=Paper= {{Paper |id=Vol-2749/paper6 |storemode=property |title=Interorganizational Process Execution Beyond Ethereum: Road to a Special Purpose Ecosystem |pdfUrl=https://ceur-ws.org/Vol-2749/paper6.pdf |volume=Vol-2749 |authors=Christian Sturm,Stefan Jablonski |dblpUrl=https://dblp.org/rec/conf/ifip8-1/0002J20 }} ==Interorganizational Process Execution Beyond Ethereum: Road to a Special Purpose Ecosystem== https://ceur-ws.org/Vol-2749/paper6.pdf
 Interorganizational Process Execution Beyond
Ethereum: Road to a Special Purpose Ecosystem

                      Christian Sturm1 and Stefan Jablonski1

                      University of Bayreuth, Bayreuth, Germany
                       firstname.lastname@uni-bayreuth.de



       Abstract. Process automation facilitates a computer-aided distribution
       of work items to respective participants according to a predefined pro-
       cess model. The automation of interorganizational processes crossing en-
       terprise boundaries requires a consideration of additional issues like the
       lack of trust among them. Current solutions implement the decentralized
       control workflow interoperability and rely on the Ethereum protocol for
       establishing a trusted layer during process execution. In this paper, we
       specify trust concerns explicitly w.r.t. process perspectives and IT secu-
       rity aspects, dismantle the Ethereum protocol and discuss how the iden-
       tified components can successfully address the trust issues. An analysis
       of these components w.r.t. non-functional requirements shows discrepan-
       cies between the BPM world and Ethereum and highlights the necessity
       for tailored designed solutions.

       Keywords: Process Execution · Interorganizational Process Manage-
       ment · Decentralized Control · Business Process Management · Blockchain


1    Introduction
Business Process Management provides strategies and tools for companies to
organize and perform their operational routines [5]. Workflow models separate
application logic from business logic and generate an unobstructed view on the
single business processes of a company. Workflow Management Systems (WFMS)
automatically interpret the models and care for a compliant distribution of work
items to responsible actors. The digital transformation and market globalization
pressures companies to rethink and complement their processes to remain com-
petitive [6]: instead of managing internal workflows solely, cross-organizational
workflows (e.g. in an interconnected automotive supply chain) must be discov-
ered, modelled and implemented. Contrary to intraorganizational processes, a
single central coordination and controlling instance is missing, especially when
it comes to the automation and computer-aided execution of these processes.
    Global monitoring of the process’ progress or trust between participants and a
tamper-protected data storage are requirements for feasible interorganizational
process management [16]. Former forms of workflow interoperability, i.e. how
processes can be assembled into an executable interorganizational process, fail
to address all requirements [16]. Decentralized control as novel form promises

Copyright c 2020 for this paper by its authors. Use permitted under Creative Commons License
Attribution 4.0 International (CC BY 4.0).




                                            68
to fill this gap by providing a trustworthy common IT infrastructure where
every participant remains its autonomy and due to automatic consensus finding,
everyone agrees on a common state which is used for passive monitoring and
active routing the control-flow based on in-process data values [16].
    Ongoing research focuses for instance on the applicability of different block-
chain protocols (e.g. Ethereum, Hyperledger, Quorum) in various settings (e.g.
supply chain management) [10]. However, we focus on the domain-unspecific
abstraction layer of process model-driven workflow automation. So far, related
work has followed a top-down approach, where the general purpose blockchain
Ethereum was considered applicable and integrated in process execution to es-
tablish a trusted layer [12][18]. The maturity and expressiveness of Ethereum
justifies the decision in favor of Ethereum in BPM research at first. We argue
for a bottom-up approach in future research, where BPM specifies explicit re-
quirements to an architectural layer within the decentralized control context, and
tailored solutions are developed and evaluated thereupon. Hence, the strategy in
this paper will be to explicitly specify trust issues w.r.t. process perspectives and
IT security aspects in Section 3 (functional requirements) as suggested by [14].
Then, we dismantle the Ethereum blockchain into its individual parts in Section
4. In the evaluation in Section 5 we check the suitability of Ethereum compo-
nents for tackling the identified functional requirements. In the end, we analyze
the components also w.r.t. non-functional requirements, recognize limitations
and propose guidelines that may help to design special purpose ecosystems.


