{"created":"2025-06-23T08:45:54.770978+00:00","updated":"2025-06-23T08:45:58.724376+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:02002873","sets":["1164:3925:11908:1749690073967"]},"path":["1749690073967"],"owner":"80578","recid":"2002873","title":["Confidential Containersを用いたMulti-Party Confidential Computing実現方式"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2025-06-30"},"_buckets":{"deposit":"afd3d837-3bb6-4a7c-b56f-4f0015e10744"},"_deposit":{"id":"2002873","pid":{"type":"depid","value":"2002873","revision_id":0},"owners":[80578],"status":"published","created_by":80578},"item_title":"Confidential Containersを用いたMulti-Party Confidential Computing実現方式","author_link":[],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Confidential Containersを用いたMulti-Party Confidential Computing実現方式","subitem_title_language":"ja"},{"subitem_title":"Multi-Party Confidential Computing using Confidential Containers","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"ICSS","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2025-06-30","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"日本電信電話株式会社"},{"subitem_text_value":"日本電信電話株式会社"},{"subitem_text_value":"日本電信電話株式会社"},{"subitem_text_value":"日本電信電話株式会社"},{"subitem_text_value":"日本電信電話株式会社"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Nippon Telegraph and Telephone Corporation","subitem_text_language":"en"},{"subitem_text_value":"Nippon Telegraph and Telephone Corporation","subitem_text_language":"en"},{"subitem_text_value":"Nippon Telegraph and Telephone Corporation","subitem_text_language":"en"},{"subitem_text_value":"Nippon Telegraph and Telephone Corporation","subitem_text_language":"en"},{"subitem_text_value":"Nippon Telegraph and Telephone Corporation","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/2002873/files/IPSJ-CSEC25110039.pdf","label":"IPSJ-CSEC25110039.pdf"},"date":[{"dateType":"Available","dateValue":"2999-12-31"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC25110039.pdf","filesize":[{"value":"1.4 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"c6a97b0d-f35b-4ec8-b9f4-e112ed6721ed","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2025 by the Institute of Electronics, Information and Communication Engineers This SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"橋本,諒太"}]},{"creatorNames":[{"creatorName":"石倉,禅"}]},{"creatorNames":[{"creatorName":"柏木,啓一郎"}]},{"creatorNames":[{"creatorName":"神谷,弘樹"}]},{"creatorNames":[{"creatorName":"馬越,健治"}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Ryota Hashimoto","creatorNameLang":"en"}]},{"creatorNames":[{"creatorName":"Zen Ishikura","creatorNameLang":"en"}]},{"creatorNames":[{"creatorName":"Keiichiro Kashiwagi","creatorNameLang":"en"}]},{"creatorNames":[{"creatorName":"Koki Mitani","creatorNameLang":"en"}]},{"creatorNames":[{"creatorName":"Kenji Umakoshi","creatorNameLang":"en"}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8655","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"TEE (Trusted Execution Environment)を用いて使用中のデータを保護する,Confidential Computingの利用が進んでいる.我々は,Confidential Computingを用いてこれを応用し,複数のユーザ企業がお互いにデータやプログラムを秘匿しつつ実行結果を得ることが可能なマルチパーティ秘匿計算技術を実現するデータサンドボックスの研究開発に取り組んでいる.しかしながら,従来方式ではその構成要素の単位は仮想マシンであり,サービス運用する際に昨今広く用いられるコンテナ基盤を適用することは適わず,データサンドボックスを提供しようとするサービス提供者は運用の容易性向上やクラウド環境への適用を求めていた.本研究では,データサンドボックスの構成をConfidential Containersなどによってコンテナ基盤に適用するアプローチを示すことで,データサンドボックスの提供する複数主体が利用できるセキュアな実行環境とConfidential Containersが提供するクラウドネイティブへの親和性やコンテナ部の一貫性検証のためのしくみの双方を備えた方式を提案する.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"To protect data in use by using Trusted Execution Environments (TEEs), the adoption of Confidential Computing is rapidly progressing. We have been conducting research and development on the Data Sandbox that uses Confidential Computing to enable Multi-Party Confidential Computing, where multiple organizations can execute programs while keeping both data and code confidential. However, conventional implementations are based on virtual machines, making it difficult to adopt container-based infrastructures that are widely used in recent service operations. Service providers aiming to offer data sandbox environments have therefore sought improved operational efficiency and compatibility with cloud-native environments. In this study, we propose a new architecture that applies data sandbox components to a container-based infrastructure using technologies such as Confidential Containers. This approach provides both a secure multi-tenant execution environment and native integration with cloud infrastructures, while also enabling consistency verification mechanisms for the container components.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"8","bibliographic_titles":[{"bibliographic_title":"研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2025-06-30","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"39","bibliographicVolumeNumber":"2025-CSEC-110"}]},"relation_version_is_last":true,"weko_creator_id":"80578"},"id":2002873,"links":{}}