SlideShare a Scribd company logo
CAKE
Sharing Slices of Confidential Data on Blockchain
Edoardo Marangone
Michele Spina
Claudio Di Ciccio | https://diciccio.net/ | c.diciccio@uu.nl
Ingo Weber
While collaborators cooperate…
06/06/2024
Marangone, Spina, Di Ciccio, Weber
Signing of the Peace Protocol Between Spain and the United States, August 12, 1898
(source: https://library.whitehousehistory.org/fotoweb/archives/5017-Digital-Library/Main%20Index/Artwork/520.tif.info)
2
… the whole network observes
06/06/2024
Marangone, Spina, Di Ciccio, Weber
3
Scene from The Truman Show (1998). Image source: https://redeemingculture.com/film/drama/4106-the-truman-show-empathy-and-reality
Fix this image in your memory
06/06/2024
Marangone, Spina, Di Ciccio, Weber
Image source: https://www.makinggameofthrones.com/production-diary/2013/5/29/leeches-dragons-and-a-bear-behind-the-scenes-of-episodes-307.html
4
Is this the same image?
06/06/2024
Marangone, Spina, Di Ciccio, Weber
Image source: https://www.makinggameofthrones.com/production-diary/2013/5/29/leeches-dragons-and-a-bear-behind-the-scenes-of-episodes-307.html
5
Validation v. understanding
06/06/2024
Marangone, Spina, Di Ciccio, Weber
6
Image source: https://www.makinggameofthrones.com/production-diary/2013/5/29/leeches-dragons-and-a-bear-behind-the-scenes-of-episodes-307.html
Business Process Model and Notation (BPMN)
collaboration diagram
06/06/2024
Marangone, Spina, Di Ciccio, Weber
7
The message, in clear
(as seen by the manufacturer)
06/06/2024
Marangone, Spina, Di Ciccio, Weber
8
0xfd9ffe3578a42d81c4684bd47e6575d9a8f10cc6dab984bd7e19ee0dbacb6287
Hash:
The message
(as seen by external parties)
06/06/2024
Marangone, Spina, Di Ciccio, Weber
9
0xfd9ffe3578a42d81c4684bd47e6575d9a8f10cc6dab984bd7e19ee0dbacb6287
Hash:
The message
(as seen by the electronic parts supplier)
06/06/2024
Marangone, Spina, Di Ciccio, Weber
10
0xfd9ffe3578a42d81c4684bd47e6575d9a8f10cc6dab984bd7e19ee0dbacb6287
Hash:
The message
(as seen by the mechanical parts supplier)
06/06/2024
Marangone, Spina, Di Ciccio, Weber
11
0xfd9ffe3578a42d81c4684bd47e6575d9a8f10cc6dab984bd7e19ee0dbacb6287
Hash:
Hence the name: CAKE
06/06/2024
Marangone, Spina, Di Ciccio, Weber
Image source: https://heriots.co.uk/products/pistachio
12
Ingredients
06/06/2024
Marangone, Spina, Di Ciccio, Weber
13
• A cup of IPFS
(distributed hash-table-based file syst.)
 To store encrypted files
• A slather of CP-ABE
(cryptography)
 To selectively encrypt documents
• A tad of Ethereum
(blockchain)
 To keep track of the exchanges
• A scoop of Solidity
(smart contract)
 To mediate the data exchange
Image source: https://heriots.co.uk/products/pistachio
Your kitchen
06/06/2024
Marangone, Spina, Di Ciccio, Weber
14
CP-ABE
• Attribute-Based Encryption (ABE): type of public-key encryption
• Ciphertext-Policy ABE (CP):
 We associate roles and process instance with attributes
 (propositional literals)
 Messages are associated with policies
 (propositional formulae on attributes)
• Attributes:
14548487, Supplier, Electronics, Mechanics, Manufacturer
• Policy:
14548487 AND (Manufacturer OR (Supplier AND
Electronics))
06/06/2024
Marangone, Spina, Di Ciccio, Weber
15
Process
instance ID
Roles
Example
06/06/2024
Marangone, Spina, Di Ciccio, Weber
16
14548487, Supplier, Mechanics
Why?
CAKE
Sharing Slices of Confidential Data on Blockchain
Edoardo Marangone
Michele Spina
Claudio Di Ciccio | https://diciccio.net/ | c.diciccio@uu.nl
Ingo Weber
PAPER
CODE