2   Modeling and Automation of Interorg. Processes

A business process goes through different phases (cf. process life cycle [5]) start-
ing with the modeling using a modeling language, e.g. BPMN (Business Pro-
cess Model and Notation) which enjoys frequent usage in research and industry.
BPMN process models include execution semantics so that a WFMS in a com-
pany can instantiate and interpret the process model and distribute pending
work items to (human) resources accordingly which are responsible for the ex-
ecution. Hence, the recorded execution history (event log) which comprises the
actual executed tasks will comply with the process model (cf. Figure 1).


         Company A                Company A         Company B        Company C




Fig. 1. Process with central- Fig. 2. Interorg. process enactment with multiple
ized coordination and single WFMS and multiple local Event Logs
Event Log




                                        69
    The situation in interorganizational settings is more complicated from a mod-
eling perspective, but also from an implementation point of view due to the
lack of a superior controlling authority. Without a central instance which inter-
prets and stores process data globally, interorganizational processes cannot be
executed within a WFMS [16]. Instead, BPMN choreographies can specify the
required message exchange protocol on a global level, participants orchestrate
thereupon their own private local workflows, and notify the respective counter-
part in due course according to the choreography [23]. This is implemented using
web services (WS-BPEL) and is described in [20] as loosely coupled workflow in-
teroperability. However, following this message-flow driven principle, no global
progress state is available which hamper automated routing [16] and trust issues
on process data may occur [22], e.g. multiple local WFMSs produce multiple
local event logs which may be subject to manipulation (cf. Figure 2).


                                                        Company A
                    Trusted
                    Network
                    w/                                  Company B
                    Automated
                    Consensus
                                                       Company C


    Fig. 3. Automated Consensus ensures Agreement on Data and Process Execution


    Decentralized control workflow interoperability solves this issues by providing
a trustworthy process-aware network environment which is resistant to malicious
manipulation (to some degree). Automatic consensus finding ensures a commonly
accepted global state of the process and control-flow driven interorganizational
process models can be executed trustworthy (cf. Figure 3). So far, decentral-
ized control was mostly implemented upon the Ethereum protocol [17][18][22].
Instead of bilateral messages as with choreographies and web services, state
changes of process diagrams are managed on the blockchain. Because data is
kept on-chain, everybody is informed immediately without explicit message ex-
changes, automatic data-based routing is enabled, and tamper-protection is en-
sured. Hence, the blockchain assumes henceforth the role of the missing process
owner and serves as message broker, work item distributor and ensures confor-
mance.


3     Trust as Functional Requirement

Trust recurs in related work as motivation for the use of a blockchain [22]. Müller
et al. provide a structured overview of trust concerns in process execution w.r.t.
process model elements and IT security aspects [14]. They have identified trust
patterns that addresses the trust issues. We follow a similar approach using
these security aspects, but we spotlight trust issues in the context of different




                                        70
process perspectives [8]. We do not introduce the perspectives here explicitly,
but believe that the examples below convey the contents sufficiently to follow
the paper. Table 1 summarizes our results and shows good accordance with the
work in [14] (cf. the superscripted numbers referring to the trust patterns).


