Logo des Repositoriums
 

Privacy-Preserving Process Mining

dc.contributor.authorMannhardt, Felix
dc.contributor.authorKoschmider, Agnes
dc.contributor.authorBaracaldo, Nathalie
dc.contributor.authorWeidlich, Matthias
dc.contributor.authorMichael, Judith
dc.date.accessioned2019-10-31T20:56:11Z
dc.date.available2019-10-31T20:56:11Z
dc.date.issued2019
dc.description.abstractPrivacy regulations for data can be regarded as a major driver for data sovereignty measures. A specific example for this is the case of event data that is recorded by information systems during the processing of entities in domains such as e-commerce or health care. Since such data, typically available in the form of event log files, contains personalized information on the specific processed entities, it can expose sensitive information that may be traced back to individuals. In recent years, a plethora of methods have been developed to analyse event logs under the umbrella of process mining. However, the impact of privacy regulations on the technical design as well as the organizational application of process mining has been largely neglected. This paper set out to develop a protection model for event data privacy which applies the well-established notion of differential privacy. Starting from common assumptions about the event logs used in process mining, this paper presents potential privacy leakages and means to protect against them. The paper also shows at which stages of privacy leakages a protection model for event logs should be used. Relying on this understanding, the notion of differential privacy for process discovery methods is instantiated, i.e., algorithms that aim at the construction of a process model from an event log. The general feasibility of our approach is demonstrated by its application to two publicly available real-life events logs.de
dc.identifier.doi10.1007/s12599-019-00613-3
dc.identifier.pissn1867-0202
dc.identifier.urihttp://dx.doi.org/10.1007/s12599-019-00613-3
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/29644
dc.publisherSpringer
dc.relation.ispartofBusiness & Information Systems Engineering: Vol. 61, No. 5
dc.relation.ispartofseriesBusiness & Information Systems Engineering
dc.subjectData protection
dc.subjectData sovereignty
dc.subjectDifferential privacy
dc.subjectEvent logs
dc.subjectProcess mining
dc.titlePrivacy-Preserving Process Miningde
dc.typeText/Journal Article
gi.citation.endPage614
gi.citation.startPage595

Dateien