Security and Privacy in Federated Process Mining

Eman Shaikh, Nazeeruddin Mohammad, Zeeshan Tariq, Sally McClean

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In recent years, Process Mining (PM) has emerged as a transformative technology, enabling organisations to discover, analyse, and optimise their processes using event logs. Despite its widespread adoption, organisations, particularly those with complex structures and multiple subunits, often face significant challenges related to the sharing of raw event logs due to confidentiality concerns. To address this, Federated Process Mining (FPM) has been proposed as an innovative approach that facilitates collaborative process mining while preserving data privacy. However, for FPM to transition effectively from concept to real-world application, a thorough understanding of its security and privacy dimensions is crucial. This research delves into the critical aspects of securing and safeguarding privacy in FPM, identifying potential vulnerabilities, and proposing strategies to mitigate risks. By addressing these challenges, the study aims to enhance the reliability and trustworthiness of FPM as a robust solution for privacy-preserving process optimisation.
Original languageEnglish
Title of host publication2024 IEEE Consumer Life Tech (ICLT)
PublisherIEEE
Pages1-6
Number of pages6
ISBN (Electronic)979-8-3315-1933-9
ISBN (Print)979-8-3315-1934-6
DOIs
Publication statusPublished online - 19 Jun 2025
Event2024 IEEE Consumer Life Tech (ICLT) - Sydney, Australia
Duration: 11 Dec 202413 Dec 2024

Publication series

Name2024 IEEE Consumer Life Tech (ICLT)
PublisherIEEE Control Society

Conference

Conference2024 IEEE Consumer Life Tech (ICLT)
Country/TerritoryAustralia
CitySydney
Period11/12/2413/12/24

Fingerprint

Dive into the research topics of 'Security and Privacy in Federated Process Mining'. Together they form a unique fingerprint.

Cite this