More Related Content

More from Claudio Di Ciccio

Execution of business processes on the blockchain
Execution of business processes on the blockchainExecution of business processes on the blockchain
Execution of business processes on the blockchain
Claudio Di Ciccio
 
Blockchain based traceability of inter-organisational business processes
Blockchain based traceability of inter-organisational business processesBlockchain based traceability of inter-organisational business processes
Blockchain based traceability of inter-organisational business processes
Claudio Di Ciccio
 
Log-Based Understanding of Business Processes through Temporal Logic Query Ch...
Log-Based Understanding of Business Processes through Temporal Logic Query Ch...Log-Based Understanding of Business Processes through Temporal Logic Query Ch...
Log-Based Understanding of Business Processes through Temporal Logic Query Ch...
Claudio Di Ciccio
 
Resolving Inconsistencies and Redundancies in Declarative Process Models
Resolving Inconsistencies and Redundancies in Declarative Process ModelsResolving Inconsistencies and Redundancies in Declarative Process Models
Resolving Inconsistencies and Redundancies in Declarative Process Models
Claudio Di Ciccio
 
Automated Discovery of Declarative Process Models
Automated Discovery of Declarative Process ModelsAutomated Discovery of Declarative Process Models
Automated Discovery of Declarative Process Models
Claudio Di Ciccio
 
Semantical Vacuity Detection in Declarative Process Mining
Semantical Vacuity Detection in Declarative Process MiningSemantical Vacuity Detection in Declarative Process Mining
Semantical Vacuity Detection in Declarative Process Mining
Claudio Di Ciccio
 
Detecting Flight Trajectory Anomalies and Predicting Diversions in Freight Tr...
Detecting Flight Trajectory Anomalies and Predicting Diversions in Freight Tr...Detecting Flight Trajectory Anomalies and Predicting Diversions in Freight Tr...
Detecting Flight Trajectory Anomalies and Predicting Diversions in Freight Tr...
Claudio Di Ciccio
 
Ensuring Model Consistency in Declarative Process Discovery
Ensuring Model Consistency in Declarative Process DiscoveryEnsuring Model Consistency in Declarative Process Discovery
Ensuring Model Consistency in Declarative Process Discovery
Claudio Di Ciccio
 

More from Claudio Di Ciccio (8)

Execution of business processes on the blockchain
Execution of business processes on the blockchainExecution of business processes on the blockchain
Execution of business processes on the blockchain
 
Blockchain based traceability of inter-organisational business processes
Blockchain based traceability of inter-organisational business processesBlockchain based traceability of inter-organisational business processes
Blockchain based traceability of inter-organisational business processes
 
Log-Based Understanding of Business Processes through Temporal Logic Query Ch...
Log-Based Understanding of Business Processes through Temporal Logic Query Ch...Log-Based Understanding of Business Processes through Temporal Logic Query Ch...
Log-Based Understanding of Business Processes through Temporal Logic Query Ch...
 
Resolving Inconsistencies and Redundancies in Declarative Process Models
Resolving Inconsistencies and Redundancies in Declarative Process ModelsResolving Inconsistencies and Redundancies in Declarative Process Models
Resolving Inconsistencies and Redundancies in Declarative Process Models
 
Automated Discovery of Declarative Process Models
Automated Discovery of Declarative Process ModelsAutomated Discovery of Declarative Process Models
Automated Discovery of Declarative Process Models
 
Semantical Vacuity Detection in Declarative Process Mining
Semantical Vacuity Detection in Declarative Process MiningSemantical Vacuity Detection in Declarative Process Mining
Semantical Vacuity Detection in Declarative Process Mining
 
Detecting Flight Trajectory Anomalies and Predicting Diversions in Freight Tr...
Detecting Flight Trajectory Anomalies and Predicting Diversions in Freight Tr...Detecting Flight Trajectory Anomalies and Predicting Diversions in Freight Tr...
Detecting Flight Trajectory Anomalies and Predicting Diversions in Freight Tr...
 
