Return to Article Details Big Data Authentication Protocol with Hierarchical Attribute-Based Encryption and Authorization Structure Download Download PDF