Loading…
Differentially Private Inductive Miner
Protecting personal data about individuals, such as event traces in process mining, is an inherently difficult task since an event trace leaks information about the path in a process model that an individual has triggered. Yet, prior anonymization methods of event traces like k-anonymity or event lo...
Saved in:
Published in: | arXiv.org 2024-10 |
---|---|
Main Authors: | , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | |
container_issue | |
container_start_page | |
container_title | arXiv.org |
container_volume | |
creator | Schulze, Max Zisgen, Yorck Kirschte, Moritz Mohammadi, Esfandiar Koschmider, Agnes |
description | Protecting personal data about individuals, such as event traces in process mining, is an inherently difficult task since an event trace leaks information about the path in a process model that an individual has triggered. Yet, prior anonymization methods of event traces like k-anonymity or event log sanitization struggled to protect against such leakage, in particular against adversaries with sufficient background knowledge. In this work, we provide a method that tackles the challenge of summarizing sensitive event traces by learning the underlying process tree in a privacy-preserving manner. We prove via the so-called Differential Privacy (DP) property that from the resulting summaries no useful inference can be drawn about any personal data in an event trace. On the technical side, we introduce a differentially private approximation (DPIM) of the Inductive Miner. Experimentally, we compare our DPIM with the Inductive Miner on 14 real-world event traces by evaluating well-known metrics: fitness, precision, simplicity, and generalization. The experiments show that our DPIM not only protects personal data but also generates faithful process trees that exhibit little utility loss above the Inductive Miner. |
doi_str_mv | 10.48550/arxiv.2407.04595 |
format | article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_3076831670</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3076831670</sourcerecordid><originalsourceid>FETCH-LOGICAL-a520-f3e921296815dd6b0a0c18ce9f724c38c0a5e8704bee38b7b0c44099b846d42c3</originalsourceid><addsrcrecordid>eNotzctKAzEUgOEgCJbaB-huQHA348nJfSn10kLFLrovSeYEUoapZi7o2yvo6t99P2NrDo20SsGDL195blCCaUAqp67YAoXgtZWIN2w1DGcAQG1QKbFg9085JSrUj9l33Xd1KHn2I1W7vp3imGeq3nJP5ZZdJ98NtPrvkh1fno-bbb1_f91tHve1Vwh1EuSQo9OWq7bVATxEbiO5ZFBGYSN4RdaADETCBhMgSgnOBSt1KzGKJbv7Yz_K5XOiYTydL1Ppf48nAUZbwbUB8QP1_UDm</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3076831670</pqid></control><display><type>article</type><title>Differentially Private Inductive Miner</title><source>Publicly Available Content (ProQuest)</source><creator>Schulze, Max ; Zisgen, Yorck ; Kirschte, Moritz ; Mohammadi, Esfandiar ; Koschmider, Agnes</creator><creatorcontrib>Schulze, Max ; Zisgen, Yorck ; Kirschte, Moritz ; Mohammadi, Esfandiar ; Koschmider, Agnes</creatorcontrib><description>Protecting personal data about individuals, such as event traces in process mining, is an inherently difficult task since an event trace leaks information about the path in a process model that an individual has triggered. Yet, prior anonymization methods of event traces like k-anonymity or event log sanitization struggled to protect against such leakage, in particular against adversaries with sufficient background knowledge. In this work, we provide a method that tackles the challenge of summarizing sensitive event traces by learning the underlying process tree in a privacy-preserving manner. We prove via the so-called Differential Privacy (DP) property that from the resulting summaries no useful inference can be drawn about any personal data in an event trace. On the technical side, we introduce a differentially private approximation (DPIM) of the Inductive Miner. Experimentally, we compare our DPIM with the Inductive Miner on 14 real-world event traces by evaluating well-known metrics: fitness, precision, simplicity, and generalization. The experiments show that our DPIM not only protects personal data but also generates faithful process trees that exhibit little utility loss above the Inductive Miner.</description><identifier>EISSN: 2331-8422</identifier><identifier>DOI: 10.48550/arxiv.2407.04595</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Personal information ; Privacy</subject><ispartof>arXiv.org, 2024-10</ispartof><rights>2024. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/3076831670?