WEKO3
アイテム
{"_buckets": {"deposit": "68f3f9f2-0e94-4abb-9026-365d26a0a426"}, "_deposit": {"created_by": 18, "id": "10377", "owners": [18], "pid": {"revision_id": 0, "type": "depid", "value": "10377"}, "status": "published"}, "_oai": {"id": "oai:muroran-it.repo.nii.ac.jp:00010377", "sets": ["46", "316", "352"]}, "author_link": ["58242", "39157", "39362", "21131", "58243", "58241", "42173"], "item_79_biblio_info_10": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2020", "bibliographicIssueDateType": "Issued"}, "bibliographicIssueNumber": "5", "bibliographicPageEnd": "814", "bibliographicPageStart": "801", "bibliographicVolumeNumber": "13", "bibliographic_titles": [{"bibliographic_title": "IEEE TRANSACTIONS ON SERVICES COMPUTING", "bibliographic_titleLang": "en"}]}]}, "item_79_description_23": {"attribute_name": "フォーマット", "attribute_value_mlt": [{"subitem_description": "application/pdf", "subitem_description_type": "Other"}]}, "item_79_description_7": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "Modern cloud computing platforms based on virtual machine monitors (VMMs) host a variety of complex businesses which present many network security vulnerabilities. In order to protect network security for these businesses in cloud computing, nowadays, a number of middleboxes are deployed at front-end of cloud computing or parts of middleboxes are deployed in cloud computing. However, the former is leading to high cost and management complexity, and also lacking of network security protection between virtual machines while the latter does not effectively prevent network attacks from external traffic. To address the above-mentioned challenges, we introduce a novel customized network security for cloud service (CNS), which not only prevents attacks from external and internal traffic to ensure network security of services in cloud computing, but also affords customized network security service for cloud users. CNS is implemented by modifying the Xen hypervisor and proved by various experiments which showing the proposed solution can be directly applied to the extensive practical promotion in cloud computing.", "subitem_description_language": "en", "subitem_description_type": "Abstract"}]}, "item_79_link_17": {"attribute_name": "出版者版へのリンク", "attribute_value_mlt": [{"subitem_link_text": "10.1109/TSC.2017.2725828", "subitem_link_url": "https://doi.org/10.1109/TSC.2017.2725828"}]}, "item_79_link_5": {"attribute_name": "室蘭工業大学研究者データベースへのリンク", "attribute_value_mlt": [{"subitem_link_text": "太田 香(OTA Kaoru)", "subitem_link_url": "http://rdsoran.muroran-it.ac.jp/html/100000140_ja.html"}, {"subitem_link_text": "董 冕雄(DONG Mianxiong)", "subitem_link_url": "http://rdsoran.muroran-it.ac.jp/html/100000145_ja.html"}]}, "item_79_publisher_11": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "IEEE COMPUTER SOC", "subitem_publisher_language": "en"}]}, "item_79_relation_18": {"attribute_name": "DOI", "attribute_value_mlt": [{"subitem_relation_type": "isVersionOf", "subitem_relation_type_id": {"subitem_relation_type_id_text": "10.1109/TSC.2017.2725828", "subitem_relation_type_select": "DOI"}}]}, "item_79_rights_19": {"attribute_name": "権利", "attribute_value_mlt": [{"subitem_rights": "© 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.", "subitem_rights_language": "en"}]}, "item_79_source_id_12": {"attribute_name": "ISSN", "attribute_value_mlt": [{"subitem_source_identifier": "1939-1374", "subitem_source_identifier_type": "EISSN"}]}, "item_79_subject_9": {"attribute_name": "日本十進分類法", "attribute_value_mlt": [{"subitem_subject": "007", "subitem_subject_scheme": "NDC"}]}, "item_79_text_4": {"attribute_name": "著者ID(非表示)", "attribute_value_mlt": [{"subitem_text_value": "1000050713971@@@1000020728274"}]}, "item_79_version_type_21": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_ab4af688f83e57aa", "subitem_version_type": "AM"}]}, "item_access_right": {"attribute_name": "アクセス権", "attribute_value_mlt": [{"subitem_access_right": "open access", "subitem_access_right_uri": "http://purl.org/coar/access_right/c_abf2"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorAffiliations": [{"affiliationNameIdentifiers": [], "affiliationNames": [{"affiliationName": "", "affiliationNameLang": "ja"}]}], "creatorNames": [{"creatorName": "HE, Jin", "creatorNameLang": "en"}], "familyNames": [{"familyName": "HE", "familyNameLang": "en"}], "givenNames": [{"givenName": "Jin", "givenNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "39362", "nameIdentifierScheme": "WEKO"}]}, {"creatorAffiliations": [{"affiliationNameIdentifiers": [{"affiliationNameIdentifier": "10103", "affiliationNameIdentifierScheme": "kakenhi"}], "affiliationNames": [{"affiliationName": "室蘭工業大学", "affiliationNameLang": "ja"}, {"affiliationName": "Muroran