4.6 Review

An Abstraction-Based Approach for Privacy-Aware Federated Process Mining

Related references

Note: Only part of the references are listed.
Proceedings Paper Computer Science, Artificial Intelligence

TraVaS: Differentially Private Trace Variant Selection for Process Mining

Majid Rafiei et al.

Summary: In the field of industrial process mining, the importance of privacy-preserving event data publication is increasing. However, the trade-off between data utility and privacy poses challenges. Existing research focuses on differentially private trace variant construction, but faces limitations such as complexity, fake variants, removal of frequent variants, and bounded variant length. This paper introduces a new approach using anonymized partition selection strategies to overcome these limitations and outperforms existing methods in terms of data utility and result preservation.

PROCESS MINING WORKSHOPS, ICPM 2022 (2023)

Article Computer Science, Information Systems

Privacy and Confidentiality in Process Mining: Threats and Research Challenges

Gamal Elkoumy et al.

Summary: This article highlights the significance of privacy and confidentiality in process mining and proposes challenges that need to be addressed in future research on privacy-preserving and confidential process mining techniques.

ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS (2022)

Proceedings Paper Computer Science, Artificial Intelligence

Libra: High-Utility Anonymization of Event Logs for Process Mining via Subsampling

Gamal Elkoumy et al.

Summary: Process mining techniques allow analysts to identify and evaluate process improvement opportunities based on event logs. However, the presence of private information in event logs poses a challenge to analysis. This paper introduces a differential privacy anonymization approach called Libra, which utilizes subsampling and noise injection to achieve a better privacy-utility tradeoff.

2022 4TH INTERNATIONAL CONFERENCE ON PROCESS MINING (ICPM 2022) (2022)

Proceedings Paper Computer Science, Information Systems

Quantifying Temporal Privacy Leakage in Continuous Event Data Publishing

Majid Rafiei et al.

Summary: Process mining uses event data from different information systems to analyze real processes, and privacy preservation is a key concern. This paper focuses on the privacy degradation issue in continuously released event data, and quantifies it in the form of temporal privacy leakages, showing the correlation among different releases.

COOPERATIVE INFORMATION SYSTEMS (COOPIS 2022) (2022)

Proceedings Paper Computer Science, Artificial Intelligence

Quantifying the Re-identification Risk in Published Process Models

Karim Maatouk et al.

Summary: Event logs are crucial for process mining operations, but releasing them may pose re-identification risks. This study proposes a method to quantify the risk for process trees annotated with frequencies by generating sample traces. The results indicate that there is still a significant risk, but it is often lower than that when releasing the original event log.

PROCESS MINING WORKSHOPS, ICPM 2021 (2022)

Article Computer Science, Information Systems

A uniformization-based approach to preserve individuals' privacy during process mining analyses

Edgar Batista et al.

Summary: The article introduces the concept of Privacy-Preserving Process Mining (PPPM) and presents a novel privacy-preserving technique u-PPPM to protect personal privacy while minimizing information loss. Experimental results demonstrate the feasibility of this technique in real settings.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2021)

Article Computer Science, Artificial Intelligence

Group-based privacy preservation techniques for process mining

Majid Rafiei et al.

Summary: Process mining techniques aim to improve processes using event data, but face challenges in preserving privacy. This study introduces an effective group-based privacy preservation technique for event data, which ensures both data utility and result utility.

DATA & KNOWLEDGE ENGINEERING (2021)

Proceedings Paper Computer Science, Artificial Intelligence

Federated Process Mining: Exploiting Event Data Across Organizational Boundaries

Wil M. P. van der Aalst

Summary: Federated process mining aims to address cross-organizational processes by mapping multiple organization-specific event logs into a single unified representation, enabling process improvement. In cases where organizations are not willing to share data, event log abstractions can be used, and federated process mining approaches can merge these abstractions to create an overall process view.

2021 IEEE INTERNATIONAL CONFERENCE ON SMART DATA SERVICES (SMDS 2021) (2021)

Proceedings Paper Business

Privacy-Preserving Continuous Event Data Publishing

Majid Rafiei et al.

Summary: Process mining helps organizations discover and analyze their actual processes, but extracted event data containing sensitive information need to be protected. Continuous publishing of anonymized event data may face attacks, indicating the importance of privacy preservation techniques.

BUSINESS PROCESS MANAGEMENT FORUM (BPM 2021) (2021)

Article Computer Science, Information Systems

Towards Comprehensive Support for Privacy Preservation Cross-Organization Business Process Mining

Cong Liu et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2019)

Article Computer Science, Information Systems

Privacy-Preserving Process Mining Differential Privacy for Event Logs

Felix Mannhardt et al.

BUSINESS & INFORMATION SYSTEMS ENGINEERING (2019)

Proceedings Paper Computer Science, Theory & Methods

PRETSA: Event Log Sanitization for Privacy-aware Process Discovery

Stephan A. Fahrenkrog-Petersen et al.

2019 INTERNATIONAL CONFERENCE ON PROCESS MINING (ICPM 2019) (2019)

Proceedings Paper Computer Science, Information Systems

User-Centered and Privacy-Driven Process Mining System Design for IoT

Judith Michael et al.

INFORMATION SYSTEMS ENGINEERING IN RESPONSIBLE INFORMATION SYSTEMS, CAISE FORUM 2019 (2019)

Review Computer Science, Artificial Intelligence

Process discovery from event data: Relating models and logs through abstractions

Wil M. P. van der Aalst

WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY (2018)

Proceedings Paper Engineering, Electrical & Electronic

Privacy Challenges for Process Mining in Human-centered Industrial Environments

Felix Mannhardt et al.

2018 14TH INTERNATIONAL CONFERENCE ON INTELLIGENT ENVIRONMENTS (IE 2018) (2018)

Proceedings Paper Computer Science, Hardware & Architecture

Toward an Anonymous Process Mining

Andrea Burattin et al.

2015 3RD INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD) AND INTERNATIONAL CONFERENCE ON OPEN AND BIG (OBD) (2015)

Article Computer Science, Artificial Intelligence

A formal modeling approach for supply chain event management

Rong Liu et al.

DECISION SUPPORT SYSTEMS (2007)

Article Computer Science, Artificial Intelligence

k-anonymity:: A model for protecting privacy

L Sweeney

INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS (2002)