SlideShare a Scribd company logo
Differential Privacy Analysis
of Data Processing Workflows
Marlon Dumas, Luciano García-Bañuelos,
Peeter Laud
Motivating example
Need to
assign ship
Send ship
assignment
Conflicting goals: Privacy vs. Utility
We need to release aggregate information about data without leaking
information about an individual involved in the incident
• Aggregate info: Number of crew members of nationality X in the ship
• Individual info: Is a particular crew member of nationality X?
Problem: Aggregate information may leak information on individuals
Number of crew members of nationality X in the ship,
Number of crew members of nationality X in the ship excluding Y
Differential privacy (Dwork 2006)
K gives e-differential privacy if for all values of DB, DB’differing
in a single element, and all S in Range(K )
Pr[ K (DB) in S]
Pr[ K (DB’) in S]
≤ eε ~ (1+ε)
Source: Gerome Miklau and Michael Hay
Accuracy loss!
Differential privacy (Laplacian noise)
NAPLES project’s goal
Develop theoretical foundations for implementing tools that
• Let one model stakeholders and flows in the Business Process Model and Notation
(BPMN)
• Find data leaks in these process models, taking into account the Privacy-Enhancing
Technologies used in the as-is models
• Quantify leakages using differential privacy
• Quantify accuracy loss
• Suggest relevant privacy-enhancing technologies to reduce privacy leaks
See http://pleak.io
Usage scenarios
•Support privacy audit of existing system
What will each stakeholder of the System learn about a
private data object? e.g. with respect to differential privacy
•Build a new privacy-aware system
What will each stakeholder of the System learn about each
private data object?
Which Privacy Enhancing Technologies would help reducing
the leakage?
Architecture
Adding privacy-enhancing technologies
OrganizationX
EmergencyOfficerDispatcher
Communities
Retrieve
Communities
Requiring
Intensive Care
Ships
ReservedFor
Evacuees
Adjust Ship to
Community
Assignment
Ship to
Community
Assignment
Communities ICU
requirements Ships
OrganizationY
Retrieve
Nearby Ships with
Spare Capacity &
Equipment
dp-task
dp-flow
Need to
assign ship
Send ship
assignment
(ships, disaster) -> {
avail_food = 0;
avail_ships = [];
for (ship in ships) do {
fuzzed_loc = ship.loc() + Lap2(3);
if (dist(fuzzed_loc, disaster.loc()) / ship.speed() <= 2
&& ship.cargo_type() == "food"
&& !ship.contains(dangerous_materials) ) {
avail_food += ship.cargo();
avail_ships.append({ship.name(), fuzzed_loc});
}
}
avail_food += Lap(2);
return (avail_food, avail_ships);
}
Annotating the model with DF and sensitivity bounds
OrganizationX
EmergencyOfficerDispatcher
Communities
Retrieve
Communities
Requiring
Intensive Care
Ships
ReservedFor
Evacuees
Adjust Ship to
Community
Assignment
Ship to
Community
Assignment
Communities ICU
requirements Ships
OrganizationY
Retrieve
Nearby Ships with
Spare Capacity &
Equipment
Ship to
Community
Assignment
(∈:0.1,c:0.2)
(∈:0.1,c:0.2) (∈:0.1,c:0.2)
(∈:0.1,c:0.2)
(∈:0.1,c:0.2) (∈:0.1,c:0.2)
Need to
assign ship
Send ship
assignment
Differential Privacy Disclosure (Roles)
OrganizationX
EmergencyOfficerDispatcher
Communities
Retrieve
Communities
Requiring
Intensive Care
Ships
ReservedFor
Evacuees
Adjust Ship to
Community
Assignment
Ship to
Community
Assignment
Communities ICU
requirements Ships
OrganizationY
Retrieve
Nearby Ships with
Spare Capacity &
Equipment
Ship to
Community
Assignment
(∈:0.1,c:0.2)
(∈:0.1,c:0.2) (∈:0.1,c:0.2)
(∈:0.1,c:0.2)
(∈:0.1,c:0.2) (∈:0.1,c:0.2)
Need to
assign ship
Send ship
assignment
Data processing workflows
Model with DF/sensitivity bounds
Generalized sensitivity
• Generalized distances – any partial order with addition and least element
• has sensitivity
• Differential privacy is a specific case of generalized sensitivity
• Generalized sensitivity is composable, i.e.
Model with DF/sensitivity bounds
Model with DF/sensitivity bounds
o
s
i
min(0.2, 0.2 * 0.4)
Result of analysis
DifferentialPrivacy Disclosure of a Data Source to a Party
r
Outlook
•Extend privacy analyzer to cover a broader class of BPMN
process models
 E.g. adding conditional branching
•Principles of program analysis for DP
 For arbitrary generalized metrics and sensitivities
•Defining a super set of BPMN, with ad-hoc constructs to model
privacy related concerns (i.e. PA-BPMN)
•Building the PETs library & extend PA-BPMN to cater for other
PETs besides differential privacy
Research funded by DARPA (Brandeis
program 2015-2019)
Thanks!

