A Distributed Service Access Authorization and Access Control Method Based on Attribute-Based Cryptography
A distributed service and access control technology, applied in the field of access control, can solve the problems of delay, service agent performance bottleneck and low efficiency.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0047] The preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings.
[0048] The system model of the present invention is as figure 1 As shown, the model consists of four entities, namely Service Broker (SB), Service Provider (SP), Fog Node (FN) and User. SB is responsible for user authentication and authorization; each SP is independent of each other, and SP is responsible for generating the attribute private key of the top-level service package and distributing it to its multiple fog nodes FN; fog node FN is responsible for providing services for authenticated and authorized users.
[0049] The flow of the distributed service access control method based on attribute encryption provided by the present invention can be found in figure 2 , including the following steps:
[0050] S1: Service release platform initialization: The service release platform is equipped with a service agent (SB) responsible for the init...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


