2020
DOI: 10.48550/arxiv.2012.01119
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Privacy-Preserving Directly-Follows Graphs: Balancing Risk and Utility in Process Mining

Gamal Elkoumy,
Alisa Pankova,
Marlon Dumas

Abstract: Process mining techniques enable organizations to analyze business process execution traces in order to identify opportunities for improving their operational performance. Oftentimes, such execution traces contain private information. For example, the execution traces of a healthcare process are likely to be privacy-sensitive. In such cases, organizations need to deploy Privacy-Enhancing Technologies (PETs) to strike a balance between the benefits they get from analyzing these data and the requirements imposed… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…In this regard, Mannhardt et al proposed a privacy protection engine based on , differential privacy [13], which theoretically ensures that personal information cannot be identified regardless of whether the attacker has background knowledge or not; Fahrenkprog-Petersen et al proposed a privacy-protected event log release Framework (PRIPEL) [14], which followed the principle of localized differential privacy and provided differential privacy guarantees at the case level rather than the entire log; Elkoumy focused on the utility loss caused by differential privacy methods, and proposed an optimized parameter setting method of  using utility-based estimation [15].…”
Section: A Mainstream Privacy Preserving Methodsmentioning
confidence: 99%
“…In this regard, Mannhardt et al proposed a privacy protection engine based on , differential privacy [13], which theoretically ensures that personal information cannot be identified regardless of whether the attacker has background knowledge or not; Fahrenkprog-Petersen et al proposed a privacy-protected event log release Framework (PRIPEL) [14], which followed the principle of localized differential privacy and provided differential privacy guarantees at the case level rather than the entire log; Elkoumy focused on the utility loss caused by differential privacy methods, and proposed an optimized parameter setting method of  using utility-based estimation [15].…”
Section: A Mainstream Privacy Preserving Methodsmentioning
confidence: 99%
“…As discussed, this neglects a process' semantics, leading to potentially low data utility and noise that can be easily recognized. For trace-variant queries, Elkoumy et al [25] further studied the relation between utility and risk, while the PRIPEL framework [26] uses trace-variant queries as a basis for privacy-preserving event log publishing.…”
Section: Related Workmentioning
confidence: 99%