Distributed and Parallel Databases

, Volume 25, Issue 3, pp 193–240 | Cite as

Log-based transactional workflow mining

  • Walid Gaaloul
  • Khaled Gaaloul
  • Sami Bhiri
  • Armin Haller
  • Manfred Hauswirth
Article

Abstract

A continuous evolution of business process parameters, constraints and needs, hardly foreseeable initially, requires a continuous design from the business process management systems. In this article we are interested in developing a reactive design through process log analysis ensuring process re-engineering and execution reliability. We propose to analyse workflow logs to discover workflow transactional behaviour and to subsequently improve and correct related recovery mechanisms. Our approach starts by collecting workflow logs. Then, we build, by statistical analysis techniques, an intermediate representation specifying elementary dependencies between activities. These dependencies are refined to mine the transactional workflow model. The analysis of the discrepancies between the discovered model and the initially designed model enables us to detect design gaps, concerning particularly the recovery mechanisms. Thus, based on this mining step, we apply a set of rules on the initially designed workflow to improve workflow reliability.

Keywords

Workflow mining Transactional workflow Workflow patterns Workflow logs Process mining Business process analysis Business process intelligence Process reengineering Execution reliability Correction 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    ter Hofstede, A.H.M., Orlowska, M.E., Rajapakse, J.: Verification problems in conceptual workflow specifications. Data Knowl. Eng. 24(3), 239–256 (1998) CrossRefMATHGoogle Scholar
  2. 2.
    van der Aalst, W.M.P.: The application of Petri nets to workflow management. J. Circuits Syst. Comput. 8(1), 21–66 (1998) CrossRefGoogle Scholar
  3. 3.
    Adam, N.R., Atluri, V., Huang, W.-K.: Modeling and analysis of workflows using petri nets. J. Intell. Inf. Syst. 10(2), 131–158 (1998) CrossRefGoogle Scholar
  4. 4.
    van Dongen, B.F., Dijkman, R.M., Mendling, J.: Measuring similarity between business process models. In: Bellahsene, Z., Léonard, M. (eds.) CAiSE. Lecture Notes in Computer Science, vol. 5074, pp. 450–464. Springer, Berlin (2008) Google Scholar
  5. 5.
    Eder, J., Liebhart, W.: Workflow recovery. In: Conference on Cooperative Information Systems, pp. 124–134, 1996 Google Scholar
  6. 6.
    Glasson, B.C., Hawryszkiewycz, I., Underwood, A., Weber, R.: Business Process Re-Engineering. IFIP Transactions, vol. A-54. Elsevier, Amsterdam (1994) Google Scholar
  7. 7.
    Hamadi, R., Benatallah, B., Medjahed, B.: Self-adapting recovery nets for policy-driven exception handling in business processes. Distrib. Parallel Databases 23(1), 1–44 (2008) CrossRefGoogle Scholar
  8. 8.
    Gaaloul, W., Baïna, K., Godart, C.: Towards mining structural workflow patterns. In: Andersen, K.V., Debenham, J.K., Wagner, R. (eds.) DEXA. LNCS, vol. 3588, pp. 24–33. Springer, Berlin (2005) Google Scholar
  9. 9.
    Gaaloul, W., Baïna, K., Godart, C.: A bottom-up workflow mining approach for workflow applications analysis. In: The 2nd International Workshop on Data Engineering Issues in E-Commerce and Services, San Francisco, California, USA, 26 June 2006. Lecture Notes in Computer Science. Springer, Berlin (2006) Google Scholar
  10. 10.
    Gaaloul, W., Bhiri, S., Godart, C.: Discovering workflow transactional behaviour event-based log. In: 12th International Conference on Cooperative Information Systems (CoopIS’04)), Larnaca, Cyprus, 25–29 October, 2004. Lecture Notes in Computer Science. Springer, Berlin (2004) Google Scholar
  11. 11.
