Business process discovery as a service with event log privacy and access control over discovered models

被引:0
作者
de la Fuente-anaya, Hector A. [1 ,3 ]
Marin-Castro, Heidy M. [2 ]
Morales-Sandoval, Miguel [1 ]
Garcia-Hernandez, Jose Juan [3 ]
机构
[1] Inst Nacl Astrofis Opt & Electr, Tonantzintla 72840, Puebla, Mexico
[2] Univ Americas Puebla, Cholula 72810, Puebla, Mexico
[3] CINVESTAV Tamaulipas, Victoria 87138, Tamaulipas, Mexico
关键词
Process mining; Privacy preservation; Access control; Cryptography; Event log; Proxy re-encryption;
D O I
10.1007/s00607-024-01299-6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The information systems supporting business processes of organizations generate and collect a large number of records in event logs that are exploitable in process mining tasks (discovery, conformance and enhancement). Under a Big Data scenario, Process Mining as a Service (PMaaS) can be attractive for organizations to outsource the storage of event logs and the processing resources for process mining tasks to the cloud in the presence of large event logs. However, the Cloud Service Provider (CSP) may be honest but curious, thus posing security and privacy risks when event log data are sensitive or subject to data privacy laws and regulations. In this work, a cryptography-based method is presented that preserves the privacy of event log data outsourced to an untrusted CSP, which executes the process discovery task, the most common task in process mining. The method conveniently encrypts the event log on the data owner's side to enable the CSP to apply access control over the discovered models (encrypted) through proxy re-encryption. The proposed method is implemented as a software tool and validated and evaluated in terms of performance, scalability, and data utility using real medical (sensitive) data logs under recommended security levels. The results demonstrate the feasibility of the proposed approach to support Process Discovery as a Service (PDaaS), which enables privacy preservation and access control.
引用
收藏
页码:3603 / 3625
页数:23
相关论文
共 20 条
[1]   Split miner: automated discovery of accurate and simple business process models from event logs [J].
Augusto, Adriano ;
Conforti, Raffaele ;
Dumas, Marlon ;
La Rosa, Marcello ;
Polyvyanyy, Artem .
KNOWLEDGE AND INFORMATION SYSTEMS, 2019, 59 (02) :251-284
[2]   Privacy-preserving process mining: A microaggregation-based approach [J].
Batista, Edgar ;
Martinez-Balleste, Antoni ;
Solanas, Agusti .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 68
[3]  
Bellafqira R., 2017, ARXIV
[4]   PPSecS: Privacy-Preserving Secure Big Data Storage in a Cloud Environment [J].
Bouleghlimat, Imene ;
Boudouda, Souheila ;
Hacini, Salima .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024, 49 (03) :3225-3239
[5]   Toward an Anonymous Process Mining [J].
Burattin, Andrea ;
Conti, Mauro ;
Turato, Daniele .
2015 3RD INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD) AND INTERNATIONAL CONFERENCE ON OPEN AND BIG (OBD), 2015, :58-63
[6]   Privacy and Confidentiality in Process Mining: Threats and Research Challenges [J].
Elkoumy, Gamal ;
Fahrenkrog-Petersen, Stephan A. ;
Sani, Mohammadreza Fani ;
Koschmider, Agnes ;
Mannhardt, Felix ;
Von Voigt, Saskia Nunez ;
Rafiei, Majid ;
Von Waldthausen, Leopold .
ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS, 2022, 13 (01)
[7]  
Giry D., 2020, CRYPTOGRAPHIC KEY LE
[8]   A Review of Secure and Privacy-Preserving Medical Data Sharing [J].
Jin, Hao ;
Luo, Yan ;
Li, Peilong ;
Mathew, Jomol .
IEEE ACCESS, 2019, 7 :61656-61669
[9]  
Leemans Sander J. J., 2013, Application and Theory of Petri Nets and Concurrency. 34th International Conference, PETRI NETS 2013. Proceedings: LNCS 7927, P311, DOI 10.1007/978-3-642-38697-8_17
[10]   Updatable ElGamal Encryption Scheme with Forward and Backward Security for Cloud Storage [J].
Liu, Zhenhua ;
Gong, Jingwan ;
Ma, Yuanju ;
Niu, Yaxin ;
Wang, Baocang .
FRONTIERS IN CYBER SECURITY, FCS 2022, 2022, 1726 :324-345