loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Gamze Tillem ; Zekeriya Erkin and Reginald L. Lagendijk

Affiliation: Delft University of Technology, Netherlands

Keyword(s): Software Privacy, Homomorphic Encryption, Applied Cryptography, Software Process Mining.

Related Ontology Subjects/Areas/Topics: Applied Cryptography ; Cryptographic Techniques and Key Management ; Data and Application Security and Privacy ; Data Engineering ; Databases and Data Security ; Information and Systems Security ; Privacy ; Privacy Enhancing Technologies ; Secure Software Development Methodologies ; Security in Information Systems

Abstract: The growing complexity of software with respect to technological advances encourages model-based analysis of software systems for validation and verification. Process mining is one recently investigated technique for such analysis which enables the discovery of process models from event logs collected during software execution. However, the usage of logs in process mining can be harmful to the privacy of data owners. While for a software user the existence of sensitive information in logs can be a concern, for a software company, the intellectual property of their product and confidential company information within logs can pose a threat to company’s privacy. In this paper, we propose a privacy-preserving protocol for the discovery of process models for software analysis that assures the privacy of users and companies. For this purpose, our proposal uses encrypted logs and processes them using cryptographic protocols in a two-party setting. Furthermore, our proposal applies data pack ing on the cryptographic protocols to optimize computations by reducing the number of repetitive operations. The experiments show that using data packing the performance of our protocol is promising for privacy-preserving software analysis. To the best of our knowledge, our protocol is the first of its kind for the software analysis which relies on processing of encrypted logs using process mining techniques. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.116.40.177

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Tillem, G.; Erkin, Z. and Lagendijk, R. (2017). Mining Encrypted Software Logs using Alpha Algorithm. In Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017) - SECRYPT; ISBN 978-989-758-259-2; ISSN 2184-3236, SciTePress, pages 267-274. DOI: 10.5220/0006408602670274

@conference{secrypt17,
author={Gamze Tillem. and Zekeriya Erkin. and Reginald L. Lagendijk.},
title={Mining Encrypted Software Logs using Alpha Algorithm},
booktitle={Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017) - SECRYPT},
year={2017},
pages={267-274},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006408602670274},
isbn={978-989-758-259-2},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017) - SECRYPT
TI - Mining Encrypted Software Logs using Alpha Algorithm
SN - 978-989-758-259-2
IS - 2184-3236
AU - Tillem, G.
AU - Erkin, Z.
AU - Lagendijk, R.
PY - 2017
SP - 267
EP - 274
DO - 10.5220/0006408602670274
PB - SciTePress