The virtual network function carried by the container has the advantages of strong orchestration ability and high flexibility. However, due to the poor natural isolation of the container, the security of the containerized virtual network function has attracted much attention. After trusted measurement of containerized virtual network functions based on trusted computing, how to reduce the privacy exposure of containerized virtual network functions under the premise of effective response to challengers has become an urgent problem to be solved. This paper proposes a trusted remote attestation protocol based on attribute certificates and ciphertext policy attribute-based encryption for containerized virtual network function, and uses Ban logic to perform inference analysis on this protocol. The results prove that the proposed is correct and can meet the expected goals.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.