Quantifying Temporal Privacy Leakage in Continuous Event Data Publishing

08/03/2022
by   Majid Rafiei, et al.
0

Process mining employs event data extracted from different types of information systems to discover and analyze actual processes. Event data often contain highly sensitive information about the people who carry out activities or the people for whom activities are performed. Therefore, privacy concerns in process mining are receiving increasing attention. To alleviate privacy-related risks, several privacy preservation techniques have been proposed. Differential privacy is one of these techniques which provides strong privacy guarantees. However, the proposed techniques presume that event data are released in only one shot, whereas business processes are continuously executed. Hence, event data are published repeatedly, resulting in additional risks. In this paper, we demonstrate that continuously released event data are not independent, and the correlation among different releases can result in privacy degradation when the same differential privacy mechanism is applied to each release. We quantify such privacy degradation in the form of temporal privacy leakages. We apply continuous event data publishing scenarios to real-life event logs to demonstrate privacy leakages.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/21/2020

Towards Quantifying Privacy in Process Mining

Process mining employs event logs to provide insights into the actual pr...
research
05/25/2021

Privacy-Preserving Continuous Event Data Publishing

Process mining enables organizations to discover and analyze their actua...
research
03/22/2021

Privacy-aware Process Performance Indicators: Framework and Release Mechanisms

Process performance indicators (PPIs) are metrics to quantify the degree...
research
07/25/2019

Protecting Spatiotemporal Event Privacy in Continuous Location-Based Services

Location privacy-preserving mechanisms (LPPMs) have been extensively stu...
research
11/29/2017

Quantifying Differential Privacy in Continuous Data Release under Temporal Correlations

Differential Privacy (DP) has received increasing attention as a rigorou...
research
12/02/2020

Privacy-Preserving Directly-Follows Graphs: Balancing Risk and Utility in Process Mining

Process mining techniques enable organizations to analyze business proce...
research
03/29/2023

TraVaG: Differentially Private Trace Variant Generation Using GANs

Process mining is rapidly growing in the industry. Consequently, privacy...

Please sign up or login with your details

Forgot password? Click here to reset