More Related Content

Viewers also liked

My business processes are deviant! What should I do about it?
My business processes are deviant! What should I do about it?My business processes are deviant! What should I do about it?
My business processes are deviant! What should I do about it?
Marlon Dumas
 
Business Process Performance Mining with Staged Process Flows
Business Process Performance Mining with Staged Process FlowsBusiness Process Performance Mining with Staged Process Flows
Business Process Performance Mining with Staged Process Flows
Marlon Dumas
 
Complete and Interpretable Conformance Checking of Business Processes
Complete and Interpretable Conformance Checking of Business ProcessesComplete and Interpretable Conformance Checking of Business Processes
Complete and Interpretable Conformance Checking of Business Processes
Marlon Dumas
 
Beyond Tasks and Gateways: Automated Discovery of BPMN Models with Subprocess...
Beyond Tasks and Gateways: Automated Discovery of BPMN Models with Subprocess...Beyond Tasks and Gateways: Automated Discovery of BPMN Models with Subprocess...
Beyond Tasks and Gateways: Automated Discovery of BPMN Models with Subprocess...
Marlon Dumas
 
Predictive Business Process Monitoring with Structured and Unstructured Data
Predictive Business Process Monitoring with Structured and Unstructured DataPredictive Business Process Monitoring with Structured and Unstructured Data
Predictive Business Process Monitoring with Structured and Unstructured Data
Marlon Dumas
 
Process Mining Reloaded: Event Structures as a Unified Representation of Proc...
Process Mining Reloaded: Event Structures as a Unified Representation of Proc...Process Mining Reloaded: Event Structures as a Unified Representation of Proc...
Process Mining Reloaded: Event Structures as a Unified Representation of Proc...
Marlon Dumas
 
Semantics and Analysis of DMN Decision Tables
Semantics and Analysis of DMN Decision TablesSemantics and Analysis of DMN Decision Tables
Semantics and Analysis of DMN Decision Tables
Marlon Dumas
 
In Processes We Trust: Privacy and Trust in Business Processes
In Processes We Trust: Privacy and Trust in Business ProcessesIn Processes We Trust: Privacy and Trust in Business Processes
In Processes We Trust: Privacy and Trust in Business Processes
Marlon Dumas
 
Automated Discovery of Structured Process Models: Discover Structured vs Disc...
Automated Discovery of Structured Process Models: Discover Structured vs Disc...Automated Discovery of Structured Process Models: Discover Structured vs Disc...
Automated Discovery of Structured Process Models: Discover Structured vs Disc...
Marlon Dumas
 
BPM Techniques and Tools: A Quick Tour of the BPM Lifecycle
BPM Techniques and Tools: A Quick Tour of the BPM LifecycleBPM Techniques and Tools: A Quick Tour of the BPM Lifecycle
BPM Techniques and Tools: A Quick Tour of the BPM Lifecycle
Marlon Dumas
 
Evidence-Based Business Process Management
Evidence-Based Business Process ManagementEvidence-Based Business Process Management
Evidence-Based Business Process Management
Marlon Dumas
 
Process Mining and Predictive Process Monitoring
Process Mining and Predictive Process MonitoringProcess Mining and Predictive Process Monitoring
Process Mining and Predictive Process Monitoring
Marlon Dumas
 
Introduction to Business Process Analysis and Redesign
Introduction to Business Process Analysis and RedesignIntroduction to Business Process Analysis and Redesign
Introduction to Business Process Analysis and Redesign
Marlon Dumas
 
Minería de Procesos y de Reglas de Negocio
Minería de Procesos y de Reglas de NegocioMinería de Procesos y de Reglas de Negocio
Minería de Procesos y de Reglas de Negocio
Marlon Dumas
 
Gpr
GprGpr
Fundamentals of Business Process Management: A Quick Introduction to Value-Dr...
Fundamentals of Business Process Management: A Quick Introduction to Value-Dr...Fundamentals of Business Process Management: A Quick Introduction to Value-Dr...
Fundamentals of Business Process Management: A Quick Introduction to Value-Dr...
Marlon Dumas
 

Viewers also liked (16)

My business processes are deviant! What should I do about it?
My business processes are deviant! What should I do about it?My business processes are deviant! What should I do about it?
My business processes are deviant! What should I do about it?
 