    Gaaloul, W., Godart, C.: Mining workflow recovery from event based logs. In: Business Process Management, pp. 169–185, 2005 Google Scholar
  12. 12.
    Veijalainen, J., Eliassen, F., Holtkamp, B.: The S-transaction model. In: Elmagarmid, A.K. (ed.) Database Transaction Models for Advanced Applications. Morgan Kauffman, San Mateo (1990) Google Scholar
  13. 13.
    Dayal, U., Hsu, M., Ladin, R.: Business process coordination: State of the art, trends, and open issues. In: Apers, P.M.G., Atzeni, P., Ceri, S., Paraboschi, S., Ramamohanarao, K., Snodgrass, R.T. (eds.) VLDB, pp. 3–13. Morgan Kaufmann, San Mateo (2001) Google Scholar
  14. 14.
    Georgakopoulos, D., Hornick, M., Sheth, A.: An overview of workflow management: from process modeling to workflow automation infrastructure. Distrib. Parallel Databases 3(2), 119–153 (1995) CrossRefGoogle Scholar
  15. 15.
    Bernstein, P.A., Hadzilacos, V., Goodman, N.: Concurrency Control and Recovery in Database Systems. Addison-Wesley, Reading (1987) Google Scholar
  16. 16.
    Ansari, M., Ness, L., Rusinkiewicz, M., Sheth, A.P.: Using flexible transactions to support multi-system telecommunication applications. In: Proceedings of the 18th International Conference on Very Large Data Bases, pp. 65–76. Morgan Kaufmann, San Mateo (1992) Google Scholar
  17. 17.
    Chrysanthis, P.K., Ramamritham, K.: Synthesis of Extended Transaction Models. ACM Trans. Database Syst. 19(3), 451–491 (1994) CrossRefGoogle Scholar
  18. 18.
    Garcia-Molina, H., Salem, K.: Sagas. In: Proceedings of the 1987 ACM SIGMOD International Conference on Management of Data, 1987, pp. 249–259. ACM Press, New York (1987) CrossRefGoogle Scholar
  19. 19.
    Rusinkiewicz, M., Sheth, A.: Specification and Execution of Transactional Workflows. In: Kim, W. (ed.) Modern Database Systems, The Object Model Interoperability and Beyond, pp. 592–620. Addison-Wesley, ACM Press, New York (1995) Google Scholar
  20. 20.
    Sheth, A., Rusinkiewicz, M.: On transactional workflows. In: Special Issue on Workflow and Extended Transaction Systems IEEE Computer Society, Washington DC, 1993. IEEE Computer Society, Los Alamitos (1993) Google Scholar
  21. 21.
    Bhiri, S., Perrin, O., Godart, C.: Extending workflow patterns with transactional dependencies to define reliable composite web services. In: AICT/ICIW, 2006, p. 145. IEEE Computer Society, Los Alamitos (2006) Google Scholar
  22. 22.
    Gaaloul, W., Bhiri, S., Haller, A.: Mining and re-engineering transactional workflows for reliable executions. In: Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.) ER. Lecture Notes in Computer Science, vol. 4801, pp. 485–501. Springer, Berlin (2007) Google Scholar
  23. 23.
    van der Aalst, W.M.P., Barros, A.P., ter Hofstede, A.H.M., Kiepuszewski, B.: Advanced workflow patterns. In: Etzion, O., Scheuermann, P. (eds.) 5th IFCIS Int. Conf. on Cooperative Information Systems (CoopIS’00), Eilat, Israel, 6–8 September 2000. Lecture Notes in Computer Science, vol. 1901, pp. 18–29. Springer, Berlin (2000) Google Scholar
  24. 24.
    Elmagarmid, A., Leu, Y., Litwin, W., Rusinkiewicz, M.: A multidatabase transaction model for interbase. In: Proceedings of the Sixteenth International Conference on Very Large Databases, 1990, pp. 507–518. Morgan Kaufmann, San Mateo (1990) Google Scholar
  25. 25.
    Du, W., Davis, J., Shan, M.-C.: Flexible specification of workflow compensation scopes. In: Proceedings of the International ACM SIGGROUP Conference on Supporting Group Work: The Integration Challenge, 1997, pp. 309–316. ACM Press, New York (1997) CrossRefGoogle Scholar
  26. 26.
    Moss, J.: Nested transactions and reliable distributed computing. In: Proceedings of the 2nd Symposium on Reliability in Distributed Software and database Systems, 1982. IEEE Computer Society, Los Alamitos (1982) Google Scholar
