktorsavhandling, sammanläggning (Övrigt vetenskapligt)
Abstract [en]

Data privacy has been growing in importance in recent years, especially with the constant increase of online activity. Consequently, researchers study, design, and develop solutions aimed at enhancing users' data privacy. The wicked problem of data privacy is a dynamic challenge that defies straightforward solutions. Since there are many factors involved in data privacy, such as technological, legal, and human aspects, we can only aim at mitigating rather than solving this wicked problem.

Our aim was to explore challenges and opportunities with a focus on human aspects for designing usable crypto-based privacy-enhancing technologies (PETs). Mainly, there were three PETs in the cloud context included in our studies: malleable signatures, secret sharing, and homomorphic encryption. Based on the three PETs, services were developed within European research projects that were the scope of our user studies. We followed a user-centered design approach by using empirical qualitative and quantitative means for collecting study data. Our results and tinkering conveyed (i) analysis of different categories of user's perspectives, mental models, and trade-offs, (ii) user requirements for PET services, and (iii) user interface design guidelines for PET services. In our contributions, we highlight considerations and guidelines for supporting the design of future solutions.

Abstract [en]

Data privacy has been growing in importance in recent years, especially with the constant increase of online activity. Consequently, researchers study, design, and develop solutions aimed at enhancing users' data privacy. The wicked problem of data privacy is a dynamic challenge that defies straightforward solutions. Since there are many factors involved in data privacy, such as technological, legal, and human aspects, we can only aim at mitigating rather than solving this wicked problem.

Our aim was to explore challenges and opportunities with a focus on human aspects for designing usable crypto-based privacy-enhancing technologies (PETs). Our results and tinkering conveyed (i) analysis of different categories of user's perspectives, mental models, and trade-offs, (ii) user requirements for PET services, and (iii) user interface design guidelines for PET services. In our contributions, we highlight considerations and guidelines for supporting the design of future solutions.

Ort, förlag, år, upplaga, sidor
Karlstads universitet, 2020. , s. 22
Serie
Karlstad University Studies, ISSN 1403-8099 ; 2020:5
Nyckelord [en]
Data privacy, wicked problems, user-centered design, privacy enhancing technologies, human factors, malleable signatures, secret sharing, homomorphic encryption
Nationell ämneskategori
Datavetenskap (datalogi) Människa-datorinteraktion (interaktionsdesign)
Forskningsämne
Datavetenskap
Identifikatorer
URN: urn:nbn:se:kau:diva-75992ISBN: 978-91-7867-077-2 (tryckt)ISBN: 978-91-7867-087-1 (digital)OAI: oai:DiVA.org:kau-75992DiVA, id: diva2:1379187
Disputation
2020-01-30, 21A342, Eva Eriksson, 10:15 (Engelska)
Opponent
Handledare
Tillgänglig från: 2020-01-09 Skapad: 2019-12-16 Senast uppdaterad: 2022-04-04Bibliografiskt granskad
Delarbeten
1. Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements
Öppna denna publikation i ny flik eller fönster >>Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements
Visa övriga...
2015 (Engelska)Ingår i: Privacy and Identity Management. Time for a Revolution?: 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers / [ed] David Aspinall, Jan Camenisch, Marit Hansen, Simone Fischer-Hübner, Charles Raab, Springer Publishing Company, 2015, Vol. 476, s. 79-96Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

This paper summarises the results of a workshop at the IFIP Summer School 2015 introducing the EU Horizon 2020 project PRISMACLOUD, that is, Privacy and Security Maintaining Services in the Cloud. The contributions of this summary are three-fold. Firstly, it provides an overview to the PRISMACLOUD cryptographic tools and use-case scenarios that were presented as part of this workshop. Secondly, it distills the discussion results of parallel focus groups. Thirdly, it summarises a ``Deep Dive on Crypto'' session that offered technical information on the new tools. Overall, the workshop aimed at outlining application scenarios and eliciting end-user requirements for PRISMACLOUD.

