Secure Conformance Checking using Token-based Replay and Homomorphic Encryption
Luis-Armando Rodríguez-Flores, Luciano García-Bañuelos, Abel Armas-Cervantes, Astrid-Monserrat Rivera-Partida
TLDR
This paper introduces a secure conformance checking method using token-based replay and homomorphic encryption to protect sensitive event logs.
Key contributions
- Introduces a secure conformance checking method for privacy-sensitive event logs.
- Utilizes homomorphic encryption to protect sensitive data during analysis.
- Adapts the token-based replay algorithm for secure process model verification.
- Demonstrates practicality through evaluation using a synthetic event log.
Why it matters
Traditional conformance checking requires access to sensitive event logs, posing privacy risks. This paper offers a solution by enabling secure analysis using homomorphic encryption, crucial for industries handling confidential data.
Original Abstract
Conformance checking, one of the main process mining operations, aims to identify discrepancies between a process model and an event log. The model represents the expected behaviour, whereas the event log represents the actual process behaviour as captured in information systems' records. Traditionally, the process model and the event log are both accessible to the business analyst performing the conformance checking. However, in some contexts the log's owner may want to protect critical or sensitive information in the log and still check its conformance with respect to a model belonging to another party. In this paper, we propose a secure approach to conformance checking based on the well-known token-based replay algorithm and homomorphic encryption. An evaluation is performed using a synthetic log, showing the practicality of the proposed technique.
📬 Weekly AI Paper Digest
Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.