Anonymous Credentials for privacy-preserving E-learning

被引:15
作者
Aimeur, Esma [1 ]
Hage, Hicham [1 ]
Serge, Flavien [1 ]
Onana, Mani [1 ]
机构
[1] Univ Montreal, Dept Informat & Rech Operat, Montreal, PQ H3C 3J7, Canada
来源
2008 INTERNATIONAL MCETECH CONFERENCE ON E-TECHNOLOGIES, PROCEEDINGS | 2007年
关键词
D O I
10.1109/MCETECH.2008.26
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
E-learning systems have made considerable progress within the last few years. Nonetheless, the issue of learner privacy has been practically ignored Existing E-learning standards offer some provisions for privacy and the security of E-learning systems offers some privacy protection, but remains unsatisfactory on several levels. On the other hand, privacy preserving solutions that are appropriate and used in E-commerce environments are inadequate and unsuitable to the context of E-learning. Indeed, while in most E-commerce applications different transactions between the client and the system are pretty much independent, in E-learning the interactions between the learner and system are intertwined into a developing process that depends heavily on the path the leaner is following. In this paper, we introduce the Anonymous Credentials for E-learning Systems (ACES), a set of protocols to preserve learner's privacy in E-learning environments. In particular, the ACES allows learners to provide anonymous credentials throughout the learning process, such as when they need to prove that they possess the necessary requirements to register for a course, and/or to prove that they are the legitimate owners of an Anonymous Transcript or an Anonymous Degree. Although the concept of anonymous credentials is not novel, ACES takes into account the specificities of E-learning. Moreover, in order to prevent the misuse of privacy, ACES prevents the possibility of sharing credentials between learners.
引用
收藏
页码:70 / 80
页数:11
相关论文
共 16 条
[1]  
AIMEUR E, 2007, JOINT ITRUST PST C P, P223
[2]  
Brands Stefan, 2000, Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy
[3]  
Camenisch J, 2001, LECT NOTES COMPUT SC, V2045, P93
[4]  
CHAUM D, 1987, LECT NOTES COMPUT SC, V263, P118
[5]  
CHAUM D, 1985, COMMUN ACM, V28, P1030, DOI 10.1145/4372.4373
[6]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[7]   Access control in a privacy-aware eLearning environment [J].
Franz, Elke ;
Wahrig, Hagen ;
Boettcher, Alexander ;
Borcea-Pfitzmann, Katrin .
FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, :879-+
[8]   Privacy provision in e-learning standardized systems: status and improvements [J].
Jerman-Blazic, B ;
Klobucar, T .
COMPUTER STANDARDS & INTERFACES, 2005, 27 (06) :561-578
[9]  
LIDONG C, 1995, INT C CRYPT POL ALG, P232
[10]  
Lysyanskaya A, 2000, LECT NOTES COMPUT SC, V1758, P184