クラウド・コンピューティングにおける情報セキュリティ管理の課題と対応

Similar documents
クラウド・コンピューティングにおける情報セキュリティ管理の課題と対応

Google Eric Schmidt Search Engine Strategies Conference Schmidt NRIST Buzz Word NIST CSA Cloud Security Alliance ENISA European Network and Informatio

情報処理学会研究報告 場合における対策として有効である 大阪大学では 中長期的な目標として大学の ICT リソー スを集約し 大学全体としての ICT 投資を効率化するこ DMZ segment Firewall Load Balancer とを掲げている それに合わせて大阪大学全体としては業 務フ


( )


untitled

スライド 1

04.™ƒ”R/’Ô”�/’Xfl©

研究レポート表紙.PDF

IT IBM Corporation


技術流出防止指針公表用.PDF

0ミ0、0・タ

Windows Azure Platformを活用したPaaSサービス:FGCP/A5

電子マネー・システムにおけるセキュリティ対策:リスク管理に焦点を当てて

さぬきの安全2016-cs5-出力.indd

看護学科案内'16/表紙

paper

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A

untitled

untitled

e-learning station 1) 2) 1) 3) 2) 2) 1) 4) e-learning Station 16 e-learning e-learning key words: e-learning LMS CMS A Trial and Prospect of Kumamoto

untitled

untitled

スライド 1

IPSJ SIG Technical Report Vol.2011-IOT-12 No /3/ , 6 Construction and Operation of Large Scale Web Contents Distribution Platfo

Computer Security Symposium October 2013 Android OS kub

美唄市広報メロディー2014年1月号

Vol. 23 No. 4 Oct Kitchen of the Future 1 Kitchen of the Future 1 1 Kitchen of the Future LCD [7], [8] (Kitchen of the Future ) WWW [7], [3

1 基本的考え方

(2) (1) 4 24 NTT Super Cash < 1 May.2001)

MATLAB® における並列・分散コンピューティング ~ Parallel Computing Toolbox™ & MATLAB Distributed Computing Server™ ~

IPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info

中田真佐男 323‐352/323‐352

1_26.dvi

i

IT Information Technology Information and Communication Technology E mail IT -84-


Testing XML Performance

625†ific‚º”††j

2016東奥義塾高等学校スクールガイド

01.P28-01

1. 2

Copyright

情報セキュリティの現状と課題

p...{..P01-48(TF)

2. Activity-Based Micro-Pricing 2.1 Activity-Based Micro-Pricing Activity-Based Micro-Pricing Activity- Based Micro-Pricing Activity-Based Micro-Prici


病医院における税務調査のポイント


全社一丸で業績目標を達成する!高収益企業が取り組む業績管理体制


お客様の心をつかむ営業活動のセオリーと実践法

歯科医院サクセスフル・マーケティング ~「自分流」を確立して動く

「選ばれる歯科医院」を目指して 歯科医院経営改善のポイント

トップ営業マンに学ぶ営業テクニック

クリニックの新規開業を成功させるプロセスと留意点


金融分野のTPPsとAPIのオープン化:セキュリティ上の留意点

スライド 1

SA B A B ( A B ) AB( A B) AB AB S A B A B A B A B ( A B ) ( A B) (S A) (S B) S ( A B) ( y 1 + y 2 + y 3 + y 5 ) mod2( y 1 + y 2 + y 4 + y 6 ) mod2( y

内部監査で検討すべき10のIT項目

ガイドブック

untitled

1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2

橡セキュリティポリシー雛形策定に関する調査報告書

_KAIT.pptx

66-5 足代訓史.pwd

guideline_1_0.dvi

. 1 EBM Evidence-Based Medicine JCAHO 2

46-3・4 田中志津子.pwd


WISS EpisoPass EpisoPass twitter EpisoPass 1 1 Twitter Mfveabn Twitter. JSON


...i A

3論説_高橋.indd

量子暗号通信の仕組みと開発動向

DEIM Forum 2009 B4-6, Str

(Information Technology )

