Toward an Anonymous Process Mining

被引:20
作者
Burattin, Andrea [1 ]
Conti, Mauro [2 ]
Turato, Daniele [3 ]
机构
[1] Univ Innsbruck, A-6020 Innsbruck, Austria
[2] Univ Padua, Dept Math, I-35100 Padua, Italy
[3] Siav SpA, Sarmeola di Rubano, Italy
来源
2015 3RD INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD) AND INTERNATIONAL CONFERENCE ON OPEN AND BIG (OBD) | 2015年
关键词
Data extraction; Anonymization; Process mining; Privacy;
D O I
10.1109/FiCloud.2015.9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Process mining is a modern family of techniques applied to datasets generated from business processes run in organizations, in order to improve and obtain useful insights and performance measurements on the processes themselves (with clear societal and economical benefits). While these techniques are very promising in understanding business processes, their complete and efficient implementation inside the organizations is often not possible. Hence, in a way similar to what is done for most non core activities, and in particular for most ICT services, companies evaluate the possibility of outsourcing such task. However, the confidentiality of the dataset related to the business processes are often key assets for most of modern companies. Then, in order to avoid threats that might come from disclosing such information, most companies decide not to benefit from these process mining techniques. In this work, we propose a possible approach toward a complete solution which allows outsourcing of Process Mining without thwarting the confidentiality of the dataset and processes. Furthermore, we provide a prototype implementation of our proposed approach and run several experiments that confirmed the feasibility of our approach. We believe the one highlighted in this paper is an important direction to work on, in order to remove the obstacles that prevent companies to fully benefit from outsourcing process mining.
引用
收藏
页码:58 / 63
页数:6
相关论文
共 25 条
[1]  
[Anonymous], 2009, THESIS
[2]  
[Anonymous], 2004, IBM COOPERATION
[3]  
Burattin A., 2010, EUR S ART NEUR NETW
[4]  
Burattin A, 2015, LECT NOTES BUS INF P, V207, pV, DOI 10.1007/978-3-319-17482-2
[5]  
Daemen J., 1999, Aes Proposal: Rijndael
[6]  
Daemen J., 2002, The Design of Rijndael, V2
[7]  
Danezis G, 2009, LECT NOTES COMPUT SC, V5672, P56, DOI 10.1007/978-3-642-03168-7_4
[8]  
Danezis George., 2013, WPES, P49
[9]  
Datta A, 2012, LECT NOTES COMPUT SC, V7215, P229, DOI 10.1007/978-3-642-28641-4_13
[10]   A Survey of Homomorphic Encryption for Nonspecialists [J].
Fontaine, Caroline ;
Galand, Fabien .
EURASIP JOURNAL ON INFORMATION SECURITY, 2007, (01)