Business Process Performance Mining with Staged Process Flows
Business Process Performance Mining with Staged Process FlowsBusiness Process Performance Mining with Staged Process Flows
Business Process Performance Mining with Staged Process Flows
 
Complete and Interpretable Conformance Checking of Business Processes
Complete and Interpretable Conformance Checking of Business ProcessesComplete and Interpretable Conformance Checking of Business Processes
Complete and Interpretable Conformance Checking of Business Processes
 
Beyond Tasks and Gateways: Automated Discovery of BPMN Models with Subprocess...
Beyond Tasks and Gateways: Automated Discovery of BPMN Models with Subprocess...Beyond Tasks and Gateways: Automated Discovery of BPMN Models with Subprocess...
Beyond Tasks and Gateways: Automated Discovery of BPMN Models with Subprocess...
 
Predictive Business Process Monitoring with Structured and Unstructured Data
Predictive Business Process Monitoring with Structured and Unstructured DataPredictive Business Process Monitoring with Structured and Unstructured Data
Predictive Business Process Monitoring with Structured and Unstructured Data
 
Process Mining Reloaded: Event Structures as a Unified Representation of Proc...
Process Mining Reloaded: Event Structures as a Unified Representation of Proc...Process Mining Reloaded: Event Structures as a Unified Representation of Proc...
Process Mining Reloaded: Event Structures as a Unified Representation of Proc...
 
Semantics and Analysis of DMN Decision Tables
Semantics and Analysis of DMN Decision TablesSemantics and Analysis of DMN Decision Tables
Semantics and Analysis of DMN Decision Tables
 
In Processes We Trust: Privacy and Trust in Business Processes
In Processes We Trust: Privacy and Trust in Business ProcessesIn Processes We Trust: Privacy and Trust in Business Processes
In Processes We Trust: Privacy and Trust in Business Processes
 
Automated Discovery of Structured Process Models: Discover Structured vs Disc...
Automated Discovery of Structured Process Models: Discover Structured vs Disc...Automated Discovery of Structured Process Models: Discover Structured vs Disc...
Automated Discovery of Structured Process Models: Discover Structured vs Disc...
 
BPM Techniques and Tools: A Quick Tour of the BPM Lifecycle
BPM Techniques and Tools: A Quick Tour of the BPM LifecycleBPM Techniques and Tools: A Quick Tour of the BPM Lifecycle
BPM Techniques and Tools: A Quick Tour of the BPM Lifecycle
 
Evidence-Based Business Process Management
Evidence-Based Business Process ManagementEvidence-Based Business Process Management
Evidence-Based Business Process Management
 
Process Mining and Predictive Process Monitoring
Process Mining and Predictive Process MonitoringProcess Mining and Predictive Process Monitoring
Process Mining and Predictive Process Monitoring
 
Introduction to Business Process Analysis and Redesign
Introduction to Business Process Analysis and RedesignIntroduction to Business Process Analysis and Redesign
Introduction to Business Process Analysis and Redesign
 
Minería de Procesos y de Reglas de Negocio
Minería de Procesos y de Reglas de NegocioMinería de Procesos y de Reglas de Negocio
Minería de Procesos y de Reglas de Negocio
 
Gpr
GprGpr
Gpr
 
Fundamentals of Business Process Management: A Quick Introduction to Value-Dr...
Fundamentals of Business Process Management: A Quick Introduction to Value-Dr...Fundamentals of Business Process Management: A Quick Introduction to Value-Dr...
Fundamentals of Business Process Management: A Quick Introduction to Value-Dr...
 

Similar to Differential Privacy Analysis of Data Processing Workflows

1 Project 1 Introduction - the SeaPort Project seri.docx
1  Project 1 Introduction - the SeaPort Project seri.docx1  Project 1 Introduction - the SeaPort Project seri.docx
1 Project 1 Introduction - the SeaPort Project seri.docx
oswald1horne84988
 
20160818 Semantics and Linkage of Archived Catalogs
20160818 Semantics and Linkage of Archived Catalogs20160818 Semantics and Linkage of Archived Catalogs
20160818 Semantics and Linkage of Archived Catalogs
andrea huang
 
Lessons Learned: What We Learned in 2012
Lessons Learned: What We Learned in 2012Lessons Learned: What We Learned in 2012
Lessons Learned: What We Learned in 2012
Cisco Crisis Response
 