Institute of Technology", "affiliationNameLang": "en"}]}], "creatorNames": [{"creatorName": "OTA, Kaoru", "creatorNameLang": "en"}, {"creatorName": "太田, 香", "creatorNameLang": "ja"}, {"creatorName": "オオタ, カオル", "creatorNameLang": "ja-Kana"}], "familyNames": [{"familyName": "OTA", "familyNameLang": "en"}, {"familyName": "太田", "familyNameLang": "ja"}, {"familyName": "オオタ", "familyNameLang": "ja-Kana"}], "givenNames": [{"givenName": " Kaoru", "givenNameLang": "en"}, {"givenName": "香", "givenNameLang": "ja"}, {"givenName": "カオル", "givenNameLang": "ja-Kana"}], "nameIdentifiers": [{"nameIdentifier": "21131", "nameIdentifierScheme": "WEKO"}, {"nameIdentifier": "1000050713971", "nameIdentifierScheme": "NRID", "nameIdentifierURI": "https://nrid.nii.ac.jp/ja/nrid/1000050713971"}]}, {"creatorAffiliations": [{"affiliationNameIdentifiers": [{"affiliationNameIdentifier": "10103", "affiliationNameIdentifierScheme": "kakenhi"}], "affiliationNames": [{"affiliationName": "室蘭工業大学", "affiliationNameLang": "ja"}, {"affiliationName": "Muroran Institute of Technology", "affiliationNameLang": "en"}]}], "creatorNames": [{"creatorName": "DONG, Mianxiong", "creatorNameLang": "en"}, {"creatorName": "トウ, メンユウ", "creatorNameLang": "ja-Kana"}, {"creatorName": "董, 冕雄", "creatorNameLang": "ja"}], "familyNames": [{"familyName": "DONG", "familyNameLang": "en"}, {"familyName": "トウ", "familyNameLang": "ja-Kana"}, {"familyName": "董", "familyNameLang": "ja"}], "givenNames": [{"givenName": " Mianxiong", "givenNameLang": "en"}, {"givenName": "メンユウ", "givenNameLang": "ja-Kana"}, {"givenName": "冕雄", "givenNameLang": "ja"}], "nameIdentifiers": [{"nameIdentifier": "39157", "nameIdentifierScheme": "WEKO"}, {"nameIdentifier": "1000020728274", "nameIdentifierScheme": "NRID", "nameIdentifierURI": "https://nrid.nii.ac.jp/ja/nrid/1000020728274"}]}, {"creatorAffiliations": [{"affiliationNameIdentifiers": [], "affiliationNames": [{"affiliationName": "", "affiliationNameLang": "ja"}]}], "creatorNames": [{"creatorName": "YANG, Laurence T.", "creatorNameLang": "en"}], "familyNames": [{"familyName": "YANG", "familyNameLang": "en"}], "givenNames": [{"givenName": "Laurence T.", "givenNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "42173", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "FAN, Mingyu", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "58241", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "WANG, Guangwei", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "58242", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "YAU, Stephen S.", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "58243", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2020-12-08"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "IEEETSC_13_5_801_814.pdf", "filesize": [{"value": "1.7 MB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_note", "mimetype": "application/pdf", "size": 1700000.0, "url": {"label": "IEEETSC_13_5_801_814", "objectType": "fulltext", "url": "https://muroran-it.repo.nii.ac.jp/record/10377/files/IEEETSC_13_5_801_814.pdf"}, "version_id": "7bdc9024-3c73-4254-be64-706ba12fc035"}]}, "item_keyword": {"attribute_name": "キーワード", "attribute_value_mlt": [{"subitem_subject": "Cloud computing", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Communication networks", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Middleboxes", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Computer architecture", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Computer crime", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Complexity theory", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Network security", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "FDCs", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "unified management", "subitem_subject_scheme": "Other"}, {"subitem_subject": "customized network security service", "subitem_subject_scheme": "Other"}, {"subitem_subject": "packet delay", "subitem_subject_scheme": "Other"}, {"subitem_subject": "throughput", "subitem_subject_scheme": "Other"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "journal article", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_title": "Customized Network Security for Cloud Service", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "Customized Network Security for Cloud Service", "subitem_title_language": "en"}]}, "item_type_id": "79", "owner": "18", "path": ["46", "316", "352"], "permalink_uri": "http://hdl.handle.net/10258/00010318", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2020-12-08"}, "publish_date": "2020-12-08", "publish_status": "0", "recid": "10377", "relation": {}, "relation_version_is_last": true, "title": ["Customized Network Security for Cloud Service"], "weko_shared_id": -1}
Customized Network Security for Cloud Service
http://hdl.handle.net/10258/00010318
http://hdl.handle.net/10258/000103187f11f934-71a4-4288-959b-6596ad964030
名前 / ファイル | ライセンス | アクション |
---|---|---|
IEEETSC_13_5_801_814 (1.7 MB)
|
|
Item type | 学術雑誌論文 / Journal Article.(1) | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
公開日 | 2020-12-08 | |||||||||||||||||
タイトル | ||||||||||||||||||
言語 | en | |||||||||||||||||
タイトル | Customized Network Security for Cloud Service | |||||||||||||||||
言語 | ||||||||||||||||||
言語 | eng | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | Cloud computing | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | Communication networks | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | Middleboxes | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | Computer architecture | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | Computer crime | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | Complexity theory | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | Network security | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | FDCs | |||||||||||||||||
キーワード | ||||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | unified management | |||||||||||||||||
キーワード | ||||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | customized network security service | |||||||||||||||||
キーワード | ||||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | packet delay | |||||||||||||||||
キーワード | ||||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | throughput | |||||||||||||||||
資源タイプ | ||||||||||||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||||||||||||
資源タイプ | journal article | |||||||||||||||||
アクセス権 | ||||||||||||||||||
アクセス権 | open access | |||||||||||||||||
アクセス権URI | http://purl.org/coar/access_right/c_abf2 | |||||||||||||||||
著者 |
HE, Jin
× HE, Jin× 太田, 香
WEKO
21131
× 董, 冕雄
WEKO
39157
× YANG, Laurence T.× FAN, Mingyu× WANG, Guangwei× YAU, Stephen S. |
|||||||||||||||||
室蘭工業大学研究者データベースへのリンク | ||||||||||||||||||
太田 香(OTA Kaoru) | ||||||||||||||||||
http://rdsoran.muroran-it.ac.jp/html/100000140_ja.html | ||||||||||||||||||
室蘭工業大学研究者データベースへのリンク | ||||||||||||||||||
董 冕雄(DONG Mianxiong) | ||||||||||||||||||
http://rdsoran.muroran-it.ac.jp/html/100000145_ja.html | ||||||||||||||||||
抄録 | ||||||||||||||||||
内容記述タイプ | Abstract | |||||||||||||||||
内容記述 | Modern cloud computing platforms based on virtual machine monitors (VMMs) host a variety of complex businesses which present many network security vulnerabilities. In order to protect network security for these businesses in cloud computing, nowadays, a number of middleboxes are deployed at front-end of cloud computing or parts of middleboxes are deployed in cloud computing. However, the former is leading to high cost and management complexity, and also lacking of network security protection between virtual machines while the latter does not effectively prevent network attacks from external traffic. To address the above-mentioned challenges, we introduce a novel customized network security for cloud service (CNS), which not only prevents attacks from external and internal traffic to ensure network security of services in cloud computing, but also affords customized network security service for cloud users. CNS is implemented by modifying the Xen hypervisor and proved by various experiments which showing the proposed solution can be directly applied to the extensive practical promotion in cloud computing. | |||||||||||||||||
言語 | en | |||||||||||||||||
書誌情報 |
en : IEEE TRANSACTIONS ON SERVICES COMPUTING 巻 13, 号 5, p. 801-814, 発行日 2020 |
|||||||||||||||||
出版者 | ||||||||||||||||||
言語 | en | |||||||||||||||||
出版者 | IEEE COMPUTER SOC | |||||||||||||||||
出版者版へのリンク | ||||||||||||||||||
10.1109/TSC.2017.2725828 | ||||||||||||||||||
https://doi.org/10.1109/TSC.2017.2725828 | ||||||||||||||||||
DOI | ||||||||||||||||||
関連タイプ | isVersionOf | |||||||||||||||||
識別子タイプ | DOI | |||||||||||||||||
関連識別子 | 10.1109/TSC.2017.2725828 | |||||||||||||||||
日本十進分類法 | ||||||||||||||||||
主題Scheme | NDC | |||||||||||||||||
主題 | 007 | |||||||||||||||||
ISSN | ||||||||||||||||||
収録物識別子タイプ | EISSN | |||||||||||||||||
収録物識別子 | 1939-1374 | |||||||||||||||||
権利 | ||||||||||||||||||
言語 | en | |||||||||||||||||
権利情報 | © 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | |||||||||||||||||
著者版フラグ | ||||||||||||||||||
出版タイプ | AM | |||||||||||||||||
出版タイプResource | http://purl.org/coar/version/c_ab4af688f83e57aa | |||||||||||||||||
フォーマット | ||||||||||||||||||
内容記述タイプ | Other | |||||||||||||||||
内容記述 | application/pdf |