Ort, förlag, år, upplaga, sidor
Springer Publishing Company, 2015
Serie
IFIP Advances in Information and Communication Technology, ISSN 1868-4238 ; 476
Nyckelord
Privacy, Cloud Computing, Functional Signatures, Malleable Signatures, Graph Signatures, Anonymous Credentials, User Requirements
Nationell ämneskategori
Datavetenskap (datalogi)
Forskningsämne
Datavetenskap
Identifikatorer
urn:nbn:se:kau:diva-43022 (URN)10.1007/978-3-319-41763-9_6 (DOI)978-3-319-41762-2 (ISBN)
Konferens
IFIP Summer School, Edinburgh, 16.‐21. August 2015
Projekt
PRISMACLOUD
Forskningsfinansiär
EU, Horisont 2020, 4805
Tillgänglig från: 2016-06-15 Skapad: 2016-06-15 Senast uppdaterad: 2019-12-16Bibliografiskt granskad
2. Stakeholders’ Perspectives on Malleable Signatures in a Cloud-based eHealth Scenario
Öppna denna publikation i ny flik eller fönster >>Stakeholders’ Perspectives on Malleable Signatures in a Cloud-based eHealth Scenario
2016 (Engelska)Ingår i: Proceedings of the International Symposium on Human Aspects of Information Security & Assurance / [ed] Nathan Clarke & Steven Furnell, 2016, s. 220-230Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

In this paper, we discuss end user requirements that we elicited for the use of malleable signatures in a Cloud-based eHealth scenario. The concept of a malleable signature, which is a privacy enhancing cryptographic scheme that enables the redaction of personal information from signed documents while preserving the validity of the signature, might be counter- intuitive to end users as its functionality does not correspond to the one of a traditional signature scheme. A qualitative study via a series of semi-structured interviews and focus groups has been conducted to understand stakeholders’ opinions and concerns in regards to the possible applications of malleable signatures in the eHealth area, where a medical record is first digitally signed by a doctor and later redacted by the patient in the cloud. Results from this study yielded user requirements such as the need for suitable metaphors and guidelines, usable templates, and clear redaction policies. 

Nyckelord
HCI Requirements, Malleable Signatures, Usable Privacy, Cloud tools, eHealth
Nationell ämneskategori
Datavetenskap (datalogi) Människa-datorinteraktion (interaktionsdesign)
Forskningsämne
Datavetenskap
Identifikatorer
urn:nbn:se:kau:diva-43016 (URN)978-1-84102-413-4 (ISBN)
Konferens
HAISA 2016 - the International Symposium on Human Aspects of Information Security & Assurance, Frankfurt Germany, 19th - 21st July 2016
Forskningsfinansiär
EU, Horisont 2020, 4805
Tillgänglig från: 2016-06-15 Skapad: 2016-06-15 Senast uppdaterad: 2023-09-26Bibliografiskt granskad
3. HCI patterns for cryptographically equipped cloud services
Öppna denna publikation i ny flik eller fönster >>HCI patterns for cryptographically equipped cloud services
Visa övriga...
2018 (Engelska)Ingår i: Human-Computer Interaction. Theories, Methods, and Human Issues / [ed] Masaaki Kurosu, Springer, 2018, s. 567-586Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Recent cryptographic research has devised several new algorithms and protocols with a potential of mitigating several of the most ardent security and privacy threats, existing in currently available public cloud services. Nevertheless, such cryptographic schemes often exhibit counterintuitive functionality to end users, or they work differently to other already established traditional schemes with which users are already familiar. A practical solution to address these problems involves a human centered design approach, deriving Human Computer Interaction (HCI) requirements from consultations and extensive testing with experts, prospective end users, and other stakeholders. The European Horizon 2020 project PRISMACLOUD “Privacy and Security Maintaining Services for the Cloud” uses such an approach and provides HCI patterns as part of its proper cloud service development methodology CryptSDLC to communicate HCI requirements to cloud service designers and user interface implementers. In this article, we present several new cryptographic cloud services, e.g. for redacting digitally signed data, and for redundant storage and sharing of confidential data in a public cloud scenario, together with three example HCI patterns for specific interactions of end users with these services. We show how these patterns were elaborated and validated in practice to prove the suitability for their intended purpose. To summarize, we give an account on our practical experience during the actual prototype development and implementation and show how they constitute an essential element of the CryptSDLC development methodology.