Data Science Academy Student Demo day--Peggy sobolewski,analyzing transporati...
Data Science Academy Student Demo day--Peggy sobolewski,analyzing transporati...Data Science Academy Student Demo day--Peggy sobolewski,analyzing transporati...
Data Science Academy Student Demo day--Peggy sobolewski,analyzing transporati...
Vivian S. Zhang
 
EDF2014: Daniel Vila-Suero, Researcher, Ontology Engineering Group, Universid...
EDF2014: Daniel Vila-Suero, Researcher, Ontology Engineering Group, Universid...EDF2014: Daniel Vila-Suero, Researcher, Ontology Engineering Group, Universid...
EDF2014: Daniel Vila-Suero, Researcher, Ontology Engineering Group, Universid...
European Data Forum
 
3LD: Towards high quality, industry-ready Linguistic Linked Licensed Data
3LD: Towards high quality, industry-ready Linguistic Linked Licensed Data3LD: Towards high quality, industry-ready Linguistic Linked Licensed Data
3LD: Towards high quality, industry-ready Linguistic Linked Licensed Data
Daniel Vila Suero
 
The ARK Identifier Scheme at Ten Years Old
The ARK Identifier Scheme at Ten Years OldThe ARK Identifier Scheme at Ten Years Old
The ARK Identifier Scheme at Ten Years Old
John Kunze
 
Containers - Portable, repeatable user-oriented application delivery. Build, ...
Containers - Portable, repeatable user-oriented application delivery. Build, ...Containers - Portable, repeatable user-oriented application delivery. Build, ...
Containers - Portable, repeatable user-oriented application delivery. Build, ...
Walid Shaari
 
prj exam
prj examprj exam
prj exam
Shweta Dolhare
 
Trivadis TechEvent 2016 Polybase challenges Hive relational access to non-rel...
Trivadis TechEvent 2016 Polybase challenges Hive relational access to non-rel...Trivadis TechEvent 2016 Polybase challenges Hive relational access to non-rel...
Trivadis TechEvent 2016 Polybase challenges Hive relational access to non-rel...
Trivadis
 
Emerging Communications Tech: Lessons from Hurricane Sandy and Super Typhoon ...
Emerging Communications Tech: Lessons from Hurricane Sandy and Super Typhoon ...Emerging Communications Tech: Lessons from Hurricane Sandy and Super Typhoon ...
Emerging Communications Tech: Lessons from Hurricane Sandy and Super Typhoon ...
Cisco Crisis Response
 
containerit at useR!2017 conference, Brussels
containerit at useR!2017 conference, Brusselscontainerit at useR!2017 conference, Brussels
containerit at useR!2017 conference, Brussels
Daniel Nüst
 
Grehack2013-RuoAndo-Unraveling large scale geographical distribution of vulne...
Grehack2013-RuoAndo-Unraveling large scale geographical distribution of vulne...Grehack2013-RuoAndo-Unraveling large scale geographical distribution of vulne...
Grehack2013-RuoAndo-Unraveling large scale geographical distribution of vulne...
Ruo Ando
 
2. Develop a MapReduce program to calculate the frequency of a given word in ...
2. Develop a MapReduce program to calculate the frequency of a given word in ...2. Develop a MapReduce program to calculate the frequency of a given word in ...
2. Develop a MapReduce program to calculate the frequency of a given word in ...
Prof. Maulik Trivedi
 
Druid meetup 4th_sql_on_druid
Druid meetup 4th_sql_on_druidDruid meetup 4th_sql_on_druid
Druid meetup 4th_sql_on_druid
Yousun Jeong
 
The Empirical Turn in Knowledge Representation
The Empirical Turn in Knowledge RepresentationThe Empirical Turn in Knowledge Representation
The Empirical Turn in Knowledge Representation
Frank van Harmelen
 
Teledyne Brown Engineering Slides
Teledyne Brown Engineering Slides Teledyne Brown Engineering Slides
Teledyne Brown Engineering Slides
CASIS
 
DISTRILAKE PROJECT D1 module 20_3_2013
DISTRILAKE PROJECT D1 module 20_3_2013DISTRILAKE PROJECT D1 module 20_3_2013
DISTRILAKE PROJECT D1 module 20_3_2013
Carolina Arias Muñoz
 
Towards Parallel Nonmonotonic Reasoning with Billions of Facts
Towards Parallel Nonmonotonic Reasoning with Billions of FactsTowards Parallel Nonmonotonic Reasoning with Billions of Facts
Towards Parallel Nonmonotonic Reasoning with Billions of Facts
PlanetData Network of Excellence
 