     Table 1. Trust Issues w.r.t. Process Perspectives and IT Security Aspects

                                      Integrity Availability Non-repudiation
         Functional Perspective         If 4.4    Af 4.4         Nf 4.2
         Behavioural Perspective        Ib 4.3      Ab             Nb
         Organizational Perspective      Iorg                     Norg
         Informational Perspective      Ii 4.1      Ai
         Operational Perspective         Iop


    We refer to Table 1 and describe the trust issues by means of an example
from the car service domain. Thereby, we roughly highlight the role of blockchain-
based systems during trustworthy process execution.
    Functional Perspective A participant can rely on the execution of certain
activities, e.g. required checks were executed during car maintenance. From the
viewpoint of the executed entity, the execution is not renounceable (Nf ), and
the on-chain storage also serves as proof for the execution (If ). Contrary to
manual tasks which are executed by human resources, script tasks are executed
automatically. Smart contracts on the blockchain ensure a transparent and con-
form execution (If ) and the distributed nature of the network leads to a high
availability (Af ), i.e. down times are very unlikely in larger networks.
    Behavioural Perspective The run-time process flow may be affected by
data values or human decisions, e.g. the milage status determines the necessity
of various checks or the master craftsman decides on the exchange of parts based
on his experience. Data-based routing can be automated in a transparent way
and the next tasks are assigned automatically to the respective resource based
on the predefined model (Ib ). The blockchain also cares for a tamper-protected
storage of human decisions or may facilitate voting-based collaborative decisions
(Nb ). We define the availability of the current progress of the process flow as the
global state of the process (Ab ).
    Organizational Perspective Process models may stipulate a responsibility
of an activity to a specific person, e.g. a task must be executed only from a master
craftsman. A blockchain-based solution cares then for a globally transparent
assignment of the task to the respective resource (Iorg ). If no specific resource
is specified a priori, the actor is identified during run-time and the responsible
person is logged for traceability purposes. Hence, the person cannot repudiate
the responsibility afterwards (Norg ).
    Informational Perspective Data values are produced and consumed from
all participants and are subject to possible manipulation. The importance of
data requires particular interest in their integrity, i.e. data management that
excludes fraudulent modifications (Ii ), and availability for data-based routing




                                          71
(Ai ). For instance, the measurement of pollutant emissions produces data which
is then decisive for an exchange of affected parts.
    Operational Perspective Car workshops can prove the usage of suitable
tools (Iop ). For instance, OBD-II error codes provided by cars to support trou-
bleshooting may include manufacturer controlled diagnostic trouble codes which
can only be read properly with the vendor specific reading device. Otherwise
errors are diagnosed incorrect.


4   Ethereum Components and their Contribution or
    Obstruction to feasible Process Execution
In this section, we dismantle the blockchain into its individual parts whilst
strongly rely on the work of Tasca et al. [19], where they deconstructed sev-
eral blockchain protocols to find a common taxonomy. We investigate the com-
ponents and their responsibilities in resolving the trust issues identified above.
Note, that the discussion is independent of any use case but pertains to the
abstraction layer of interpreting a process model.

I) Consensus mechanism The consensus mechanism implemented in Ethereum
is called Proof-of-Work (PoW). PoW is not responsible for reaching consensus
over the data which is stored on the blockchain per se. In the first place, PoW
is an algorithm for an automated selection of a participant to be allowed to
propose a new set of data which is to be included in the blockchain. PoW is the
first algorithm to empower such an election for the first time in a global-scaled
network with anonymous (or pseudonymized) participants, whereas naive solu-
tions, e.g. random selection, are affected from sybil attacks: a single user with
multiple accounts gets selected more likely [21]. Using PoW, the available com-
puting power is decisive, instead of the number of accounts. PoW is driven by a
monetary incentive mechanism. Finding the solution of a cryptographic puzzle is
expensive in terms of computing power or electricity respectively, but is awarded
with inbuilt cryptocurrency. However, if a participant attempts to include invalid
data, the network will repeal the new block and the attacker loses the reward.
Hence, PoW ensures network stability by limiting the number of proposed new
data and by ensuring that new data can be expected to be valid.
    The issue of detection and elimination of faults or intentional manipulation
within an untrustworthy network is years old and described for instance as the
byzantine generals problem [11] - whose solutions are ascribed to be byzantine
fault tolerant (BFT). PoW solves the byzantine generals problem in a large scale
in the ballpark of thousands of nodes, whereas former fault tolerate algorithms
[1][3][15] are afflicted with inferior scalability due to a massive communication
overload and are impractical within networks with more than 20 nodes [21].
    Lessons Learned BPM currently builds on blockchains incorporating PoW
as consensus mechanism and cryptocurrencies and a reward system are necessary
in order to run PoW and maintain network stability. In turn, BPM process exe-
cution is unnaturally concerned with cryptocurrencies. However, PoW’s natural