Ensuring Model Consistency in Declarative Process Discovery
Ensuring Model Consistency in Declarative Process DiscoveryEnsuring Model Consistency in Declarative Process Discovery
Ensuring Model Consistency in Declarative Process Discovery
 

Recently uploaded

Camunda Chapter NY Meetup July 2024.pptx
Camunda Chapter NY Meetup July 2024.pptxCamunda Chapter NY Meetup July 2024.pptx
Camunda Chapter NY Meetup July 2024.pptx
ZachWylie3
 
How UiPath Discovery Suite supports identification of Agentic Process Automat...
How UiPath Discovery Suite supports identification of Agentic Process Automat...How UiPath Discovery Suite supports identification of Agentic Process Automat...
How UiPath Discovery Suite supports identification of Agentic Process Automat...
DianaGray10
 
Zaitechno Handheld Raman Spectrometer.pdf
Zaitechno Handheld Raman Spectrometer.pdfZaitechno Handheld Raman Spectrometer.pdf
Zaitechno Handheld Raman Spectrometer.pdf
AmandaCheung15
 
Accelerating Migrations = Recommendations
Accelerating Migrations = RecommendationsAccelerating Migrations = Recommendations
Accelerating Migrations = Recommendations
isBullShit
 
Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17
Bhajan Mehta
 
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
FIDO Alliance
 
Discovery Series - Zero to Hero - Task Mining Session 1
Discovery Series - Zero to Hero - Task Mining Session 1Discovery Series - Zero to Hero - Task Mining Session 1
Discovery Series - Zero to Hero - Task Mining Session 1
DianaGray10
 
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
alexjohnson7307
 
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptxMAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
janagijoythi
 
Vertex AI Agent Builder - GDG Alicante - Julio 2024
Vertex AI Agent Builder - GDG Alicante - Julio 2024Vertex AI Agent Builder - GDG Alicante - Julio 2024
Vertex AI Agent Builder - GDG Alicante - Julio 2024
Nicolás Lopéz
 
Google I/O Extended Harare Merged Slides
Google I/O Extended Harare Merged SlidesGoogle I/O Extended Harare Merged Slides
Google I/O Extended Harare Merged Slides
Google Developer Group - Harare
 
Semantic-Aware Code Model: Elevating the Future of Software Development
Semantic-Aware Code Model: Elevating the Future of Software DevelopmentSemantic-Aware Code Model: Elevating the Future of Software Development
Semantic-Aware Code Model: Elevating the Future of Software Development
Baishakhi Ray
 
Finetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and DefendingFinetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and Defending
Priyanka Aash
 
UX Webinar Series: Aligning Authentication Experiences with Business Goals
UX Webinar Series: Aligning Authentication Experiences with Business GoalsUX Webinar Series: Aligning Authentication Experiences with Business Goals
UX Webinar Series: Aligning Authentication Experiences with Business Goals
FIDO Alliance
 
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
FIDO Alliance
 
Mastering Board Best Practices: Essential Skills for Effective Non-profit Lea...
Mastering Board Best Practices: Essential Skills for Effective Non-profit Lea...Mastering Board Best Practices: Essential Skills for Effective Non-profit Lea...
Mastering Board Best Practices: Essential Skills for Effective Non-profit Lea...
OnBoard
 
Keynote : AI & Future Of Offensive Security
Keynote : AI & Future Of Offensive SecurityKeynote : AI & Future Of Offensive Security
Keynote : AI & Future Of Offensive Security
Priyanka Aash
 
Types of Weaving loom machine & it's technology
Types of Weaving loom machine & it's technologyTypes of Weaving loom machine & it's technology
Types of Weaving loom machine & it's technology
ldtexsolbl
 
