SlideShare a Scribd company logo
1 of 27
Secure Multi-Party
Computation for Inter-
Organizational Process Mining
Gamal Elkoumy1,
Stephan A. Fahrenkrog-Petersen2, Marlon Dumas1,
Peeter Laud3, Alisa Pankova3, and Matthias Weidlich2
1University of Tartu, Tartu, Estonia
2Humboldt-Universität zu Berlin, Berlin, Germany
3Cybernetica, Tartu, Estonia
gamal.elkoumy@ut.ee
1
Inter-organizational Process Model
Airport
Airline Company
Process Mining
2
Aircraft ground handling process
3
Multi-Party Computation based Process Mining
Airport
Airline Company
Process Mining
Compute
Node
Compute
Node
Compute
Node
Query
Engine
Secret Shares Secret Shares
4
Privacy-Preserving Process Mining
• Pika et al 2019 discussed the necessity of privacy-preserving process mining, due
to legal developments such as the GDPR.
• Existing techniques adopted anonymization of the event data to achieve privacy
preserving process mining such as algorithms have been published using k-anonymity
and t-closeness (Fahrenkrog-Petersen et al 2019 and Sweeney et al 2002).
• Other techniques incorporates privacy consideration in process mining techniques.
• Tools like ELPaaS (Bauer et al 2019) have been presented.
• Tillem et al 2017 discussed the inter-organizational settings using encryption, but
they assumed the existence of a trusted third party.
5
Inter-Organizational Process Mining
• Approaches for the automated discovery of process models in an inter-
organizational setting have been considered without addressing privacy
concerns [Schulz et al 2004,and Zeng et al 2013].
• Techniques to compare executions of the same process across multiple
organizations have been presented without considering privacy requirements
[Buijs et al. 2011, and Aksu et al. 2016].
• Liu et al. 2019 proposed a privacy-preserving inter-organizational process
mining, with the assumption of sharing confidential information with a trusted
third party.
6
Secure Multi-Party
Computation (MPC)
• Secure Multi-Party Computation is a
cryptographic functionality that allows n
parties to cooperatively evaluate a
function with no party or an allowed
coalition parties learning nothing besides
their own inputs and outputs.
https://sunfish-platform-documentation.readthedocs.io/en/latest/smc.html
7
Secure Multi-Party
Computation (MPC)
• Homomorphic secret sharing [Shamir et
al. 1979] is a common basis for MPC
protocols.
• In such protocols, the arithmetic or
Boolean circuit representing the
functionality is evaluated gate-by-gate,
constructing secret-shared outputs of
gates from their secret-shared inputs.
https://sunfish-platform-documentation.readthedocs.io/en/latest/smc.html
8
MPC based Process Mining
• In this paper, we build on top of
Sharemind (Bogdanov et al 2008),
whose main protocol set is based on
secret-sharing.
• The Sharemind framework provides
its own programming language,
namely the SecreC language.
9
Security Model
• In this paper, we use three-party MPC protocol set of
Sharemind that is secure against honest-but-curios
adversaries.
• Which means that as long as the parties are following
the protocols honestly and don’t collude, none of
them will learn more than the size of the data.
• We assume that input parties are sharing with each
other the number of activities and the maximum
trace length in their event logs. This is needed to do
preprocessing.
10
Security Model
• Even with encrypted data, contextual knowledge
might lead to leakage of some data (Majid et al
2018):
• An adversarial party might learn the shortest or
the longest trace and with the domain
experience they can reveal the actual activities.
• For such a case we are performing padding to the