DDS Made Simple
DDS Made SimpleDDS Made Simple
DDS Made Simple
Angelo Corsaro
 

Similar to Differential Privacy Analysis of Data Processing Workflows (20)

1 Project 1 Introduction - the SeaPort Project seri.docx
1  Project 1 Introduction - the SeaPort Project seri.docx1  Project 1 Introduction - the SeaPort Project seri.docx
1 Project 1 Introduction - the SeaPort Project seri.docx
 
20160818 Semantics and Linkage of Archived Catalogs
20160818 Semantics and Linkage of Archived Catalogs20160818 Semantics and Linkage of Archived Catalogs
20160818 Semantics and Linkage of Archived Catalogs
 
Lessons Learned: What We Learned in 2012
Lessons Learned: What We Learned in 2012Lessons Learned: What We Learned in 2012
Lessons Learned: What We Learned in 2012
 
Data Science Academy Student Demo day--Peggy sobolewski,analyzing transporati...
Data Science Academy Student Demo day--Peggy sobolewski,analyzing transporati...Data Science Academy Student Demo day--Peggy sobolewski,analyzing transporati...
Data Science Academy Student Demo day--Peggy sobolewski,analyzing transporati...
 
EDF2014: Daniel Vila-Suero, Researcher, Ontology Engineering Group, Universid...
EDF2014: Daniel Vila-Suero, Researcher, Ontology Engineering Group, Universid...EDF2014: Daniel Vila-Suero, Researcher, Ontology Engineering Group, Universid...
EDF2014: Daniel Vila-Suero, Researcher, Ontology Engineering Group, Universid...
 
3LD: Towards high quality, industry-ready Linguistic Linked Licensed Data
3LD: Towards high quality, industry-ready Linguistic Linked Licensed Data3LD: Towards high quality, industry-ready Linguistic Linked Licensed Data
3LD: Towards high quality, industry-ready Linguistic Linked Licensed Data
 
The ARK Identifier Scheme at Ten Years Old
The ARK Identifier Scheme at Ten Years OldThe ARK Identifier Scheme at Ten Years Old
The ARK Identifier Scheme at Ten Years Old
 
Containers - Portable, repeatable user-oriented application delivery. Build, ...
Containers - Portable, repeatable user-oriented application delivery. Build, ...Containers - Portable, repeatable user-oriented application delivery. Build, ...
Containers - Portable, repeatable user-oriented application delivery. Build, ...
 
prj exam
prj examprj exam
prj exam
 
Trivadis TechEvent 2016 Polybase challenges Hive relational access to non-rel...
Trivadis TechEvent 2016 Polybase challenges Hive relational access to non-rel...Trivadis TechEvent 2016 Polybase challenges Hive relational access to non-rel...
Trivadis TechEvent 2016 Polybase challenges Hive relational access to non-rel...
 
Emerging Communications Tech: Lessons from Hurricane Sandy and Super Typhoon ...
Emerging Communications Tech: Lessons from Hurricane Sandy and Super Typhoon ...Emerging Communications Tech: Lessons from Hurricane Sandy and Super Typhoon ...
Emerging Communications Tech: Lessons from Hurricane Sandy and Super Typhoon ...
 
containerit at useR!2017 conference, Brussels
containerit at useR!2017 conference, Brusselscontainerit at useR!2017 conference, Brussels
containerit at useR!2017 conference, Brussels
 
Grehack2013-RuoAndo-Unraveling large scale geographical distribution of vulne...
Grehack2013-RuoAndo-Unraveling large scale geographical distribution of vulne...Grehack2013-RuoAndo-Unraveling large scale geographical distribution of vulne...
Grehack2013-RuoAndo-Unraveling large scale geographical distribution of vulne...
 
2. Develop a MapReduce program to calculate the frequency of a given word in ...
2. Develop a MapReduce program to calculate the frequency of a given word in ...2. Develop a MapReduce program to calculate the frequency of a given word in ...
2. Develop a MapReduce program to calculate the frequency of a given word in ...
 
