Trusted Execution Environment for Decentralized Process Mining

LucaBarbaro3 48 views 70 slides Jun 10, 2024
Slide 1
Slide 1 of 70
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70

About This Presentation

Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.


Slide Content

Trusted Execution Environment for Decentralized Process Mining Valerio Goretti, Sapienza University of Rome Davide Basile, Sapienza University of Rome Luca Barbaro , Sapienza University of Rome – [email protected] Claudio Di Ciccio, Utrecht University

Outsourcing or not, that is the question 2

Outsourcing or not, that is the question 3

Decentralized process mining 4

Inter-organizational scenario 5

Inter- organizational scenario 6

Inter- organizational scenario 7

Inter- organizational scenario 8

Inter- organizational scenario 9

Inter- organizational scenario 10

Inter- organizational scenario 11

Inter- organizational scenario 12

Inter- organizational scenario 13

Inter- organizational scenario 14

Inter- organizational scenario 15

Inter- organizational scenario 16

Inter- organizational scenario 17

Inter- organizational scenario 18

Inter-organizational scenario National Institute of Statistics University 19

Confidential computing 20 Outsourcing of the event log introduces critical issues in terms of data secrecy What if the University disclose Alice’s hospitalization data with unauthorized parties ?

21 “ Confidential Computing is the protection of data in use by performing computation in a hardware-based, attested Trusted Execution Environment .” Confidential Computing Consortium Confidential computing

Our Requirements Organizational autonomy No fixed roles No event log alteration or abstraction No computational synchronization 22

No event log alteration or abstraction Results derived directly from the original information source No computational synchronization 23 Organizational autonomy No fixed roles

Once the logs are loaded, are then processed by a single machine No computational synchronization Organizational autonomy 24

Organizational autonomy Each participating organization retains the discretion to choose when and how mining operations are conducted No fixed roles 25

No fixed roles Peer-to-peer scenario in which organizations can simultaneously be data provisioners or miners 26

CONFINE Architecture 27

Log Recorder Secure Miner Node Node Secure Miner Node Event Log Exchange Node Provisioner Secure Miner Provisioner 28 High-level architecture

Miner Node Node Secure Miner Node Provisioner Node 29 Provisioner Secure Miner High-level architecture

Operating System PAIS Log Server Provisioner Node Provisioner Log Recorder Log Provider 30 Provisioner architecture Miner Node Secure Miner

Provisioner Node Operating System P.A.I.S. Log Server Execution environment: Data transfer 31 Provisioner Log Recorder Log Provider Provisioner deployment Miner Node Provisioner Secure Miner Log Receiver Log Manager Log Elaborator Log Requester

Miner Node Provisioner Secure Miner Log Receiver Log Manager Log Elaborator Log Requester 32 Miner architecture Provisioner Node Provisioner Operating System P.A.I.S. Log Server Execution environment: Data transfer 32 Provisioner Log Recorder Log Provider

Miner Node Provisioner Secure Miner Log Receiver Log Manager Log Elaborator Log Requester 33 Miner architecture Trusted Execution Environment Trusted App Event Log Data Execution environment:

Miner deployment 34 Miner Node Secure Miner Log Receiver Log Manager Log Elaborator Log Requester Trusted Execution Environment Trusted App Event Log Data Execution environment: Operating System TEE Interface Execution environment Method invocation

Miner Node Deployment Provisioner Node Provisioner P.A.I.S. Log Server Trusted Execution Environment Event Log Data Operating System TEE Interface Execution environment Execution environment Execution environment Operating System Trusted App Data transfer Method invocation Web communication 35 Secure Miner Log Receiver Log Manager Log Elaborator Log Requester

The CONFINE Protocol 36

Protocol Phases 37 Initialization Remote Attestation Data Transmission Computation Initialization Data Transmission Computation Remote Attestation

38 Initialization Data Transmission Computation Remote Attestation Request c ases r eferences Provisioner Node Miner Node TEE Trusted App: Secure Miner Log Requester Trusted Execution Environment Log Server: Log Provider

39 Initialization Data Transmission Computation Remote Attestation Request c ases r eferences Provisioner Node Miner Node TEE Trusted App: Secure Miner Log Requester Identify miner Trusted Execution Environment Log Server: Log Provider

40 Initialization Data Transmission Computation Remote Attestation Request c ases r eferences Provisioner Node Miner Node TEE Trusted App: Secure Miner Log Requester PAIS: Log Recorder Identify miner Access event log Trusted Execution Environment Log Server: Log Provider

41 Initialization Data Transmission Computation Remote Attestation Request c ases r eferences Provisioner Node Miner Node TEE Trusted App: Secure Miner Log Requester PAIS: Log Recorder Identify miner Access event log Send event log Trusted Execution Environment Log Server: Log Provider