logs, so the logs will have all the traces with the
same length, which is the maximum trace length.
https://www.pngitem.com/middle/ioRihxT_cyber-attack-clipart-hd-png-download/
11
Security Model
• Even with encrypted data, contextual knowledge
might lead to leakage of some data:
• A leakage might happen due to frequent
pattern mining or any access pattern attacks.
• To prevent such an attack, we use privacy-
preserving quicksort algorithm (Hamada et al
2012) We also use one-hot encoding and
privacy-preserving outer-product to update
the DFG Matrix (Laud et al 2017)
https://www.pngitem.com/middle/ioRihxT_cyber-attack-clipart-hd-png-download/
12
Model for Inter-Organizational Process Mining
Airport Event Log
Case
ID
Activity Time stamp
1 Check-In of
Passengers
02/01/20xx 12:31:57
1 Security Check 02/01/20xx 13:02:09
1 Boarding 02/01/20xx 14:22:45
2 Check-In of
Passengers
02/01/20xx 12:55:43
2 Processing
Luggage
02/01/20xx 14:21:56
Airline Event Log
Case
ID
Activity Time stamp
1 Close Doors 02/01/20xx 15:00:00
1 Aircraft ready for
take-off
02/01/20xx 15:07:00
3 Calculate Fuel
demand
03/01/20xx 10:24:45
3 Preparing Aircraft 03/01/20xx 12:44:23
3 Welcome
Passengers
03/01/20xx 13:32:12
13
MPC Architecture for Process Mining
14
Processing Steps Example
15
Processing Steps Example
16
Source Code
A GitHub repository with the source
code, installation steps and example
event logs can be found on:
https://github.com/Elkoumy/shareprom
17
Research Questions
• RQ1: How do the characteristics of the input event logs influence the
performance of the secure multi-party computation of the DFG?
• RQ2: What is the effect of increasing the number of parallel chunks on
the performance of the multi-party computation of the DFG?
18
Event Logs
Event Log # Events # Cases # Activities # Events per Case
Avg Max Min
BPIC 2013 6,660 1,432 6 4,478 35 1
Credit Requirement 50,525 10,034 8 15 15 15
Traffic Fines 561,470 150,370 11 3.73 20 2
19
Runtime Experiment
20
Throughput Experiment
21
Communication Overhead Experiment
22
Threats to validity
• The evaluation has the following limitations:
• The event logs used in the evaluation are intra-organizational event logs,
which we have split into separate logs to simulate the inter-organizational
setting.
• It is possible that they don’t capture the communication pattern of inter-
organizational processes.
• The number of event logs is reduced, which limits the generalizability of the
conclusions.
• The proposed technique can handle small-to-medium-sized logs, with
relatively short traces.
23
Conclusion
• This paper introduced a framework that enables two or more parties to
perform basic process mining operations over their partial logs of an inter-
organizational process held by each party.
• The framework only reveals the output of the queries that the parties opt
to disclose and three high-level log statistics; the number of traces per log,
the number of event types and the maximum trace length.
• An evaluation using real world event logs shows that it is possible to
compute the DFG with execution times that make this technique usable in
practice.
24
Future Work
• In future work, we will combine the proposed approach with differential
privacy approaches to noisify the DFG and the outputs from the framework.
• Another avenue for future work is to apply the framework to the problem of
business process management benchmarks, where an organization is
interested in knowing their performance in comparison to the industry
standards and other performers.
25
Questions
• Please send you question via email to :
gamal.elkoumy@ut.ee
26
Thank You!
27

