
Drogkaris Prokopios
pdrogk@aegean.gr
+30 22730 82275
Privacy and Security in e-Government Information Systems
Prokopios Drogkaris holds a Diploma in Information and Communication Systems Engineering from the University of the Aegean, Greece, an MSc in Information Systems from City University London, UK and a Ph.D. in Privacy and Security in e-Governemtn Information Systems from the Department of Information and Communication Systems Engineering, University of the Aegean, Greece. He was also within University of Piraeus, Department of Digital Systems as a postdoc researcher under the supervision of Professor C. Lambrinoudakis. Currently he is an Expert in Network and Information Security at European Union Agency for Cybersecurity (ENISA) working in the areas of Privacy and Data Protection, Cybersecurity Certification and Trust Services.
He is an author of several scientific publications, an editorial board member in International Journal on Advances in Internet Technology, IARIA Publications and has served as a member on program and organizing committees at several scientific International and European conferences. His ORCID iD is: 0000-0001-9058-0077
His current research interests are in the areas of Information and Communication Systems Security and Privacy Enhancing Technologies (PET). He has participated in national research projects and studies and in European projects funded under the Seventh Framework Programme of the EC (DG Enterprise and Industry, DG Home Affairs).
Since 2010 he has worked as a Laboratory Assistant at the Department of Information Technology and Telecommunications, TEI Kalamata and in the Department of Electronic, Automation and Electronic Computer Systems, TEI Piraeus. Between 2011 and 2012 he has also served as a coordinator and a rapporteur for the public dialogue, at European level, for the Digital Agenda 2020 Trust and Security pillar.
Research Interests
- e-Goverment Privacy Issues
- e-Goverment Authentication Frameworks
- Privacy Enhancing Technologies
- Federated Identities Management (FIM)
- Digital Identity and Anonymity
- Web 2.0
- Cloud Computing
R&D Activities - National
- eGIF: The Greek eGovernment Authentication Framework (2007 - 2009), http://www.e-gif.gov.gr/
- Digital Greece 2020 - Trust & Security Group Raporteur (2010 - 2011), http://www.digitalgreece2020.gr/
- Comparative study of the European Union and Greece for trust and security. Deviations, performance indicators and recommendations for national action (2012)
- Secure & Privacy-Aware eGOvernment Services (SPAGOS) (2014 - 2015), http://research.icbnet.ntua.gr/spagos/home/
R&D Activities - InterNational
- European Commision Digital Agenda Assembly (DAE) Animator - Security Group Moderator (2012), http://www.digitalagenda12.eu/
- Development of Intelligent Sea Space surveillance system with the application of Array Camera and Sensor Networks (POSEIDON)” (2012-2013), http://www.poseidonproject.eu/
- European Commision Digital Agenda for Europe Going Local III Cuprus & Greece online animator (2012 - 2013) http://daa.ec.europa.eu/
- GCC: A CyberCrime Center of Excellence for Training, Research and Education in Greece (2013 - 2015) http://www.cybercc.gr/
- PACT: Public perception of security and privacy: Assessing knowledge, Collecting evidence, Translating research into action (2012-2014) http://www.projectpact.eu/
- HIT-GATE: Heterogeneous Interoperable Transportable GATEway for First-Responders (2012-2014) http://www.hit-gate.eu/
- CIISC-T2: Critical Instrastructure Improvement of Security Control against the Terrorist Threat (2013 - 2015) http://www.ciisct2.eu/
- P-REACT: Petty criminality diminution through search and analysis in multi-source video Capturing and archiving platform (2014-2016) www.p-react.eu
- UINFC2: Engaging Users in Preventing and FIghting Cybercrime (2014 - 2016) www.uinfc2.eu
Scientific And Professional Organizations Membership
- Member of Technical Chamber of Greece (T.E.E.)
- Member of Greek Computer Society (Ε.Π.Υ.)
- Member of OWASP (Open Web Application Security Project)
Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.
Journals
The appeal of e-Government users to retain control over their personal information, while making use of advanced governmental electronic services through interconnected and interoperable deployments, can be assisted by the incorporation of Privacy Policy and Preferences documents. This paper addresses the formulation of coherent and accurate Privacy Policies while preserving compliance with underlying legal and regulatory framework. Through the exploitation of existing governmental hierarchies, a multitier approach is proposed able to support diverge data needs and processing requests imposed by Service Providers. The incorporation of this approach into e-Government environments will reduce the administrative workload, imposed by the inclusion of Privacy Policy documents, promote the implementation and provision of user-centric and data privacy aware electronic services.
The evolvement of e-Government has raised users’ concerns on personal data disclosure and privacy threats as more and more information is released to various governmental service providers. This paper addresses the consideration of users who would wish to retain control over their personal information while using advanced governmental electronic services. Additionally, it proposes a simple, yet effective, architecture which promotes the employment of Privacy Policies and Preferences in modern e-Government environments. The aim is to simplify the provision of electronic services while preserving users’ personal data and information privacy.
