TY - GEN
T1 - Security and Privacy in Federated Process Mining
AU - Shaikh, Eman
AU - Mohammad, Nazeeruddin
AU - Tariq, Zeeshan
AU - McClean, Sally
PY - 2025/6/19
Y1 - 2025/6/19
N2 - In recent years, Process Mining (PM) has emerged as a transformative technology, enabling organisations to discover, analyse, and optimise their processes using event logs. Despite its widespread adoption, organisations, particularly those with complex structures and multiple subunits, often face significant challenges related to the sharing of raw event logs due to confidentiality concerns. To address this, Federated Process Mining (FPM) has been proposed as an innovative approach that facilitates collaborative process mining while preserving data privacy. However, for FPM to transition effectively from concept to real-world application, a thorough understanding of its security and privacy dimensions is crucial. This research delves into the critical aspects of securing and safeguarding privacy in FPM, identifying potential vulnerabilities, and proposing strategies to mitigate risks. By addressing these challenges, the study aims to enhance the reliability and trustworthiness of FPM as a robust solution for privacy-preserving process optimisation.
AB - In recent years, Process Mining (PM) has emerged as a transformative technology, enabling organisations to discover, analyse, and optimise their processes using event logs. Despite its widespread adoption, organisations, particularly those with complex structures and multiple subunits, often face significant challenges related to the sharing of raw event logs due to confidentiality concerns. To address this, Federated Process Mining (FPM) has been proposed as an innovative approach that facilitates collaborative process mining while preserving data privacy. However, for FPM to transition effectively from concept to real-world application, a thorough understanding of its security and privacy dimensions is crucial. This research delves into the critical aspects of securing and safeguarding privacy in FPM, identifying potential vulnerabilities, and proposing strategies to mitigate risks. By addressing these challenges, the study aims to enhance the reliability and trustworthiness of FPM as a robust solution for privacy-preserving process optimisation.
U2 - 10.1109/iclt63507.2024.11038637
DO - 10.1109/iclt63507.2024.11038637
M3 - Conference contribution
SN - 979-8-3315-1934-6
T3 - 2024 IEEE Consumer Life Tech (ICLT)
SP - 1
EP - 6
BT - 2024 IEEE Consumer Life Tech (ICLT)
PB - IEEE
T2 - 2024 IEEE Consumer Life Tech (ICLT)
Y2 - 11 December 2024 through 13 December 2024
ER -