A lightweight Encryption Method For Privacy-Preserving in Process Mining

04/07/2023
by   Mohsen Kazemian, et al.
0

Novel technological achievements in the fields of business intelligence, business management and data science are based on real-time and complex virtual networks. Sharing data between a large number of organizations that leads to a system with high computational complexity is one of the considerable characteristics of the current business networks. Discovery, conformance and enhancement of the business processes are performed using the generated event logs. In this regard, one of the overlooked challenges is privacy-preserving in the field of process mining in the industry. To preserve the data-privacy with a low computational complexity structure that is a necessity for the current digital business technology, a novel lightweight encryption method based on Haar transform and a private key is proposed in this paper. We compare the proposed method with the well-known homomorphic cryptosystem and Walsh- Hadamard encryption (WHE) in terms of cryptography, computational complexity and structure vulnerability. The analyses show that the proposed method anonymizes the event logs with the lower complexity and more accuracy compared with two aforementioned cryptosystems, significantly.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/04/2021

Privacy-Preserving Data Publishing in Process Mining

Process mining aims to provide insights into the actual processes based ...
research
11/13/2020

Practical Privacy-Preserving Data Science With Homomorphic Encryption: An Overview

Privacy has gained a growing interest nowadays due to the increasing and...
research
03/24/2020

Quantifying the Re-identification Risk of Event Logs for Process Mining

Event logs recorded during the execution of business processes constitut...
research
07/30/2021

PC4PM: A Tool for Privacy/Confidentiality Preservation in Process Mining

Process mining enables business owners to discover and analyze their act...
research
12/02/2020

Privacy-Preserving Directly-Follows Graphs: Balancing Risk and Utility in Process Mining

Process mining techniques enable organizations to analyze business proce...
research
04/21/2023

Mining Privacy-Preserving Association Rules based on Parallel Processing in Cloud Computing

With the onset of the Information Era and the rapid growth of informatio...
research
01/23/2019

Adaptive Quantum Image Encryption Method Based on Wavelet Transform

An adaptive quantum image encryption method based on wavelet transform i...

Please sign up or login with your details

Forgot password? Click here to reset