Cargando…
Secure Multi-party Computation for Inter-organizational Process Mining
Process mining is a family of techniques for analyzing business processes based on event logs extracted from information systems. Mainstream process mining tools are designed for intra-organizational settings, insofar as they assume that an event log is available for processing as a whole. The use o...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7254557/ http://dx.doi.org/10.1007/978-3-030-49418-6_11 |
_version_ | 1783539564419219456 |
---|---|
author | Elkoumy, Gamal Fahrenkrog-Petersen, Stephan A. Dumas, Marlon Laud, Peeter Pankova, Alisa Weidlich, Matthias |
author_facet | Elkoumy, Gamal Fahrenkrog-Petersen, Stephan A. Dumas, Marlon Laud, Peeter Pankova, Alisa Weidlich, Matthias |
author_sort | Elkoumy, Gamal |
collection | PubMed |
description | Process mining is a family of techniques for analyzing business processes based on event logs extracted from information systems. Mainstream process mining tools are designed for intra-organizational settings, insofar as they assume that an event log is available for processing as a whole. The use of such tools for inter-organizational process analysis is hampered by the fact that such processes involve independent parties who are unwilling to, or sometimes legally prevented from, sharing detailed event logs with each other. In this setting, this paper proposes an approach for constructing and querying a common artifact used for process mining, namely the frequency and time-annotated Directly-Follows Graph (DFG), over multiple event logs belonging to different parties, in such a way that the parties do not share the event logs with each other. The proposal leverages an existing platform for secure multi-party computation, namely Sharemind. Since a direct implementation of DFG construction in Sharemind suffers from scalability issues, we propose to rely on vectorization of event logs and to employ a divide-and-conquer scheme for parallel processing of sub-logs. The paper reports on experiments that evaluate the scalability of the approach on real-life logs. |
format | Online Article Text |
id | pubmed-7254557 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
record_format | MEDLINE/PubMed |
spelling | pubmed-72545572020-05-28 Secure Multi-party Computation for Inter-organizational Process Mining Elkoumy, Gamal Fahrenkrog-Petersen, Stephan A. Dumas, Marlon Laud, Peeter Pankova, Alisa Weidlich, Matthias Enterprise, Business-Process and Information Systems Modeling Article Process mining is a family of techniques for analyzing business processes based on event logs extracted from information systems. Mainstream process mining tools are designed for intra-organizational settings, insofar as they assume that an event log is available for processing as a whole. The use of such tools for inter-organizational process analysis is hampered by the fact that such processes involve independent parties who are unwilling to, or sometimes legally prevented from, sharing detailed event logs with each other. In this setting, this paper proposes an approach for constructing and querying a common artifact used for process mining, namely the frequency and time-annotated Directly-Follows Graph (DFG), over multiple event logs belonging to different parties, in such a way that the parties do not share the event logs with each other. The proposal leverages an existing platform for secure multi-party computation, namely Sharemind. Since a direct implementation of DFG construction in Sharemind suffers from scalability issues, we propose to rely on vectorization of event logs and to employ a divide-and-conquer scheme for parallel processing of sub-logs. The paper reports on experiments that evaluate the scalability of the approach on real-life logs. 2020-05-05 /pmc/articles/PMC7254557/ http://dx.doi.org/10.1007/978-3-030-49418-6_11 Text en © Springer Nature Switzerland AG 2020 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Article Elkoumy, Gamal Fahrenkrog-Petersen, Stephan A. Dumas, Marlon Laud, Peeter Pankova, Alisa Weidlich, Matthias Secure Multi-party Computation for Inter-organizational Process Mining |
title | Secure Multi-party Computation for Inter-organizational Process Mining |
title_full | Secure Multi-party Computation for Inter-organizational Process Mining |
title_fullStr | Secure Multi-party Computation for Inter-organizational Process Mining |
title_full_unstemmed | Secure Multi-party Computation for Inter-organizational Process Mining |
title_short | Secure Multi-party Computation for Inter-organizational Process Mining |
title_sort | secure multi-party computation for inter-organizational process mining |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7254557/ http://dx.doi.org/10.1007/978-3-030-49418-6_11 |
work_keys_str_mv | AT elkoumygamal securemultipartycomputationforinterorganizationalprocessmining AT fahrenkrogpetersenstephana securemultipartycomputationforinterorganizationalprocessmining AT dumasmarlon securemultipartycomputationforinterorganizationalprocessmining AT laudpeeter securemultipartycomputationforinterorganizationalprocessmining AT pankovaalisa securemultipartycomputationforinterorganizationalprocessmining AT weidlichmatthias securemultipartycomputationforinterorganizationalprocessmining |