2021
DOI: 10.48550/arxiv.2105.11983
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Group-Based Privacy Preservation Techniques for Process Mining

Abstract: Process mining techniques help to improve processes using event data. Such data are widely available in information systems. However, they often contain highly sensitive information. For example, healthcare information systems record event data that can be utilized by process mining techniques to improve the treatment process, reduce patient's waiting times, improve resource productivity, etc. However, the recorded event data include highly sensitive information related to treatment activities. Responsible pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…PRETSA [11] has been proposed as an algorithm to tackle this problem based on the privacy notions of k-anonymity and t-closeness. Similarly, Rafiei et al [24,23] proposed alternative techniques to ensure a group-based privacy guarantee, inspired by k-anonymity.…”
Section: Related Workmentioning
confidence: 99%
“…PRETSA [11] has been proposed as an algorithm to tackle this problem based on the privacy notions of k-anonymity and t-closeness. Similarly, Rafiei et al [24,23] proposed alternative techniques to ensure a group-based privacy guarantee, inspired by k-anonymity.…”
Section: Related Workmentioning
confidence: 99%
“…The TLKC-privacy application implements the TLKC-privacy model providing group-based privacy guarantees for process discovery and performance analysis. The TLKC-privacy extended application extends the TLKC-privacy model and considers all the main perspectives of process mining [3]. The anonymization operation application, implements all the main anonymization operations proposed in [9] including suppression, addition, substitution, condensation, swapping, generalization, and cryptography.…”
Section: Functionality and Characteristicsmentioning
confidence: 99%
“…Respect for privacy when analyzing personal data is also dictated by regulations, e.g., the European General Data Protection Regulation (GDPR) 1 . Such legitimate and ethical requirements have recently resulted in more attention to privacy and confidentiality issues in process mining [2,3,4,5]. Some tools have also been introduced to provide specific privacy/confidentiality requirements [6,7,8].…”
Section: Introductionmentioning
confidence: 99%