Ort, förlag, år, upplaga, sidor
Springer, 2018
Serie
Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349 ; 10901
Nyckelord
Cloud computing, Cryptography, HCI patterns, End-user security, End-user privacy
Nationell ämneskategori
Datavetenskap (datalogi)
Forskningsämne
Datavetenskap
Identifikatorer
urn:nbn:se:kau:diva-67347 (URN)10.1007/978-3-319-91238-7_44 (DOI)000450991000044 ()978-3-319-91237-0 (ISBN)978-3-319-91238-7 (ISBN)
Konferens
20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018.
Tillgänglig från: 2018-05-23 Skapad: 2018-05-23 Senast uppdaterad: 2023-09-26Bibliografiskt granskad
4. Enhancing Privacy Controls for Patients via a Selective Authentic Electronic Health Record Exchange Service: Qualitative Study of Perspectives by Medical Professionals and Patients
Öppna denna publikation i ny flik eller fönster >>Enhancing Privacy Controls for Patients via a Selective Authentic Electronic Health Record Exchange Service: Qualitative Study of Perspectives by Medical Professionals and Patients
2018 (Engelska)Ingår i: Journal of Medical Internet Research, E-ISSN 1438-8871, Vol. 20, nr 12, artikel-id e10954Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

Background: Patients' privacy is regarded as essential for the patient-doctor relationship. One example of a privacy-enhancing technology for user-controlled data minimization on content level is a redactable signature. It enables users to redact personal information from signed documents while preserving the validity of the signature, and thus the authenticity of the document. In this study, we present end users' evaluations of a Cloud-based selective authentic electronic health record (EHR) exchange service (SAE-service) in an electronic health use case. In the use case scenario, patients were given control to redact specified information fields in their EHR, which were signed by their doctors with a redactable signature and transferred to them into a Cloud platform. They can then selectively disclose the remaining information in the EHR, which still bears the valid digital signature, to third parties of their choice. Objective: This study aimed to explore the perceptions, attitudes, and mental models concerning the SAE-service of 2 user roles: signers (medical professionals) and redactors (patients with different technical knowledge) in Germany and Sweden. Another objective was to elicit usability requirements for this service based on the analysis of our investigation. Methods: We chose empirical qualitative methods to address our research objective. Designs of mock-ups for the service were used as part of our user-centered design approach in our studies with test participants from Germany and Sweden. A total of 13 individual walk-throughs or interviews were conducted with medical staff to investigate the EHR signers' perspectives. Moreover, 5 group walk-throughs in focus groups sessions with (N=32) prospective patients with different technical knowledge to investigate redactor's perspective of EHR data redaction control were used. Results: We found that our study participants had correct mental models with regard to the redaction process. Users with some technical models lacked trust in the validity of the doctor's signature on the redacted documents. Main results to be considered are the requirements concerning the accountability of the patients' redactions and the design of redaction templates for guidance and control. Conclusions: For the SAE-service to be means for enhancing patient control and privacy, the diverse usability and trust factors of different user groups should be considered.

Ort, förlag, år, upplaga, sidor
JMIR Publications, 2018
Nationell ämneskategori
Datavetenskap (datalogi)
Forskningsämne
Datavetenskap
Identifikatorer
urn:nbn:se:kau:diva-70971 (URN)10.2196/10954 (DOI)000454351700001 ()30578189 (PubMedID)
Anmärkning

This paper was included as manuscript in Alaqra's licentiate thesis The Wicked Problem of Privacy: Design Challenge for Crypto-based Solutions

This paper was included as manuscript in Alaqra's licentiate thesis Tinkering the Wicked Problem of Privacy: Design Challenges and Opportunities for Crypto-based Services, with the title: Enhancing Privacy Controls for Patients via a Selective Authentic Electronic Health Record Exchange Service: Perspectives by Medical Professionals and Patients

Tillgänglig från: 2019-02-07 Skapad: 2019-02-07 Senast uppdaterad: 2024-01-17Bibliografiskt granskad
5. Reciprocities or Incentives?: Understanding Privacy Intrusion Perspectives and Sharing Behaviors
Öppna denna publikation i ny flik eller fönster >>Reciprocities or Incentives?: Understanding Privacy Intrusion Perspectives and Sharing Behaviors
2019 (Engelska)Ingår i: HCI for Cybersecurity, Privacy and Trust: First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedings / [ed] Abbas Moallem, Cham, Switzerland: Springer, 2019, s. 355-370Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