                                       72
habitat is a global network with pseudonymized users which does not always
comply with the BPM world, where participants are identified and the num-
ber of participants in a single process is limited. Classical BFT algorithms also
promise to be resistant to a certain fraction of faulty nodes and the issue of bad
scalability does not apply in small BPM use cases.


II) Security and Privacy The taxonomy lists data encryption as a sub compo-
nent of Security and Privacy and discusses the selected algorithms (e.g. ECDSA,
SHA-2, etc.) mostly. We are interested in the properties of these algorithms and
their particular role in the blockchain, especially hashes, private/public-key pairs
and digital signatures. In the blockchain, every state change is initiated with a
transaction from a user. Transactions are always digitally signed. The sender
hashes the transaction and encrypts the hash with his private key to calcu-
late a signature. The triple of transaction, hash and signature is propagated
in the network. By applying the decryption function to the signature with the
sender’s public key and comparing the result with the recalculated hash from
the transaction, the network can assume the following statements: the owner
of the according private key is the actual sender and the document equals the
originally sent document. On the other hand, the sender of a transactions cannot
deny being the original sender because the decryption works properly only with
his private key.
    Lessons Learned In blockchain protocols, an asymmetric key-pair is re-
sponsible to sign transactions or to assemble user accounts. In terms of BPM
process execution, digital signatures alone may provide enough reliability dur-
ing process execution, where no full decentralization is required. In practice,
participants may then be forced to sign task execution actions (including data)
on a centralized or distributed workflow engine. Precise infrastructures must be
evaluated and coordinated with respect to the use case.


III) Storage Structure and Counterfeit Protection Data is stored in
blocks which serve as container for confirmed transactions. All state changes
in a blockchain network are initiated with transactions. These transactions go
through different phases: first, they are created locally, before they get propa-
gated in the global network. They are considered valid in this stage as invalid
transactions are not propagated and repealed by the network. Valid transac-
tions are stored in the pool of unconfirmed transactions. At some time, a new
block with arbitrary unconfirmed transactions is proposed and added to the
blockchain and thereby, the transactions get confirmed. To achieve high tamper-
protection whilst retaining performance, each new block also includes the hashed
information of the predecessor block. Thus, a manipulation of a single bygone
transaction is easily detected by checking the latest block only, as the mutations
of block headers will propagate. In this regard, the limitation of blocks due to
consensus mechanisms like PoW prevents a recalculation of the hash chain, as
this is practically impossible hard to solve.




                                        73
    With cryptocurrencies, during the validation of a transaction t1 , the network
checks if someone has ever received the monetary units, he is about to spend in
past transactions t00 , t10 , t20 , .... The transactions may be included in very ancient
blocks wherefore high tamper protection to the very beginning is essential. In
the outcome, blockchains suffer from a huge amount of data and transactions
are tangled arbitrary distributed over all blocks as second property to mention.
    Lessons Learned This storage structure is implemented since the first
blockchain which is located in a cryptocurrency context. The design to track
all asset transfers to the very beginning and keep them in an immutable ledger
is decisive for cryptocurrency-related blockchains as also very old transactions
may determine the next valid state. At BPM side, the storage for process data
might become obsolete with reaching the end point of a process or when re-
tention periods have expired. Alternative storage concepts may counteract the
constantly growth of the database.
    The issue of chaotic distribution of all transactions over the blocks is subject
to current research, which have to reconstruct the timely-ordered history of task
executions for process mining issues [9][13]. Special purpose systems may design
storage structures which reflects BPM aware data structures, including process
models which vary in time (new versions through enhancement), models that are
instantiated multiply, etc. As an example, for a different storage, IoT research
introduces a tree-structured data storage to overcome performance issues [4].