資料3.doc

今企業が取るべきセキュリティ対策とは策

YMS-VPN1_User_Manual

2. Twitter Twitter 2.1 Twitter Twitter( ) Twitter Twitter ( 1 ) RT ReTweet RT ReTweet RT ( 2 ) URL Twitter Twitter 140 URL URL URL 140 URL URL

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63>

Tf dvi


johokiso-internet

IP Management Within Universities: Experiences in the US

通し組/F7:論説:西垣鳴人(送り)


untitled

(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1

SOZO_経営_PDF用.indd

DEIM Forum 2019 H2-2 SuperSQL SuperSQL SQL SuperSQL Web SuperSQL DBMS Pi

納品_ jim_ver099a _3_.docx



本組/魚田勝臣、他

untitled

Transcription:

E-mail: masashi.une@boj.or.jp E-mail: masataka.suzuki@boj.or.jp E-mail: sachikoy@jp.ibm.com / /2011.1 227

1. 1 1 2010 1 2 2 3 1 2010 2010 2 1 1 3 multi-tenancy 228 /2011.1

SaaS 4 Vamosi [2008] 1 CPU CPU Ristenpart, Tromer, Shacham, and Savage [2009] 2009 2010 2001 2008 Armbrust et al. [2009] ENISA [2009] 2009 Wang, Wang, Ren, and Lou [2009] Bowers et al. [2010] Gentry [2009] 2009 4 SaaS Software as a Service 229

2. 1 IT 2009 National Institute for Standards and Technology; NIST 5 Mell and Grance [2009] ffl ffl ffl ffl ffl NIST Cloud Security Alliance Open Cloud Manifesto ENISA 5 NIST CSA [2009] ENISA [2009] OCM [2010] NIST 6 5ENISA European Network and Information Security Agency EU 6 230 /2011.1

2 1 NIST 1 231

3. ffl SaaS Software as a Service Ajax 7 SaaS ID ffl PaaS Platform as a Service PaaS PaaS ffl IaaS Infrastructure as a Service OS IaaS. ffl 7Ajax Asynchronous JavaScript C XML 232 /2011.1

ffl ffl 1 ffl 4 ffl ffl 1 ffl 233

3 3. 2 1 PDCA 8 9 2001 8PDCA Plan Do Check Act 9 2001 234 /2011.1

10 2008 2007 PDCA PDCA D Plan Do Check Act 2 2 2 PDCA. Plan 1 10 235

2 A B C 2 CPU Ristenpart, Tromer, Shacham, and Savage [2009] 2009 1 11 11 US Patriot Act EU 25 EU 236 /2011.1

ENISA ENISA [2009] 12 ENISA ENISA 13 14 service level agreement; SLA 15 16 EU 12 ENISA 1 13 Armbrust et al. [2009] 14 basically available soft state eventual consistency 3 BASE 2010 15 2001 A B C D 16 PaaS 237

. Do Check Do Plan Check. Act Check 3 2 2 1 2 SLA IaaS OS SaaS SLA 2008 238 /2011.1

1 2 17 ENISA [2009] 1 R.9 18 2 2 4. 2 19 1 17 2010 18 DoS IP 19 239

2 1 1 20. 2001 ffl ffl ffl ffl 21 20 21 2009 10 Amazon EC2 17 1 2009 240 /2011.1

. 2010 2. 2006 2010 241

3 Wang, Wang, Ren, and Lou [2009] Bowers et al. [2010] Gentry [2009] RSA * van Dijk and Juels [2010] * 22 Wang, Wang, Ren, and Lou [2009] Bowers et al. [2010] Gentry [2009] van Dijk and Juels [2010] van Dijk, Gentry, Halevi, and Vaikuntanathan [2010] 3 23 3 22 2010 23 2 242 /2011.1

. 1 SAS-70 Statement on Auditing Standards 70 2009 ISMS 24 25 2009 2009 24 ISMS Information Security Management System ISMS ISMS JIS Q 27001 2008 25 ENISA [2009] ISMS PCI DSS * *PCIDSS Payment Card Industry Data Security Standard 5 Amex Discover JCB MasterCard VISA 243

