Skip to main content

eIDAS Implementation Challenges: The Case of Estonia and the Netherlands

  • Conference paper
  • First Online:
Electronic Governance and Open Society: Challenges in Eurasia (EGOSE 2020)

Abstract

Solid eID (electronic identification) infrastructures form the backbone of today’s digital transformation. In June 2014, the European Commission adopted the eIDAS regulation (electronic identification and trust services for electronic transactions in the internal market) as a major initiative towards EU-wide eID interoperability; which receives massive attention in all EU member states in recent years. As a joint effort of Estonia and the Netherlands, this study provides a comparative case study on eIDAS implementation practices of the two countries. The aim was to analyze eIDAS implementation challenges of the two countries and to propose a variety of possible solutions to overcome them. During an action learning workshop in November 2019, key experts from Estonia and the Netherlands identified eIDAS implementation challenges and proposed possible solutions to the problems from the policy maker, the service provider and the user perspective. As a result, we identified five themes of common challenges: compliance issues, interpretation problems, different practices in member states, cooperation and collaboration barriers, and representation of legal persons. Proposed solutions do not only involve changes in the eIDAS regulation, but different actions to develop an eIDAS framework and to improve cross-border service provision - which has recently become an important topic among member states. Eventually, the study provides practical input to the ongoing eIDAS review process and can help member states to overcome eIDAS implementation challenges.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    According to eIDAS, an eID scheme is a system for electronic identification under which electronic identification means are issued to natural or legal persons (or to natural persons representing legal persons).

  2. 2.

    Estonian eID scheme notified under eIDAS, https://ec.europa.eu/cefdigital/wiki/display/EIDCOMMUNITY/Estonia.

  3. 3.

    Estonian eID statistics, https://www.id.ee/?lang=en&id=.

  4. 4.

    Smart-ID’s recognition as Qualified Signature Creation Device (QSCD), https://www.smart-id.com/e-service-providers/smart-id-as-a-qscd/.

  5. 5.

    Estonian eID statistics, https://www.id.ee/?lang=en&id=.

  6. 6.

    The Netherlands (DTF/eHerkenning) eID scheme notified under eIDAS, https://ec.europa.eu/cefdigital/wiki/pages/viewpage.action?pageId=74091935.

  7. 7.

    Dutch Trust framework for Electronic Identification, https://ec.europa.eu/cefdigital/wiki/pages/viewpage.action?pageId=74091935.

  8. 8.

    The Netherlands (DigiD) scheme pre-notified under eIDAS, https://ec.europa.eu/cefdigital/wiki/pages/viewpage.action?pageId=176620999.

  9. 9.

    Digicampus homepage, https://www.dedigicampus.nl/.

References

  1. Vial, G.: Understanding digital transformation: a review and a research agenda. J. Strateg. Inf. Syst. 28(2), 118–144 (2019)

    Article  Google Scholar 

  2. Khatchatourov, A., Laurent, M., Levallois-Barth, C.: Privacy in digital identity systems: models, assessment, and user adoption. In: Tambouris, E., et al. (eds.) EGOV 2015. LNCS, vol. 9248, pp. 273–290. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-22479-4_21

    Chapter  Google Scholar 

  3. Pappel, I., Pappel, I., Tepandi, J., Draheim, D.: Systematic digital signing in estonian e-government processes. In: Hameurlain, A., Küng, J., Wagner, R., Dang, T.K., Thoai, N. (eds.) Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVI. LNCS, vol. 10720, pp. 31–51. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-56266-6_2

    Chapter  Google Scholar 

  4. European Parliament and Council: EU Parliament and Council regulation (EU) No 910/2014 on electronic identification and trust services for electronic transactions in the internal market and repealing directive 1999/93/EC (2014)