More Related Content

Similar to Secure multi party computation for inter-organizational process mining

Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...
Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...
Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...Editor IJCATR
 
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...IRJET Journal
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGIJNSA Journal
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGIJNSA Journal
 
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
Efficient Data Mining Of Association Rules in Horizontally Distributed DatabasesEfficient Data Mining Of Association Rules in Horizontally Distributed Databases
Efficient Data Mining Of Association Rules in Horizontally Distributed Databasesijircee
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...dbpublications
 
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...IJSRED
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudIJTET Journal
 
Securezy - A Penetration Testing Toolbox
Securezy - A Penetration Testing ToolboxSecurezy - A Penetration Testing Toolbox
Securezy - A Penetration Testing ToolboxIRJET Journal
 
SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTION
SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTIONSECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTION
SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTIONacijjournal
 
SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTION
SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTIONSECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTION
SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTIONacijjournal
 
Collecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCollecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCSITiaesprime
 
Review and Analysis of Self Destruction of Data in Cloud Computing
Review and Analysis of Self Destruction of Data in Cloud ComputingReview and Analysis of Self Destruction of Data in Cloud Computing
Review and Analysis of Self Destruction of Data in Cloud ComputingIRJET Journal
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdprUlf Mattsson
 
IRJET- E-Commerce Website using Skyline Queries
IRJET-  	  E-Commerce Website using Skyline QueriesIRJET-  	  E-Commerce Website using Skyline Queries
IRJET- E-Commerce Website using Skyline QueriesIRJET Journal
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET Journal
 
D-Eclat Association Rules on Vertically Partitioned Dynamic Data to Outsource...
D-Eclat Association Rules on Vertically Partitioned Dynamic Data to Outsource...D-Eclat Association Rules on Vertically Partitioned Dynamic Data to Outsource...
D-Eclat Association Rules on Vertically Partitioned Dynamic Data to Outsource...IRJET Journal
 

Similar to Secure multi party computation for inter-organizational process mining (20)

Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...
Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...
Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...
 
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
 
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
Efficient Data Mining Of Association Rules in Horizontally Distributed DatabasesEfficient Data Mining Of Association Rules in Horizontally Distributed Databases
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
 
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
Securezy - A Penetration Testing Toolbox
Securezy - A Penetration Testing ToolboxSecurezy - A Penetration Testing Toolbox
Securezy - A Penetration Testing Toolbox
 
SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTION
SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTIONSECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTION
SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTION
 
SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTION
SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTIONSECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTION
SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTION
 
Collecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCollecting and analyzing network-based evidence
Collecting and analyzing network-based evidence
 
Review and Analysis of Self Destruction of Data in Cloud Computing
Review and Analysis of Self Destruction of Data in Cloud ComputingReview and Analysis of Self Destruction of Data in Cloud Computing
Review and Analysis of Self Destruction of Data in Cloud Computing
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
 
IRJET- E-Commerce Website using Skyline Queries
IRJET-  	  E-Commerce Website using Skyline QueriesIRJET-  	  E-Commerce Website using Skyline Queries
IRJET- E-Commerce Website using Skyline Queries
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
 
D-Eclat Association Rules on Vertically Partitioned Dynamic Data to Outsource...
D-Eclat Association Rules on Vertically Partitioned Dynamic Data to Outsource...D-Eclat Association Rules on Vertically Partitioned Dynamic Data to Outsource...
D-Eclat Association Rules on Vertically Partitioned Dynamic Data to Outsource...
 

Recently uploaded

Soil and Water Conservation Engineering (SWCE) is a specialized field of stud...
Soil and Water Conservation Engineering (SWCE) is a specialized field of stud...Soil and Water Conservation Engineering (SWCE) is a specialized field of stud...
Soil and Water Conservation Engineering (SWCE) is a specialized field of stud...yogeshlabana357357
 
Costs to heap leach gold ore tailings in Karamoja region of Uganda
Costs to heap leach gold ore tailings in Karamoja region of UgandaCosts to heap leach gold ore tailings in Karamoja region of Uganda
Costs to heap leach gold ore tailings in Karamoja region of UgandaTimothyOkuna
 
Molecular and Cellular Mechanism of Action of Hormones such as Growth Hormone...
Molecular and Cellular Mechanism of Action of Hormones such as Growth Hormone...Molecular and Cellular Mechanism of Action of Hormones such as Growth Hormone...
Molecular and Cellular Mechanism of Action of Hormones such as Growth Hormone...Ansari Aashif Raza Mohd Imtiyaz
 
Heads-Up Multitasker: CHI 2024 Presentation.pdf
Heads-Up Multitasker: CHI 2024 Presentation.pdfHeads-Up Multitasker: CHI 2024 Presentation.pdf
Heads-Up Multitasker: CHI 2024 Presentation.pdfbyp19971001
 
SaffronCrocusGenomicsThessalonikiOnlineMay2024TalkOnline.pptx
SaffronCrocusGenomicsThessalonikiOnlineMay2024TalkOnline.pptxSaffronCrocusGenomicsThessalonikiOnlineMay2024TalkOnline.pptx
SaffronCrocusGenomicsThessalonikiOnlineMay2024TalkOnline.pptxPat (JS) Heslop-Harrison
 
NUMERICAL Proof Of TIme Electron Theory.
NUMERICAL Proof Of TIme Electron Theory.NUMERICAL Proof Of TIme Electron Theory.
NUMERICAL Proof Of TIme Electron Theory.syedmuneemqadri
 
Heat Units in plant physiology and the importance of Growing Degree days
Heat Units in plant physiology and the importance of Growing Degree daysHeat Units in plant physiology and the importance of Growing Degree days
Heat Units in plant physiology and the importance of Growing Degree daysBrahmesh Reddy B R
 
TEST BANK for Organic Chemistry 6th Edition.pdf
TEST BANK for Organic Chemistry 6th Edition.pdfTEST BANK for Organic Chemistry 6th Edition.pdf
TEST BANK for Organic Chemistry 6th Edition.pdfmarcuskenyatta275
 
X-rays from a Central “Exhaust Vent” of the Galactic Center Chimney
X-rays from a Central “Exhaust Vent” of the Galactic Center ChimneyX-rays from a Central “Exhaust Vent” of the Galactic Center Chimney
X-rays from a Central “Exhaust Vent” of the Galactic Center ChimneySérgio Sacani
 
Classification of Kerogen, Perspective on palynofacies in depositional envi...
Classification of Kerogen,  Perspective on palynofacies in depositional  envi...Classification of Kerogen,  Perspective on palynofacies in depositional  envi...
Classification of Kerogen, Perspective on palynofacies in depositional envi...Sangram Sahoo
 
Fun for mover student's book- English book for teaching.pdf
Fun for mover student's book- English book for teaching.pdfFun for mover student's book- English book for teaching.pdf
Fun for mover student's book- English book for teaching.pdfhoangquan21999
 
Information science research with large language models: between science and ...
Information science research with large language models: between science and ...Information science research with large language models: between science and ...
Information science research with large language models: between science and ...Fabiano Dalpiaz
 
THE FUNDAMENTAL UNIT OF LIFE CLASS IX.ppt
THE FUNDAMENTAL UNIT OF LIFE CLASS IX.pptTHE FUNDAMENTAL UNIT OF LIFE CLASS IX.ppt
THE FUNDAMENTAL UNIT OF LIFE CLASS IX.pptsinghnarendra5386
 
A Scientific PowerPoint on Albert Einstein
A Scientific PowerPoint on Albert EinsteinA Scientific PowerPoint on Albert Einstein
A Scientific PowerPoint on Albert Einsteinxgamestudios8
 
Efficient spin-up of Earth System Models usingsequence acceleration
Efficient spin-up of Earth System Models usingsequence accelerationEfficient spin-up of Earth System Models usingsequence acceleration
Efficient spin-up of Earth System Models usingsequence accelerationSérgio Sacani
 
PHOTOSYNTHETIC BACTERIA (OXYGENIC AND ANOXYGENIC)
PHOTOSYNTHETIC BACTERIA  (OXYGENIC AND ANOXYGENIC)PHOTOSYNTHETIC BACTERIA  (OXYGENIC AND ANOXYGENIC)
PHOTOSYNTHETIC BACTERIA (OXYGENIC AND ANOXYGENIC)kushbuR
 
Manganese‐RichSandstonesasanIndicatorofAncientOxic LakeWaterConditionsinGale...
Manganese‐RichSandstonesasanIndicatorofAncientOxic  LakeWaterConditionsinGale...Manganese‐RichSandstonesasanIndicatorofAncientOxic  LakeWaterConditionsinGale...
Manganese‐RichSandstonesasanIndicatorofAncientOxic LakeWaterConditionsinGale...Sérgio Sacani
 
TransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRings
TransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRingsTransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRings
TransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRingsSérgio Sacani
 

Recently uploaded (20)

Soil and Water Conservation Engineering (SWCE) is a specialized field of stud...
Soil and Water Conservation Engineering (SWCE) is a specialized field of stud...Soil and Water Conservation Engineering (SWCE) is a specialized field of stud...
Soil and Water Conservation Engineering (SWCE) is a specialized field of stud...
 