IV) Finality A bitcoin transaction is considered totally confirmed after ap-
proximately one hour, i.e. six blocks are added afterwards. This high latency,
i.e. the time from the insertion of a transaction in a block until the moment of
considerable acceptance, is reasoned by the use of practicality-based heuristics.
With PoW, confirmation is a progress of increasing probability, not a fixed point
in time (non-deterministic finality). Non-deterministic or probabilistic finality
causes the danger that an appended block could get removed from the current
valid chain in case of temporary forks. That is for instance, when multiple valid
blocks are propagated simultaneously from different edges of the network. Such
abnormalities are dissolved following the longest chain rule. As a result, vali-
dated and verified transactions may get reverted when they are not included
in the longest chain. Classical BFT algorithms are not affected as they inherit
consensus finality [21].
     Lessons Learned The solution in current blockchains is to simply recre-
ate and re-propagate removed transactions. What is easy in the cryptocur-
rency world, is much more complex regarding process execution. With non-
deterministic finality, BPM must answer questions according to the task life
cycle, for instance when should the next task be claimed or executed? at time
when the respective transaction occurs in the mining pool, when it gets included
in a block, or when enough succeeding blocks are mined? Another question con-
cerns the (dirty) redo of a task. It cannot be presumed, that every task can
be redone. Hence, deterministic finality should be a design principle in a BPM
related ecosystem.




                                          74
V) Extensibility The level of extensibility determines how flexible the rules
for considering a transaction valid can be modified [19]. In bitcoin for instance,
a transaction to be valid must reference to incoming monetary units of the re-
spective account for each outgoing monetary unit. The flexibility culminates in
turing-complete execution environments, like the Ethereum Virtual Machine,
where arbitrary conditions can be defined. This serves many application areas
and is surely responsible for Ethereum’s success story. As being turing-complete,
the systems consequently suffer from denial-of-service (DoS) attacks. To confirm
a transaction, a node must execute the assigned code. For turing-complete en-
vironments there is no algorithm which can check the termination for arbitrary
programs (halting problem). To counteract, Ethereum introduced gas which is
related to the inbuilt cryptocurrency Ether and thus an equivalent to real money.
Every transaction is associated with an amount of gas which represents the max-
imum computing effort which is available to confirm the transaction. Hence, par-
ticipants pay for the confirmation which eliminates the danger of DoS attacks.
    Lessons Learned For process execution itself, turing-completeness is not
a viable requirement. A BPM execution environment must only support the
execution semantics regarding a modelling language. Consequently, DoS attacks
could be eliminated by design, instead of synthetically prevent them with gas
and introducing a cryptocurrency like in Ethereum.

VI) Cryptocurrency, Charging and Rewarding System Cryptocurrencies
are the central use case for the first blockchain (bitcoin). It was promoted as dig-
ital payment instrument which dispense with third party providers like banking
institutions but is under full control of the network. However, the cryptocurrency
topic is addressed in various ways in different blockchain protocols. See [19] for
further details. We have covered a subset of use cases in the above discussion.
Cryptocurrency drives important pillars, e.g. the rewarding system as incentive
for mining new blocks (network stability through PoW) or the charging system
by paying for transactions to prevent DoS attacks (gas).
    Lessons Learned Cryptocurrencies are foreign to process execution in the
first place, but other components of the blockchain rely on cryptocurrencies.
Hence, to eliminate this component, alternative implementations for other com-
ponents must be included. On the other hand, research has already shown, that
cryptocurrencies can also automate payment transactions during process execu-
tion [22].