    Google Scholar 

  5. The European Parliament: EU Parliament Resolution. Towards a Digital Single Market Act (2015/2147(INI) (2016)

    Google Scholar 

  6. European Parliament and Council: EU Parliament and Council Regulation (EU) No 2018/1724 establishing a single digital gateway to provide access to information, to procedures and to assistance and problem-solving services and amending Regulation (EU) No 1024/2012 (2018)

    Google Scholar 

  7. Bhattarai, R., Pappel, I., Vainsalu, H., Yahia, S.B., Draheim, D.: The impact of the single digital gateway regulation from the citizens’ perspective. Procedia Comput. Sci. 164, 159–167 (2019)

    Article  Google Scholar 

  8. Bharosa, N., Lips, S., Draheim, D.: Making e-government work: learning from the Netherlands and Estonia. In: Hofmann, S., Csáki, C., Edelmann, N., Lampoltshammer, T., Melin, U., Parycek, P., Schwabe, G., Tambouris, E. (eds.) ePart 2020. LNCS, vol. 12220, pp. 41–53. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-58141-1_4

    Chapter  Google Scholar 

  9. Yin, R.K.: Applications of Case Study Research. Sage, Thousand Oaks (2011)

    Google Scholar 

  10. Revans, R.W.: ABC of Action Learning. Gower Publishing, Ltd., Farnham (2011)

    Google Scholar 

  11. Berbecaru, D., Lioy, A., Cameroni, C.: Electronic identification for universities: building cross-border services based on the eIDAS infrastructure. Information 10(6), 210 (2019)

    Article  Google Scholar 

  12. Maliappis, M., Gerakos, K., Costopoulou, C., Ntaliani, M.: Authenticated academic services through eIDAS. Int. J. Electron. Gov. 11(3/4), 386 (2019)

    Google Scholar 

  13. Klobučar, T.: Improving cross-border educational services with eIDAS. In: Rocha, Á., Adeli, H., Reis, L.P., Costanzo, S. (eds.) WorldCIST’19 2019. AISC, vol. 931, pp. 932–938. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-16184-2_88

    Chapter  Google Scholar 

  14. Berbecaru, D., Lioy, A., Cameroni, C.: Providing digital identity and academic attributes through European eID infrastructures: results achieved, limitations, and future steps. Softw. Pract. Exp. 49(11), 1643–1662 (2019)

    Google Scholar 

  15. Gerakos, K., Maliappis, M., Costopoulou, C., Ntaliani, M.: Electronic authentication for university transactions using eIDAS. In: Katsikas, S.K., Zorkadis, V. (eds.) e-Democracy 2017. CCIS, vol. 792, pp. 187–195. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-71117-1_13

    Chapter  Google Scholar 

  16. Vogt, T.: Die neue eIDAS-verordnung – chance und herausforderung für die öffentliche verwaltung in deutschland. Inf. Wissenschaft Praxis 67(1), 61–68 (2016)

    Google Scholar 

  17. Tsakalakis, N., OHara, K., Stalla-Bourdillon, S.: Identity assurance in the UK. In: Proceedings of WebSci 16 - The 8th ACM Conference on Web Science. ACM Press (2016)

    Google Scholar 

  18. Pelikánová, R.M., Cvik, E.D., MacGregor, R.: Qualified electronic signature – eIDAS striking czech public sector bodies. Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis 67(6), 1551–1560 (2019)

    Article  Google Scholar 

  19. Engelbertz, N., Erinola, N., Herring, D., Somorovsky, J., Mladenov, V., Schwenk, J.: Security analysis of eidas – the cross-country authentication scheme in europe. In: 12th USENIX Workshop on Offensive Technologies (WOOT 2018). USENIX Association, Baltimore, MD, August 2018

    Google Scholar 

  20. Kutyłowski, M., Hanzlik, L., Kluczniak, K.: Pseudonymous signature on eIDAS token – implementation based privacy threats. In: Liu, J.K., Steinfeld, R. (eds.) ACISP 2016. LNCS, vol. 9723, pp. 467–477. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-40367-0_31

