Skip to main content

Group-Based Access Technique for Effective Resource Utilization and Access Control Mechanism in Cloud

  • Conference paper
  • First Online:
Artificial Intelligence and Evolutionary Algorithms in Engineering Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 324))

Abstract

Due to the demand on large volume of data access, the cloud computing is currently a popular model in computing world to process large volumetric data using clusters of commodity systems. It delivers computing resources as a service in which data security and access control is one of the most challenging ongoing research works in cloud computing, because of users outsourcing their sensitive data to cloud providers. Existing solutions that use pure cryptographic techniques to mitigate these security and access control problems suffer from heavy computational overhead on the data owner as well as the cloud service provider for key distribution and management. Protecting data and handling resources for solving problem is a difficult task. In order to overcome this problem, the recent trend is to use cloud computing, supporting resource sharing. The objective of this project is to solve the above challenging problem using group-based instance access control technique that ensures effective utilization of resources within a particular time slot and the verification scheme for secure data access in cloud environment. This work also suggests a proactive secret sharing scheme between data owner and cloud service provider, cloud service provider and the user for secure data access that alleviates the problem of key distribution and management at cloud service provider. In this context, the above approach provides effective utilization of resources and security as well.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. E. Gleeson, Computing industry set for a shocking change. MoneyWeek (2009)

    Google Scholar 

  2. S.D.C. Di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, A data outsourcing architecture combining cryptography and access control, in Proceedings of ACM Workshop on Computer Security Architecture (CSAW’07) (2007)

    Google Scholar 

  3. S. Yu, C. Wang, K. Ren, W. Lou, Achieving secure, scalable, and fine-grained data access control in cloud computing, in Proceedings of IEEE INFOCOM (2010), pp. 1–9

    Google Scholar 

  4. W. Wang, Z. Li, R. Owens, B. Bhargava, Secure and efficient access to outsourced data, in Proceedings of ACM Cloud Computing Security Workshop (2009), pp. 55–65

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lavanya Selvaraj .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Selvaraj, L., Kumar, S. (2015). Group-Based Access Technique for Effective Resource Utilization and Access Control Mechanism in Cloud. In: Suresh, L., Dash, S., Panigrahi, B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, vol 324. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2126-5_85

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2126-5_85

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2125-8

  • Online ISBN: 978-81-322-2126-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics