{"id":233266,"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00233266","sets":["1164:3925:11477:11523"]},"path":["11523"],"owner":"44499","recid":"233266","title":["AMD SEVを用いてネストしたVMを保護することによる安全な通信の追跡・制御"],"pubdate":{"attribute_name":"公開日","attribute_value":"2024-03-11"},"_buckets":{"deposit":"782cf104-b6eb-415f-9c7d-d50280bf441d"},"_deposit":{"id":"233266","pid":{"type":"depid","value":"233266","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"AMD SEVを用いてネストしたVMを保護することによる安全な通信の追跡・制御","author_link":["633277","633278","633276"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"AMD SEVを用いてネストしたVMを保護することによる安全な通信の追跡・制御"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"システムセキュリティ2 ","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2024-03-11","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"九州工業大学"},{"subitem_text_value":"九州工業大学"},{"subitem_text_value":"九州工業大学"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Kyusyu Institute of Technology","subitem_text_language":"en"},{"subitem_text_value":"Kyusyu Institute of Technology","subitem_text_language":"en"},{"subitem_text_value":"Kyusyu Institute of Technology","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/233266/files/IPSJ-CSEC24104052.pdf","label":"IPSJ-CSEC24104052.pdf"},"date":[{"dateType":"Available","dateValue":"2026-03-11"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC24104052.pdf","filesize":[{"value":"1.2 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"5bf1781a-7f6c-4c41-bd20-f679c1597b09","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2024 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"安東, 尚哉"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"瀧口, 和樹"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"光来, 健一"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8655","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"近年,クラウドからのパーソナルデータの漏洩が問題となっている.その原因の一つとしてクラウドのサービスが複雑化し,パーソナルデータが様々なサービスに転送されるようになっていることが挙げられる.一般的に,クラウドサービスが扱うデータの流れはユーザに公開されていないため,ユーザはパーソナルデータの漏洩を把握することができない.この問題を解決するには,ユーザが自分のデータを追跡・制御するためのプライバシ制御機構がクラウド内に必要となるが,ユーザはクラウドの提供するプライバシ制御機構を完全に信頼することはできない.本稿では,AMD SEV を用いてネストした仮想マシン(VM)を保護することにより安全に通信の追跡・制御を行うシステム SEV-tracker を提案する.SEV-tracker はネストした仮想化を用いてクラウドの VM 内でユーザのハイパーバイザを実行し,その上のユーザ VM で動作するクラウドサービスの通信情報の追跡・制御を行う.クラウド内でユーザ・ハイパーバイザを安全に実行するために,SEV を用いてユーザ・ハイパーバイザとクラウドを相互に保護する.SEV-tracker を BitVisor と Unikraft を用いて実装し,通信履歴が視覚的に表示できることおよび,クラウドサービスの性能について調べた.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"8","bibliographic_titles":[{"bibliographic_title":"研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2024-03-11","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"52","bibliographicVolumeNumber":"2024-CSEC-104"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"updated":"2025-01-19T10:09:14.187636+00:00","created":"2025-01-19T01:34:36.318233+00:00","links":{}}