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>776,780,25732,27904,36991,44569</link.rule.ids></links><search><creatorcontrib>Schulze, Max</creatorcontrib><creatorcontrib>Zisgen, Yorck</creatorcontrib><creatorcontrib>Kirschte, Moritz</creatorcontrib><creatorcontrib>Mohammadi, Esfandiar</creatorcontrib><creatorcontrib>Koschmider, Agnes</creatorcontrib><title>Differentially Private Inductive Miner</title><title>arXiv.org</title><description>Protecting personal data about individuals, such as event traces in process mining, is an inherently difficult task since an event trace leaks information about the path in a process model that an individual has triggered. Yet, prior anonymization methods of event traces like k-anonymity or event log sanitization struggled to protect against such leakage, in particular against adversaries with sufficient background knowledge. In this work, we provide a method that tackles the challenge of summarizing sensitive event traces by learning the underlying process tree in a privacy-preserving manner. We prove via the so-called Differential Privacy (DP) property that from the resulting summaries no useful inference can be drawn about any personal data in an event trace. On the technical side, we introduce a differentially private approximation (DPIM) of the Inductive Miner. Experimentally, we compare our DPIM with the Inductive Miner on 14 real-world event traces by evaluating well-known metrics: fitness, precision, simplicity, and generalization. The experiments show that our DPIM not only protects personal data but also generates faithful process trees that exhibit little utility loss above the Inductive Miner.</description><subject>Personal information</subject><subject>Privacy</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNotzctKAzEUgOEgCJbaB-huQHA348nJfSn10kLFLrovSeYEUoapZi7o2yvo6t99P2NrDo20SsGDL195blCCaUAqp67YAoXgtZWIN2w1DGcAQG1QKbFg9085JSrUj9l33Xd1KHn2I1W7vp3imGeq3nJP5ZZdJ98NtPrvkh1fno-bbb1_f91tHve1Vwh1EuSQo9OWq7bVATxEbiO5ZFBGYSN4RdaADETCBhMgSgnOBSt1KzGKJbv7Yz_K5XOiYTydL1Ppf48nAUZbwbUB8QP1_UDm</recordid><startdate>20241004</startdate><enddate>20241004</enddate><creator>Schulze, Max</creator><creator>Zisgen, Yorck</creator><creator>Kirschte, Moritz</creator><creator>Mohammadi, Esfandiar</creator><creator>Koschmider, Agnes</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20241004</creationdate><title>Differentially Private Inductive Miner</title><author>Schulze, Max ; Zisgen, Yorck ; Kirschte, Moritz ; Mohammadi, Esfandiar ; Koschmider, Agnes</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a520-f3e921296815dd6b0a0c18ce9f724c38c0a5e8704bee38b7b0c44099b846d42c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Personal information</topic><topic>Privacy</topic><toplevel>online_resources</toplevel><creatorcontrib>Schulze, Max</creatorcontrib><creatorcontrib>Zisgen, Yorck</creatorcontrib><creatorcontrib>Kirschte, Moritz</creatorcontrib><creatorcontrib>Mohammadi, Esfandiar</creatorcontrib><creatorcontrib>Koschmider, Agnes</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content (ProQuest)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering collection</collection><jtitle>arXiv.org</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Schulze, Max</au><au>Zisgen, Yorck</au><au>Kirschte, Moritz</au><au>Mohammadi, Esfandiar</au><au>Koschmider, Agnes</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Differentially Private Inductive Miner</atitle><jtitle>arXiv.org</jtitle><date>2024-10-04</date><risdate>2024</risdate><eissn>2331-8422</eissn><abstract>Protecting personal data about individuals, such as event traces in process mining, is an inherently difficult task since an event trace leaks information about the path in a process model that an individual has triggered. Yet, prior anonymization methods of event traces like k-anonymity or event log sanitization struggled to protect against such leakage, in particular against adversaries with sufficient background knowledge. In this work, we provide a method that tackles the challenge of summarizing sensitive event traces by learning the underlying process tree in a privacy-preserving manner. We prove via the so-called Differential Privacy (DP) property that from the resulting summaries no useful inference can be drawn about any personal data in an event trace. On the technical side, we introduce a differentially private approximation (DPIM) of the Inductive Miner. Experimentally, we compare our DPIM with the Inductive Miner on 14 real-world event traces by evaluating well-known metrics: fitness, precision, simplicity, and generalization. The experiments show that our DPIM not only protects personal data but also generates faithful process trees that exhibit little utility loss above the Inductive Miner.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><doi>10.48550/arxiv.2407.04595</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | EISSN: 2331-8422 |
ispartof | arXiv.org, 2024-10 |
issn | 2331-8422 |
language | eng |
recordid | cdi_proquest_journals_3076831670 |
source | Publicly Available Content (ProQuest) |
subjects | Personal information Privacy |
title | Differentially Private Inductive Miner |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-23T00%3A43%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Differentially%20Private%20Inductive%20Miner&rft.jtitle=arXiv.org&rft.au=Schulze,%20Max&rft.date=2024-10-04&rft.eissn=2331-8422&rft_id=info:doi/10.48550/arxiv.2407.04595&rft_dat=%3Cproquest%3E3076831670%3C/proquest%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-a520-f3e921296815dd6b0a0c18ce9f724c38c0a5e8704bee38b7b0c44099b846d42c3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=3076831670&rft_id=info:pmid/&rfr_iscdi=true |