A. Sri Krishna

Work place: Department of Information Technology, RVR & JC College of Engineering, Acharya Nagarjuna University, Guntur, Andhra Pradesh, 522510, India

E-mail: ask@rvrjc.ac.in


Research Interests: Computer Vision, Information Security, Image Processing


Dr. Atluri Srikrishna received her AMIE (ECE), Institute of Engineers, Kolkata, India. She obtained her M.Tech. Degree JNTUH, Hyderabad, Andhra Pradesh, India and her Ph.D. Degree from JNTUK, Kakinada, Andhra Pradesh, India. She is currently working as a Professor & Head in the Department of Information Technology, R.V.R. & J.C. College of Engineering, Chowdavaram, Guntur, India. Her current Research Interests are in Image Processing & Computer Vision, Information Security and Algorithms. She can be contacted at Email: atlurisrikrishna@gmail.com. 

Author Articles
Traitor Traceable and Revocation-oriented Attribute Based Encryption with Proxy Decryption for Cloud Devices

By G. Sravan Kumar A. Sri Krishna

DOI: https://doi.org/10.5815/ijcnis.2024.03.04, Pub. Date: 8 Jun. 2024

Cloud storage environment permits the data holders to store their private data on remote cloud computers. Ciphertext Policy Attribute Based Encryption (CP-ABE) is an advanced method that assigns fine-grained access control and provides data confidentiality for accessing the cloud data. CP-ABE methods with small attribute universe limit the practical application of CP-ABE as the public parameter length linearly increases with the number of attributes. Further, it is necessary to provide a way to perform complex calculations during decryption on outsourced devices. In addition, the state-of-art techniques found it difficult to trace the traitor as well as revoke their attribute due to the complexity of ciphertext updation. In this paper, a concrete construction of CP-ABE technique has been provided to address the above limitations. The proposed technique supports large attribute universe, proxy decryption, traitor traceability, attribute revocation and ciphertext updation. The proposed scheme is proven to be secure under random oracle model. Moreover, the experimental outcomes reveal that our scheme is more time efficient than the existing schemes in terms of computation cost.

[...] Read more.
Other Articles