Abstract
Validation in a big software system can be managed by analysis of its behaviour through occasionally collected event logs. Process mining is a technique to perform software validation by discovering process models from event logs or by checking the conformance of the logs to a process model. A well-known algorithm in process mining to discover process models is alpha algorithm. However, while utilising alpha algorithm is useful for software validation, the existence of some sensitive information in the log files may become a threat for the privacy of users. In this work, we propose a protocol for privacy-preserving alpha algorithm on encrypted data. Our protocol aims to generate process models for a software without leaking any information about its users. It achieves same computational complexity with the original algorithm despite the additional computation overhead.
Original language | English |
---|---|
Title of host publication | 37th WIC Symposium on Information Theory in the Benelux / 6th WIC/IEEE SP Symposium on Information Theory and Signal Processing in the Benelux |
Pages | 136-143 |
Number of pages | 8 |
Publication status | Published - 2016 |
Event | 37th WIC Symposium on Information Theory in the Benelux / 6th WIC/IEEE SP Symposium on Information Theory and Signal Processing in the Benelux - Université Catholique de Louvain, Louvain, Belgium Duration: 19 May 2016 → 20 May 2016 http://sites.uclouvain.be/sitb2016/ |
Conference
Conference | 37th WIC Symposium on Information Theory in the Benelux / 6th WIC/IEEE SP Symposium on Information Theory and Signal Processing in the Benelux |
---|---|
Country/Territory | Belgium |
City | Louvain |
Period | 19/05/16 → 20/05/16 |
Internet address |