Skip to main content

Privacy Preserving Course Evaluations in Greek Higher Education Institutes: An e-Participation Case Study with the Empowerment of Attribute Based Credentials

  • Conference paper
Privacy Technologies and Policy (APF 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8319))

Included in the following conference series:

Abstract

Course evaluations enable educational institutions to adjust their teaching methodologies and curricula in order to suit, best, their students’ needs. Such evaluations in Greece are being conducted for many years in higher education institutes based on traditional print questionnaires handed-out to students at the lecture room. Compared to traditional paper-based questionnaires, the introduction of electronic student evaluation procedures has a number of advantages that merit consideration. a) it allows the students to evaluate courses from their home at their ease and beyond privacy breaches (e.g. by avoiding his/her fellow student looking at his/her answers), b) results are automatically archived in electronic format allowing fast further processing for the extraction of useful information, and c) it offers the possibility of using strong cryptographic tools to ensure student anonymity and data confidentiality. In this report we describe a pilot system that is being developed by the Computer Technology Institute & Press - “Diophantus” (CTI) within the context of the project ABC4Trust. The project’s main goal is the development of a reference implementation of a privacy preserving eIdentity management framework based on the cryptographic primitives called Attribute Based Credentials. The pilot system will offer to a group of selected students the possibility of evaluating courses they have taken from their homes through the Internet and provide their feedback proving their eligibility to participate in the evaluation while, at the same time, preserving their anonymity. In this paper we describe the architecture and main scenarios of the pilot. CTI’s long term vision is to use the pilot as a small scale proof of concept of privacy enhancement technologies in the eParticipation domain in order to introduce, in the future, of these technologies to the educational communities of all levels in Greece. These technologies will be the vehicle for supporting privacy preserving eParticipation in discussion groups whereby participants will provide their opinion anonymously but after proving that they are eligible to participate in group discussions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Project Description, ABC4Trust-Attribute-based Credentials for Trust, https://abc4trust.eu/

  2. European Network and Information Security Agency, Privacy Features of European eID Card Specifications. Position Paper (February 2009), http://www.enisa.europa.eu/act/it/privacy-and-trust/eid/eid-cards-en

  3. Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93–118. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  4. Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56–72. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  5. Chaum, D.: Security without identification: Transaction systems to make big brother obsolete. Commun. ACM 28(10), 1030–1044 (1985)

    Article  Google Scholar 

  6. Federrath, H., Pfitzmann, A.: Gliederung und Systematisierung von Schutzzielen in IT-Systemen. Datenschutz und Datensicherheit (DuD) 24(12), 704–710 (2000)

    Google Scholar 

  7. Hedbom, H., Schallaböck, J., Wenning, R., Hansen, M.: Contributions to standardisation. In: Privacy and Identity Management for Life, pp. 479–492 (2011)

    Google Scholar 

  8. Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management (2010), http://dud.inf.tu-dresden.de/Anon_Terminology.shtml

  9. Zwingelberg, H., Hansen, M.: Privacy protection goals and their implications for eID system (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liagkou, V., Metakides, G., Pyrgelis, A., Raptopoulos, C., Spirakis, P., Stamatiou, Y.C. (2014). Privacy Preserving Course Evaluations in Greek Higher Education Institutes: An e-Participation Case Study with the Empowerment of Attribute Based Credentials. In: Preneel, B., Ikonomou, D. (eds) Privacy Technologies and Policy. APF 2012. Lecture Notes in Computer Science, vol 8319. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54069-1_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-54069-1_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-54068-4

  • Online ISBN: 978-3-642-54069-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics