2020
DOI: 10.3390/ijerph17051612
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Process Mining in Healthcare

Abstract: Process mining has been successfully applied in the healthcare domain and has helped to uncover various insights for improving healthcare processes. While the benefits of process mining are widely acknowledged, many people rightfully have concerns about irresponsible uses of personal data. Healthcare information systems contain highly sensitive information and healthcare regulations often require protection of data privacy. The need to comply with strict privacy requirements may result in a decreased data util… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 61 publications
(34 citation statements)
references
References 20 publications
0
34
0
Order By: Relevance
“…With a more technological view, a large catalog of mechanisms to protect users' privacy in well-being services have been reported: from protocols to be implemented into cloud infrastructures supporting health services, 13 to solutions to hide personal information in medical records, 14 logs, 15 and other eHealth solutions. 16 Solutions based on traditional cryptographic methods (including revocation procedures and other innovative functionalities) have been reported.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…With a more technological view, a large catalog of mechanisms to protect users' privacy in well-being services have been reported: from protocols to be implemented into cloud infrastructures supporting health services, 13 to solutions to hide personal information in medical records, 14 logs, 15 and other eHealth solutions. 16 Solutions based on traditional cryptographic methods (including revocation procedures and other innovative functionalities) have been reported.…”
Section: Related Workmentioning
confidence: 99%
“…In the cloud, service providers perform those operations which are secret as they belong to their business core. As tokens are anonymous parameters representing real data, the result of these initial operations is a parametric service result (equation (15)…”
Section: Trustworthy Data Protection: the Mathematical Approachmentioning
confidence: 99%
“…In [5], a secure multi-party computation solution is proposed for preserving privacy in an inter-organizational setting. In [13], the authors analyze data privacy and utility requirements for healthcare event data, and the suitability of privacy-preserving techniques is assessed. In [16], privacy metadata in process mining are discussed and a privacy extension for the XES standard (https://xes-standard.org/) is proposed.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, privacy is a concern once data is analyzed that is related to people who are not part of the same organization as the one in which the data is analyzed or where the generated insights are used (see Mannhardt et al 2019). This is particularly relevant for mining data from the Internet of Things (Michael et al 2019) and applications in healthcare (Pika et al 2020).…”
Section: Digital Ecosystem Levelmentioning
confidence: 99%