42 Initialization Data Transmission Computation Remote Attestation Request c ases r eferences Provisioner Node Miner Node TEE Trusted App: Secure Miner Log Requester PAIS: Log Recorder Identify miner Access event log Send event log Send cases r eferences Trusted Execution Environment Log Server: Log Provider

Miner Node 43 Initialization Data Transmission Computation Remote Attestation TEE Request c ases Provisioner Node Miner Node TEE Trusted App: Secure Miner Log Requester Trusted Execution Environment Log Server: Log Provider

Miner Node 44 Initialization Data Transmission Computation Remote Attestation TEE Request c ases Provisioner Node Miner Node TEE Trusted App: Secure Miner Log Requester Trusted Execution Environment Request attestation data Log Receiver Log Server: Log Provider

Miner Node 45 Initialization Data Transmission Computation Remote Attestation TEE Request c ases Provisioner Node Miner Node TEE Trusted App: Secure Miner Log Requester Trusted Execution Environment Request attestation data Log Receiver Send report Log Server: Log Provider

Miner Node 46 Initialization Data Transmission Computation Remote Attestation TEE Request c ases Provisioner Node Miner Node TEE Trusted App: Secure Miner Log Requester Trusted Execution Environment Request attestation data Log Receiver Send report Identify miner and verify report Log Server: Log Provider

47 Initialization Data Transmission Computation Remote Attestation TEE Provisioner Node Miner Node TEE Trusted App: Secure Miner Trusted Execution Environment PAIS: Log Recorder Access event log Log Server: Log Provider Log Receiver

48 Initialization Data Transmission Computation Remote Attestation TEE Provisioner Node Miner Node TEE Trusted App: Secure Miner Trusted Execution Environment PAIS: Log Recorder Access event log Send event log Log Server: Log Provider Log Receiver

49 Initialization Data Transmission Computation Remote Attestation TEE Provisioner Node Miner Node TEE Trusted App: Secure Miner Trusted Execution Environment PAIS: Log Recorder Generate segments Access event log Send event log Log Server: Log Provider Log Receiver

50 Initialization Data Transmission Computation Remote Attestation TEE Provisioner Node Miner Node TEE Trusted App: Secure Miner Trusted Execution Environment PAIS: Log Recorder Generate segments Access event log Send event log Send encrypted segments Log Server: Log Provider Log Receiver

51 Initialization Data Transmission Computation Remote Attestation Provisioner Node Miner Node TEE PAIS: Log Recorder Generate segments Access event log Send event log Send encrypted segments Log Server: Log Provider Trusted App: Secure Miner Trusted Execution Environment Log Receiver Decrypt segment

52 Initialization Data Transmission Computation Remote Attestation Provisioner Node Miner Node TEE PAIS: Log Recorder Generate segments Access event log Send event log Send encrypted segments Log Server: Log Provider Trusted App: Secure Miner Trusted Execution Environment Log Receiver Decrypt segment Forward segment cases Log Manager

Provisioner Node Miner Node TEE PAIS: Log Recorder Generate segments Access event log Send event log Send encrypted segments Log Server: Log Provider Trusted App: Secure Miner Trusted Execution Environment Log Receiver Decrypt segment Forward segment cases Log Manager Merge and store 53 Initialization Data Transmission Computation Remote Attestation

Miner Node Miner Node Trusted App: Secure Miner Trusted Execution Environment Log Manager Forward merged cases Log Elaborator 54 Initialization Data Transmission Computation Remote Attestation

Miner Node 55 Initialization Data Transmission Computation Miner Node Miner Node Trusted App: Secure Miner Trusted Execution Environment Log Manager Forward merged cases Operating System Log Elaborator Run mining algorithm Remote Attestation

Miner Node 56 Initialization Data Transmission Computation Miner Node Miner Node Trusted App: Secure Miner Trusted Execution Environment Log Manager Forward merged cases Operating System Log Elaborator Run mining algorithm Remote Attestation Operating System TEE Interface result Return

Evaluation 57

58 Name Type Activities Cases Max events Min events Avg events Parties Motivating scenario Synthetic 19 1000 18 9 14 3 Sepsis Real 16 1050 185 3 15 3 BPIC 2013 Real 7 1487 123 1 9 3 Event Logs

Memory Usage 59

Memory Usage 60

Memory Usage 61

Memory Usage 62

Memory Usage 63

Memory Usage 64

Memory Usage 65

Scalability 66

Scalability 67

Future Work 68

Clock synch Future Work More algorithms integration Utilization rules 69 Agreement on case identification

https:// github.com / Process -in-Chains/CONFINE Trusted Execution Environment for Decentralized Process Mining Valerio Goretti, Sapienza University of Rome Davide Basile, Sapienza University of Rome Luca Barbaro , Sapienza University of Rome Claudio Di Ciccio, Utrecht University
Tags