Group-Based Access Technique for Effective Resource Utilization and Access Control Mechanism in Cloud

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 324)


Due to the demand on large volume of data access, the cloud computing is currently a popular model in computing world to process large volumetric data using clusters of commodity systems. It delivers computing resources as a service in which data security and access control is one of the most challenging ongoing research works in cloud computing, because of users outsourcing their sensitive data to cloud providers. Existing solutions that use pure cryptographic techniques to mitigate these security and access control problems suffer from heavy computational overhead on the data owner as well as the cloud service provider for key distribution and management. Protecting data and handling resources for solving problem is a difficult task. In order to overcome this problem, the recent trend is to use cloud computing, supporting resource sharing. The objective of this project is to solve the above challenging problem using group-based instance access control technique that ensures effective utilization of resources within a particular time slot and the verification scheme for secure data access in cloud environment. This work also suggests a proactive secret sharing scheme between data owner and cloud service provider, cloud service provider and the user for secure data access that alleviates the problem of key distribution and management at cloud service provider. In this context, the above approach provides effective utilization of resources and security as well.


Cloud Computing Access Control Cloud Environment Cloud Service Provider Data Owner 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    E. Gleeson, Computing industry set for a shocking change. MoneyWeek (2009)Google Scholar
  2. 2.
    S.D.C. Di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, A data outsourcing architecture combining cryptography and access control, in Proceedings of ACM Workshop on Computer Security Architecture (CSAW’07) (2007)Google Scholar
  3. 3.
    S. Yu, C. Wang, K. Ren, W. Lou, Achieving secure, scalable, and fine-grained data access control in cloud computing, in Proceedings of IEEE INFOCOM (2010), pp. 1–9Google Scholar
  4. 4.
    W. Wang, Z. Li, R. Owens, B. Bhargava, Secure and efficient access to outsourced data, in Proceedings of ACM Cloud Computing Security Workshop (2009), pp. 55–65Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.Department of Information TechnologySri Krishna College of Engineering and TechnologyCoimbatoreIndia
  2. 2.Department of Computer ScienceBannari Amman Institute of TechnologyErodeIndia

Personalised recommendations