Costs to heap leach gold ore tailings in Karamoja region of Uganda
Costs to heap leach gold ore tailings in Karamoja region of UgandaCosts to heap leach gold ore tailings in Karamoja region of Uganda
Costs to heap leach gold ore tailings in Karamoja region of Uganda
 
Molecular and Cellular Mechanism of Action of Hormones such as Growth Hormone...
Molecular and Cellular Mechanism of Action of Hormones such as Growth Hormone...Molecular and Cellular Mechanism of Action of Hormones such as Growth Hormone...
Molecular and Cellular Mechanism of Action of Hormones such as Growth Hormone...
 
Heads-Up Multitasker: CHI 2024 Presentation.pdf
Heads-Up Multitasker: CHI 2024 Presentation.pdfHeads-Up Multitasker: CHI 2024 Presentation.pdf
Heads-Up Multitasker: CHI 2024 Presentation.pdf
 
SaffronCrocusGenomicsThessalonikiOnlineMay2024TalkOnline.pptx
SaffronCrocusGenomicsThessalonikiOnlineMay2024TalkOnline.pptxSaffronCrocusGenomicsThessalonikiOnlineMay2024TalkOnline.pptx
SaffronCrocusGenomicsThessalonikiOnlineMay2024TalkOnline.pptx
 
NUMERICAL Proof Of TIme Electron Theory.
NUMERICAL Proof Of TIme Electron Theory.NUMERICAL Proof Of TIme Electron Theory.
NUMERICAL Proof Of TIme Electron Theory.
 
Heat Units in plant physiology and the importance of Growing Degree days
Heat Units in plant physiology and the importance of Growing Degree daysHeat Units in plant physiology and the importance of Growing Degree days
Heat Units in plant physiology and the importance of Growing Degree days
 
TEST BANK for Organic Chemistry 6th Edition.pdf
TEST BANK for Organic Chemistry 6th Edition.pdfTEST BANK for Organic Chemistry 6th Edition.pdf
TEST BANK for Organic Chemistry 6th Edition.pdf
 
X-rays from a Central “Exhaust Vent” of the Galactic Center Chimney
X-rays from a Central “Exhaust Vent” of the Galactic Center ChimneyX-rays from a Central “Exhaust Vent” of the Galactic Center Chimney
X-rays from a Central “Exhaust Vent” of the Galactic Center Chimney
 
Classification of Kerogen, Perspective on palynofacies in depositional envi...
Classification of Kerogen,  Perspective on palynofacies in depositional  envi...Classification of Kerogen,  Perspective on palynofacies in depositional  envi...
Classification of Kerogen, Perspective on palynofacies in depositional envi...
 
Fun for mover student's book- English book for teaching.pdf
Fun for mover student's book- English book for teaching.pdfFun for mover student's book- English book for teaching.pdf
Fun for mover student's book- English book for teaching.pdf
 
Information science research with large language models: between science and ...
Information science research with large language models: between science and ...Information science research with large language models: between science and ...
Information science research with large language models: between science and ...
 
THE FUNDAMENTAL UNIT OF LIFE CLASS IX.ppt
THE FUNDAMENTAL UNIT OF LIFE CLASS IX.pptTHE FUNDAMENTAL UNIT OF LIFE CLASS IX.ppt
THE FUNDAMENTAL UNIT OF LIFE CLASS IX.ppt
 
A Scientific PowerPoint on Albert Einstein
A Scientific PowerPoint on Albert EinsteinA Scientific PowerPoint on Albert Einstein
A Scientific PowerPoint on Albert Einstein
 
Efficient spin-up of Earth System Models usingsequence acceleration
Efficient spin-up of Earth System Models usingsequence accelerationEfficient spin-up of Earth System Models usingsequence acceleration
Efficient spin-up of Earth System Models usingsequence acceleration
 
PHOTOSYNTHETIC BACTERIA (OXYGENIC AND ANOXYGENIC)
PHOTOSYNTHETIC BACTERIA  (OXYGENIC AND ANOXYGENIC)PHOTOSYNTHETIC BACTERIA  (OXYGENIC AND ANOXYGENIC)
PHOTOSYNTHETIC BACTERIA (OXYGENIC AND ANOXYGENIC)
 
Manganese‐RichSandstonesasanIndicatorofAncientOxic LakeWaterConditionsinGale...
Manganese‐RichSandstonesasanIndicatorofAncientOxic  LakeWaterConditionsinGale...Manganese‐RichSandstonesasanIndicatorofAncientOxic  LakeWaterConditionsinGale...
Manganese‐RichSandstonesasanIndicatorofAncientOxic LakeWaterConditionsinGale...
 
TransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRings
TransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRingsTransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRings
TransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRings
 
HIV AND INFULENZA VIRUS PPT HIV PPT INFULENZA VIRUS PPT
HIV AND INFULENZA VIRUS PPT HIV PPT  INFULENZA VIRUS PPTHIV AND INFULENZA VIRUS PPT HIV PPT  INFULENZA VIRUS PPT
HIV AND INFULENZA VIRUS PPT HIV PPT INFULENZA VIRUS PPT
 
ABHISHEK ANTIBIOTICS PPT MICROBIOLOGY // USES OF ANTIOBIOTICS TYPES OF ANTIB...
ABHISHEK ANTIBIOTICS PPT MICROBIOLOGY  // USES OF ANTIOBIOTICS TYPES OF ANTIB...ABHISHEK ANTIBIOTICS PPT MICROBIOLOGY  // USES OF ANTIOBIOTICS TYPES OF ANTIB...
ABHISHEK ANTIBIOTICS PPT MICROBIOLOGY // USES OF ANTIOBIOTICS TYPES OF ANTIB...
 

Secure multi party computation for inter-organizational process mining

  • 1. Secure Multi-Party Computation for Inter- Organizational Process Mining Gamal Elkoumy1, Stephan A. Fahrenkrog-Petersen2, Marlon Dumas1, Peeter Laud3, Alisa Pankova3, and Matthias Weidlich2 1University of Tartu, Tartu, Estonia 2Humboldt-Universität zu Berlin, Berlin, Germany 3Cybernetica, Tartu, Estonia gamal.elkoumy@ut.ee 1
  • 4. Multi-Party Computation based Process Mining Airport Airline Company Process Mining Compute Node Compute Node Compute Node Query Engine Secret Shares Secret Shares 4
  • 5. Privacy-Preserving Process Mining • Pika et al 2019 discussed the necessity of privacy-preserving process mining, due to legal developments such as the GDPR. • Existing techniques adopted anonymization of the event data to achieve privacy preserving process mining such as algorithms have been published using k-anonymity and t-closeness (Fahrenkrog-Petersen et al 2019 and Sweeney et al 2002). • Other techniques incorporates privacy consideration in process mining techniques. • Tools like ELPaaS (Bauer et al 2019) have been presented. • Tillem et al 2017 discussed the inter-organizational settings using encryption, but they assumed the existence of a trusted third party. 5
  • 6. Inter-Organizational Process Mining • Approaches for the automated discovery of process models in an inter- organizational setting have been considered without addressing privacy concerns [Schulz et al 2004,and Zeng et al 2013]. • Techniques to compare executions of the same process across multiple organizations have been presented without considering privacy requirements [Buijs et al. 2011, and Aksu et al. 2016]. • Liu et al. 2019 proposed a privacy-preserving inter-organizational process mining, with the assumption of sharing confidential information with a trusted third party. 6
  • 7. Secure Multi-Party Computation (MPC) • Secure Multi-Party Computation is a cryptographic functionality that allows n parties to cooperatively evaluate a function with no party or an allowed coalition parties learning nothing besides their own inputs and outputs. https://sunfish-platform-documentation.readthedocs.io/en/latest/smc.html 7
  • 8. Secure Multi-Party Computation (MPC) • Homomorphic secret sharing [Shamir et al. 1979] is a common basis for MPC protocols. • In such protocols, the arithmetic or Boolean circuit representing the functionality is evaluated gate-by-gate, constructing secret-shared outputs of gates from their secret-shared inputs. https://sunfish-platform-documentation.readthedocs.io/en/latest/smc.html 8
  • 9. MPC based Process Mining • In this paper, we build on top of Sharemind (Bogdanov et al 2008), whose main protocol set is based on secret-sharing. • The Sharemind framework provides its own programming language, namely the SecreC language. 9
  • 10. Security Model • In this paper, we use three-party MPC protocol set of Sharemind that is secure against honest-but-curios adversaries. • Which means that as long as the parties are following the protocols honestly and don’t collude, none of them will learn more than the size of the data. • We assume that input parties are sharing with each other the number of activities and the maximum trace length in their event logs. This is needed to do preprocessing. 10
