EconPapers    
Economics at your fingertips  
 

Privacy-Preserving Process Mining

Felix Mannhardt (), Agnes Koschmider (), Nathalie Baracaldo (), Matthias Weidlich () and Judith Michael ()
Additional contact information
Felix Mannhardt: SINTEF Digital
Agnes Koschmider: Kiel University
Nathalie Baracaldo: IBM Almaden Research Center
Matthias Weidlich: Humboldt-Universität zu Berlin
Judith Michael: RWTH Aachen University

Business & Information Systems Engineering: The International Journal of WIRTSCHAFTSINFORMATIK, 2019, vol. 61, issue 5, No 4, 595-614

Abstract: Abstract Privacy regulations for data can be regarded as a major driver for data sovereignty measures. A specific example for this is the case of event data that is recorded by information systems during the processing of entities in domains such as e-commerce or health care. Since such data, typically available in the form of event log files, contains personalized information on the specific processed entities, it can expose sensitive information that may be traced back to individuals. In recent years, a plethora of methods have been developed to analyse event logs under the umbrella of process mining. However, the impact of privacy regulations on the technical design as well as the organizational application of process mining has been largely neglected. This paper set out to develop a protection model for event data privacy which applies the well-established notion of differential privacy. Starting from common assumptions about the event logs used in process mining, this paper presents potential privacy leakages and means to protect against them. The paper also shows at which stages of privacy leakages a protection model for event logs should be used. Relying on this understanding, the notion of differential privacy for process discovery methods is instantiated, i.e., algorithms that aim at the construction of a process model from an event log. The general feasibility of our approach is demonstrated by its application to two publicly available real-life events logs.

Keywords: Differential privacy; Process mining; Event logs; Data protection; Data sovereignty (search for similar items in EconPapers)
Date: 2019
References: View complete reference list from CitEc
Citations: View citations in EconPapers (3)

Downloads: (external link)
http://link.springer.com/10.1007/s12599-019-00613-3 Abstract (text/html)
Access to the full text of the articles in this series is restricted.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:binfse:v:61:y:2019:i:5:d:10.1007_s12599-019-00613-3

Ordering information: This journal article can be ordered from
http://www.springer.com/economics/journal/12599

DOI: 10.1007/s12599-019-00613-3

Access Statistics for this article

Business & Information Systems Engineering: The International Journal of WIRTSCHAFTSINFORMATIK is currently edited by Martin Bichler

More articles in Business & Information Systems Engineering: The International Journal of WIRTSCHAFTSINFORMATIK from Springer, Gesellschaft für Informatik e.V. (GI)
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-03-20
Handle: RePEc:spr:binfse:v:61:y:2019:i:5:d:10.1007_s12599-019-00613-3