The importance and perception of privacy varies from one context to the other. However, everyone values his or her privacy to a certain extent. The subjectivity of that value, attitudes, and behaviors would depend on different entangling factors. It is important to understand the motivation that influences human behavior, whether to protect or share their information. In this paper, we aim at understanding the boundaries of privacy, factors influencing information sharing behavior including experiences (reciprocities of privacy), and efforts taken to protect one’s data. We collected data using quantitative (survey/quiz) and qualitative means (focus groups). In the survey/quiz, our results showed that intrusion experience and awareness have a significant correlation between sharing of data. Furthermore, our focus groups results yielded details on influencing factors for privacy reciprocities and tradeoffs. We discuss our results in terms of privacy incentives and factors influencing the sharing behavior of their information. Finally, we highlight the complexity of behavior where intrinsic and extrinsic motivations could clash and result in a dilemma such as the privacy paradox phenomenon. © 2019, Springer Nature Switzerland AG.

Ort, förlag, år, upplaga, sidor
Cham, Switzerland: Springer, 2019
Serie
Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349 ; 11594
Nyckelord
Behavior, Incentive, Motivation, Privacy, Privacy paradox, Reciprocity, Behavioral research, Data privacy, Human computer interaction, Information dissemination, Surveys, Extrinsic motivation, Focus groups, Human behaviors, Information sharing, Privacy intrusion, Computer privacy
Nationell ämneskategori
Människa-datorinteraktion (interaktionsdesign)
Forskningsämne
Datavetenskap; Psykologi
Identifikatorer
urn:nbn:se:kau:diva-75636 (URN)10.1007/978-3-030-22351-9_24 (DOI)2-s2.0-85069853461 (Scopus ID)9783030223502 (ISBN)
Konferens
21st HCI International Conference, HCII 2019, July 26–31, 2019, Orlando, FL, USA,
Tillgänglig från: 2019-11-12 Skapad: 2019-11-12 Senast uppdaterad: 2019-12-16Bibliografiskt granskad
6. Making secret sharing based cloud storage usable
Öppna denna publikation i ny flik eller fönster >>Making secret sharing based cloud storage usable
Visa övriga...
2019 (Engelska)Ingår i: Information and Computer Security, E-ISSN 2056-4961, Vol. 27, nr 5, s. 647-667Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

The purpose of this paper is to develop a usable configuration management for Archistar, whichutilizes secret sharing for redundantly storing data over multiple independent storage clouds in a secure andprivacy-friendly manner. Selecting the optimal secret sharing parameters, cloud storage servers and othersettings for securely storing the secret data shares, while meeting all of end user’s requirements and otherrestrictions, is a complex task. In particular, complex trade-offs between different protection goals and legalprivacy requirements need to be made.

Ort, förlag, år, upplaga, sidor
Emerald Group Publishing Limited, 2019
Nyckelord
Privacy, Decision support systems, Usability, Security, Cloud computing, Secret sharing
Nationell ämneskategori
Datavetenskap (datalogi)
Forskningsämne
Datavetenskap
Identifikatorer
urn:nbn:se:kau:diva-75182 (URN)10.1108/ICS-01-2019-0016 (DOI)000491597600004 ()
Projekt
Prismacloud (4805)
Forskningsfinansiär
EU, Horisont 2020
Tillgänglig från: 2019-10-09 Skapad: 2019-10-09 Senast uppdaterad: 2023-09-26Bibliografiskt granskad
7. Machine Learning–Based Analysis of Encrypted Medical Data in the Cloud: Qualitative Study of Expert Stakeholders’ Perspectives
Öppna denna publikation i ny flik eller fönster >>Machine Learning–Based Analysis of Encrypted Medical Data in the Cloud: Qualitative Study of Expert Stakeholders’ Perspectives
2021 (Engelska)Ingår i: JMIR Human Factors, E-ISSN 2292-9495, Vol. 8, nr 3, s. 1-15, artikel-id e21810Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

Background:Third-party cloud-based data analysis applications are proliferating in electronic health (eHealth) because of the expertise offered and their monetary advantage. However, privacy and security are critical concerns when handling sensitive medical data in the cloud. Technical advances based on “crypto magic” in privacy-preserving machine learning (ML) enable data analysis in encrypted form for maintaining confidentiality. Such privacy-enhancing technologies (PETs) could be counterintuitive to relevant stakeholders in eHealth, which could in turn hinder adoption; thus, more attention is needed on human factors for establishing trust and transparency.