5   Evaluation
The initial research goal was to secure process execution and settle disputes au-
tomatically. Thereby, research has established trust as an umbrella term. We
have unraveled trust in Section 3 and dismantled Ethereum in its components
in Section 4. In this section, we synthesize both sides and evaluate which com-
ponents are responsible for a specific trust dimension. The result is further on
investigated from a non-functional point of view.




                                        75
5.1    Blockchain Components satisfy Functional Requirements


Section 3 defines trust in terms of IT security aspects and process perspectives.
Table 2 aggregates over the later and shows the responsibilities of components
from the blockchain system for certain IT security aspects during process execu-
tion. The integrity aspect was split into run-time conformity (w.r.t. the process
model) and the no-modifications aspect of event logs as suggested in [2].


      Table 2. Responsibilities of Blockchain Components w.r.t. Security Aspects

                Conformity      No Modifications Avail. of Data Non-rep.
        Cons. Validation rules Longest Chain Rule      ×            ×
        Sec.   Asym. Crypt.         Hashing            ×        Digit. Sig.
        Ext. Process Semantics         ×          Script tasks      ×
        Stor.        ×         Chaining of Blocks      ×            ×
        Fin.         ×                 ×          Agreement         ×
        Crypt.       ×                 ×               ×            ×



    Conformity Each action of users with the blockchain (transactions) must
match the validation rules to be considered during consensus finding (Cons.).
Hence, non-compliant actions will not affect the process status. The validation
rules are defined in terms of extensibility (Ext.) and regarding the organizational
perspective, resources can be identified with their private key (Sec.).
    No Modifications It is important that data cannot be modified, once agreed
upon. The blockchain is ascribed to be tamper-resistant, because modifications
are detected easily by having a representation hash of all data in one block (Sec.)
and chaining these hash values through the blocks. Even small modifications
would propagate to the latest block (Stor.). It is theoretically possible to convince
the network that the malicious modification should be accepted: an attacker must
then recalculate the whole hash chain from the block containing the respected
transaction or data until the latest block, so that the modification is still in the
longest chain, but the difficulty of PoW to find valid blocks prevents this (Cons.).
    Availability of Data Tasca et al. defines finality when information intended
to be stored in a blockchain can be safely considered perpetually stored. This is,
when every participant in the network agrees on the same state of the blockchain
and thus on the same state of the process’ progress (Fin.). At this point in time,
all data and information are unlikely to get reverted and can be considered
available. The availability of single (automated script) tasks is given, because
every node in the network is able to execute the assigned code (Ext.)
    Non-repudiation Every actor in the network must add a digital signature
to each transaction. This signature is associated with the actor’s private key
and hence, he cannot deny being the initiator of the transaction, because the
signature can be verified with his corresponding public key solely (Sec.).




                                         76
5.2   Analyzing Non-functional Concerns of Ethereum Components

Some components cannot directly be ascribed to tackle a certain security aspect,
e.g. cryptocurrency. However, cryptocurrencies are an important mainstay dur-
ing Ethereum process execution because they are the engine behind dependent
components which are necessary to reach the addressed goals. As stated, the
functional requirements are satisfied, however going with Ethereum means that
we have to take a loss in terms of non-functional observations which are sub-
ject to this section. Table 3 gives an overview on which Ethereum components
influence selected non-functional characteristics.


       Table 3. How do Components influence Non-functional Characteristics

             Performance     Costs         Avail. of System    Scalability
      Cons.  Block Period     ×        Rationed Data Proposals   PoW
      Sec.        ×           ×                    ×               ×
      Ext.        ×          Gas                  Gas              ×
      Stor.  Tangled Txs Storage costs             ×               ×
      Fin. Final Validation   ×                    ×               ×
      Crypt.      ×         Tx fees           Incentive            ×



    Performance The consensus mechanism in Ethereum is currently configured
so that a new leader node is selected, and a new block is proposed every 10-
20 seconds (Cons.). Due to probabilistic finality, transactions are considered
perpetually stored after 37 confirmations in succeeding blocks [7] which equals
to approx. 6-12 minutes and causes a severe performance issue (Fin.). An idle
time of up to 12 minutes after each task to have persistent data is not acceptable
from our point of view. A secondary issue are tangled transactions which may
inhibit performance during analysis (Stor.).
    Costs Having a turing-complete scripting language in the extensibility com-
ponent, the Ethereum protocol introduces gas, a measure with financial coun-
tervalue, to avoid DoS attacks (Ext.). Additionally, actors have to pay a small
fee for each transaction (also with financial countervalue in terms of cryptocur-
rency) which will be transferred to the winner of the PoW puzzle as allowance
(Crypt.). Also storing data on chain carry costs (Stor.).
    Availability of System The system is of global-scaled nature and the avail-
ability time and network stability is driven by the PoW consensus mechanism
in terms of the rationed data proposals every 10-20 seconds (Cons.) and the in-
centive mechanism for compliant behaviour (Crypt.). Speaking from availability,
DoS attacks are prevented with gas (Ext.).
    Scalability Scalability is a broad term and may affect in the blockchain
context the number of nodes, transactions, users, etc. [19]. In BPM context, we
define this as the number of participants in consensus finding which is not a
limiting factor with PoW (Cons.).




                                       77
5.3   Guidelines for a Bottom-up System Design

Until now, we have shown how blockchain components address the identified
trust issues and that blockchain components come along with severe restrictions
w.r.t. non-functional aspects of process execution. Consequently, the Ethereum
blockchain should not be considered as silver bullet. For a special purpose system
design, the following questions may help to specify guidelines which we plan to
verify in future research in a more structured way.
    In a global network with full decentralization and many participants, a highly
scalable consensus mechanism like PoW must be included, which inevitable
comes along with cryptocurrencies and probabilistic finality. Ethereum can also
be configured as permissioned network with Proof-of-Authority consensus find-
ing. Then again, trusted nodes must be included to verify data which limits the
level of decentralization. In small-scaled networks up to 20 nodes, BFT algo-
rithms can be considered for consensus finding. In minimal bilateral or trilateral
relations, decentralization fades into the background and trust during interorga-
nizational process execution may be established with sole digital signatures.
    A sophisticated automation of tasks (script tasks) requires a powerful com-
puting environment which must be protected from DoS attacks by introducing
a cryptocurrency. However, speaking of a system which is mainly used for global
routing and task distribution, the expressiveness can be limited to interpret pro-
cess language and DoS-attacks and hence cryptocurrencies are eliminated by
design.
    If no long-term data storage and protection is required as it is the case with
cryptocurrencies, alternative storage structures can be developed instead of using
the continual growing blockchain.


6     Conclusion

Interorganizational process management strives for a trustworthy environment
during process execution. Decentralized control acts in a P2P-network with au-
tomated consensus finding to address these trust issues. First implementations
rely on the complex Ethereum protocol. We have shown, that the building blocks
in the ecosystem may influence process execution positively (e.g. decentraliza-
tion, automated consensus finding in the presence of malicious nodes, tamper-
protected data storage) but also in a negative respect for certain use cases (cryp-
tocurrency, overpowered scripting language, latency). The evaluation of trust
issues as functional requirements w.r.t. blockchain components resulted in dis-
crepancies between the Ethereum world and the BPM world, especially the fur-
ther analysis on non-functional aspects. Hence, the necessity of a special purpose
solution is demonstrated.
    Future BPM research must concentrate on a detailed specification of trust
related requirements and tailored solutions must be selected in favour of the
general purpose Ethereum blockchain, which despite solving the initial research
question comes with not negligible reservations w.r.t. non-functional concerns.




                                        78
References
 1. Bessani, A., Sousa, J., Alchieri, E.: State machine replication for the masses with
    bft-smart (2014)
 2. Biskup, J.: Security in Computing Systems (2009)
 3. Castro, M., Liskov, B.: Practical byzantine fault tolerance. In: Proc. of the Third
    Symposium on Operating Systems Design and Implementation. OSDI ’99 (1999)
 4. Dorri, A., Jurdak, R.: Tree-chain: A fast lightweight consensus algorithm for iot
    applications. PREPRINT (2020)
 5. Dumas, M., Rosa, M.L., Mendling, J., Reijers, H.A.: Fundamentals of Business
    Process Management, Second Edition. Springer (2018)
 6. Fridgen, G., Radszuwill, S., Urbach, N., Utz, L.: Cross-organizational workflow
    management using blockchain technology (2018)
 7. Gervais, A., Karame, G.O., Wüst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On
    the security and performance of proof of work blockchains. In: Proc. of the 2016
    ACM SIGSAC Conference on Computer and Communications Security
 8. Jablonski, S., Bussler, C.: Workflow Management: Modeling Concepts, Architec-
    ture, and Implementation (1996)
 9. Klinkmüller, C., et al: Mining blockchain processes. In: BPM: Blockchain and Cen-
    tral and Eastern Europe Forum (2019)
10. Kumar, A., Liu, R., Shan, Z.: Is blockchain a silver bullet for supply chain man-
    agement? Decision Sciences 51 (2020)
11. Lamport, L., Shostak, R., Pease, M.: The byzantine generals problem. ACM Trans-
    actions on Programming Languages and Systems (1982)
12. López-Pintado, O., Garcı́a-Bañuelos, L., Dumas, M., Weber, I., Ponomarev, A.:
    Caterpillar: A business process execution engine (...). Softw. Pract. Exp. 49 (2019)
13. Mühlberger, R., Bachhofner, S., Di Ciccio, C., Garcı́a-Bañuelos, L., López-Pintado,
    O.: Extracting event logs for process mining... In: BPM Workshops (2019)
14. Müller, M., Ostern, N., Rosemann, M.: Silver bullet for all trust issues? blockchain-
    based trust patterns for collaborative business processes. In: BPM: Blockchain and
    Robotic Process Automation Forum (2020)
15. Schneider, F.B.: Implementing fault-tolerant services using the state machine ap-
    proach: A tutorial. ACM Comput. Surv. 22 (Dec 1990)
16. Sturm, C., Scalanczi, J., Jablonski, S., Schönig, S.: Decentralized control: A novel
    form of interorganizational workflow interoperability. In: The Practice of Enterprise
    Modeling - 13th IFIP Working Conference, PoEM 2020, Proceedings (IN PRESS)
17. Sturm, C., Scalanczi, J., Schönig, S., Jablonski, S.: A blockchain-based and
    resource-aware process execution engine. FGCS Journal 100 (2019)
18. Sturm, C., Szalanczi, J., Schönig, S., Jablonski, S.: A lean architecture for
    blockchain based decentralized process execution. In: BPM Workshops
19. Tasca, P., Tessone, C.J.: A taxonomy of blockchain technologies: Principles of
    identification and classification. Ledger 4 (Feb 2019)
20. van der Aalst, Wil: Process-oriented architectures for electronic commerce and
    interorganizational workflow. Information Systems 24 (1999)
21. Vukolić, M.: The quest for scalable blockchain fabric: Pow vs. bft replication (2016)
22. Weber, I., Xu, X., Riveret, R., Governatori, G., Ponomarev, A., Mendling, J.: Un-
    trusted business process monitoring and execution using blockchain. In: Business
    Process Management - 14th International Conference, Proceedings (2016)
23. Weske, M.: BPM - Concepts, Languages, Architectures. Springer (2019)




                                           79