Cargando…

Quantifying the Re-identification Risk of Event Logs for Process Mining: Empiricial Evaluation Paper

Event logs recorded during the execution of business processes constitute a valuable source of information. Applying process mining techniques to them, event logs may reveal the actual process execution and enable reasoning on quantitative or qualitative process properties. However, event logs often...

Descripción completa

Detalles Bibliográficos
Autores principales: Nuñez von Voigt, Saskia, Fahrenkrog-Petersen, Stephan A., Janssen, Dominik, Koschmider, Agnes, Tschorsch, Florian, Mannhardt, Felix, Landsiedel, Olaf, Weidlich, Matthias
Formato: Online Artículo Texto
Lenguaje:English
Publicado: 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7266437/
http://dx.doi.org/10.1007/978-3-030-49435-3_16
_version_ 1783541309137485824
author Nuñez von Voigt, Saskia
Fahrenkrog-Petersen, Stephan A.
Janssen, Dominik
Koschmider, Agnes
Tschorsch, Florian
Mannhardt, Felix
Landsiedel, Olaf
Weidlich, Matthias
author_facet Nuñez von Voigt, Saskia
Fahrenkrog-Petersen, Stephan A.
Janssen, Dominik
Koschmider, Agnes
Tschorsch, Florian
Mannhardt, Felix
Landsiedel, Olaf
Weidlich, Matthias
author_sort Nuñez von Voigt, Saskia
collection PubMed
description Event logs recorded during the execution of business processes constitute a valuable source of information. Applying process mining techniques to them, event logs may reveal the actual process execution and enable reasoning on quantitative or qualitative process properties. However, event logs often contain sensitive information that could be related to individual process stakeholders through background information and cross-correlation. We therefore argue that, when publishing event logs, the risk of such re-identification attacks must be considered. In this paper, we show how to quantify the re-identification risk with measures for the individual uniqueness in event logs. We also report on a large-scale study that explored the individual uniqueness in a collection of publicly available event logs. Our results suggest that potentially up to all of the cases in an event log may be re-identified, which highlights the importance of privacy-preserving techniques in process mining.
format Online
Article
Text
id pubmed-7266437
institution National Center for Biotechnology Information
language English
publishDate 2020
record_format MEDLINE/PubMed
spelling pubmed-72664372020-06-03 Quantifying the Re-identification Risk of Event Logs for Process Mining: Empiricial Evaluation Paper Nuñez von Voigt, Saskia Fahrenkrog-Petersen, Stephan A. Janssen, Dominik Koschmider, Agnes Tschorsch, Florian Mannhardt, Felix Landsiedel, Olaf Weidlich, Matthias Advanced Information Systems Engineering Article Event logs recorded during the execution of business processes constitute a valuable source of information. Applying process mining techniques to them, event logs may reveal the actual process execution and enable reasoning on quantitative or qualitative process properties. However, event logs often contain sensitive information that could be related to individual process stakeholders through background information and cross-correlation. We therefore argue that, when publishing event logs, the risk of such re-identification attacks must be considered. In this paper, we show how to quantify the re-identification risk with measures for the individual uniqueness in event logs. We also report on a large-scale study that explored the individual uniqueness in a collection of publicly available event logs. Our results suggest that potentially up to all of the cases in an event log may be re-identified, which highlights the importance of privacy-preserving techniques in process mining. 2020-05-09 /pmc/articles/PMC7266437/ http://dx.doi.org/10.1007/978-3-030-49435-3_16 Text en © Springer Nature Switzerland AG 2020 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle Article
Nuñez von Voigt, Saskia
Fahrenkrog-Petersen, Stephan A.
Janssen, Dominik
Koschmider, Agnes
Tschorsch, Florian
Mannhardt, Felix
Landsiedel, Olaf
Weidlich, Matthias
Quantifying the Re-identification Risk of Event Logs for Process Mining: Empiricial Evaluation Paper
title Quantifying the Re-identification Risk of Event Logs for Process Mining: Empiricial Evaluation Paper
title_full Quantifying the Re-identification Risk of Event Logs for Process Mining: Empiricial Evaluation Paper
title_fullStr Quantifying the Re-identification Risk of Event Logs for Process Mining: Empiricial Evaluation Paper
title_full_unstemmed Quantifying the Re-identification Risk of Event Logs for Process Mining: Empiricial Evaluation Paper
title_short Quantifying the Re-identification Risk of Event Logs for Process Mining: Empiricial Evaluation Paper
title_sort quantifying the re-identification risk of event logs for process mining: empiricial evaluation paper
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7266437/
http://dx.doi.org/10.1007/978-3-030-49435-3_16
work_keys_str_mv AT nunezvonvoigtsaskia quantifyingthereidentificationriskofeventlogsforprocessminingempiricialevaluationpaper
AT fahrenkrogpetersenstephana quantifyingthereidentificationriskofeventlogsforprocessminingempiricialevaluationpaper
AT janssendominik quantifyingthereidentificationriskofeventlogsforprocessminingempiricialevaluationpaper
AT koschmideragnes quantifyingthereidentificationriskofeventlogsforprocessminingempiricialevaluationpaper
AT tschorschflorian quantifyingthereidentificationriskofeventlogsforprocessminingempiricialevaluationpaper
AT mannhardtfelix quantifyingthereidentificationriskofeventlogsforprocessminingempiricialevaluationpaper
AT landsiedelolaf quantifyingthereidentificationriskofeventlogsforprocessminingempiricialevaluationpaper
AT weidlichmatthias quantifyingthereidentificationriskofeventlogsforprocessminingempiricialevaluationpaper