Research Article

A Distributed Access Control with Outsourced Computation in Fog Computing

Table 1

The meanings of main symbols.

The symbolThe meaning of each symbol

DAThe generic term of distribute authority
ACAuthority center
The computing time of a bilinear pair
The computing time of one scalar multiplication in
The computing time of exponentiation computation in
The computing time of general hash function
The computing time of symmetric encryption
The number of the attribute that the sender possesses
Related to the user’s access control structure
Each distribute authority
nThe number of distribute authority