Til hovedinnhold

Privacy-Preserving Process Mining: Differential Privacy for Event Logs

Privacy-Preserving Process Mining: Differential Privacy for Event Logs

Kategori
Tidsskriftspublikasjon
Sammendrag
Privacy regulations for data can be regarded as a major driver for data sovereignty measures. A specific example for this is the case of event data that is recorded by information systems during the processing of entities in domains such as e-commerce or health care. Since such data, typically available in the form of event log files, contains personalized information on the specific processed entities, it can expose sensitive information that may be traced back to individuals. In recent years, a plethora of methods have been developed to analyse event logs under the umbrella of process mining. However, the impact of privacy regulations on the technical design as well as the organizational application of process mining has been largely neglected. This paper set out to develop a protection model for event data privacy which applies the well-established notion of differential privacy. Starting from common assumptions about the event logs used in process mining, this paper presents potential privacy leakages and means to protect against them. The paper also shows at which stages of privacy leakages a protection model for event logs should be used. Relying on this understanding, the notion of differential privacy for process discovery methods is instantiated, i.e., algorithms that aim at the construction of a process model from an event log. The general feasibility of our approach is demonstrated by its application to two publicly available real-life events logs.
Språk
Engelsk
Forfatter(e)
  • Mannhardt Felix
  • Koschmider Agnes
  • Baracaldo Nathalie
  • Weidlich Matthias
  • Michael Judith
Institusjon(er)
  • SINTEF Digital / Teknologiledelse
  • Christian-Albrechts-Universität zu Kiel
  • IBM Research
  • Humboldt-Universität zu Berlin
  • Rheinisch-Westfälische Technische Hochschule Aachen
År
2019
Publisert i
Business & Information Systems Engineering
ISSN
1867-0202
Årgang
61
Hefte nr.
5
Side(r)
595 - 614
Eksterne ressurser