Druid meetup 4th_sql_on_druid
Druid meetup 4th_sql_on_druidDruid meetup 4th_sql_on_druid
Druid meetup 4th_sql_on_druid
 
The Empirical Turn in Knowledge Representation
The Empirical Turn in Knowledge RepresentationThe Empirical Turn in Knowledge Representation
The Empirical Turn in Knowledge Representation
 
Teledyne Brown Engineering Slides
Teledyne Brown Engineering Slides Teledyne Brown Engineering Slides
Teledyne Brown Engineering Slides
 
DISTRILAKE PROJECT D1 module 20_3_2013
DISTRILAKE PROJECT D1 module 20_3_2013DISTRILAKE PROJECT D1 module 20_3_2013
DISTRILAKE PROJECT D1 module 20_3_2013
 
Towards Parallel Nonmonotonic Reasoning with Billions of Facts
Towards Parallel Nonmonotonic Reasoning with Billions of FactsTowards Parallel Nonmonotonic Reasoning with Billions of Facts
Towards Parallel Nonmonotonic Reasoning with Billions of Facts
 
DDS Made Simple
DDS Made SimpleDDS Made Simple
DDS Made Simple
 

More from Marlon Dumas

How GenAI will (not) change your business?
How GenAI will (not)  change your business?How GenAI will (not)  change your business?
How GenAI will (not) change your business?
Marlon Dumas
 
Walking the Way from Process Mining to AI-Driven Process Optimization
Walking the Way from Process Mining to AI-Driven Process OptimizationWalking the Way from Process Mining to AI-Driven Process Optimization
Walking the Way from Process Mining to AI-Driven Process Optimization
Marlon Dumas
 
Discovery and Simulation of Business Processes with Probabilistic Resource Av...
Discovery and Simulation of Business Processes with Probabilistic Resource Av...Discovery and Simulation of Business Processes with Probabilistic Resource Av...
Discovery and Simulation of Business Processes with Probabilistic Resource Av...
Marlon Dumas
 
Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...
Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...
Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...
Marlon Dumas
 
Business Process Optimization: Status and Perspectives
Business Process Optimization: Status and PerspectivesBusiness Process Optimization: Status and Perspectives
Business Process Optimization: Status and Perspectives
Marlon Dumas
 
Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...
Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...
Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...
Marlon Dumas
 
Why am I Waiting Data-Driven Analysis of Waiting Times in Business Processes
Why am I Waiting Data-Driven Analysis of Waiting Times in Business ProcessesWhy am I Waiting Data-Driven Analysis of Waiting Times in Business Processes
Why am I Waiting Data-Driven Analysis of Waiting Times in Business Processes
Marlon Dumas
 
Augmented Business Process Management
Augmented Business Process ManagementAugmented Business Process Management
Augmented Business Process Management
Marlon Dumas
 
Process Mining and Data-Driven Process Simulation
Process Mining and Data-Driven Process SimulationProcess Mining and Data-Driven Process Simulation
Process Mining and Data-Driven Process Simulation
Marlon Dumas
 
Modeling Extraneous Activity Delays in Business Process Simulation
Modeling Extraneous Activity Delays in Business Process SimulationModeling Extraneous Activity Delays in Business Process Simulation
Modeling Extraneous Activity Delays in Business Process Simulation
Marlon Dumas
 
Business Process Simulation with Differentiated Resources: Does it Make a Dif...
Business Process Simulation with Differentiated Resources: Does it Make a Dif...Business Process Simulation with Differentiated Resources: Does it Make a Dif...
Business Process Simulation with Differentiated Resources: Does it Make a Dif...
Marlon Dumas
 
Prescriptive Process Monitoring Under Uncertainty and Resource Constraints
Prescriptive Process Monitoring Under Uncertainty and Resource ConstraintsPrescriptive Process Monitoring Under Uncertainty and Resource Constraints
Prescriptive Process Monitoring Under Uncertainty and Resource Constraints
Marlon Dumas
 
Robotic Process Mining
Robotic Process MiningRobotic Process Mining
Robotic Process Mining
Marlon Dumas
 
Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?
Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?
Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?
Marlon Dumas
 
Learning Accurate Business Process Simulation Models from Event Logs via Auto...
Learning Accurate Business Process Simulation Models from Event Logs via Auto...Learning Accurate Business Process Simulation Models from Event Logs via Auto...
Learning Accurate Business Process Simulation Models from Event Logs via Auto...
Marlon Dumas
 
Process Mining: A Guide for Practitioners
Process Mining: A Guide for PractitionersProcess Mining: A Guide for Practitioners
Process Mining: A Guide for Practitioners
Marlon Dumas
 
Process Mining for Process Improvement.pptx
Process Mining for Process Improvement.pptxProcess Mining for Process Improvement.pptx
Process Mining for Process Improvement.pptx
Marlon Dumas
 
Data-Driven Analysis of Batch Processing Inefficiencies in Business Processes
Data-Driven Analysis of  Batch Processing Inefficiencies  in Business ProcessesData-Driven Analysis of  Batch Processing Inefficiencies  in Business Processes
Data-Driven Analysis of Batch Processing Inefficiencies in Business Processes
Marlon Dumas
 
Optimización de procesos basada en datos
Optimización de procesos basada en datosOptimización de procesos basada en datos
Optimización de procesos basada en datos
Marlon Dumas
 
Process Mining and AI for Continuous Process Improvement
Process Mining and AI for Continuous Process ImprovementProcess Mining and AI for Continuous Process Improvement
Process Mining and AI for Continuous Process Improvement
Marlon Dumas
 

More from Marlon Dumas (20)

How GenAI will (not) change your business?
How GenAI will (not)  change your business?How GenAI will (not)  change your business?
How GenAI will (not) change your business?
 
