Towards Comprehensive Support for Privacy Preservation Cross-Organization Business Process Mining

More and more business requirements are crossing organizational boundaries. There comes the cross-organization business process management, and its modeling is a complicated task. Mining a cross-organization business process aims to discover its model from a set of distributed event logs. Unfortunately, traditional process mining approaches totally neglect the privacy-preservation issue, which means the privacy of both event log and business process model. In this paper, a privacy-preservation cross-organization business process mining framework is proposed to handle its privacy issues. It includes three steps: (1) each organization discovers its private and public business process models from its event logs; (2) the trusted third-party midware takes the public process models as input and generates cooperative public process model fragments of each organization; and (3) each organization combines its private business process model with its relevant public fragments to obtain the organization-specific cross-organization cooperative business process model. To illustrate the applicability of the proposed approach, a multi-modal cross-organization transportation case is used for its validation and comparison with other methods.

[1]  MengChu Zhou,et al.  Business and Scientific Workflows: A Web Service-Oriented Approach , 2013 .

[2]  MengChu Zhou,et al.  Modeling, Simulation, and Control of Flexible Manufacturing Systems - A Petri Net Approach , 1999, Series in Intelligent Control and Intelligent Automation.

[3]  Ping Wang,et al.  Cuckoo Search and Particle Filter-Based Inversing Approach to Estimating Defects via Magnetic Flux Leakage Signals , 2016, IEEE Transactions on Magnetics.

[4]  Qingtian Zeng,et al.  Modeling and Verification for Cross-Department Collaborative Business Processes Using Extended Petri Nets , 2015, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[5]  Hans-Arno Jacobsen,et al.  Process Discovery from Dependence-Complete Event Logs , 2016, IEEE Transactions on Services Computing.

[6]  Gu Si-yang,et al.  Privacy preserving association rule mining in vertically partitioned data , 2006 .

[7]  Andrew B. Whinston,et al.  Trusted Third Parties in the Electronic Marketplace: An Evolutionary Game Approach , 1999 .

[8]  Maria E. Orlowska,et al.  Facilitating cross-organisational workflows with a workflow view approach , 2004, Data Knowl. Eng..

[9]  Wil M. P. van der Aalst,et al.  Workflow mining: discovering process models from event logs , 2004, IEEE Transactions on Knowledge and Data Engineering.

[10]  Vidyaranya B. Gargeya,et al.  Success and failure factors of adopting SAP in ERP system implementation , 2005, Bus. Process. Manag. J..

[11]  Wil M. P. van der Aalst,et al.  Process Mining - Discovery, Conformance and Enhancement of Business Processes , 2011 .

[12]  Rik Eshuis,et al.  Constructing customized process views , 2008, Data Knowl. Eng..

[13]  Karl Aberer,et al.  CrossFlow: Cross-Organizational Workflow Management in Dynamic Virtual Enterprises , 2000 .

[14]  Qingtian Zeng,et al.  Invariant Decomposition Conditions for Petri Nets Based on the Index of Transitions , 2012 .

[15]  Lars Michael Kristensen,et al.  Coloured Petri Nets and CPN Tools for modelling and validation of concurrent systems , 2007, International Journal on Software Tools for Technology Transfer.

[16]  MengChu Zhou,et al.  Analysis and Application of Logical Petri Nets to E-Commerce Systems , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[17]  Ricardo Seguel,et al.  Process Mining Manifesto , 2011, Business Process Management Workshops.

[18]  Qingtian Zeng,et al.  Modeling and Analysis of Subway Fire Emergency Response: An Empirical Study , 2016 .

[19]  MengChu Zhou,et al.  Modeling Self-Adaptive Software Systems With Learning Petri Nets , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[20]  MengChu Zhou,et al.  Composite Particle Swarm Optimizer With Historical Memory for Function Optimization , 2015, IEEE Transactions on Cybernetics.

[21]  MengChu Zhou,et al.  Petri net synthesis for discrete event control of manufacturing systems , 1992, The Kluwer international series in engineering and computer science.

[22]  Wil M. P. van der Aalst,et al.  Mining Inter-organizational Business Process Models from EDI Messages: A Case Study from the Automotive Sector , 2012, CAiSE.

[23]  Qingtian Zeng,et al.  Resource conflict detection and removal strategy for nondeterministic emergency response processes using Petri nets , 2016, Enterp. Inf. Syst..

[24]  Jianmin Wang,et al.  A novel approach for process mining based on event types , 2007, IEEE International Conference on Services Computing (SCC 2007).

[25]  Wil M. P. van der Aalst,et al.  Process Mining: Overview and Opportunities , 2012, ACM Trans. Manag. Inf. Syst..

[26]  Qingtian Zeng,et al.  E-Net Modeling and Analysis of Emergency Response Processes Constrained by Resources and Uncertain Durations , 2015, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[27]  Qingtian Zeng,et al.  Process-Mining-Based Workflow Model Fragmentation for Distributed Execution , 2011, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[28]  MengChu Zhou,et al.  Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns , 2016, IEEE Transactions on Automation Science and Engineering.

[29]  Wil M. P. van der Aalst,et al.  Inheritance of workflows: an approach to tackling problems related to change , 2002 .

[30]  Weidong Zhao,et al.  Process Mining from the Organizational Perspective , 2014 .

[31]  MengChu Zhou,et al.  Modeling and Validating E-Commerce Business Process Based on Petri Nets , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[32]  Wil M. P. van der Aalst,et al.  The Application of Petri Nets to Workflow Management , 1998, J. Circuits Syst. Comput..