  27. 27.
    Kiepuszewski, B., Muhlberger, R., Orlowska, M.E.: Flowback: providing backward recovery for workflow management systems. In: Proceedings of the 1998 ACM SIGMOD international conference on Management of Data, 1998, pp. 555–557. ACM Press, New York (1998) CrossRefGoogle Scholar
  28. 28.
    Eder, J., Liebhart, W.: The workflow activity model Wamo. In: CoopIS, pp. 87–98, 1995 Google Scholar
  29. 29.
    Grefen, P.W.P.J., Vonk, J., Boertjes, E., Apers, P.M.G.: Two-layer transaction management for workflow management applications. In: Hameurlain, A., Tjoa, A.M. (eds.) DEXA. Lecture Notes in Computer Science, vol. 1308, pp. 430–439. Springer, Berlin (1997) Google Scholar
  30. 30.
    Canals, G., Godart, C., Charoy, F., Molli, P., Skaf-Molli, H.: Coo approach to support cooperation in software developments. IEE Proc.—Softw. 145(2–3), 79–84 (1998) CrossRefGoogle Scholar
  31. 31.
    Kamath, M., Ramamritham, K.: Failure handling and coordinated execution of concurrent workflows. In: ICDE, 1998, pp. 334–341. IEEE Computer Society, Los Alamitos (1998) Google Scholar
  32. 32.
    van der Aalst, W.M.P., van Dongen, B.F.: Workflow mining: A survey of issues and approaches. In: Data and Knowledge Engineering, 2003 Google Scholar
  33. 33.
    Eder, J., Olivotto, G.E., Gruber, W.: A data warehouse for workflow logs. In: Proceedings of the First International Conference on Engineering and Deployment of Cooperative Information Systems, 2000, pp. 1–15. Springer, Berlin (2002) CrossRefGoogle Scholar
  34. 34.
    zur Muehlen, M.: Process-driven management information systems—combining data warehouses and workflow technology. In: Gavish, B. (ed.) Proceedings of the 4th International Conference on Electronic Commerce Research (ICECR-4), Dallas (TX), 2001, pp. 550–566. Southern Methodist University, Dallas (2001) Google Scholar
  35. 35.
    WorkFlow Management Coalition. Terminology and glossary. Technical report wfms-tc-1011. Technical report, Workflow Management Coalition Brussels, Belgium (1996) Google Scholar
  36. 36.
    van der Aalst, W.M.P., Weijters, T., Maruster, L.: Workflow mining: Discovering process models from event logs. IEEE Trans. Knowl. Data Eng. 16(9), 1128–1142 (2004) CrossRefGoogle Scholar
  37. 37.
    van Dongen, B.F., de Medeiros, A.K.A., Verbeek, H.M.W., Weijters, A.J.M.M., van der Aalst, W.M.P.: The prom framework: A new era in process mining tool support. In: Ciardo, G., Darondeau, P. (eds.) ICATPN. Lecture Notes in Computer Science, vol. 3536, pp. 444–454. Springer, Berlin (2005) Google Scholar
  38. 38.
    Gaaloul, W.: La découverte de workflow transactionnel pour la fiabilisation des exécutions. Ph.D. thesis, Université Henri Poincaré—Nancy 1, LORIA, 3 November (2006) Google Scholar
  39. 39.
    Attie, P.C., Singh, M.P., Sheth, A.P., Rusinkiewicz, M.: Specifying and enforcing intertask dependencies. In: Agrawal, R., Baker, S., Bell, D.A. (eds.) 19th International Conference on Very Large Data Bases, Proceedings, Dublin, Ireland, 24–27 August 1993, pp. 134–145. Morgan Kaufmann, San Mateo (1993) Google Scholar
  40. 40.
    Cook, J.E., Wolf, A.L.: Event-based detection of concurrency. In: Proceedings of the 6th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 1998, pp. 35–45. ACM Press, New York (1998) CrossRefGoogle Scholar
  41. 41.
    Mannila, H., Toivonen, H., Inkeri Verkamo, A.: Discovery of frequent episodes in event sequences. Data Min. Knowl. Discovery 1(3), 259–289 (1997) CrossRefGoogle Scholar
  42. 42.
    Cook, J.E., Wolf, A.L.: Software process validation: quantitatively measuring the correspondence of a process to a model. ACM Trans. Softw. Eng. Methodol. (TOSEM) 8(2), 147–176 (1999) CrossRefGoogle Scholar
