HCI Patterns for Cryptographically Equipped Cloud Services

Details

Serval ID
serval:BIB_148A39A7BD14
Type
Inproceedings: an article in a conference proceedings.
Collection
Publications
Institution
Title
HCI Patterns for Cryptographically Equipped Cloud Services
Title of the conference
Human-Computer Interaction. Theories, Methods, and Human Issues
Author(s)
Länger T., Alaqra A., Fischer-Hübner S., Framner E., Pettersson J.S., Riemer K.
Publisher
Springer International Publishing
ISBN
9783319912370
9783319912387
ISSN
0302-9743
1611-3349
Publication state
Published
Issued date
2018
Peer-reviewed
Oui
Pages
567-586
Language
english
Abstract
Recent cryptographic research has devised several new algorithms and protocols with a potential of mitigating several of the most ardent security and privacy threats, existing in currently available public cloud services. Nevertheless, such cryptographic schemes often exhibit counterintuitive functionality to end users, or they work differently to other already established traditional schemes with which users are already familiar. A practical solution to address these problems involves a human centered design approach, deriving Human Computer Interaction (HCI) requirements from consultations and extensive testing with experts, prospective end users, and other stakeholders. The European Horizon 2020 project PRISMACLOUD “Privacy and Security Maintaining Services for the Cloud” uses such an approach and provides HCI patterns as part of its proper cloud service development methodology CryptSDLC to communicate HCI requirements to cloud service designers and user interface implementers. In this article, we present several new cryptographic cloud services, e.g. for redacting digitally signed data, and for redundant storage and sharing of confidential data in a public cloud scenario, together with three example HCI patterns for specific interactions of end users with these services. We show how these patterns were elaborated and validated in practice to prove the suitability for their intended purpose. To summarize, we give an account on our practical experience during the actual prototype development and implementation and show how they constitute an essential element of the CryptSDLC development methodology.
Create date
27/06/2019 11:10
Last modification date
21/08/2019 6:17
Usage data