Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Security issues with cloud computing
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Security issues with cloud computing
This section point up the idea of Cloud and Grid Computing, it find out some is-sues and compare both technology. Cloud computing and grid computing are widely used now-a-days. Cloud computing becomes crowd pleasing and it is in the main-stream. Cloud computing is an transpire model for business computing. Cloud computing is moderate and economical than the grid computing, that is the reason it reduces the user’s cost. Grid computing is tightly coupled whereas cloud computing is loosely coupled. Basically, cloud computing is based on grid computing but if grid computing is to be discussed then there would be possibility that it may be cloud or maybe not. Cloud stakes the services. Grid can be considered as a middleware that enable sharing and managing grid components based on user requirements. Cloud computing consists of three things: clients, grid computing, and utility computing. Grid computing provides computing resources as a utility that can be used or not while cloud computing moves one step forwards it provides on-demand resource provisioning and eliminates over provisioning when used with utility pricing. Increasingly, IT companies are switching to cloud computing. There are some types of cloud computing: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), storage as a Service, Information as a Service and Software as a Service (SaaS) [4][5].
Cloud computing is the progression of other computing technologies such as paral-lel computing, distributed computing, and grid computing. Its main principle is to disseminate the computing grind stones to distributed computers. Majority of us still use the PC’s and laptops to cache the data and files, sharing of data and files, and to send emails. If our pc’s diverse...
... middle of paper ...
... computing due to low security features. In cloud computing tech-nique only the user name and password are used so it is less secure while in grid com-puting three methods are used for authentications:
• Secure socket layer authentication
• Primary key infrastructure authentication
• Mutual authentications
To make more efficient security features a method is referred as “Two factor authen-tications using graphical password with pass point scheme”.
Two techniques are used in this method:
1. Recognition technique:
User name and password is required for this technique and a image is also to be re-quired for authentication which one is selected by the user during registration.
2. Recall based technique:
This technique use pass point method in which image is selected and selected image becomes larger and a specific portion of image is picked for authentication. [11]
The password related configuration changes which are recommended below will make it more difficult or unauthorized users to figure out user passwords and access systems with the identified
The user then can use his or her screen name and password to log on and use the
Biometrics is described as the use of human physical features to verify identity and has been in use since the beginning of recorded history. Only recently, biometrics has been used in today’s high-tech society for the prevention of identity theft. In this paper, we will be understanding biometrics, exploring the history of biometrics, examples of today’s current technology and where biometrics are expected to go in the future.
computer. You can move to the cloud or what is the same, the network, this model implies use
This article examines the use of multiple authentication methods to increase the security of a system. Moreover, with the use of biometric methods, the author seeks to show that authentication can occur continually during the time the resources are being utilized.
Password Authentication: client sends plaintext password to the server encrypted with the key identified in the previous steps [3].
Virtualization technologies provide isolation of operating systems from hardware. This separation enables hardware resource sharing. With virtualization, a system pretends to be two or more of the same system [23]. Most modern operating systems contain a simplified system of virtualization. Each running process is able to act as if it is the only thing running. The CPUs and memory are virtualized. If a process tries to consume all of the CPU, a modern operating system will pre-empt it and allow others their fair share. Similarly, a running process typically has its own virtual address space that the operating system maps to physical memory to give the process the illusion that it is the only user of RAM.
Cloud computing is sort of like the first computers come full circle – in the early days of computing, users at terminals with no computing power to speak of made use of the number-crunching capabilities of mainframes in a shared fashion – in fact, the model of computer use was called “time-sharing.” As the personal computer grew in power and capabilities while also becoming a cheap...
Many tools and techniques were use in biometric such as SVM (Support Vector Machine), MRI Scanner. Biometrics is the tomorrow authentication’s method, it is easy for us to use in daily life and make life more secure and comfortable. Good choice must be taken depends on the level of security. Some problems are controlling in biometrics. But if the solution can be found, it can provide us a secure and easy technique of authenticate people.
When they wanted to save photos online instead of on your personal computer, they are able to use “cloud computing” service. Cloud computing means that the transfer of computing data or information over the internet. Not just to keep data in your personal computer, they are able to save the data on internet server to open their data in any computer. In this report we will walk through about what is cloud computing, what kinds of model did cloud computing have, types of cloud computing, benefits of cloud computing, and security.
Grid computing is an extension to parallel and distributed computing. It is an emerging environment to solve large scale complex problems. It enables the sharing, coordinating and aggregation of computational machines to full the user demands. Computational grid is an innovative technology for succeeding generations. It is a collection of machines which is geographically distributed under different organizations. It makes a heterogeneous high performance computing environment.
The way to understand this feature is to embed a level of the authentication signature into the digital image using a digital watermark. In the case of the image being tampered, it can easily be detected as the pixel values of the embedded data would change and do not match with the original pixel values. There are many spatial and frequency domain techniques are available for authentication of watermarking. Watermarking techniques are judged on the basis of their performance on...
Rayne, PB, Kulkarni, P, Patil, S & Meshram, BB 2012, ‘Authentication and Authorization:Tool for Ecommerce Security’, Engineering Science and Technology: An International Journal, vol. 2, no. 1, pp. 150-157.
Cloud computing is a type of computing that depends on sharing computing resources rather than having local servers or personal device to handle applications.
Grid computing is became an important technology in distributed computing technology. The Concept is focused on grid computing has Load balancing, Fault tolerance and recovery from Fault failure. Grid computing is a set for techniques and methods applied for the coordinated use of multiple servers. These servers are specialized and works as a single, logic integrated system. Grid computing is defined as a technology that allows strengthening, accessing and managing IT resources in a distributed computing environment. Network Security - addresses a wide range of issues, such as: authentication, data integrity, access control and updates. Grid system and technologies, in order to secure a place on the corporations market and their use in important IT departments. Fault tolerance concept- Binding the developers