Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
48 views
70 slides
Jun 10, 2024
Slide 1 of 70
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
About This Presentation
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
Size: 6.16 MB
Language: en
Added: Jun 10, 2024
Slides: 70 pages
Slide Content
Trusted Execution Environment for Decentralized Process Mining Valerio Goretti, Sapienza University of Rome Davide Basile, Sapienza University of Rome Luca Barbaro , Sapienza University of Rome – [email protected] Claudio Di Ciccio, Utrecht University
Outsourcing or not, that is the question 2
Outsourcing or not, that is the question 3
Decentralized process mining 4
Inter-organizational scenario 5
Inter- organizational scenario 6
Inter- organizational scenario 7
Inter- organizational scenario 8
Inter- organizational scenario 9
Inter- organizational scenario 10
Inter- organizational scenario 11
Inter- organizational scenario 12
Inter- organizational scenario 13
Inter- organizational scenario 14
Inter- organizational scenario 15
Inter- organizational scenario 16
Inter- organizational scenario 17
Inter- organizational scenario 18
Inter-organizational scenario National Institute of Statistics University 19
Confidential computing 20 Outsourcing of the event log introduces critical issues in terms of data secrecy What if the University disclose Alice’s hospitalization data with unauthorized parties ?
21 “ Confidential Computing is the protection of data in use by performing computation in a hardware-based, attested Trusted Execution Environment .” Confidential Computing Consortium Confidential computing
Our Requirements Organizational autonomy No fixed roles No event log alteration or abstraction No computational synchronization 22
No event log alteration or abstraction Results derived directly from the original information source No computational synchronization 23 Organizational autonomy No fixed roles
Once the logs are loaded, are then processed by a single machine No computational synchronization Organizational autonomy 24
Organizational autonomy Each participating organization retains the discretion to choose when and how mining operations are conducted No fixed roles 25
No fixed roles Peer-to-peer scenario in which organizations can simultaneously be data provisioners or miners 26
Miner Node 56 Initialization Data Transmission Computation Miner Node Miner Node Trusted App: Secure Miner Trusted Execution Environment Log Manager Forward merged cases Operating System Log Elaborator Run mining algorithm Remote Attestation Operating System TEE Interface result Return
Evaluation 57
58 Name Type Activities Cases Max events Min events Avg events Parties Motivating scenario Synthetic 19 1000 18 9 14 3 Sepsis Real 16 1050 185 3 15 3 BPIC 2013 Real 7 1487 123 1 9 3 Event Logs
Memory Usage 59
Memory Usage 60
Memory Usage 61
Memory Usage 62
Memory Usage 63
Memory Usage 64
Memory Usage 65
Scalability 66
Scalability 67
Future Work 68
Clock synch Future Work More algorithms integration Utilization rules 69 Agreement on case identification
https:// github.com / Process -in-Chains/CONFINE Trusted Execution Environment for Decentralized Process Mining Valerio Goretti, Sapienza University of Rome Davide Basile, Sapienza University of Rome Luca Barbaro , Sapienza University of Rome Claudio Di Ciccio, Utrecht University