Conferences
Big data is widely considered as the next big trend in e-Government environments but at the same time one of the most emerging and critical issues due to the challenges it imposes. The large amount of data being retained by governmental Service Providers that can be (potentially) exploited during Data Mining and analytics processes, include personal data and personally identifiable information, raising privacy concerns, mostly regarding data minimization and purpose limitation. This paper addresses the consideration of Central Government to aggregate information without revealing personal identifiers of individuals and proposes a privacy preserving methodology that can be easily incorporated into already deployed electronic services and e-Government frameworks through the adoption of scalable and adaptable salted hashing techniques.
The provision of advanced e-Government services has raised users’ concerns on personal data disclosure and privacy violation threats as more and more information is released to various governmental service providers. Towards this direction, the employment of Privacy Policies and Preferences has been proposed in an attempt to simplify the provision of electronic services while preserving users’ personal data and information privacy. This paper addresses the users’ need to create, manage and fine-tune their privacy preferences in a user friendly, yet efficient way. It presents a Graphical User Interface (GUI) that empowers them to articulate their preferences in machine readable format and resolve possible conflicts with Service Provider’s (SP) Privacy Policy, without being obliged to go through complex and nuanced XML documents or being familiar with privacy terminology. Users can now be confident that their personal data will be accessed, processed and transmitted according to their actual preferences. At the same time they will be aware of their privacy-related consequences, as a result of their selections.
Seamless and faultless operational conditions of multi stakeholder Critical Infrastructures (CIs) are of high importance for today’s societies on a global scale. Due to their population impact, attacks against their interconnected components can create serious damages and performance degradation which eventually can result in a societal crisis. Therefore it is crucial to effectively and timely protect these high performance - critical systems against any type of ma-licious cyber-physical intrusions. This can be realized by protecting CIs against threat consequences or by blocking threats to take place at an early stage and preventing further escalation or predicting threat occurrences and have the ability to rapidly react by eliminating its roots. In this paper a novel architecture is proposed in which these three ways of confronting with cyber – physical threats are combined using a novel semantics based risk methodology that relies on real time behavioral analysis. The final prototype provides the CI operator with a decision tool (DST) that imprints the proposed approach and which is capable of alerting on new unknown threats, generate suggestions of the required counter-actions and alert of probable threat existence. The implemented architecture has been tested and validated in a proof of concept scenario of an airport CI with simulated monitoring data.
Intercloud notion is gaining a lot of attention lately from both enterprise and academia, not only because of its benefits and expected results but also due to the challenges that it introduces regarding interoperability and standardisation. Identity management services are one of the main candidates to be outsourced into the Intercloud, since they are one of the most common services needed by companies and organisations. This paper addresses emerging identity management challenges that arise in intercloud formations, such as naming, identification, interoperability, identity life cycle management and single sign-on.
The appeals for interoperable and decentralized Electronic Identity Management are rapidly increasing, especially since their contribution towards interoperability across the entire “electronic” public sector, effective information sharing and simplified access to electronic services, is unquestioned. This paper presents an efficient and user-centric method for storing multiple users’ identifiers in X.509 digital certificates while preserving their confidentiality, allowing for interoperable user identification in environments where users cannot be identified by an all embracing unique identifier.
Modern e-Government environments across the public sector have achieved significant interoperability and coherence but are now in front of the next leap forward, which is the adaptation of Web 2.0 technologies. This transition towards e-Government 2.0 will not only improve participation, transparency and integration but it will also speed up the pace of innovation through collaboration and consultation. This paper presents an enhanced Greek e-Government Framework that fully incorporates Web 2.0 technologies along with an identification mechanism that retains compliance with existing authentication sub-framework taking into account the specific needs and requirements of the Greek Governmental Agencies.
Even though e-Government environments have achieved a certain interoperability level and coherence across public sector, there are several approaches, technologies and mechanisms that could aid these environments towards delivering more user-centric electronic services. This paper focuses on the aspect of identity management. More specifically it presents a framework that incorporates the notion of federation and federated identities in order to overcome the impediment of per-sector identifiers. Moreover, it provides Single Sign-On access to electronic services through the utilization of a linking mechanism. This framework has been based on the Greek Interoperability Framework and its specific requirements and limitations.
Modern e-Government environments adopt technologies that can support interoperability across the entire “electronic” public sector and thus new improved electronic services. At the same time new requirements are raised from the users. This paper presents ongoing research on a secure user data management architecture for e-Government environments. More specifically the utilization of Privacy Preferences and Privacy Policies along with the introduction of two entities responsible for administrating user documents and data management is proposed. The research work presented has been based on the Greek Interoperability Framework and it’s specific requirements and limitations.
It is widely accepted that electronic Government environments have caused a complete transformation of the way individuals, businesses and governmental agencies interact with central government. However, the acceptance and success of e-Government services largely depend on the level of trust and confidence developed by the users to the provided services and the overall system security. Thus the employment of the appropriate authentication framework is a crucial factor. This paper focuses on the way to determine the appropriate trust level of an electronic service. Specifically, it provides guidelines according to the data required for a transaction, as well as to the available authentication and registration mechanisms. Moreover, a Single Sign-On architecture is proposed, supporting a uniform authentication procedure that depends on the level of trust required by the service. In the aforementioned research work specific requirements and limitations for Greece have been taken into account.