Redefining Cybersecurity with AI Capabilities
Redefining Cybersecurity with AI CapabilitiesRedefining Cybersecurity with AI Capabilities
Redefining Cybersecurity with AI Capabilities
Priyanka Aash
 
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Zilliz
 

Recently uploaded (20)

Camunda Chapter NY Meetup July 2024.pptx
Camunda Chapter NY Meetup July 2024.pptxCamunda Chapter NY Meetup July 2024.pptx
Camunda Chapter NY Meetup July 2024.pptx
 
How UiPath Discovery Suite supports identification of Agentic Process Automat...
How UiPath Discovery Suite supports identification of Agentic Process Automat...How UiPath Discovery Suite supports identification of Agentic Process Automat...
How UiPath Discovery Suite supports identification of Agentic Process Automat...
 
Zaitechno Handheld Raman Spectrometer.pdf
Zaitechno Handheld Raman Spectrometer.pdfZaitechno Handheld Raman Spectrometer.pdf
Zaitechno Handheld Raman Spectrometer.pdf
 
Accelerating Migrations = Recommendations
Accelerating Migrations = RecommendationsAccelerating Migrations = Recommendations
Accelerating Migrations = Recommendations
 
Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17
 
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
 
Discovery Series - Zero to Hero - Task Mining Session 1
Discovery Series - Zero to Hero - Task Mining Session 1Discovery Series - Zero to Hero - Task Mining Session 1
Discovery Series - Zero to Hero - Task Mining Session 1
 
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
 
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptxMAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
 
Vertex AI Agent Builder - GDG Alicante - Julio 2024
Vertex AI Agent Builder - GDG Alicante - Julio 2024Vertex AI Agent Builder - GDG Alicante - Julio 2024
Vertex AI Agent Builder - GDG Alicante - Julio 2024
 
Google I/O Extended Harare Merged Slides
Google I/O Extended Harare Merged SlidesGoogle I/O Extended Harare Merged Slides
Google I/O Extended Harare Merged Slides
 
Semantic-Aware Code Model: Elevating the Future of Software Development
Semantic-Aware Code Model: Elevating the Future of Software DevelopmentSemantic-Aware Code Model: Elevating the Future of Software Development
Semantic-Aware Code Model: Elevating the Future of Software Development
 
Finetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and DefendingFinetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and Defending
 
UX Webinar Series: Aligning Authentication Experiences with Business Goals
UX Webinar Series: Aligning Authentication Experiences with Business GoalsUX Webinar Series: Aligning Authentication Experiences with Business Goals
UX Webinar Series: Aligning Authentication Experiences with Business Goals
 
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
 
Mastering Board Best Practices: Essential Skills for Effective Non-profit Lea...
Mastering Board Best Practices: Essential Skills for Effective Non-profit Lea...Mastering Board Best Practices: Essential Skills for Effective Non-profit Lea...
Mastering Board Best Practices: Essential Skills for Effective Non-profit Lea...
 
Keynote : AI & Future Of Offensive Security
Keynote : AI & Future Of Offensive SecurityKeynote : AI & Future Of Offensive Security
Keynote : AI & Future Of Offensive Security
 
Types of Weaving loom machine & it's technology
Types of Weaving loom machine & it's technologyTypes of Weaving loom machine & it's technology
Types of Weaving loom machine & it's technology
 
Redefining Cybersecurity with AI Capabilities
Redefining Cybersecurity with AI CapabilitiesRedefining Cybersecurity with AI Capabilities
Redefining Cybersecurity with AI Capabilities
 