Walking the Way from Process Mining to AI-Driven Process Optimization
Walking the Way from Process Mining to AI-Driven Process OptimizationWalking the Way from Process Mining to AI-Driven Process Optimization
Walking the Way from Process Mining to AI-Driven Process Optimization
 
Discovery and Simulation of Business Processes with Probabilistic Resource Av...
Discovery and Simulation of Business Processes with Probabilistic Resource Av...Discovery and Simulation of Business Processes with Probabilistic Resource Av...
Discovery and Simulation of Business Processes with Probabilistic Resource Av...
 
Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...
Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...
Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...
 
Business Process Optimization: Status and Perspectives
Business Process Optimization: Status and PerspectivesBusiness Process Optimization: Status and Perspectives
Business Process Optimization: Status and Perspectives
 
Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...
Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...
Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...
 
Why am I Waiting Data-Driven Analysis of Waiting Times in Business Processes
Why am I Waiting Data-Driven Analysis of Waiting Times in Business ProcessesWhy am I Waiting Data-Driven Analysis of Waiting Times in Business Processes
Why am I Waiting Data-Driven Analysis of Waiting Times in Business Processes
 
Augmented Business Process Management
Augmented Business Process ManagementAugmented Business Process Management
Augmented Business Process Management
 
Process Mining and Data-Driven Process Simulation
Process Mining and Data-Driven Process SimulationProcess Mining and Data-Driven Process Simulation
Process Mining and Data-Driven Process Simulation
 
Modeling Extraneous Activity Delays in Business Process Simulation
Modeling Extraneous Activity Delays in Business Process SimulationModeling Extraneous Activity Delays in Business Process Simulation
Modeling Extraneous Activity Delays in Business Process Simulation
 
Business Process Simulation with Differentiated Resources: Does it Make a Dif...
Business Process Simulation with Differentiated Resources: Does it Make a Dif...Business Process Simulation with Differentiated Resources: Does it Make a Dif...
Business Process Simulation with Differentiated Resources: Does it Make a Dif...
 
Prescriptive Process Monitoring Under Uncertainty and Resource Constraints
Prescriptive Process Monitoring Under Uncertainty and Resource ConstraintsPrescriptive Process Monitoring Under Uncertainty and Resource Constraints
Prescriptive Process Monitoring Under Uncertainty and Resource Constraints
 
Robotic Process Mining
Robotic Process MiningRobotic Process Mining
Robotic Process Mining
 
Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?
Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?
Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?
 
Learning Accurate Business Process Simulation Models from Event Logs via Auto...
Learning Accurate Business Process Simulation Models from Event Logs via Auto...Learning Accurate Business Process Simulation Models from Event Logs via Auto...
Learning Accurate Business Process Simulation Models from Event Logs via Auto...
 
Process Mining: A Guide for Practitioners
Process Mining: A Guide for PractitionersProcess Mining: A Guide for Practitioners
Process Mining: A Guide for Practitioners
 
Process Mining for Process Improvement.pptx
Process Mining for Process Improvement.pptxProcess Mining for Process Improvement.pptx
Process Mining for Process Improvement.pptx
 
Data-Driven Analysis of Batch Processing Inefficiencies in Business Processes
Data-Driven Analysis of  Batch Processing Inefficiencies  in Business ProcessesData-Driven Analysis of  Batch Processing Inefficiencies  in Business Processes
Data-Driven Analysis of Batch Processing Inefficiencies in Business Processes
 
Optimización de procesos basada en datos
Optimización de procesos basada en datosOptimización de procesos basada en datos
Optimización de procesos basada en datos
 
Process Mining and AI for Continuous Process Improvement
Process Mining and AI for Continuous Process ImprovementProcess Mining and AI for Continuous Process Improvement
Process Mining and AI for Continuous Process Improvement
 

Recently uploaded

2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 

Recently uploaded (20)

