Essay On Cloud And Grid Computing

1723 Words4 Pages

This section point up the idea of Cloud and Grid Computing, it find out some is-sues and compare both technology. Cloud computing and grid computing are widely used now-a-days. Cloud computing becomes crowd pleasing and it is in the main-stream. Cloud computing is an transpire model for business computing. Cloud computing is moderate and economical than the grid computing, that is the reason it reduces the user’s cost. Grid computing is tightly coupled whereas cloud computing is loosely coupled. Basically, cloud computing is based on grid computing but if grid computing is to be discussed then there would be possibility that it may be cloud or maybe not. Cloud stakes the services. Grid can be considered as a middleware that enable sharing and managing grid components based on user requirements. Cloud computing consists of three things: clients, grid computing, and utility computing. Grid computing provides computing resources as a utility that can be used or not while cloud computing moves one step forwards it provides on-demand resource provisioning and eliminates over provisioning when used with utility pricing. Increasingly, IT companies are switching to cloud computing. There are some types of cloud computing: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), storage as a Service, Information as a Service and Software as a Service (SaaS) [4][5].

Cloud computing is the progression of other computing technologies such as paral-lel computing, distributed computing, and grid computing. Its main principle is to disseminate the computing grind stones to distributed computers. Majority of us still use the PC’s and laptops to cache the data and files, sharing of data and files, and to send emails. If our pc’s diverse...

... middle of paper ...

... computing due to low security features. In cloud computing tech-nique only the user name and password are used so it is less secure while in grid com-puting three methods are used for authentications:
• Secure socket layer authentication
• Primary key infrastructure authentication
• Mutual authentications
To make more efficient security features a method is referred as “Two factor authen-tications using graphical password with pass point scheme”.
Two techniques are used in this method:
1. Recognition technique:
User name and password is required for this technique and a image is also to be re-quired for authentication which one is selected by the user during registration.
2. Recall based technique:
This technique use pass point method in which image is selected and selected image becomes larger and a specific portion of image is picked for authentication. [11]

More about Essay On Cloud And Grid Computing

Open Document