Mining Encrypted Software Logs using Alpha Algorithm

Gamze Tillem, Zekeriya Erkin, Reginald L. Lagendijk

2017

Abstract

The growing complexity of software with respect to technological advances encourages model-based analysis of software systems for validation and verification. Process mining is one recently investigated technique for such analysis which enables the discovery of process models from event logs collected during software execution. However, the usage of logs in process mining can be harmful to the privacy of data owners. While for a software user the existence of sensitive information in logs can be a concern, for a software company, the intellectual property of their product and confidential company information within logs can pose a threat to company’s privacy. In this paper, we propose a privacy-preserving protocol for the discovery of process models for software analysis that assures the privacy of users and companies. For this purpose, our proposal uses encrypted logs and processes them using cryptographic protocols in a two-party setting. Furthermore, our proposal applies data packing on the cryptographic protocols to optimize computations by reducing the number of repetitive operations. The experiments show that using data packing the performance of our protocol is promising for privacy-preserving software analysis. To the best of our knowledge, our protocol is the first of its kind for the software analysis which relies on processing of encrypted logs using process mining techniques.

Download


Paper Citation


in Harvard Style

Tillem G., Erkin Z. and Lagendijk R. (2017). Mining Encrypted Software Logs using Alpha Algorithm . In Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 6: SECRYPT, (ICETE 2017) ISBN 978-989-758-259-2, pages 267-274. DOI: 10.5220/0006408602670274


in Bibtex Style

@conference{secrypt17,
author={Gamze Tillem and Zekeriya Erkin and Reginald L. Lagendijk},
title={Mining Encrypted Software Logs using Alpha Algorithm},
booktitle={Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 6: SECRYPT, (ICETE 2017)},
year={2017},
pages={267-274},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006408602670274},
isbn={978-989-758-259-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 6: SECRYPT, (ICETE 2017)
TI - Mining Encrypted Software Logs using Alpha Algorithm
SN - 978-989-758-259-2
AU - Tillem G.
AU - Erkin Z.
AU - Lagendijk R.
PY - 2017
SP - 267
EP - 274
DO - 10.5220/0006408602670274