In e-democracy, e-participation represents a key component, as it is the way to adapt government decisions to the real expectations of citizens. The availability of information-communication technologies represents the basis for the implementation of concrete plans of citizens' participation to the government of the community. However, there is a non trivial trade-off to manage, between security and privacy needs and opinion analysis opportunities. Indeed, whereas we have to guarantee that the action of citizens is kept anonymous, relating opinions to information about people allows the government management to coherently orient the executive action. In this paper, we present a solution of the above trade-off, by proposing a framework relying on existing social networks and working through cryptographic protocols able to ensure citizens' anonymity yet enabling opinion analysis. A careful security analysis and the addressing of the main implementation issues make the proposal ready to a secure and feasible adoption in real-life contexts.

A privacy-preserving e-participation framework allowing citizen opinion analysis

Fotia L.;
2015-01-01

Abstract

In e-democracy, e-participation represents a key component, as it is the way to adapt government decisions to the real expectations of citizens. The availability of information-communication technologies represents the basis for the implementation of concrete plans of citizens' participation to the government of the community. However, there is a non trivial trade-off to manage, between security and privacy needs and opinion analysis opportunities. Indeed, whereas we have to guarantee that the action of citizens is kept anonymous, relating opinions to information about people allows the government management to coherently orient the executive action. In this paper, we present a solution of the above trade-off, by proposing a framework relying on existing social networks and working through cryptographic protocols able to ensure citizens' anonymity yet enabling opinion analysis. A careful security analysis and the addressing of the main implementation issues make the proposal ready to a secure and feasible adoption in real-life contexts.
2015
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11386/4786076
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 10
  • ???jsp.display-item.citation.isi??? ND
social impact