A TEE-based approach for preserving data secrecy in process mining with decentralized sources

📅 2026-02-04
🏛️ Journal of Information Security and Applications
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work addresses the challenge of confidentiality breaches in cross-organizational process mining, which often arise from sharing sensitive event logs and hinder collaborative analysis. To overcome this, the authors propose CONFINE, a novel approach that integrates Trusted Execution Environments (TEEs) into this domain for the first time. CONFINE employs a four-phase secure aggregation protocol that enables tamper-proof cross-organizational process mining without exposing raw event logs. To mitigate TEE memory constraints, the method introduces an innovative log segmentation mechanism. Experimental evaluation demonstrates that the solution incurs memory overhead that grows logarithmically with log size and linearly with the number of participating organizations. Results on both real-world and synthetic datasets confirm that CONFINE achieves strong security guarantees while maintaining scalability and practical deployability.

Technology Category

Application Category

Problem

Research questions and friction points this paper is trying to address.

process mining
data secrecy
inter-organizational
confidentiality
event logs
Innovation

Methods, ideas, or system contributions that make the work stand out.

Trusted Execution Environment (TEE)
Inter-organizational Process Mining
Data Secrecy
Event Log Segmentation
Secure Multi-party Computation
🔎 Similar Papers
No similar papers found.