Loading…

Differentially Private Inductive Miner

Protecting personal data about individuals, such as event traces in process mining, is an inherently difficult task since an event trace leaks information about the path in a process model that an individual has triggered. Yet, prior anonymization methods of event traces like k-anonymity or event lo...

Full description

Saved in:
Bibliographic Details
Published in:arXiv.org 2024-10
Main Authors: Schulze, Max, Zisgen, Yorck, Kirschte, Moritz, Mohammadi, Esfandiar, Koschmider, Agnes
Format: Article
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page
container_issue
container_start_page
container_title arXiv.org
container_volume
creator Schulze, Max
Zisgen, Yorck
Kirschte, Moritz
Mohammadi, Esfandiar
Koschmider, Agnes
description Protecting personal data about individuals, such as event traces in process mining, is an inherently difficult task since an event trace leaks information about the path in a process model that an individual has triggered. Yet, prior anonymization methods of event traces like k-anonymity or event log sanitization struggled to protect against such leakage, in particular against adversaries with sufficient background knowledge. In this work, we provide a method that tackles the challenge of summarizing sensitive event traces by learning the underlying process tree in a privacy-preserving manner. We prove via the so-called Differential Privacy (DP) property that from the resulting summaries no useful inference can be drawn about any personal data in an event trace. On the technical side, we introduce a differentially private approximation (DPIM) of the Inductive Miner. Experimentally, we compare our DPIM with the Inductive Miner on 14 real-world event traces by evaluating well-known metrics: fitness, precision, simplicity, and generalization. The experiments show that our DPIM not only protects personal data but also generates faithful process trees that exhibit little utility loss above the Inductive Miner.
doi_str_mv 10.48550/arxiv.2407.04595
format article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_3076831670</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3076831670</sourcerecordid><originalsourceid>FETCH-LOGICAL-a520-f3e921296815dd6b0a0c18ce9f724c38c0a5e8704bee38b7b0c44099b846d42c3</originalsourceid><addsrcrecordid>eNotzctKAzEUgOEgCJbaB-huQHA348nJfSn10kLFLrovSeYEUoapZi7o2yvo6t99P2NrDo20SsGDL195blCCaUAqp67YAoXgtZWIN2w1DGcAQG1QKbFg9085JSrUj9l33Xd1KHn2I1W7vp3imGeq3nJP5ZZdJ98NtPrvkh1fno-bbb1_f91tHve1Vwh1EuSQo9OWq7bVATxEbiO5ZFBGYSN4RdaADETCBhMgSgnOBSt1KzGKJbv7Yz_K5XOiYTydL1Ppf48nAUZbwbUB8QP1_UDm</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3076831670</pqid></control><display><type>article</type><title>Differentially Private Inductive Miner</title><source>Publicly Available Content (ProQuest)</source><creator>Schulze, Max ; Zisgen, Yorck ; Kirschte, Moritz ; Mohammadi, Esfandiar ; Koschmider, Agnes</creator><creatorcontrib>Schulze, Max ; Zisgen, Yorck ; Kirschte, Moritz ; Mohammadi, Esfandiar ; Koschmider, Agnes</creatorcontrib><description>Protecting personal data about individuals, such as event traces in process mining, is an inherently difficult task since an event trace leaks information about the path in a process model that an individual has triggered. Yet, prior anonymization methods of event traces like k-anonymity or event log sanitization struggled to protect against such leakage, in particular against adversaries with sufficient background knowledge. In this work, we provide a method that tackles the challenge of summarizing sensitive event traces by learning the underlying process tree in a privacy-preserving manner. We prove via the so-called Differential Privacy (DP) property that from the resulting summaries no useful inference can be drawn about any personal data in an event trace. On the technical side, we introduce a differentially private approximation (DPIM) of the Inductive Miner. Experimentally, we compare our DPIM with the Inductive Miner on 14 real-world event traces by evaluating well-known metrics: fitness, precision, simplicity, and generalization. The experiments show that our DPIM not only protects personal data but also generates faithful process trees that exhibit little utility loss above the Inductive Miner.</description><identifier>EISSN: 2331-8422</identifier><identifier>DOI: 10.48550/arxiv.2407.04595</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Personal information ; Privacy</subject><ispartof>arXiv.org, 2024-10</ispartof><rights>2024. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/3076831670?