5. 244 /2011.1

12 2010 3 5 5 NBL 928 2010 5 56 61 50 11 2009 11 1099 1105 2009 10 9 http:// www.gartner.co.jp/press/html/ref20091009-01.html 2 2008 308 2010 4 44 78 SaaS SLA 2008 1 21 2009 7 IT 2010-CSEC-48 4 2010 3 20 2 2006 9 49 61 2010 3 Amazon EC2 DDoS 2009 10 8 http:// www.netsecrity.ne.jp/2_14112.html 2010 3 BP 2010 144 149 27 1 2008 79 114 2001 4 17 2007 245

377 2008 2 NBL 919 2009 12 58 63 2009-CSEC-47 4 2009 12 IC 10 1987 17 22 2010 5 BP 2010 5 64 67 Armbrust, Micheal, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy H. Katz, Andrew Konwinski, Gunho Lee, David A. Patterson, Ariel Rabkin, Ion Stoica, and Matei Zaharia, Above the Clouds: A Berkeley View of Cloud Computing, Technical Report No. UCB/EECS-2009-28, Electrical Engineering and Computer Sciences, University of Berkeley, 10 February, 2009. Bowers, Kevin, Marten van Dijk, Ari Juels, Alina Oprea, and Ronald L. Rivest, How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes, IACR eprint 2010/214, IACR, 2010. Cloud Security Alliance (CSA), Security Guidance for Critical Area of Focus in Cloud Computing, V2.1, CSA, December, 2009. van Dijk, Marten, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan, Fully Homomorphic Encryption over the Integers, Proceedings of Eurocrypt 2010, LNCS 6110, Springer-Verlag, May, 2010, pp. 24 43., and Ari Juels, On the Impossibility of Cryptography Alone for Privacy- Preserving Cloud Computing, IACR eprint 2010/305, IACR, 2010. European Network and Information Security Agency (ENISA), Cloud Computing Benefits, Risks and Recommendations for Information Security, ENISA, 20 November, 2009 (http://www.enisa.europa.eu/act/rm/files/deliverables/ cloud-computing-risk-assessment/). Gentry, Craig, A Fully Homomorphic Encryption Scheme, A Dissertation Submitted to the Department of Computer Science and the Committee on Graduate Studies of Stanford University, September, 2009. Mell, Peter, and Tim Grance, The NIST Definition of Cloud Computing, Version 15, NIST, 7 October, 2009 (http://csrc.nist.gov/groups/sns/cloud-computing/). Open Cloud Manifesto (OCM), Cloud Computing Use Cases White Paper Version 3.0, OCM, 2 February, 2010 (http://www.opencloudmanifesto.org/). 246 /2011.1

Ristenpart, Thomas, Eran Tromer, Hovav Shacham, and Stefan Savage, Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds, Proceedings of the 6th ACM Conference on Computer and Communications Security, ACM, 2009. Vamosi, Robert, Gmail Cookie Stolen via Google Spreadsheets, CNET, 14 April, 2008 (http://news.cnet.com/8301-10789_3-9918582-52.html). Wang, Cong, Qian Wang, Kui Ren, and Wenjing Lou, Ensuring Data Storage Security in Cloud Computing, IACR eprint 2009/081, IACR, 2009. 247

1. ENISA [2009] R.1 R.2 R.3 R.4 R.5 R.6 R.7 R.8 R.9 R.10 R.11 R.12 R.13 R.14 R.15 Distributed Denial of Service 248 /2011.1

R.16 Economic Denial of Service R.17 R.18 R.19 R.20 R.21 R.22 R.23 R.24 service engine e-discovery R.25 R.26 R.27 R.28 R.29 R.30 R.31 R.32 R.33 R.34 R.35 R.2 R.3 R.23 R.22 249

2. 4 2 1 Wang, Wang, Ren, and Lou [2009] 26 RSA 27 2 99.9% 26 Google File System 64 27 2010 250 /2011.1

Bowers et al. [2010] 28 1 1 2 2 Bowers et al. [2010] 3 1987 Gentry [2009] van Dijk, Gentry, Halevi, and Vaikuntanathan [2010] 28 Bowers et al. [2010] 251

van Dijk and Juels [2010] Gentry [2009] Gentry [2009] 29 29 252 /2011.1