2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 

Differential Privacy Analysis of Data Processing Workflows

  • 1. Differential Privacy Analysis of Data Processing Workflows Marlon Dumas, Luciano García-Bañuelos, Peeter Laud
  • 2. Motivating example Need to assign ship Send ship assignment
  • 3. Conflicting goals: Privacy vs. Utility We need to release aggregate information about data without leaking information about an individual involved in the incident • Aggregate info: Number of crew members of nationality X in the ship • Individual info: Is a particular crew member of nationality X? Problem: Aggregate information may leak information on individuals Number of crew members of nationality X in the ship, Number of crew members of nationality X in the ship excluding Y
  • 4. Differential privacy (Dwork 2006) K gives e-differential privacy if for all values of DB, DB’differing in a single element, and all S in Range(K ) Pr[ K (DB) in S] Pr[ K (DB’) in S] ≤ eε ~ (1+ε)
  • 5. Source: Gerome Miklau and Michael Hay Accuracy loss! Differential privacy (Laplacian noise)
  • 6. NAPLES project’s goal Develop theoretical foundations for implementing tools that • Let one model stakeholders and flows in the Business Process Model and Notation (BPMN) • Find data leaks in these process models, taking into account the Privacy-Enhancing Technologies used in the as-is models • Quantify leakages using differential privacy • Quantify accuracy loss • Suggest relevant privacy-enhancing technologies to reduce privacy leaks See http://pleak.io
  • 7. Usage scenarios •Support privacy audit of existing system What will each stakeholder of the System learn about a private data object? e.g. with respect to differential privacy •Build a new privacy-aware system What will each stakeholder of the System learn about each private data object? Which Privacy Enhancing Technologies would help reducing the leakage?
  • 9. Adding privacy-enhancing technologies OrganizationX EmergencyOfficerDispatcher Communities Retrieve Communities Requiring Intensive Care Ships ReservedFor Evacuees Adjust Ship to Community Assignment Ship to Community Assignment Communities ICU requirements Ships OrganizationY Retrieve Nearby Ships with Spare Capacity & Equipment dp-task dp-flow Need to assign ship Send ship assignment (ships, disaster) -> { avail_food = 0; avail_ships = []; for (ship in ships) do { fuzzed_loc = ship.loc() + Lap2(3); if (dist(fuzzed_loc, disaster.loc()) / ship.speed() <= 2 && ship.cargo_type() == "food" && !ship.contains(dangerous_materials) ) { avail_food += ship.cargo(); avail_ships.append({ship.name(), fuzzed_loc}); } } avail_food += Lap(2); return (avail_food, avail_ships); }
  • 10. Annotating the model with DF and sensitivity bounds OrganizationX EmergencyOfficerDispatcher Communities Retrieve Communities Requiring Intensive Care Ships ReservedFor Evacuees Adjust Ship to Community Assignment Ship to Community Assignment Communities ICU requirements Ships OrganizationY Retrieve Nearby Ships with Spare Capacity & Equipment Ship to Community Assignment (∈:0.1,c:0.2) (∈:0.1,c:0.2) (∈:0.1,c:0.2) (∈:0.1,c:0.2) (∈:0.1,c:0.2) (∈:0.1,c:0.2) Need to assign ship Send ship assignment
  • 11. Differential Privacy Disclosure (Roles) OrganizationX EmergencyOfficerDispatcher Communities Retrieve Communities Requiring Intensive Care Ships ReservedFor Evacuees Adjust Ship to Community Assignment Ship to Community Assignment Communities ICU requirements Ships OrganizationY Retrieve Nearby Ships with Spare Capacity & Equipment Ship to Community Assignment (∈:0.1,c:0.2) (∈:0.1,c:0.2) (∈:0.1,c:0.2) (∈:0.1,c:0.2) (∈:0.1,c:0.2) (∈:0.1,c:0.2) Need to assign ship Send ship assignment
  • 14. Generalized sensitivity • Generalized distances – any partial order with addition and least element • has sensitivity • Differential privacy is a specific case of generalized sensitivity • Generalized sensitivity is composable, i.e.
  • 16. Model with DF/sensitivity bounds o s i min(0.2, 0.2 * 0.4)
  • 18. DifferentialPrivacy Disclosure of a Data Source to a Party r
  • 19. Outlook •Extend privacy analyzer to cover a broader class of BPMN process models  E.g. adding conditional branching •Principles of program analysis for DP  For arbitrary generalized metrics and sensitivities •Defining a super set of BPMN, with ad-hoc constructs to model privacy related concerns (i.e. PA-BPMN) •Building the PETs library & extend PA-BPMN to cater for other PETs besides differential privacy
  • 20. Research funded by DARPA (Brandeis program 2015-2019) Thanks!