Behaviour Anonymous Method of Business Process Based on Log Skeleton

Authors

  • Xinsheng Fang School of Mathematics and Big Data, Anhui University of Science and Technology, Huainan 232001, Anhui, China
  • Xianwen Fang School of Mathematics and Big Data, Anhui University of Science and Technology, Huainan 232001, Anhui, China
  • Ke Lu School of Mathematics and Big Data, Anhui University of Science and Technology, Huainan 232001, Anhui, China

DOI:

https://doi.org/10.31577/cai_2026_1_231

Keywords:

Privacy protection process mining, behavioural anonymization, log skeleton, behavioural relationships, behavioural constraint set

Abstract

Privacy-preserving process mining (PPPM) is a technology that analyses and optimises processes while safeguarding sensitive information. Earlier research on PPPM mainly focused on the data perspective, employing techniques such as noise insertion and data generalisation to protect the sensitive personal information of process executors. However, these studies overlooked the behavioural relationships between activities in the process. Attackers can exploit domain knowledge and certain behavioural information of executors to carry out re-identification attacks, leading to the leakage of personal sensitive information. To address this issue, a behaviour anonymous method of business process based on a log skeleton is proposed. This method begins with the individual process model of the executor, clustering based on the similarity between models and utilising K-anonymity and the log skeleton technology to achieve cluster division and the construction of behaviour constraint sets. Furthermore, the generation of privacy models is standardised by the behaviour constraint set to achieve global behaviour anonymization. To evaluate the effectiveness of this method, experiments were conducted using multiple real and synthetic datasets. The experimental results indicate that this method significantly outperforms the comparison methods.

Downloads

Download data is not yet available.

Published

2026-04-30

How to Cite

Fang, X., Fang, X., & Lu, K. (2026). Behaviour Anonymous Method of Business Process Based on Log Skeleton. Computing and Informatics, 45(1), 231–260. https://doi.org/10.31577/cai_2026_1_231

Most read articles by the same author(s)