Identifying the Context of Data Usage to Diagnose Privacy Issues through Process Mining

被引:0
作者
Mehr, Azadeh Sadat Mozafari [1 ]
de Carvalho, Renata M. [1 ]
van Dongen, Boudewijn [1 ]
机构
[1] Eindhoven Univ Technol, Dept Math & Comp Sci, Eindhoven, Netherlands
关键词
Privacy; Data privacy; Multi-perspective Analysis; Conformance Checking; Process Mining; CONFORMANCE CHECKING;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, data privacy issues are increasingly concerned by organisations and governments. Organisations often define a set of rules as privacy policies for protecting sensitive data of their business. Regulations like the European General Data Protection Regulation (GDPR) added another layer of importance to data security emphasizing personal data protection, making it not only a business requirement but also a legal requirement. Existing access control mechanisms are not sufficient for data protection. They are only preventive and cannot guarantee that data is accessed for the intended purposes. This paper presents the underlying theory of a novel approach for multi-perspective conformance checking which considers the process control-flow, data and privacy perspectives simultaneously. In addition to detecting deviations in each perspective, the approach is able to detect hidden deviations where non-conformity relates to either a combination of two or all three aspects of a business process. Moreover, by reconciling the process, data and privacy aspects, it can detect spurious data access and identify privacy infringements where data have been processed for unclear or secondary purposes by an authorised role. The approach has been implemented in the open source ProM framework and was evaluated through controlled experiments using synthetic and real logs.
引用
收藏
页码:123 / 151
页数:29
相关论文
共 21 条
[1]  
Adriansyah A, 2011, LECT NOTES BUS INF P, V66, P122
[2]  
Aggarwal Charu C., 2015, Data Mining: The Textbook, DOI [DOI 10.1007/978-3-319-14142-8, 10.1007/978-3-319-14142-8]
[3]   Linking data and process perspectives for conformance analysis [J].
Alizadeh, Mandi ;
Lu, Xixi ;
Fahland, Dirk ;
Zannone, Nicola ;
van der Aalst, Wil M. P. .
COMPUTERS & SECURITY, 2018, 73 :172-193
[4]  
[Anonymous], 2002, Workflow Management: Models, Methods, and Systems
[5]  
Carmona J., 2018, Conformance Checking-Relating Processes and Models
[6]   Software process validation: Quantitatively measuring the correspondence of a process to a model [J].
Cook, JE ;
Wolf, AL .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 1999, 8 (02) :147-176
[7]  
de Leoni Massimiliano, 2013, Business Process Management. 11th International Conference, BPM 2013. Proceedings: LNCS 8094, P113, DOI 10.1007/978-3-642-40176-3_10
[8]  
de Leoni M, 2012, LECT NOTES BUS INF P, V117, P48
[9]  
Mannhardt F., 2014, BALANCED MULTIPERSPE
[10]   Privacy-Preserving Process Mining Differential Privacy for Event Logs [J].
Mannhardt, Felix ;
Koschmider, Agnes ;
Baracaldo, Nathalie ;
Weidlich, Matthias ;
Michael, Judith .
BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2019, 61 (05) :595-614