Privacy-Preserving Data Publishing in Process Mining

被引:17
|
作者
Rafiei, Majid [1 ]
van der Aalst, Wil M. P. [1 ]
机构
[1] Rhein Westfal TH Aachen, Chair Proc & Data Sci, Aachen, Germany
关键词
Responsible process mining; Privacy preservation; Privacy metadata; Process mining; Event logs; DIFFERENTIAL PRIVACY;
D O I
10.1007/978-3-030-58638-6_8
中图分类号
F [经济];
学科分类号
02 ;
摘要
Process mining aims to provide insights into the actual processes based on event data. These data are often recorded by information systems and are widely available. However, they often contain sensitive private information that should be analyzed responsibly. Therefore, privacy issues in process mining are recently receiving more attention. Privacy preservation techniques obviously need to modify the original data, yet, at the same time, they are supposed to preserve the data utility. Privacy-preserving transformations of the data may lead to incorrect or misleading analysis results. Hence, new infrastructures need to be designed for publishing the privacy-aware event data whose aim is to provide metadata regarding the privacy-related transformations on event data without revealing details of privacy preservation techniques or the protected information. In this paper, we provide formal definitions for the main anonymization operations, used by privacy models in process mining. These are used to create an infrastructure for recording the privacy metadata. We advocate the proposed privacy metadata in practice by designing a privacy extension for the XES standard and a general data structure for event data which are not in the form of standard event logs.
引用
收藏
页码:122 / 138
页数:17
相关论文
共 50 条
  • [41] HyObscure: Hybrid Obscuring for Privacy-Preserving Data Publishing
    Han, Xiao
    Yang, Yuncong
    Wu, Junjie
    Xiong, Hui
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 36 (08) : 3893 - 3905
  • [42] Privacy-Preserving Data Publishing Based On Utility Specification
    Tian, Hongwei
    Zhang, Weining
    2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, : 114 - 121
  • [43] On Privacy-Preserving Publishing of Spontaneous ADE Reporting Data
    Lin, Wen-Yang
    Yang, Duan-Chun
    2013 IEEE INTERNATIONAL CONFERENCE ON BIOINFORMATICS AND BIOMEDICINE (BIBM), 2013,
  • [44] Privacy-Preserving Data Publishing: A Survey of Recent Developments
    Fung, Benjamin C. M.
    Wang, Ke
    Chen, Rui
    Yu, Philip S.
    ACM COMPUTING SURVEYS, 2010, 42 (04)
  • [45] Privacy-preserving data mining in the malicious model
    Kantarcioglu, Murat
    Kardes, Onur
    International Journal of Information and Computer Security, 2008, 2 (04) : 353 - 375
  • [46] Logical Foundations of Privacy-Preserving Publishing of Linked Data
    Grau, Bernardo Cuenca
    Kostylev, Egor V.
    THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2016, : 943 - 949
  • [47] Research on Privacy-Preserving Technology of Data Mining
    Shen, Yanguang
    Han, Junrui
    HuiShao
    ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL II, PROCEEDINGS, 2009, : 612 - 614
  • [48] Research on distributed privacy-preserving data mining
    Jia, Zhe
    Pang, Lei
    Luo, Shoushan
    Xin, Yang
    Zhang, Miao
    Journal of Convergence Information Technology, 2012, 7 (01) : 356 - 367
  • [49] Privacy-preserving data mining in electronic surveys
    Zhan, J
    Matwin, S
    SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS, 2004, : 1179 - 1185
  • [50] Privacy-Preserving Data Mining for Smart Manufacturing
    Hu, Qianyu
    Chen, Ruimin
    Yang, Hui
    Kumara, Soundar
    SMART AND SUSTAINABLE MANUFACTURING SYSTEMS, 2020, 4 (02): : 99 - 120