Abstract
Due to the demand on large volume of data access, the cloud computing is currently a popular model in computing world to process large volumetric data using clusters of commodity systems. It delivers computing resources as a service in which data security and access control is one of the most challenging ongoing research works in cloud computing, because of users outsourcing their sensitive data to cloud providers. Existing solutions that use pure cryptographic techniques to mitigate these security and access control problems suffer from heavy computational overhead on the data owner as well as the cloud service provider for key distribution and management. Protecting data and handling resources for solving problem is a difficult task. In order to overcome this problem, the recent trend is to use cloud computing, supporting resource sharing. The objective of this project is to solve the above challenging problem using group-based instance access control technique that ensures effective utilization of resources within a particular time slot and the verification scheme for secure data access in cloud environment. This work also suggests a proactive secret sharing scheme between data owner and cloud service provider, cloud service provider and the user for secure data access that alleviates the problem of key distribution and management at cloud service provider. In this context, the above approach provides effective utilization of resources and security as well.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
E. Gleeson, Computing industry set for a shocking change. MoneyWeek (2009)
S.D.C. Di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, A data outsourcing architecture combining cryptography and access control, in Proceedings of ACM Workshop on Computer Security Architecture (CSAW’07) (2007)
S. Yu, C. Wang, K. Ren, W. Lou, Achieving secure, scalable, and fine-grained data access control in cloud computing, in Proceedings of IEEE INFOCOM (2010), pp. 1–9
W. Wang, Z. Li, R. Owens, B. Bhargava, Secure and efficient access to outsourced data, in Proceedings of ACM Cloud Computing Security Workshop (2009), pp. 55–65
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Selvaraj, L., Kumar, S. (2015). Group-Based Access Technique for Effective Resource Utilization and Access Control Mechanism in Cloud. In: Suresh, L., Dash, S., Panigrahi, B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, vol 324. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2126-5_85
Download citation
DOI: https://doi.org/10.1007/978-81-322-2126-5_85
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2125-8
Online ISBN: 978-81-322-2126-5
eBook Packages: EngineeringEngineering (R0)