  43. 43.
    van der Aalst, W.M.P.: Exterminating the dynamic change bug: a concrete approach to support workflow change. Inf. Syst. Front. 3(3), 297–317 (2001) CrossRefGoogle Scholar
  44. 44.
    Basten, T., van der Aalst, W.M.P.: Inheritance of behavior. J. Log. Algebr. Program. 47(2), 47–145 (2001) CrossRefMathSciNetMATHGoogle Scholar
  45. 45.
    Gaaloul, W., Godart, C.: A workflow mining tool based on logs statistical analysis. In: Maurer, F., Ruhe, G. (ed.) SEKE, pp. 37–44, 2006 Google Scholar
  46. 46.
    Jensen, K.: Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use, vol. 2. Springer, London (1995) MATHGoogle Scholar
  47. 47.
    Miguel, V., Charoy, F.: Bonita: workflow cooperative system. http://bonita.objectweb.org (2003)
  48. 48.
    Sun. Enterprise JavaBeansTM Specification, Version 2.1. Sun Microsystems, August 2002 Google Scholar
  49. 49.
    Harold, E.R.: Processing XML with Java: a guide to SAX, DOM, JDOM, JAXP, and TrAX (2003) Google Scholar
  50. 50.
    de Medeiros, A., Gunther, C.: Process mining: using cpn tools to create test logs for mining algorithms, 2005 Google Scholar
  51. 51.
    Baïna, K., Berrada, I., Kjiri, L.: A balanced scoreboard experiment for business process performance monitoring: case study. In: 1st International E-Business Conference (IEBC’05), Tunis, Tunisia, 24–25 June 2005 Google Scholar
  52. 52.
    Baïna, K., Gaaloul, W., El Khattabi, R., Mouhou, A.: Workflowminer: a new workflow patterns and performance analysis tool. In: Boudjlida, N., Cheng, D., Guelfi, N. (eds.) CAiSE Forum. CEUR Workshop Proceedings, vol. 231. CEUR-WS.org (2006) Google Scholar
  53. 53.
    van der Aalst, W.M.P., van Dongen, B.F., Günther, C.W., Mans, R.S., Alves de Medeiros, A.K., Rozinat, A., Rubin, V., Song, M., Verbeek, H.M.W., Weijters, A.J.M.M.: Prom 4.0: comprehensive support for eal process analysis. In: Kleijn, J., Yakovlev, A. (eds.) ICATPN. Lecture Notes in Computer Science, vol. 4546, pp. 484–494. Springer, Berlin (2007) Google Scholar
  54. 54.
    Mukherjee, S., Davulcu, H., Kifer, M., Senkul, P., Yang, G.: Logic based approaches to workflow modeling and verification. In: Chomicki, J., van der Meyden, R., Saake, G. (eds.) Logics for Emerging Applications of Databases, pp. 167–202. Springer, Berlin (2003) Google Scholar
  55. 55.
    Mueller, E.T.: Event calculus reasoning through satisfiability. J. Log. and Comput. 14(5), 703–730 (2004) CrossRefMathSciNetMATHGoogle Scholar
  56. 56.
    Gaaloul, W., Hauswirth, M., Rouached, M., Godart, C.: Verifying composite service recovery mechanisms: a transactional approach based on event calculus. In: 15th International Conference on Cooperative Information Systems CoopIS07, November, 2007 Google Scholar
  57. 57.
    Stratulat, S.: A general framework to build contextual cover set induction provers. J. Symb. Comput. 32(4), 403–445 (2001) CrossRefMathSciNetMATHGoogle Scholar
  58. 58.
    Woody Jin, W., Rusinkiewicz, M., Ness, L., Sheth, A.: Concurrency control and recovery of multidatabase work flows in telecommunication applications. In: Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, 1993, pp. 456–459. ACM Press, New York (1993) Google Scholar
  59. 59.
    Leymann, F.: Supporting business transactions via partial backward recovery in workflow management systems. In: Proceedings of BTW’95, 1995, pp. 51–70. Springer, Berlin (1995) Google Scholar
  60. 60.
    Ray, I., Xin, T.: Analysis of dependencies in advanced transaction models. Distrib. Parallel Databases 20(1), 5–27 (2006) CrossRefGoogle Scholar
  61. 61.
    Luo, Z., Sheth, A.P., Kochut, K., Arpinar, I.B.: Exception handling for conflict resolution in cross-organizational workflows. Distrib. Parallel Databases 13(3), 271–306 (2003) CrossRefGoogle Scholar
