Abstract

In cloud computing environment, while preventing users from illegally accessing resources, various cloud service systems must provide protection for authorized users of their personal sensitive information. Attribute-based authentication (ABA) makes it possible to solve the above problems. An efficient ABA system was put forward by extending the direct anonymous attestation (DAA) scheme of Brickell et al. During the construction of the new system, the technique of lightweight ciphertext policy attribute-based encryption was adopted, and the online computing task of users was optimized. Compared with other similar systems, the new system is characterized by the use of trusted computing technology to improve the level of privacy protection of users, and the computational complexity of users in the authentication stage is independent of the size of access policy.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call