AudiWFlow: Confidential, collusion-resistant auditing of distributed workflows

نویسندگان

چکیده

We discuss the problem of accountability when multiple parties cooperate towards an end result, such as companies in a supply chain or departments government service under different authorities. In cases where fully trusted central point does not exist, it is difficult to obtain audit trail workflow each individual participant unaccountable all others. propose AudiWFlow, auditing architecture that makes participants accountable for their contributions distributed workflow. Our scheme provides confidentiality most cases, collusion detection, and availability evidence after terminates. AudiWFlow based on verifiable secret sharing real-time peer-to-peer verification records; further supports levels assurance meet desired trade-off between overhead resulting from approach. evaluate two implementation approaches AudiWFlow. The first one except auxiliary that, nevertheless, needs only low level trust. second smart contracts running public blockchain, which able remove need any but requires integration with blockchain.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards Information Flow Auditing in Workflows

The paper proposes an approach for compliance audits in workflow environments based on the tracking of information flow. Requirements are formalized as a binary relation on the workflow principals. The workflows’ execution logs are transferred into graph-based representations of the explicit information flows (dataflows) and adherence to compliance requirements is checked while traversing these...

متن کامل

Logging in Distributed Workflows

Business needs are nowadays frequently realized by business workflows spanning multiple organizations. Current infrastructures, such as SOA, support this trend on the implementation side. As a side effect these issues of privacy and data protection arise, because data is shipped across organizational boundaries. At the same time increased awareness about protection of privacy and IPR have lead ...

متن کامل

Collusion Detection for Distributed Computing

A common technique for result verification in distributed computing is to delegate a computation redundantly and apply majority voting to the results. However, the technique is sensitive to “collusion” where a majority of malicious hosts collectively returns the same incorrect result. In this paper, we propose a mechanism that identifies groups of colluding hosts. The mechanism is based on the ...

متن کامل

Flexibility for Distributed Workflows

This chapter shows how flexibility can be realized for distributed workflows. The capability to dynamically adapt workflow instances during runtime (e.g., to add, delete or move activities) constitutes a fundamental challenge for any workflow management system (WfMS). While there has been significant research on ad-hoc workflow changes and on related correctness issues, there exists only little...

متن کامل

Resiliency in Distributed Workflows

In this report we present a thorough study of the concept of resiliency in distributed workflow systems. We focus particularly in applying this concept in fields like numerical optimization, where any software or logical error could mean restarting the entire experiment. A theoretical study is presented along with a set of software tools for implementation directions. At the end a resilient alg...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Blockchain: research and applications

سال: 2022

ISSN: ['2096-7209', '2666-9536']

DOI: https://doi.org/10.1016/j.bcra.2022.100073