Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1007/978-3-031-17834-4_5guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Quantifying Temporal Privacy Leakage in Continuous Event Data Publishing

Published: 04 October 2022 Publication History

Abstract

Process mining employs event data extracted from different types of information systems to discover and analyze actual processes. Event data often contain highly sensitive information about the people who carry out activities or the people for whom activities are performed. Therefore, privacy concerns in process mining are receiving increasing attention. To alleviate privacy-related risks, several privacy preservation techniques have been proposed. Differential privacy is one of these techniques which provides strong privacy guarantees. However, the proposed techniques presume that event data are released in only one shot, whereas business processes are continuously executed. Hence, event data are published repeatedly, resulting in additional risks. In this paper, we demonstrate that continuously released event data are not independent, and the correlation among different releases can result in privacy degradation when the same differential privacy mechanism is applied to each release. We quantify such privacy degradation in the form of temporal privacy leakages. We apply continuous event data publishing scenarios to real-life event logs to demonstrate privacy leakages.

References

[2]
Cao Y, Yoshikawa M, Xiao Y, and Xiong L Quantifying differential privacy in continuous data release under temporal correlations IEEE Trans. Knowl. Data Eng. 2019 31 7 1281-1295
[3]
Chen R, Fung BCM, Yu PS, and Desai BC Correlated network data publication via differential privacy VLDB J. 2013 23 4 653-676
[4]
Dwork C Bugliesi M, Preneel B, Sassone V, and Wegener I Differential privacy Automata Lang. Program. 2006 Heidelberg Springer 1-12
[5]
Dwork, C.: Differential privacy: a survey of results. In: Theory and Applications of Models of Computation. In: 5th International Conference, TAMC 2008 (2008)
[6]
Dwork, C.: Differential privacy in new settings. In: SODA. SIAM (2010)
[7]
Dwork, C., Naor, M., Pitassi, T., Rothblum, G.N.: Differential privacy under continual observation. In: STOC, pp. 715–724. ACM (2010)
[8]
Elkoumy, G., et al.: Privacy and confidentiality in process mining: Threats and research challenges. ACM Trans. Manag. Inf. Syst. 13(1), 11:1–11:17 (2022)
[9]
Elkoumy, G., Pankova, A., Dumas, M.: Mine me but don’t single me out: Differentially private event logs for process mining. In: ICPM, pp. 80–87. IEEE (2021)
[10]
Fahrenkrog-Petersen SA, van der Aa H, and Weidlich M Fahland D, Ghidini C, Becker J, and Dumas M PRIPEL: Privacy-preserving event log publishing including contextual information Business Process Management 2020 Cham Springer 111-128
[11]
Fahrenkrog-Petersen, S.A., Kabierski, M., Rösel, F., van der Aa, H., Weidlich, M.: SaCoFa: Semantics-aware control-flow anonymization for process mining, In: ICPM, pp. 72–79. IEEE (2021)
[12]
Fan, L., Xiong, L., Sunderam, V.S.: FAST: differentially private real-time aggregate monitor with filtering and adaptive sampling. In: SIGMOD Conference, pp. 1065–1068. ACM (2013)
[13]
Fung, B.C., Wang, K., Fu, A.W.C., Philip, S.Y.: Introduction to privacy-preserving data publishing: Concepts and techniques. Chapman and Hall/CRC (2010)
[14]
Kellaris G, Papadopoulos S, Xiao X, and Papadias D Differentially private event sequences over infinite streams Proc. VLDB Endow. 2014 7 12 1155-1166
[15]
Mannhardt F, Koschmider A, Baracaldo N, Weidlich M, and Michael J Privacy-preserving process mining-differential privacy for event logs Bus. Inf. Syst. Eng. 2019 61 5 595-614
[16]
Rafiei M and van der Aalst WMP Leemans S and Leopold H Towards quantifying privacy in process mining Process Mining Workshops 2021 Cham Springer 385-397
[17]
Rafiei M and van der Aalst WMP Group-based privacy preservation techniques for process mining Data Knowl. Eng. 2021 134
[18]
Rafiei M and van der Aalst WMP Polyvyanyy A, Wynn MT, Van Looy A, and Reichert M Privacy-preserving continuous event data publishing Business Process Management Forum 2021 Cham Springer 178-194

Index Terms

  1. Quantifying Temporal Privacy Leakage in Continuous Event Data Publishing
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    Cooperative Information Systems: 28th International Conference, CoopIS 2022, Bozen-Bolzano, Italy, October 4–7, 2022, Proceedings
    Oct 2022
    346 pages
    ISBN:978-3-031-17833-7
    DOI:10.1007/978-3-031-17834-4

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 04 October 2022

    Author Tags

    1. Privacy preservation
    2. Differential privacy
    3. Process mining
    4. Privacy leakage
    5. Event data

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 0
      Total Downloads
    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 21 Nov 2024

    Other Metrics

    Citations

    View Options

    View options

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media