Privacy-Preserving Alpha Algorithm for Software Analysis

Conference Paper (2016)
Author(s)

G. Tillem (TU Delft - Cyber Security)

Z. Erkin (TU Delft - Cyber Security)

Reginald Lagendijk (TU Delft - Intelligent Systems)

Research Group
Cyber Security
Copyright
© 2016 G. Tillem, Z. Erkin, R.L. Lagendijk
More Info
expand_more
Publication Year
2016
Language
English
Copyright
© 2016 G. Tillem, Z. Erkin, R.L. Lagendijk
Research Group
Cyber Security
Pages (from-to)
136-143
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Validation in a big software system can be managed by analysis of its behaviour through occasionally collected event logs. Process mining is a technique to perform software validation by discovering process models from event logs or by checking the conformance of the logs to a process model. A well-known algorithm in process mining to discover process models is alpha algorithm. However, while utilising alpha algorithm is useful for software validation, the existence of some sensitive information in the log files may become a threat for the privacy of users. In this work, we propose a protocol for privacy-preserving alpha algorithm on encrypted data. Our protocol aims to generate process models for a software without leaking any information about its users. It achieves same computational complexity with the original algorithm despite the additional computation overhead.

Files

11312324.pdf
(pdf | 0.433 Mb)
License info not available