Objective:The aim of this study was to analyze eHealth expert stakeholders’ perspectives and the perceived tradeoffs in regard to data analysis on encrypted medical data in the cloud, and to derive user requirements for development of a privacy-preserving data analysis tool.

Methods:We used semistructured interviews and report on 14 interviews with individuals having medical, technical, or research expertise in eHealth. We used thematic analysis for analyzing interview data. In addition, we conducted a workshop for eliciting requirements.

Results:Our results show differences in the understanding of and in trusting the technology; caution is advised by technical experts, whereas patient safety assurances are required by medical experts. Themes were identified with general perspectives on data privacy and practices (eg, acceptance of using external services), as well as themes highlighting specific perspectives (eg, data protection drawbacks and concerns of the data analysis on encrypted data). The latter themes result in requiring assurances and conformance testing for trusting tools such as the proposed ML-based tool. Communicating privacy, and utility benefits and tradeoffs with stakeholders is essential for trust. Furthermore, stakeholders and their organizations share accountability of patient data. Finally, stakeholders stressed the importance of informing patients about the privacy of their data.

Conclusions:Understanding the benefits and risks of using eHealth PETs is crucial, and collaboration among diverse stakeholders is essential. Assurances of the tool’s privacy, accuracy, and patient safety should be in place for establishing trust of ML-based PETs, especially if used in the cloud.

Ort, förlag, år, upplaga, sidor
JMIR Publications, 2021
Nyckelord
medical data analysis, encryption, privacy-enhancing technologies, machine learning, stakeholders, tradeoffs, perspectives, eHealth, interviews, )
Nationell ämneskategori
Människa-datorinteraktion (interaktionsdesign)
Forskningsämne
Datavetenskap; Informatik
Identifikatorer
urn:nbn:se:kau:diva-86407 (URN)10.2196/21810 (DOI)000787621300004 ()2-s2.0-85115950373 (Scopus ID)
Forskningsfinansiär
Europeiska kommissionen, 786767
Anmärkning

Publicerades som manuscript med titeln: 

Analysis on Encrypted Medical Data In The Cloud, Should We Be Worried?: A Qualitative Study of Stakeholders' Perspectives

I Ala Sarah Alaqras avhandling med titeln: 

Tinkering the Wicked Problem of Privacy Design Challenges and Opportunities for Crypto-based Services 

 

Tillgänglig från: 2021-11-01 Skapad: 2021-11-01 Senast uppdaterad: 2022-05-19Bibliografiskt granskad

Open Access i DiVA

2020:5(9539 kB)783 nedladdningar
Filinformation
Filnamn FULLTEXT03.pdfFilstorlek 9539 kBChecksumma SHA-512
b28559a7cf3e6a587b07814e86144ff772329361ba9406e5cda9e575ce8d52bfb350abbccb96b1ac79170c21cc47b49492c76c44bfb3ecfab889b26801601c23
Typ fulltextMimetyp application/pdf

Sök vidare i DiVA

Av författaren/redaktören
Alaqra, Ala Sarah
Av organisationen
Institutionen för matematik och datavetenskap (from 2013)
Datavetenskap (datalogi)Människa-datorinteraktion (interaktionsdesign)

Sök vidare utanför DiVA

GoogleGoogle Scholar
Totalt: 814 nedladdningar
Antalet nedladdningar är summan av nedladdningar för alla fulltexter. Det kan inkludera t.ex tidigare versioner som nu inte längre är tillgängliga.

isbn
urn-nbn

Altmetricpoäng

isbn
urn-nbn
Totalt: 1917 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf