{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00214421","sets":["6164:6165:6462:10749"]},"path":["10749"],"owner":"44499","recid":"214421","title":["ミドルボックスを経由する通信の安全性を保証するための要件の定義とプロトコルの設計に関する一考察"],"pubdate":{"attribute_name":"公開日","attribute_value":"2021-10-19"},"_buckets":{"deposit":"9b87c700-5d80-4731-8daa-e371f69fa709"},"_deposit":{"id":"214421","pid":{"type":"depid","value":"214421","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"ミドルボックスを経由する通信の安全性を保証するための要件の定義とプロトコルの設計に関する一考察","author_link":["550444","550446","550450","550445","550447","550449","550448","550443"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ミドルボックスを経由する通信の安全性を保証するための要件の定義とプロトコルの設計に関する一考察"},{"subitem_title":"A Study on Requirements and a Protocol for Secure Communication through Middleboxes","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"セキュリティ,ミドルボックス,プロトコル","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2021-10-19","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"大阪大学大学院情報科学研究科"},{"subitem_text_value":"大阪大学大学院情報科学研究科"},{"subitem_text_value":"大阪大学大学院情報科学研究科"},{"subitem_text_value":"大阪大学大学院情報科学研究科"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Information Science and Technology, Osaka University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Science and Technology, Osaka University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Science and Technology, Osaka University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Science and Technology, Osaka University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/214421/files/IPSJCSS2021022.pdf","label":"IPSJCSS2021022.pdf"},"date":[{"dateType":"Available","dateValue":"2023-10-19"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2021022.pdf","filesize":[{"value":"502.9 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"e92af60e-930e-4c7f-a0a4-e261fc6e23f0","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2021 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"北, 健太朗"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"武政, 淳二"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"小泉, 佑揮"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"長谷川, 亨"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kentaro, Kita","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Junji, Takemasa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yuki, Koizumi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Toru, Hasegawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"インターネット上の通信の多くは,通信の品質やホストの安全性の向上などの機能を提供するミドルボックスを経由しているが,ミドルボックスを経由する通信の安全性を保証する手法は十分には確立されていない.具体的には,通信の安全性を保証するプロトコルとして広く利用されている Transport Layer Security (TLS) は,2 台のホストのみが参加する通信を考慮しており,平文データの読み書きを必要とするミドルボックスが参加する通信の安全性は保証できない.さらに,既存研究ではミドルボックスを経由する通信の安全性を保証するためのプロトコルが設計されているが,(1) プロトコルの要件が整理されていない,(2) 通信に参加するノードがオネストな場合のみを考慮しているため,それらのうち一つが攻撃者にコンプロマイズされた場合に通信全体の安全性が損なわれる,という課題がある.本研究では,既存研究で提案された要件を整理した上で,それらの要件を満たしつつ,通信に参加するあるノードがコンプロマイズされることが,通信の安全性に最小限の影響のみを及ぼすようにプロトコルを設計する.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Internet communication today involves middleboxes, aiming at improving quality of communication and security of hosts. Transport Layer Security (TLS) protocols have been designed only for communication between exactly two hosts, and thus, they cannot provide security in the cases that middleboxes require permission to read and write plaintext data. Several studies have designed protocols to provide security for such communication, however, they have the following problems: Requirements for protocols have not been systematically organized. They assume only the case that all hosts and middleboxes are honest. Therefore, if one of the hosts and middleboxes is compromised by an adversary, security of the session can completely be compromised. In this paper, we organize the requirements proposed in existing studies and design a protocol in which an adversary can only cause minimal impacts on security of a session even if the adversary compromises any of the hosts and middleboxes in the session.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"162","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2021論文集"}],"bibliographicPageStart":"155","bibliographicIssueDates":{"bibliographicIssueDate":"2021-10-19","bibliographicIssueDateType":"Issued"}}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"updated":"2025-01-19T16:38:21.433252+00:00","created":"2025-01-19T01:15:14.301358+00:00","links":{},"id":214421}