[33]  Qingtian Zeng,et al.  Classification and evaluation of timed running schemas for workflow based on process mining , 2009, J. Syst. Softw..

[34]  Changjun Jiang,et al.  Modeling and monitoring of E-commerce workflows , 2009, Inf. Sci..

[35]  Qingtian Zeng,et al.  Cross-organizational collaborative workflow mining from a multi-source log , 2013, Decis. Support Syst..

[36]  Liuqing Yang,et al.  Where does AlphaGo go: from church-turing thesis to AlphaGo thesis and beyond , 2016, IEEE/CAA Journal of Automatica Sinica.

[37]  MengChu Zhou,et al.  A Transaction and QoS-Aware Service Selection Approach Based on Genetic Algorithm , 2015, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[38]  W.M.P. van der Aalst,et al.  Business Process Management: A Comprehensive Survey , 2013 .

[39]  Gustavo Alonso,et al.  The WISE approach to Electronic Commerce , 2000 .

[40]  Samir Tata,et al.  The view-based approach to dynamic inter-organizational workflow cooperation , 2006, Data Knowl. Eng..

[41]  MengChu Zhou,et al.  An Incremental and Distributed Inference Method for Large-Scale Ontologies Based on MapReduce Paradigm , 2015, IEEE Transactions on Cybernetics.

[42]  Boudewijn F. van Dongen,et al.  XES, XESame, and ProM 6 , 2010, CAiSE Forum.

[43]  Jianqiang Li,et al.  Enforcing Differential Privacy for Shared Collaborative Filtering , 2017, IEEE Access.

[44]  Hua Duan,et al.  Petri Net Based Behavior Description of Cross-Organization Workflow with Synchronous Interaction Pattern , 2014 .

[45]  MengChu Zhou,et al.  A hybrid methodology for synthesis of Petri net models for manufacturing systems , 1992, IEEE Trans. Robotics Autom..

[46]  Wil M. P. van der Aalst,et al.  Loosely coupled interorganizational workflows: : modeling and analyzing workflows crossing organizational boundaries , 2000, Inf. Manag..

[47]  Geert Poels,et al.  Merging event logs for process mining: A rule based merging method and rule suggestion algorithm , 2014, Expert Syst. Appl..

[48]  MengChu Zhou,et al.  Swarm Intelligence Approaches to Optimal Power Flow Problem With Distributed Generator Failures in Power Networks , 2013, IEEE Transactions on Automation Science and Engineering.

[49]  Wil M. P. van der Aalst,et al.  Intra- and Inter-Organizational Process Mining: Discovering Processes within and between Organizations , 2011, PoEM.

[50]  Jiujun Cheng,et al.  Automatic Composition of Semantic Web Services Based on Fuzzy Predicate Petri Nets , 2015, IEEE Transactions on Automation Science and Engineering.

[51]  W.M.P. van der Aalst,et al.  Interorganizational workflows: An approach based on message sequence charts and petri nets , 1999 .

[52]  Wil M. P. van der Aalst,et al.  Multiparty Contracts: Agreeing and Implementing Interorganizational Processes , 2010, Comput. J..

[53]  M. Zhou,et al.  Gaussian Classifier-Based Evolutionary Strategy for Multimodal Optimization , 2014, IEEE Transactions on Neural Networks and Learning Systems.

[54]  Cong Liu,et al.  Modeling and Analysis for Cross-Organizational Emergency Response Systems Using Petri Nets: Modeling and Analysis for Cross-Organizational Emergency Response Systems Using Petri Nets , 2014 .

[55]  MengChu Zhou,et al.  An Incremental-and-Static-Combined Scheme for Matrix-Factorization-Based Collaborative Filtering , 2016, IEEE Transactions on Automation Science and Engineering.

[56]  Jianmin Wang,et al.  Mining process models with non-free-choice constructs , 2007, Data Mining and Knowledge Discovery.

[57]  Boudewijn F. van Dongen,et al.  ProM 6: The Process Mining Toolkit , 2010, BPM.

[58]  Benny Pinkas,et al.  FairplayMP: a system for secure multi-party computation , 2008, CCS.

[59]  Cong Liu,et al.  Petri Net Based Modeling and Correctness Verification of Collaborative Emergency Response Processes , 2016 .

[60]  MengChu Zhou,et al.  A weight-incorporated similarity-based clustering ensemble method based on swarm intelligence , 2016, Knowl. Based Syst..

[61]  Wolfgang Reisig,et al.  Understanding Petri Nets Modeling Techniques, Analysis Methods, Case Studies , 2013, Bull. EATCS.

[62]  Chengfei Liu,et al.  Steering Dynamic Collaborations Between Business Processes , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[63]  MengChu Zhou,et al.  Modeling, Analysis and Control of Dual-Arm Cluster Tools With Residency Time Constraint and Activity Time Variation Based on Petri Nets , 2012, IEEE Transactions on Automation Science and Engineering.

[64]  Jiujun Cheng,et al.  Time Performance Optimization and Resource Conflicts Resolution for Multiple Project Management , 2016, IEICE Trans. Inf. Syst..

[65]  Benny Pinkas,et al.  Fairplay - Secure Two-Party Computation System (Awarded Best Student Paper!) , 2004 .

[66]  Boudewijn F. van Dongen,et al.  ProM: The Process Mining Toolkit , 2009, BPM.