Skip to main content

On the User Acceptance of Privacy-Preserving Attribute-Based Credentials – A Qualitative Study

  • Conference paper
  • First Online:
Data Privacy Management and Security Assurance (DPM 2016, QASA 2016)

Abstract

Privacy and data protection are critical aspects of today’s use of Internet services. Privacy-preserving Attribute-based Credentials (Privacy-ABCs), also known as anonymous credentials, are elegant techniques to allow security and privacy go hand-in-hand. In this paper, we report on the results of our structured interviews with users who tried a prototype of Privacy-ABC identity card. We questioned their observations of benefits and barriers to use such technologies as well as their desired application. Moreover, we investigated their trust believes and anchors and inquired their preferred implementation scheme. Our results shed lights on the direction that must be followed to foster adoption of Privacy-ABCs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://abc4trust.eu/demo/hotelbooking.

  2. 2.

    Allgemeine Geschäftsbedingungen (Terms of Service).

  3. 3.

    A German consumer protection organization.

  4. 4.

    Technischer Überwachungsverein (Technical Inspection Association).

References

  1. Attribute-based Crednetials for Trust (ABC4Trust) EU Project. https://abc4trust.eu/

  2. FutureID EU Project. http://www.futureid.eu/

  3. Identity Mixer. http://idemix.wordpress.com/

  4. Microsoft U-Prove. http://www.microsoft.com/uprove

  5. PRIME - Privacy and Identity Management for Europe. https://www.prime-project.eu/

  6. PrimeLife EU Project. http://primelife.ercim.eu/

  7. Sabouri, A., (ed.): Architecture for Attribute-based Credential Technologies - Final Version. Deliverable D2.2, The ABC4Trust EU Project (2014). https://abc4trust.eu/download/Deliverable_D2.2.pdf, Accessed 2014–11-08

  8. Benenson, Z., Girard, A., Krontiris, I.: User acceptance factors for anonymous credentials: An empirical investigation. In: Proceedings of the Workshop on the Economics of Information Security (WEIS) (2015)

    Google Scholar 

  9. Benenson, Z., Girard, A., Krontiris, I., Liagkou, V., Rannenberg, K., Stamatiou, Y.: User acceptance of privacy-ABCs: an exploratory study. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 375–386. Springer, Heidelberg (2014). doi:10.1007/978-3-319-07620-1_33

    Google Scholar 

  10. Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13, 319–340 (1989)

    Article  Google Scholar 

  11. Harbach, M., Fahl, S., Rieger, M., Smith, M.: On the acceptance of privacy-preserving authentication technology: the curious case of national identity cards. In: De Cristofaro, E., Wright, M. (eds.) PETS 2013. LNCS, vol. 7981, pp. 245–264. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  12. Liagkou, V., Metakides, G., Pyrgelis, A., Raptopoulos, C., Spirakis, P.G., Stamatiou, Y.C.: Privacy preserving course evaluations in greek higher education institutes: An e-participation case study with the empowerment of attribute based credentials. In: Privacy Technologies and Policy - First Annual Privacy Forum, ApPF 2012, Limassol, Cyprus, October 10–11, 2012, Revised Selected Papers, pp. 140–156 (2012)

    Google Scholar 

  13. Sabouri, A.: Understanding the determinants of privacy-ABC technologies adoption by service providers. In: Janssen, M., et al. (eds.) I3E 2015. LNCS, vol. 9373, pp. 119–132. Springer, Heidelberg (2015). doi:10.1007/978-3-319-25013-7_10

    Chapter  Google Scholar 

  14. Seidel, S., Recker, J.C., Vom Brocke, J.: Sensemaking and sustainable practicing: functional affordances of information systems in green transformations. Manage. Inf. Syst. Q. 37(4), 1275–1299 (2013)

    Google Scholar 

  15. Strauss, A., Corbin, J.: Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory. Sage Publications Inc., Thousand Oaks (1998)

    Google Scholar 

  16. Strübing, J.: Grounded Theory: Zur sozialtheoretischen und epistemologischen Fundierung eines pragmatistischen Forschungsstils. Springer, Heidelberg (2014)

    Book  Google Scholar 

  17. Wästlund, E., Angulo, J., Fischer-Hübner, S.: Evoking comprehensive mental models of anonymous credentials. In: Camenisch, J., Kesdogan, D. (eds.) iNetSec 2011. LNCS, vol. 7039, pp. 1–14. Springer, Heidelberg (2012). doi:10.1007/978-3-642-27585-2_1

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ahmad Sabouri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Sabouri, A. (2016). On the User Acceptance of Privacy-Preserving Attribute-Based Credentials – A Qualitative Study. In: Livraga, G., Torra, V., Aldini, A., Martinelli, F., Suri, N. (eds) Data Privacy Management and Security Assurance. DPM QASA 2016 2016. Lecture Notes in Computer Science(), vol 9963. Springer, Cham. https://doi.org/10.1007/978-3-319-47072-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47072-6_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47071-9

  • Online ISBN: 978-3-319-47072-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics