{"created":"2023-05-15T11:59:38.621241+00:00","id":6162,"links":{},"metadata":{"_buckets":{"deposit":"fe1c79da-ad12-49b5-9edc-3e5c1ae57ab8"},"_deposit":{"created_by":3,"id":"6162","owners":[3],"pid":{"revision_id":0,"type":"depid","value":"6162"},"status":"published"},"_oai":{"id":"oai:kyutech.repo.nii.ac.jp:00006162","sets":["15:20"]},"author_link":["25313","20772"],"item_23_biblio_info_6":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2018-05-14","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"1","bibliographicPageEnd":"8","bibliographicPageStart":"1","bibliographicVolumeNumber":"2018-OS-143","bibliographic_titles":[{"bibliographic_title":"情報処理学会研究報告. [システムソフトウェアとオペレーティング・システム]"}]}]},"item_23_description_4":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"近年,IaaS型クラウドの普及が進んでいるが,クラウド内の仮想マシン(VM)はインターネットを経由した攻撃を受けやすい.そのため,侵入検知システム(IDS)を用いてVMを監視することがますます重要となっており,IDSを監視対象VMの外側で安全に実行するIDSオフロードと呼ばれる手法が提案されている.しかし,IDSオフロードを用いてもクラウド内の信頼できない管理者や外部の攻撃者によってオフロードしたIDSが攻撃される恐れがある.これまでに提案されてきた手法では,クラウド内で高度なIDSを安全に実行し,かつ,システム性能への影響を小さくするのは難しかった.そこで本稿では,Intel SGXを用いてクラウド内でIDSを安全に実行し,正しいIDSだけがVM内の情報を取得できるシステムSGmonitorを提案する.SGmonitorはエンクレイヴと呼ばれる保護領域内でIDSを動作させることによりIDSの改ざんを防ぎ,監視対象VMから取得した機密情報の漏洩を防ぐことを可能にする.エンクレイヴはアプリケーションの一部であるため,高度なIDSの開発が行いやすく,システム性能に及ぼす影響も小さい.我々はSGXをサポートしたXen 4.7にSGmonitorを実装し,オフロードしたIDSの性能について調べた.","subitem_description_type":"Abstract"}]},"item_23_description_5":{"attribute_name":"内容記述","attribute_value_mlt":[{"subitem_description":"第143回 システムソフトウェアとオペレーティング・システム研究会, 2018年5月21日-22日, 沖縄県国頭郡恩納村","subitem_description_type":"Other"}]},"item_23_description_60":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"subitem_description":"Conference Paper","subitem_description_type":"Other"}]},"item_23_publisher_7":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会"}]},"item_23_relation_14":{"attribute_name":"情報源","attribute_value_mlt":[{"subitem_relation_name":[{"subitem_relation_name_text":"http://id.nii.ac.jp/1001/00189281/"}],"subitem_relation_type_id":{"subitem_relation_type_id_text":"http://id.nii.ac.jp/1001/00189281/","subitem_relation_type_select":"URI"}}]},"item_23_rights_13":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"Copyright (c) 2018 Information Processing Society of Japan. ここに掲載した著作物の利用に関する注意: 本著作物の著作権は(社)情報処理学会に帰属します。本著作物は著作権者である情報処理学会の許可のもとに掲載するものです。ご利用に当たっては「著作権法」ならびに「情報処理学会倫理綱領」に従うことをお願いいたします。 Notice for the use of this material The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). This material is published on this web site with the agreement of the author(s) and the IPSJ. Please be complied with Copyright Law of Japan and the Code of Ethics of the IPSJ if any users wish to reproduce, make derivative work, distribute or make available to the public any part or whole thereof. All Rights Reserved, Copyright (C) Information Processing Society of Japan."}]},"item_23_select_59":{"attribute_name":"査読の有無","attribute_value_mlt":[{"subitem_select_item":"no"}]},"item_23_source_id_10":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN10444176","subitem_source_identifier_type":"NCID"}]},"item_23_text_37":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"九州工業大学"},{"subitem_text_value":"九州工業大学"}]},"item_23_text_62":{"attribute_name":"連携ID","attribute_value_mlt":[{"subitem_text_value":"7865"}]},"item_23_version_type_58":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"中野, 智晴"}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"Kourai, Kenichi","creatorNameLang":"en"},{"creatorName":"光来, 健一","creatorNameLang":"ja"},{"creatorName":"コウライ, ケンイチ","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{},{},{},{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2019-09-04"}],"displaytype":"detail","filename":"RECN_2018-51.pdf","filesize":[{"value":"447.1 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"RECN_2018-51.pdf","url":"https://kyutech.repo.nii.ac.jp/record/6162/files/RECN_2018-51.pdf"},"version_id":"0af5142b-9953-4f69-9a2b-766c957d26be"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"仮想化","subitem_subject_scheme":"Other"},{"subitem_subject":"I/O","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"conference paper","resourceuri":"http://purl.org/coar/resource_type/c_5794"}]},"item_title":"クラウドにおけるIntel SGXを用いたVMの安全な監視機構","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"クラウドにおけるIntel SGXを用いたVMの安全な監視機構"}]},"item_type_id":"23","owner":"3","path":["20"],"pubdate":{"attribute_name":"公開日","attribute_value":"2019-09-04"},"publish_date":"2019-09-04","publish_status":"0","recid":"6162","relation_version_is_last":true,"title":["クラウドにおけるIntel SGXを用いたVMの安全な監視機構"],"weko_creator_id":"3","weko_shared_id":3},"updated":"2023-10-25T08:59:10.754117+00:00"}