  62. 62.
    van der Aalst, W.M.P., Dumas, M., Ouyang, C., Rozinat, A., Verbeek, H.M.W.: Conformance checking of service behavior. ACM Trans. Internet Technol. (TOIT), Special issue on Middleware for Service-Oriented Computing (2007) Google Scholar
  63. 63.
    Sayal, M., Casati, F., Shan, M.C., Dayal, U.: Business process cockpit. In: Proceedings of 28th International Conference on Very Large Data Bases (VLDB’02), pp. 880–883, 2002 Google Scholar
  64. 64.
    Grigori, D., Casati, F., Castellanos, M., Dayal, U., Sayal, M., Shan, M.-C.: Business process intelligence. Comput. Ind. 53(3), 321–343 (2004) CrossRefGoogle Scholar
  65. 65.
    van der Aalst, W.M.P., de Medeiros, K.A.: Process mining and security: detecting anomalous process executions and checking process conformance. Electr. Notes Theor. Comput. Sci. 121, 3–21 (2005) CrossRefGoogle Scholar
  66. 66.
    Rozinat, A., van der Aalst, W.M.P.: Conformance testing: measuring the fit and appropriateness of event logs and process models. In: Business Process Management Workshops, pp. 163–176, 2005 Google Scholar
  67. 67.
    van der Aalst, W.M.P.: Business alignment: using process mining as a tool for delta analysis. In: CAiSE Workshops (2), pp. 138–145, 2004 Google Scholar
  68. 68.
    Benatallah, B., Casati, F., Toumani, F.: Analysis and management of web service protocols. In: ER, pp. 524–541, 2004 Google Scholar
  69. 69.
    Baïna, K., Benatallah, B., Casati, F., Toumani, F.: Model-driven web service development. In: CAiSE, pp. 290–306, 2004 Google Scholar
  70. 70.
    Agrawal, R., Gunopulos, D., Leymann, F.: Mining process models from workflow logs. In: Lecture Notes in Computer Science, vol. 1377, pp. 469–498. Springer, Berlin (1998) Google Scholar
  71. 71.
    Cook, J.E., Wolf, A.L.: Discovering models of software processes from event-based data. ACM Trans. Softw. Eng. Methodol. (TOSEM) 7(3), 215–249 (1998) CrossRefGoogle Scholar
  72. 72.
    Cook, J.E., Wolf, A.L.: Event-based detection of concurrency. In: Proceedings of the 6th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 1998, pp. 35–45. ACM Press, New York (1998) CrossRefGoogle Scholar
  73. 73.
    de Medeiros, A.K.A., Weijters, A.J.M.M., van der Aalst, W.M.P.: Genetic process mining: an experimental evaluation. Data Min. Knowl. Discov. 14(2), 245–304 (2007) CrossRefMathSciNetGoogle Scholar
  74. 74.
    Bergenthum, R., Desel, J., Lorenz, R., Mauser, S.: Process mining based on regions of languages. In: BPM, pp. 375–383, 2007 Google Scholar
  75. 75.
    Wen, L., van der Aalst, W.M.P., Wang, J., Sun, J.: Mining process models with non-free-choice constructs. Data Min. Knowl. Discov. 15(2), 145–180 (2007) CrossRefMathSciNetGoogle Scholar
  76. 76.
    Bhiri, S., Gaaloul, W., Godart, C.: Mining and improving composite web services recovery mechanisms. Int. J. Web Serv. Res. 5(2), 23–48 (2008) Google Scholar
  77. 77.
    Rouached, M., Gaaloul, W., van der Aalst, W.M.P., Bhiri, S., Godart, C.: Web service mining and verification of properties: an approach based on event calculus. In: Meersman, R., Tari, Z. (eds.) OTM Conferences (1). Lecture Notes in Computer Science, vol. 4275, pp. 408–425. Springer, Berlin (2006) Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2009

Authors and Affiliations

  • Walid Gaaloul
    • 1
  • Khaled Gaaloul
    • 3
    • 4
  • Sami Bhiri
    • 2
  • Armin Haller
    • 2
  • Manfred Hauswirth
    • 2
  1. 1.GET/INT (Institut National des Telecommunications)EvryFrance
  2. 2.DERI-NUIGIDA Business ParkGalwayIreland
  3. 3.SAP CEC KarlsruheKarlsruheGermany
  4. 4.LORIA-INRIA-UMR 7503Vandœuvre-les-Nancy CedexFrance

Personalised recommendations