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>776,780,25732,27904,36991,44569</link.rule.ids></links><search><creatorcontrib>Schulze, Max</creatorcontrib><creatorcontrib>Zisgen, Yorck</creatorcontrib><creatorcontrib>Kirschte, Moritz</creatorcontrib><creatorcontrib>Mohammadi, Esfandiar</creatorcontrib><creatorcontrib>Koschmider, Agnes</creatorcontrib><title>Differentially Private Inductive Miner</title><title>arXiv.org</title><description>Protecting personal data about individuals, such as event traces in process mining, is an inherently difficult task since an event trace leaks information about the path in a process model that an individual has triggered. Yet, prior anonymization methods of event traces like k-anonymity or event log sanitization struggled to protect against such leakage, in particular against adversaries with sufficient background knowledge. In this work, we provide a method that tackles the challenge of summarizing sensitive event traces by learning the underlying process tree in a privacy-preserving manner. We prove via the so-called Differential Privacy (DP) property that from the resulting summaries no useful inference can be drawn about any personal data in an event trace. On the technical side, we introduce a differentially private approximation (DPIM) of the Inductive Miner. Experimentally, we compare our DPIM with the Inductive Miner on 14 real-world event traces by evaluating well-known metrics: fitness, precision, simplicity, and generalization. The experiments show that our DPIM not only protects personal data but also generates faithful process trees that exhibit little utility loss above the Inductive Miner.</description><subject>Personal information</subject><subject>Privacy</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNotzctKAzEUgOEgCJbaB-huQHA348nJfSn10kLFLrovSeYEUoapZi7o2yvo6t99P2NrDo20SsGDL195blCCaUAqp67YAoXgtZWIN2w1DGcAQG1QKbFg9085JSrUj9l33Xd1KHn2I1W7vp3imGeq3nJP5ZZdJ98NtPrvkh1fno-bbb1_f91tHve1Vwh1EuSQo9OWq7bVATxEbiO5ZFBGYSN4RdaADETCBhMgSgnOBSt1KzGKJbv7Yz_K5XOiYTydL1Ppf48nAUZbwbUB8QP1_UDm</recordid><startdate>20241004</startdate><enddate>20241004</enddate><creator>Schulze, Max</creator><creator>Zisgen, Yorck</creator><creator>Kirschte, Moritz</creator><creator>Mohammadi, Esfandiar</creator><creator>Koschmider, Agnes</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20241004</creationdate><title>Differentially Private Inductive Miner</title><author>Schulze, Max ; Zisgen, Yorck ; Kirschte, Moritz ; Mohammadi, Esfandiar ; Koschmider, Agnes</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a520-f3e921296815dd6b0a0c18ce9f724c38c0a5e8704bee38b7b0c44099b846d42c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Personal information</topic><topic>Privacy</topic><toplevel>online_resources</toplevel><creatorcontrib>Schulze, Max</creatorcontrib><creatorcontrib>Zisgen, Yorck</creatorcontrib><creatorcontrib>Kirschte, Moritz</creatorcontrib><creatorcontrib>Mohammadi, Esfandiar</creatorcontrib><creatorcontrib>Koschmider, Agnes</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content (ProQuest)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering collection</collection><jtitle>arXiv.org</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Schulze, Max</au><au>Zisgen, Yorck</au><au>Kirschte, Moritz</au><au>Mohammadi, Esfandiar</au><au>Koschmider, Agnes</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Differentially Private Inductive Miner</atitle><jtitle>arXiv.org</jtitle><date>2024-10-04</date><risdate>2024</risdate><eissn>2331-8422</eissn><abstract>Protecting personal data about individuals, such as event traces in process mining, is an inherently difficult task since an event trace leaks information about the path in a process model that an individual has triggered. Yet, prior anonymization methods of event traces like k-anonymity or event log sanitization struggled to protect against such leakage, in particular against adversaries with sufficient background knowledge. In this work, we provide a method that tackles the challenge of summarizing sensitive event traces by learning the underlying process tree in a privacy-preserving manner. We prove via the so-called Differential Privacy (DP) property that from the resulting summaries no useful inference can be drawn about any personal data in an event trace. On the technical side, we introduce a differentially private approximation (DPIM) of the Inductive Miner. Experimentally, we compare our DPIM with the Inductive Miner on 14 real-world event traces by evaluating well-known metrics: fitness, precision, simplicity, and generalization. The experiments show that our DPIM not only protects personal data but also generates faithful process trees that exhibit little utility loss above the Inductive Miner.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><doi>10.48550/arxiv.2407.04595</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier EISSN: 2331-8422
ispartof arXiv.org, 2024-10
issn 2331-8422
language eng
recordid cdi_proquest_journals_3076831670
source Publicly Available Content (ProQuest)
subjects Personal information
Privacy
title Differentially Private Inductive Miner
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-23T00%3A43%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Differentially%20Private%20Inductive%20Miner&rft.jtitle=arXiv.org&rft.au=Schulze,%20Max&rft.date=2024-10-04&rft.eissn=2331-8422&rft_id=info:doi/10.48550/arxiv.2407.04595&rft_dat=%3Cproquest%3E3076831670%3C/proquest%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-a520-f3e921296815dd6b0a0c18ce9f724c38c0a5e8704bee38b7b0c44099b846d42c3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=3076831670&rft_id=info:pmid/&rfr_iscdi=true