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
 

CAKE: Sharing Slices of Confidential Data on Blockchain

  • 1. CAKE Sharing Slices of Confidential Data on Blockchain Edoardo Marangone Michele Spina Claudio Di Ciccio | https://diciccio.net/ | c.diciccio@uu.nl Ingo Weber
  • 2. While collaborators cooperate… 06/06/2024 Marangone, Spina, Di Ciccio, Weber Signing of the Peace Protocol Between Spain and the United States, August 12, 1898 (source: https://library.whitehousehistory.org/fotoweb/archives/5017-Digital-Library/Main%20Index/Artwork/520.tif.info) 2
  • 3. … the whole network observes 06/06/2024 Marangone, Spina, Di Ciccio, Weber 3 Scene from The Truman Show (1998). Image source: https://redeemingculture.com/film/drama/4106-the-truman-show-empathy-and-reality
  • 4. Fix this image in your memory 06/06/2024 Marangone, Spina, Di Ciccio, Weber Image source: https://www.makinggameofthrones.com/production-diary/2013/5/29/leeches-dragons-and-a-bear-behind-the-scenes-of-episodes-307.html 4
  • 5. Is this the same image? 06/06/2024 Marangone, Spina, Di Ciccio, Weber Image source: https://www.makinggameofthrones.com/production-diary/2013/5/29/leeches-dragons-and-a-bear-behind-the-scenes-of-episodes-307.html 5
  • 6. Validation v. understanding 06/06/2024 Marangone, Spina, Di Ciccio, Weber 6 Image source: https://www.makinggameofthrones.com/production-diary/2013/5/29/leeches-dragons-and-a-bear-behind-the-scenes-of-episodes-307.html
  • 7. Business Process Model and Notation (BPMN) collaboration diagram 06/06/2024 Marangone, Spina, Di Ciccio, Weber 7
  • 8. The message, in clear (as seen by the manufacturer) 06/06/2024 Marangone, Spina, Di Ciccio, Weber 8 0xfd9ffe3578a42d81c4684bd47e6575d9a8f10cc6dab984bd7e19ee0dbacb6287 Hash:
  • 9. The message (as seen by external parties) 06/06/2024 Marangone, Spina, Di Ciccio, Weber 9 0xfd9ffe3578a42d81c4684bd47e6575d9a8f10cc6dab984bd7e19ee0dbacb6287 Hash:
  • 10. The message (as seen by the electronic parts supplier) 06/06/2024 Marangone, Spina, Di Ciccio, Weber 10 0xfd9ffe3578a42d81c4684bd47e6575d9a8f10cc6dab984bd7e19ee0dbacb6287 Hash:
  • 11. The message (as seen by the mechanical parts supplier) 06/06/2024 Marangone, Spina, Di Ciccio, Weber 11 0xfd9ffe3578a42d81c4684bd47e6575d9a8f10cc6dab984bd7e19ee0dbacb6287 Hash:
  • 12. Hence the name: CAKE 06/06/2024 Marangone, Spina, Di Ciccio, Weber Image source: https://heriots.co.uk/products/pistachio 12
  • 13. Ingredients 06/06/2024 Marangone, Spina, Di Ciccio, Weber 13 • A cup of IPFS (distributed hash-table-based file syst.)  To store encrypted files • A slather of CP-ABE (cryptography)  To selectively encrypt documents • A tad of Ethereum (blockchain)  To keep track of the exchanges • A scoop of Solidity (smart contract)  To mediate the data exchange Image source: https://heriots.co.uk/products/pistachio
  • 15. CP-ABE • Attribute-Based Encryption (ABE): type of public-key encryption • Ciphertext-Policy ABE (CP):  We associate roles and process instance with attributes  (propositional literals)  Messages are associated with policies  (propositional formulae on attributes) • Attributes: 14548487, Supplier, Electronics, Mechanics, Manufacturer • Policy: 14548487 AND (Manufacturer OR (Supplier AND Electronics)) 06/06/2024 Marangone, Spina, Di Ciccio, Weber 15 Process instance ID Roles
  • 16. Example 06/06/2024 Marangone, Spina, Di Ciccio, Weber 16 14548487, Supplier, Mechanics Why?
  • 17. CAKE Sharing Slices of Confidential Data on Blockchain Edoardo Marangone Michele Spina Claudio Di Ciccio | https://diciccio.net/ | c.diciccio@uu.nl Ingo Weber PAPER CODE