当前位置: X-MOL 学术Bus. Inf. Syst. Eng. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Privacy-Preserving Process Mining
Business & Information Systems Engineering ( IF 7.9 ) Pub Date : 2019-08-15 , DOI: 10.1007/s12599-019-00613-3
Felix Mannhardt , Agnes Koschmider , Nathalie Baracaldo , Matthias Weidlich , Judith Michael

Privacy regulations for data can be regarded as a major driver for data sovereignty measures. A specific example for this is the case of event data that is recorded by information systems during the processing of entities in domains such as e-commerce or health care. Since such data, typically available in the form of event log files, contains personalized information on the specific processed entities, it can expose sensitive information that may be traced back to individuals. In recent years, a plethora of methods have been developed to analyse event logs under the umbrella of process mining. However, the impact of privacy regulations on the technical design as well as the organizational application of process mining has been largely neglected. This paper set out to develop a protection model for event data privacy which applies the well-established notion of differential privacy. Starting from common assumptions about the event logs used in process mining, this paper presents potential privacy leakages and means to protect against them. The paper also shows at which stages of privacy leakages a protection model for event logs should be used. Relying on this understanding, the notion of differential privacy for process discovery methods is instantiated, i.e., algorithms that aim at the construction of a process model from an event log. The general feasibility of our approach is demonstrated by its application to two publicly available real-life events logs.

中文翻译:

隐私保护过程挖掘

数据隐私法规可以被视为数据主权措施的主要驱动力。一个具体的例子是信息系统在处理电子商务或医疗保健等领域的实体期间记录的事件数据。由于此类数据(通常以事件日志文件的形式提供)包含有关特定处理实体的个性化信息,因此可能会暴露可追溯到个人的敏感信息。近年来,在过程挖掘的保护伞下,已经开发了大量的方法来分析事件日志。然而,隐私法规对流程挖掘的技术设计和组织应用的影响在很大程度上被忽视了。本文着手开发一种事件数据隐私保护模型,该模型应用了完善的差异隐私概念。从流程挖掘中使用的事件日志的常见假设出发,本文提出了潜在的隐私泄漏和防止它们的方法。该论文还展示了应在隐私泄漏的哪个阶段使用事件日志保护模型。依赖于这种理解,流程发现方法的差分隐私概念被实例化,即旨在从事件日志构建流程模型的算法。我们的方法的一般可行性通过将其应用于两个公开可用的现实生活事件日志来证明。本文介绍了潜在的隐私泄露以及防止泄露的方法。该论文还展示了应在隐私泄漏的哪个阶段使用事件日志保护模型。依赖于这种理解,流程发现方法的差分隐私概念被实例化,即旨在从事件日志构建流程模型的算法。我们的方法在两个公开可用的真实事件日志中的应用证明了我们方法的一般可行性。本文介绍了潜在的隐私泄露以及防止泄露的方法。该论文还展示了应在隐私泄漏的哪个阶段使用事件日志保护模型。依赖于这种理解,流程发现方法的差分隐私概念被实例化,即旨在从事件日志构建流程模型的算法。我们的方法在两个公开可用的真实事件日志中的应用证明了我们方法的一般可行性。旨在从事件日志构建流程模型的算法。我们的方法在两个公开可用的真实事件日志中的应用证明了我们方法的一般可行性。旨在从事件日志构建流程模型的算法。我们的方法在两个公开可用的真实事件日志中的应用证明了我们方法的一般可行性。
更新日期:2019-08-15
down
wechat
bug