Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Security issues with cloud computing
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Security issues with cloud computing
This section point up the idea of Cloud and Grid Computing, it find out some is-sues and compare both technology. Cloud computing and grid computing are widely used now-a-days. Cloud computing becomes crowd pleasing and it is in the main-stream. Cloud computing is an transpire model for business computing. Cloud computing is moderate and economical than the grid computing, that is the reason it reduces the user’s cost. Grid computing is tightly coupled whereas cloud computing is loosely coupled. Basically, cloud computing is based on grid computing but if grid computing is to be discussed then there would be possibility that it may be cloud or maybe not. Cloud stakes the services. Grid can be considered as a middleware that enable sharing and managing grid components based on user requirements. Cloud computing consists of three things: clients, grid computing, and utility computing. Grid computing provides computing resources as a utility that can be used or not while cloud computing moves one step forwards it provides on-demand resource provisioning and eliminates over provisioning when used with utility pricing. Increasingly, IT companies are switching to cloud computing. There are some types of cloud computing: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), storage as a Service, Information as a Service and Software as a Service (SaaS) [4][5].
Cloud computing is the progression of other computing technologies such as paral-lel computing, distributed computing, and grid computing. Its main principle is to disseminate the computing grind stones to distributed computers. Majority of us still use the PC’s and laptops to cache the data and files, sharing of data and files, and to send emails. If our pc’s diverse...
... middle of paper ...
... computing due to low security features. In cloud computing tech-nique only the user name and password are used so it is less secure while in grid com-puting three methods are used for authentications:
• Secure socket layer authentication
• Primary key infrastructure authentication
• Mutual authentications
To make more efficient security features a method is referred as “Two factor authen-tications using graphical password with pass point scheme”.
Two techniques are used in this method:
1. Recognition technique:
User name and password is required for this technique and a image is also to be re-quired for authentication which one is selected by the user during registration.
2. Recall based technique:
This technique use pass point method in which image is selected and selected image becomes larger and a specific portion of image is picked for authentication. [11]
The password related configuration changes which are recommended below will make it more difficult or unauthorized users to figure out user passwords and access systems with the identified
The way to understand this feature is to embed a level of the authentication signature into the digital image using a digital watermark. In the case of the image being tampered, it can easily be detected as the pixel values of the embedded data would change and do not match with the original pixel values. There are many spatial and frequency domain techniques are available for authentication of watermarking. Watermarking techniques are judged on the basis of their performance on...
As its core essences cloud computing is nothing but a specialized form of grid computing and distributing computing’s which various in terms of infrastructure , deployment, service and Geographic’s dispersion (Veeramachanenin, Sepetember 2015) the cloud enhance scalability, collaboration, availability , ability to adapt to fluctuation according to demand accelerate development work and provide optional for cost reduction and through efficient and optimized computing. (BH kawljeet, June 2015) cloud computing (CC) recently become as a new paradigm for the delivery and hosting of services our the internet. There are mainly three service delivery model Software as Service (SaaS) required software, operating system and network is provided or we can say in SaaS the customer can access the hosted software instead of installing it in local computer and the user can access these software through local computer internet browser (e.g web enabled E-mail ) the user only pay and the cloud service provider is responsible for management or control of mobile cloud infrastructure some of the company which provide such service are Google, Microsoft , Salesforce ,Facebook, etc…..Infrastructure as Service(IaaS)the cloud provider only provide some hardware resources such as network and virtualization is
This article examines the use of multiple authentication methods to increase the security of a system. Moreover, with the use of biometric methods, the author seeks to show that authentication can occur continually during the time the resources are being utilized.
Biometrics is described as the use of human physical features to verify identity and has been in use since the beginning of recorded history. Only recently, biometrics has been used in today’s high-tech society for the prevention of identity theft. In this paper, we will be understanding biometrics, exploring the history of biometrics, examples of today’s current technology and where biometrics are expected to go in the future.
When they wanted to save photos online instead of on your personal computer, they are able to use “cloud computing” service. Cloud computing means that the transfer of computing data or information over the internet. Not just to keep data in your personal computer, they are able to save the data on internet server to open their data in any computer. In this report we will walk through about what is cloud computing, what kinds of model did cloud computing have, types of cloud computing, benefits of cloud computing, and security.
The process of verifying a person’s identity, also called authentication, plays an important role in various areas of everyday life. Any situation with user interaction where the identity is required needs a means to verify the claimed identity. One of the more obvious and commonly known application areas for identity verifying technologies, i.e. authentication, is the Logical Access Control to computer systems, where authenticity is normally established by confirming aclaimed identity with a secret password or PIN code.Traditional methods of confirming the identity of an unknown person rely either upon some secret knowledge (such as a PIN or password) or upon an object the person possesses (such as a key or card). But testing for secret knowledge or the possession of special objects can only confirm the knowledge or presence, and not, that the rightful owner is present. In fact, both could be stolen. Conversely, biometric technology is capable of establishing a much closer relationship between the user’s identity and a particular body, through its unique features or behavior.
The cloud computing is the practice that enables access to the shared pool of configurable computing resources which can be dynamically provisioned. It refers to both the applications delivered as service as well as hardware and system software in the data centres that provide those services. The attractive features of cloud computing such as on-demand access, high scalability, reliability, cost savings, low maintenance and energy efficiency bring benefits to both cloud service consumers and providers.
Virtualization technologies provide isolation of operating systems from hardware. This separation enables hardware resource sharing. With virtualization, a system pretends to be two or more of the same system [23]. Most modern operating systems contain a simplified system of virtualization. Each running process is able to act as if it is the only thing running. The CPUs and memory are virtualized. If a process tries to consume all of the CPU, a modern operating system will pre-empt it and allow others their fair share. Similarly, a running process typically has its own virtual address space that the operating system maps to physical memory to give the process the illusion that it is the only user of RAM.
The user then can use his or her screen name and password to log on and use the
Many tools and techniques were use in biometric such as SVM (Support Vector Machine), MRI Scanner. Biometrics is the tomorrow authentication’s method, it is easy for us to use in daily life and make life more secure and comfortable. Good choice must be taken depends on the level of security. Some problems are controlling in biometrics. But if the solution can be found, it can provide us a secure and easy technique of authenticate people.
Grid computing is became an important technology in distributed computing technology. The Concept is focused on grid computing has Load balancing, Fault tolerance and recovery from Fault failure. Grid computing is a set for techniques and methods applied for the coordinated use of multiple servers. These servers are specialized and works as a single, logic integrated system. Grid computing is defined as a technology that allows strengthening, accessing and managing IT resources in a distributed computing environment. Network Security - addresses a wide range of issues, such as: authentication, data integrity, access control and updates. Grid system and technologies, in order to secure a place on the corporations market and their use in important IT departments. Fault tolerance concept- Binding the developers
In cloud computing, the word cloud is used as a metaphor for “the internet”. So the cloud computing means “a type of internet-based computing”, where different services such as servers, storage and applications are delivered to an organization’s computers and devices through the internet.
Rayne, PB, Kulkarni, P, Patil, S & Meshram, BB 2012, ‘Authentication and Authorization:Tool for Ecommerce Security’, Engineering Science and Technology: An International Journal, vol. 2, no. 1, pp. 150-157.
Grid computing is an extension to parallel and distributed computing. It is an emerging environment to solve large scale complex problems. It enables the sharing, coordinating and aggregation of computational machines to full the user demands. Computational grid is an innovative technology for succeeding generations. It is a collection of machines which is geographically distributed under different organizations. It makes a heterogeneous high performance computing environment.