Verifiable access control scheme based on unpaired CP-ABE in fog computing
Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is a technology to ensure data confidentiality an...
Váldodahkkit: | , , |
---|---|
Materiálatiipa: | Artihkal |
Giella: | zho |
Almmustuhtton: |
Editorial Department of Journal on Communications
2021-08-01
|
Ráidu: | Tongxin xuebao |
Fáttát: | |
Liŋkkat: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021162/ |