Yong Zhao
College of Computer Science, Beijing University of Technology, Beijing, 100124, China
Junxi Zhuang
College of Computer Science, Beijing University of Technology, Beijing, 100124, China
Yanxue Zhang
College of Mathematics and Information Science, Hebei Normal University, Shijiazhuang, 050000, China
ABSTRACT
Remote attestation and CP-ABE (ciphertext policy-attribute based encryption) algorithm are Independent of each other. In this study, by the analysis and comparison of existing remote attestation technology and CP-ABE algorithm, we propose a remote attestation scheme based on the CP-ABE algorithm. Remote attestation scheme based on the CP-ABE algorithm includes both remote attestation with a virtual computing node and remote attestation with a group of virtual computing nodes. By a analysis, we verify the security and efficiency of the program.
PDF References Citation
Received: August 02, 2013;
Accepted: October 06, 2013;
Published: November 16, 2013
How to cite this article
Yong Zhao, Junxi Zhuang and Yanxue Zhang, 2013. Remote Attestation Based on CP-ABE Algorithm. Journal of Applied Sciences, 13: 5516-5519.
DOI: 10.3923/jas.2013.5516.5519
URL: https://scialert.net/abstract/?doi=jas.2013.5516.5519
DOI: 10.3923/jas.2013.5516.5519
URL: https://scialert.net/abstract/?doi=jas.2013.5516.5519
REFERENCES
- Bethencourt, J., A. Sahai and B. Waters, 2007. Ciphertext-policy attribute-based encryption. Proceedings of the IEEE Symposium on Security and Privacy, May 20-23, 2007, Berkeley, CA., USA., pp: 321-334.
CrossRef - Schelleken, D., B. Wyseur and B. Preneel, 2008. Remote attestation on legacy operating systems with trusted platform modules. Electron. Notes Theor. Comput. Sci., 197: 59-72.
CrossRefDirect Link - Goyal, V., O. Pandey, A. Sahai and B. Waters, 2006. Attribute basedencryptionfor fine-grained access control of encrypted data. Proceedings of the 13th ACM Conference on Computer and Communications Security, October 30-November 3, 2006, Virginia, USA., pp: 89-98.
CrossRef - Li, S.J., Y.P. He, D.M. Liu and C.Y. Yuan, 2009. On privacy of property-based remote attestation. J. Commun., 30: 146-152.
Direct Link - Sun, G.Z., Y. Dong and Y. Li, 2011. CP-ABE based data access control for cloud storage. J. Commun., 32: 146-152.
Direct Link - Wang, J.S., Z. Yu and G. Li, 2008. Study of trusted chain technology of computing trusted. Comput. Eng. Des., 29: 2195-2198.
Direct Link