2020
DOI: 10.1007/978-3-030-49435-3_16
|View full text |Cite
|
Sign up to set email alerts
|

Quantifying the Re-identification Risk of Event Logs for Process Mining

Abstract: Event logs recorded during the execution of business processes constitute a valuable source of information. Applying process mining techniques to them, event logs may reveal the actual process execution and enable reasoning on quantitative or qualitative process properties. However, event logs often contain sensitive information that could be related to individual process stakeholders through background information and cross-correlation. We therefore argue that, when publishing event logs, the risk of such re-… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 22 publications
0
10
0
Order By: Relevance
“…Protecting the privacy of individuals in event logs is difficult, as sequential event data is highly vulnerable to re-identification [42]. In fact, when assuming some background information, privacy leakages exists in the vast majority of presumably anonymous event logs that are used in the process mining community [42].…”
Section: Process Mining Perspectivementioning
confidence: 99%
See 1 more Smart Citation
“…Protecting the privacy of individuals in event logs is difficult, as sequential event data is highly vulnerable to re-identification [42]. In fact, when assuming some background information, privacy leakages exists in the vast majority of presumably anonymous event logs that are used in the process mining community [42].…”
Section: Process Mining Perspectivementioning
confidence: 99%
“…Protecting the privacy of individuals in event logs is difficult, as sequential event data is highly vulnerable to re-identification [42]. In fact, when assuming some background information, privacy leakages exists in the vast majority of presumably anonymous event logs that are used in the process mining community [42]. As events are linked together through a case, and often the traces in an event log are highly unique, already very limited background knowledge on some attributes or events can reveal the identity of an individual.…”
Section: Process Mining Perspectivementioning
confidence: 99%
“…Thus, the uniqueness of cases in an event log can indicate the risk of reidentification. It was shown in [52] that there is serious potential for privacy leaks in published event log data, as the vast majority of public research event logs contain many unique cases.…”
Section: Re-identification Threats (T1)mentioning
confidence: 99%
“…Pika et al [36] studied the impact of anonymization on process mining in healthcare without providing a concrete mechanism. In this line, Rafiei et al [40] provide privacy quantifications for both the disclosure risk and the utility loss and Nuñez von Voigt et al [52] quantify the re-identification risk resulted from the disclosure of event logs based on individual uniqueness. Both do not provide a solution.…”
Section: Current Workmentioning
confidence: 99%
See 1 more Smart Citation