2021
DOI: 10.1145/3468877
|View full text |Cite
|
Sign up to set email alerts
|

Privacy and Confidentiality in Process Mining: Threats and Research Challenges

Abstract: Privacy and confidentiality are very important prerequisites for applying process mining to comply with regulations and keep company secrets. This article provides a foundation for future research on privacy-preserving and confidential process mining techniques. Main threats are identified and related to a motivation application scenario in a hospital context as well as to the current body of work on privacy and confidentiality in process mining. A newly developed conceptual model structures the discussion tha… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 29 publications
(13 citation statements)
references
References 47 publications
0
13
0
Order By: Relevance
“…Please note that we use protection here in the sense of anononymity and unlinkability requirements. Next to those, other requirements such as notice, transparency, and accountability are often imposed by regulations [45]. Note that most privacy-preserving techniques differ from the wide variety of best-effort pseudonymization, perturbation, and generalization Fig.…”
Section: Process Mining Perspectivementioning
confidence: 99%
See 2 more Smart Citations
“…Please note that we use protection here in the sense of anononymity and unlinkability requirements. Next to those, other requirements such as notice, transparency, and accountability are often imposed by regulations [45]. Note that most privacy-preserving techniques differ from the wide variety of best-effort pseudonymization, perturbation, and generalization Fig.…”
Section: Process Mining Perspectivementioning
confidence: 99%
“…Several attacks on confidential data in event logs are possible. We follow Elkoumy et al [45] and focus on a honest-but-curious attacker scenario. An adversary has access to data or results and tries to identify some sensitive information without trying to break into systems.…”
Section: Threats and Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…AI is too important and too promising to be governed in a hands-off fashion, waiting for problems to develop and then trying to fix them after the fact". 6 3 The Proposed EU Regulation of AI On April 20, 2021 the European Commission released the proposal for the regulation of artificial intelligence 7 , the ambition of which is to balance the socioeconomic benefits of AI and new risks or negative consequences for individuals or society. The proposed Artificial Intelligence Act (AIA) takes a risk-based approach to regulate AI by fostering an "ecosystem of trust that should give citizens the confidence to take up AI applications and give companies and public organisations the legal certainty to innovate using AI".…”
Section: The Emergence Of Trustworthy Ai Principlesmentioning
confidence: 99%
“…However, providing each aspect of RDS has its own challenges from contextualizing the aspect to implementing it in data science and AI systems. In [6], the authors describe the challenges regarding the confidentiality aspect for process mining which combines process and data science. In the following, we provide the challenges regarding the fairness aspect.…”
Section: Responsible Data Science and Trustworthy Aimentioning
confidence: 99%