4.5 Article

A uniformization-based approach to preserve individuals' privacy during process mining analyses

期刊

PEER-TO-PEER NETWORKING AND APPLICATIONS
卷 14, 期 3, 页码 1500-1519

出版社

SPRINGER
DOI: 10.1007/s12083-020-01059-1

关键词

Process mining; Privacy; Privacy-preserving process mining; Distribution-based attacks; Uniformization strategies

资金

  1. Government of Catalonia (GC) [2017-DI-002, 2017-SGR-896]
  2. Fundacio PuntCAT with the Vinton Cerf Distinction
  3. Spanish Ministry of Science Technology [RTI2018-095499-B-C32]
  4. EU [832735]

向作者/读者索取更多资源

The article introduces the concept of Privacy-Preserving Process Mining (PPPM) and presents a novel privacy-preserving technique u-PPPM to protect personal privacy while minimizing information loss. Experimental results demonstrate the feasibility of this technique in real settings.
Process Mining is a set of techniques that aim at discovering, monitoring and improving real processes by using logs of events created and stored by corporate information systems. The growing use of information and communication technologies and the imminent wide deployment of the Internet of Things enable the massive collection of events, which are going to be studied so as to improve all kinds of systems efficiency. Despite its enormous benefits, analyzing event logs might endanger individuals privacy, especially when those logs contain personal and confidential information, such as healthcare data. This article contributes to an emerging research direction within the process mining field, known as Privacy-Preserving Process Mining (PPPM), which embraces the privacy-by-design principle when conducting process mining analyses. We show that current solutions based on pseudonyms and encryption are vulnerable to attacks based on the analysis of the distribution of events combined with well-known location-oriented attacks such as the restricted space identification and the object identification attacks. With the aim to counteract these attacks, we present u-PPPM, a novel privacy-preserving process mining technique based on the uniformization of events distributions. This approach protects the privacy of the individuals appearing in event logs while minimizing the information loss during process discovery analyses. Experimental results, conducted using six real-life event logs, demonstrate the feasibility of our approach in real settings.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据