    Chapter  MATH  Google Scholar 

  21. Tsakalakis, N., Stalla-Bourdillon, S., O’Hara, K.: Data protection by design for cross-border electronic identification: does the eIDAS interoperability framework need to be modernised? In: Kosta, E., Pierson, J., Slamanig, D., Fischer-Hübner, S., Krenn, S. (eds.) Privacy and Identity 2018. IAICT, vol. 547, pp. 255–274. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-16744-8_17

    Chapter  Google Scholar 

  22. Mocanu, S., Chiriac, A.M., Popa, C., Dobrescu, R., Saru, D.: Identification and trust techniques compatible with eIDAS regulation. In: Li, J., Liu, Z., Peng, H. (eds.) SPNCE 2019. LNICST, vol. 284, pp. 656–665. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-21373-2_55

    Chapter  Google Scholar 

  23. Lips, S., Pappel, I., Tsap, V., Draheim, D.: Key factors in coping with large-scale security vulnerabilities in the eID field. In: Kő, A., Francesconi, E. (eds.) EGOVIS 2018. LNCS, vol. 11032, pp. 60–70. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-98349-3_5

    Chapter  Google Scholar 

  24. Lips, S., Aas, K., Pappel, I., Draheim, D.: Designing an effective long-term identity management strategy for a mature e-state. In: Kő, A., Francesconi, E., Anderst-Kotsis, G., Tjoa, A.M., Khalil, I. (eds.) EGOVIS 2019. LNCS, vol. 11709, pp. 221–234. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-27523-5_16

    Chapter  Google Scholar 

  25. Tsap, V., Pappel, I., Draheim, D.: Factors affecting e-ID public acceptance: a literature review. In: Kő, A., Francesconi, E., Anderst-Kotsis, G., Tjoa, A.M., Khalil, I. (eds.) EGOVIS 2019. LNCS, vol. 11709, pp. 176–188. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-27523-5_13

    Chapter  Google Scholar 

  26. Tsap, V., Pappel, I., Draheim, D.: Key success factors in introducing national e-identification systems. In: Dang, T.K., Wagner, R., Küng, J., Thoai, N., Takizawa, M., Neuhold, E.J. (eds.) FDSE 2017. LNCS, vol. 10646, pp. 455–471. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-70004-5_33

    Chapter  Google Scholar 

  27. Roelofs, F.: Analysis and comparison of identification and authentication systems under the eIDAS regulation. Master’s thesis, Radboud University, the Netherlands (2019)

    Google Scholar 

  28. Pedler, M.: Action Learning in Practice. Gower Publishing, Farnham (2011)

    Google Scholar 

  29. Zuber-Skerritt, O.: Action learning and action research: paradigm, praxis and programs. In: Effective Change Management Through Action Research and Action Learning: Concepts, Perspectives, Processes and Applications, vol. 1, p. 20 (2001)

    Google Scholar 

  30. Aldred, R.: From community participation to organizational therapy? World cafe and appreciative inquiry as research methods. Commun. Dev. J. 46, 57–71 (2009)

    Article  Google Scholar 

  31. Wimmer, M.A., Tambouris, E., Krimmer, R., Gil-Garcia, J.R., Chatfield, A.T.: Once only principle. In: Proceedings of the 18th Annual International Conference on Digital Government Research. ACM (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Silvia Lips .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lips, S., Bharosa, N., Draheim, D. (2020). eIDAS Implementation Challenges: The Case of Estonia and the Netherlands. In: Chugunov, A., Khodachek, I., Misnikov, Y., Trutnev, D. (eds) Electronic Governance and Open Society: Challenges in Eurasia. EGOSE 2020. Communications in Computer and Information Science, vol 1349. Springer, Cham. https://doi.org/10.1007/978-3-030-67238-6_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-67238-6_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-67237-9

  • Online ISBN: 978-3-030-67238-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics