{"created":"2023-06-19T10:30:10.704574+00:00","id":10377,"links":{},"metadata":{"_buckets":{"deposit":"68f3f9f2-0e94-4abb-9026-365d26a0a426"},"_deposit":{"created_by":18,"id":"10377","owners":[18],"pid":{"revision_id":0,"type":"depid","value":"10377"},"status":"published"},"_oai":{"id":"oai:muroran-it.repo.nii.ac.jp:00010377","sets":["216:316","216:352","46"]},"author_link":["58242","39157","39362","21131","58243","58241","42173"],"item_79_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2020","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"5","bibliographicPageEnd":"814","bibliographicPageStart":"801","bibliographicVolumeNumber":"13","bibliographic_titles":[{"bibliographic_title":"IEEE TRANSACTIONS ON SERVICES COMPUTING","bibliographic_titleLang":"en"}]}]},"item_79_description_23":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_79_description_7":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Modern cloud computing platforms based on virtual machine monitors (VMMs) host a variety of complex businesses which present many network security vulnerabilities. In order to protect network security for these businesses in cloud computing, nowadays, a number of middleboxes are deployed at front-end of cloud computing or parts of middleboxes are deployed in cloud computing. However, the former is leading to high cost and management complexity, and also lacking of network security protection between virtual machines while the latter does not effectively prevent network attacks from external traffic. To address the above-mentioned challenges, we introduce a novel customized network security for cloud service (CNS), which not only prevents attacks from external and internal traffic to ensure network security of services in cloud computing, but also affords customized network security service for cloud users. CNS is implemented by modifying the Xen hypervisor and proved by various experiments which showing the proposed solution can be directly applied to the extensive practical promotion in cloud computing.","subitem_description_language":"en","subitem_description_type":"Abstract"}]},"item_79_link_17":{"attribute_name":"出版者版へのリンク","attribute_value_mlt":[{"subitem_link_text":"10.1109/TSC.2017.2725828","subitem_link_url":"https://doi.org/10.1109/TSC.2017.2725828"}]},"item_79_link_5":{"attribute_name":"室蘭工業大学研究者データベースへのリンク","attribute_value_mlt":[{"subitem_link_text":"太田 香(OTA Kaoru)","subitem_link_url":"http://rdsoran.muroran-it.ac.jp/html/100000140_ja.html"},{"subitem_link_text":"董 冕雄(DONG Mianxiong)","subitem_link_url":"http://rdsoran.muroran-it.ac.jp/html/100000145_ja.html"}]},"item_79_publisher_11":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"IEEE COMPUTER SOC","subitem_publisher_language":"en"}]},"item_79_relation_18":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_type":"isVersionOf","subitem_relation_type_id":{"subitem_relation_type_id_text":"10.1109/TSC.2017.2725828","subitem_relation_type_select":"DOI"}}]},"item_79_rights_19":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"© 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.","subitem_rights_language":"en"}]},"item_79_source_id_12":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1939-1374","subitem_source_identifier_type":"EISSN"}]},"item_79_subject_9":{"attribute_name":"日本十進分類法","attribute_value_mlt":[{"subitem_subject":"007","subitem_subject_scheme":"NDC"}]},"item_79_version_type_21":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_ab4af688f83e57aa","subitem_version_type":"AM"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"open access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_abf2"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorAffiliations":[{"affiliationNameIdentifiers":[],"affiliationNames":[{"affiliationName":""}]}],"creatorNames":[{"creatorName":"HE, Jin","creatorNameLang":"en"}],"familyNames":[{}],"givenNames":[{}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{}],"affiliationNames":[{},{}]}],"creatorNames":[{"creatorName":"OTA, Kaoru","creatorNameLang":"en"},{"creatorName":"太田, 香","creatorNameLang":"ja"},{"creatorName":"オオタ, カオル","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{}],"affiliationNames":[{},{}]}],"creatorNames":[{"creatorName":"DONG, Mianxiong","creatorNameLang":"en"},{"creatorName":"トウ, メンユウ","creatorNameLang":"ja-Kana"},{"creatorName":"董, 冕雄","creatorNameLang":"ja"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[],"affiliationNames":[{"affiliationName":""}]}],"creatorNames":[{"creatorName":"YANG, Laurence T.","creatorNameLang":"en"}],"familyNames":[{}],"givenNames":[{}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"FAN, Mingyu","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"WANG, Guangwei","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"YAU, Stephen S.","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2020-12-08"}],"displaytype":"detail","filename":"IEEETSC_13_5_801_814.pdf","filesize":[{"value":"1.7 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"IEEETSC_13_5_801_814","objectType":"fulltext","url":"https://muroran-it.repo.nii.ac.jp/record/10377/files/IEEETSC_13_5_801_814.pdf"},"version_id":"7bdc9024-3c73-4254-be64-706ba12fc035"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Cloud computing","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Communication networks","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Middleboxes","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Computer architecture","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Computer crime","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Complexity theory","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Network security","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"FDCs","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"unified management","subitem_subject_scheme":"Other"},{"subitem_subject":"customized network security service","subitem_subject_scheme":"Other"},{"subitem_subject":"packet delay","subitem_subject_scheme":"Other"},{"subitem_subject":"throughput","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"Customized Network Security for Cloud Service","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Customized Network Security for Cloud Service","subitem_title_language":"en"}]},"item_type_id":"79","owner":"18","path":["46","316","352"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2020-12-08"},"publish_date":"2020-12-08","publish_status":"0","recid":"10377","relation_version_is_last":true,"title":["Customized Network Security for Cloud Service"],"weko_creator_id":"18","weko_shared_id":-1},"updated":"2024-02-20T02:25:26.819558+00:00"}