Abstract

In the current era, Grid computing and cloud comput ing are the main fields in the research work. This thesis define which are the main security issues to be considered in cloud comp uting and grid computing, and how some of these sec urity issues are solved. Comparative study shows the grid security is tighte r than the cloud. It also shows cloud computing is less secure and faced security problems. This research work is based on main secur ity problems in cloud computing such as authenticat ion, authorization, access control and security infrastructure (SLA). Cloud in frastructure is based on service level agreement; s imply cloud providers provide different services to cloud’s users and organizatio ns with an agreement known SLA. So the security and privacy of user’s data is the main problem, because unauthorized person can’t acc ess the data of cloud user. Hacking and data leakag e are the common threats in cloud computing. As the security due to hackers inc rease over internet and the cloud computing is tota lly on internet. At this time, cloud computing demand the tight password protectio n and strong authentication and authorization proce dure. For an increased level of security, privacy and password protection, we pr ovide a new strong authentication model named “Two factor authentications using graphical password with pass point scheme”. This au thentication model includes the login procedure, ac cess control that is based on service level agreement (SLA) in cloud computing .

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.