  • 11. Security Model • Even with encrypted data, contextual knowledge might lead to leakage of some data (Majid et al 2018): • An adversarial party might learn the shortest or the longest trace and with the domain experience they can reveal the actual activities. • For such a case we are performing padding to the logs, so the logs will have all the traces with the same length, which is the maximum trace length. https://www.pngitem.com/middle/ioRihxT_cyber-attack-clipart-hd-png-download/ 11
  • 12. Security Model • Even with encrypted data, contextual knowledge might lead to leakage of some data: • A leakage might happen due to frequent pattern mining or any access pattern attacks. • To prevent such an attack, we use privacy- preserving quicksort algorithm (Hamada et al 2012) We also use one-hot encoding and privacy-preserving outer-product to update the DFG Matrix (Laud et al 2017) https://www.pngitem.com/middle/ioRihxT_cyber-attack-clipart-hd-png-download/ 12
  • 13. Model for Inter-Organizational Process Mining Airport Event Log Case ID Activity Time stamp 1 Check-In of Passengers 02/01/20xx 12:31:57 1 Security Check 02/01/20xx 13:02:09 1 Boarding 02/01/20xx 14:22:45 2 Check-In of Passengers 02/01/20xx 12:55:43 2 Processing Luggage 02/01/20xx 14:21:56 Airline Event Log Case ID Activity Time stamp 1 Close Doors 02/01/20xx 15:00:00 1 Aircraft ready for take-off 02/01/20xx 15:07:00 3 Calculate Fuel demand 03/01/20xx 10:24:45 3 Preparing Aircraft 03/01/20xx 12:44:23 3 Welcome Passengers 03/01/20xx 13:32:12 13
  • 14. MPC Architecture for Process Mining 14
  • 17. Source Code A GitHub repository with the source code, installation steps and example event logs can be found on: https://github.com/Elkoumy/shareprom 17
  • 18. Research Questions • RQ1: How do the characteristics of the input event logs influence the performance of the secure multi-party computation of the DFG? • RQ2: What is the effect of increasing the number of parallel chunks on the performance of the multi-party computation of the DFG? 18
  • 19. Event Logs Event Log # Events # Cases # Activities # Events per Case Avg Max Min BPIC 2013 6,660 1,432 6 4,478 35 1 Credit Requirement 50,525 10,034 8 15 15 15 Traffic Fines 561,470 150,370 11 3.73 20 2 19
  • 23. Threats to validity • The evaluation has the following limitations: • The event logs used in the evaluation are intra-organizational event logs, which we have split into separate logs to simulate the inter-organizational setting. • It is possible that they don’t capture the communication pattern of inter- organizational processes. • The number of event logs is reduced, which limits the generalizability of the conclusions. • The proposed technique can handle small-to-medium-sized logs, with relatively short traces. 23
  • 24. Conclusion • This paper introduced a framework that enables two or more parties to perform basic process mining operations over their partial logs of an inter- organizational process held by each party. • The framework only reveals the output of the queries that the parties opt to disclose and three high-level log statistics; the number of traces per log, the number of event types and the maximum trace length. • An evaluation using real world event logs shows that it is possible to compute the DFG with execution times that make this technique usable in practice. 24
  • 25. Future Work • In future work, we will combine the proposed approach with differential privacy approaches to noisify the DFG and the outputs from the framework. • Another avenue for future work is to apply the framework to the problem of business process management benchmarks, where an organization is interested in knowing their performance in comparison to the industry standards and other performers. 25
  • 26. Questions • Please send you question via email to : gamal.elkoumy@ut.ee 26