{"created":"2025-01-19T01:22:58.607238+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00223103","sets":["6164:6165:6462:11124"]},"path":["11124"],"owner":"44499","recid":"223103","title":["TEEを用いたマリシャス安全な組織間データ連携手法の提案"],"pubdate":{"attribute_name":"公開日","attribute_value":"2022-10-17"},"_buckets":{"deposit":"abd570a4-fa7c-4c11-9e01-45278fd19ebe"},"_deposit":{"id":"223103","pid":{"type":"depid","value":"223103","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"TEEを用いたマリシャス安全な組織間データ連携手法の提案","author_link":["586942","586955","586950","586941","586945","586948","586952","586943","586954","586951","586946","586947","586949","586953","586944","586940"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"TEEを用いたマリシャス安全な組織間データ連携手法の提案"},{"subitem_title":"A Proposal of Secure Data Aggregation Against Malicious Participants Based on Trusted Execution Environment","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"TEE,秘密計算,データ連携","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2022-10-17","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"NTTドコモクロステック開発部"},{"subitem_text_value":"NTTドコモクロステック開発部"},{"subitem_text_value":"NTT社会情報研究所"},{"subitem_text_value":"NTTドコモクロステック開発部"},{"subitem_text_value":"NTTドコモクロステック開発部"},{"subitem_text_value":"NTTドコモ クロステック開発部"},{"subitem_text_value":"NTT社会情報研究/群馬大学情報学部"},{"subitem_text_value":"NTTドコモクロステック開発部"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"X-Tech Development Department, NTT DOCOMO,INC.","subitem_text_language":"en"},{"subitem_text_value":"X-Tech Development Department, NTT DOCOMO,INC.","subitem_text_language":"en"},{"subitem_text_value":"NTT Social Informatics Laboratories","subitem_text_language":"en"},{"subitem_text_value":"X-Tech Development Department, NTT DOCOMO,INC.","subitem_text_language":"en"},{"subitem_text_value":"X-Tech Development Department, NTT DOCOMO,INC.","subitem_text_language":"en"},{"subitem_text_value":"X-Tech Development Department, NTT DOCOMO,INC.","subitem_text_language":"en"},{"subitem_text_value":"   NTT Social Informatics Laboratories / Gunma University, Faculty of Informatics","subitem_text_language":"en"},{"subitem_text_value":"X-Tech Development Department, NTT DOCOMO,INC.","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/223103/files/IPSJ-CSS2022048.pdf","label":"IPSJ-CSS2022048.pdf"},"date":[{"dateType":"Available","dateValue":"2024-10-17"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSS2022048.pdf","filesize":[{"value":"2.0 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"4add1c5d-3d79-458b-a866-50ef6e10acc4","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2022 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"長谷川, 慶太"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"野澤, 一真"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"奥田, 哲也"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"中川, 智尋"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"落合, 桂一"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"佐々木, 一也"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"千田, 浩司"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"寺田, 雅之"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Keita, Hasegawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kazuma, Nozawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tetsuya, Okuda","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tomohiro, Nakagawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Keiichi, Ochiai","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kazuya, Sasaki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Koji, Chida","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masayuki, Terada","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"データ連携を安全に行う技術として秘密計算技術が存在するが,多くの秘密計算プロトコルは,参加者がセミオネストであるという仮定を必要とする.しかしながら,一般に他の組織で動作するプログラムが適切に動作していることを保証することは困難である.そこで本稿では,セミオネスト安全な秘密計算(秘匿共通集合プロトコル)をTEE (Trusted Execution Environment)に実装し,RA(Remote Attestation)を用いて組織間で相互に完全性検証を行うことで,マリシャス安全なデータ連携を実現する手法を提案する.また,提案手法をクラウド環境(AWS)にシステム実装し,参加者が悪意を持ったとしてもデータ連携の安全性を保証できることを示す.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"We propose a method for coordinated data aggregation between organizations with secure computation. Many secure computation protocols require the assumption that participants are semi-honest. However, in many occasions, it is essential for real-world implementations to be secure against malicious participants. Therefore, we propose a method that protects secure computation protocol by TEE(Trusted Execution Environment), and utilizes RA(Remote Attestation) for integrity verification across the organizations. We implement the proposed method on AWS cloud platform and verify that our method is secure against malicious participants. ","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"348","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2022論文集"}],"bibliographicPageStart":"341","bibliographicIssueDates":{"bibliographicIssueDate":"2022-10-17","bibliographicIssueDateType":"Issued"}}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":223103,"updated":"2025-01-19T13:30:54.964165+00:00","links":{}}