Privacy-Preserving Process Mining
dc.contributor.author | Mannhardt, Felix | |
dc.contributor.author | Koschmider, Agnes | |
dc.contributor.author | Baracaldo, Nathalie | |
dc.contributor.author | Weidlich, Matthias | |
dc.contributor.author | Michael, Judith | |
dc.date.accessioned | 2019-10-31T20:56:11Z | |
dc.date.available | 2019-10-31T20:56:11Z | |
dc.date.issued | 2019 | |
dc.description.abstract | Privacy regulations for data can be regarded as a major driver for data sovereignty measures. A specific example for this is the case of event data that is recorded by information systems during the processing of entities in domains such as e-commerce or health care. Since such data, typically available in the form of event log files, contains personalized information on the specific processed entities, it can expose sensitive information that may be traced back to individuals. In recent years, a plethora of methods have been developed to analyse event logs under the umbrella of process mining. However, the impact of privacy regulations on the technical design as well as the organizational application of process mining has been largely neglected. This paper set out to develop a protection model for event data privacy which applies the well-established notion of differential privacy. Starting from common assumptions about the event logs used in process mining, this paper presents potential privacy leakages and means to protect against them. The paper also shows at which stages of privacy leakages a protection model for event logs should be used. Relying on this understanding, the notion of differential privacy for process discovery methods is instantiated, i.e., algorithms that aim at the construction of a process model from an event log. The general feasibility of our approach is demonstrated by its application to two publicly available real-life events logs. | de |
dc.identifier.doi | 10.1007/s12599-019-00613-3 | |
dc.identifier.pissn | 1867-0202 | |
dc.identifier.uri | http://dx.doi.org/10.1007/s12599-019-00613-3 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/29644 | |
dc.publisher | Springer | |
dc.relation.ispartof | Business & Information Systems Engineering: Vol. 61, No. 5 | |
dc.relation.ispartofseries | Business & Information Systems Engineering | |
dc.subject | Data protection | |
dc.subject | Data sovereignty | |
dc.subject | Differential privacy | |
dc.subject | Event logs | |
dc.subject | Process mining | |
dc.title | Privacy-Preserving Process Mining | de |
dc.type | Text/Journal Article | |
gi.citation.endPage | 614 | |
gi.citation.startPage | 595 |