🤖 AI Summary
This work addresses the challenge of confidentiality breaches in cross-organizational process mining, which often arise from sharing sensitive event logs and hinder collaborative analysis. To overcome this, the authors propose CONFINE, a novel approach that integrates Trusted Execution Environments (TEEs) into this domain for the first time. CONFINE employs a four-phase secure aggregation protocol that enables tamper-proof cross-organizational process mining without exposing raw event logs. To mitigate TEE memory constraints, the method introduces an innovative log segmentation mechanism. Experimental evaluation demonstrates that the solution incurs memory overhead that grows logarithmically with log size and linearly with the number of participating organizations. Results on both real-world and synthetic datasets confirm that CONFINE achieves strong security guarantees while maintaining scalability and practical deployability.