4.5 Article

Privacy-preserving process mining: A microaggregation-based approach

Journal

Publisher

ELSEVIER
DOI: 10.1016/j.jisa.2022.103235

Keywords

Privacy-preserving process mining; Process mining; Privacy preservation; Microaggregation; k-anonymity; Confidentiality; Anonymization

Funding

  1. MCIN/AEI [RTI2018-095499-B-C32]
  2. ERDF A way of making Europe
  3. Agncia de Gestio d'Ajuts Universitaris i de Recerca (AGAUR) [2017-DI-002, 2017-SGR-896, ACTUA 2020PANDE00103]
  4. Universitat Rovira i Virgili [2017PFR-URV-B2-41]
  5. European Commission (EU)
  6. LO-CARD project [832735]
  7. GoodBrother COST action [19121]

Ask authors/readers for more resources

The proper utilization of process mining techniques with large amounts of event data can lead to the discovery, monitoring, and improvement of business processes, enabling the development of more efficient business intelligence systems. However, privacy concerns arising from personal and confidential information within event data have not been adequately addressed in the field of process mining. This article presents a novel privacy-preserving process mining method called k-PPPM, which utilizes microaggregation techniques to achieve k-anonymity and protects targeted individuals from re-identification through attacks based on process model analysis and location-oriented attacks.
The proper exploitation of vast amounts of event data by means of process mining techniques enables the discovery, monitoring and improvement of business processes, allowing organizations to develop more efficient business intelligence systems. However, event data often contain personal and/or confidential information that, unless properly managed, may jeopardize people's privacy while conducting process mining analysis. Despite its relevance, privacy aspects have barely been considered within process mining, and the field of privacy-preserving process mining is still in an embryonic stage. With the aim to protect people's privacy, this article presents a novel privacy-preserving process mining method based on microaggregation techniques, called k-PPPM, that increases privacy in process mining through k-anonymity. Contrary to current solutions, mostly based on pseudonyms and encryption, this method averts the re-identification of targeted individuals from attacks based on the analysis of process models in combination with location-oriented attacks, such as Restricted Space Identification and Object Identification attacks. The proposed method provides adjustable parameters to tune different anonymization aspects. Six real-life event logs have been employed to evaluate the method in terms of process models quality and information loss.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available