Enhancing security of cloud using static IP techniques
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.1.30Keywords:
Cloud computing, Security mechanism, Authorized user, Internet Protocol (IP), Static IP, Dynamic IP, Cloud Service Provider (CSP).Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The user authentication and access control procedures for data stored on a cloud server encountered numerous security risks and concerns. Because critical company data should only be accessible by authorized workers, enhancing cloud security with static IP approaches is more beneficial. Even though the cloud providers maintain many security mechanisms, still the level of security should be raised by them due to lot of intruders who want to break their security mechanism. An encryption method is frequently used in most servers’ security mechanisms. In this security mechanism, data in the cloud server may be stolen and misused. Security mechanisms using static IP addresses are another method for data security in cloud security. This paper explains that the static IP address security mechanism is better and more goal-oriented than that of earlier security systems.Abstract
How to Cite
Downloads
Similar Articles
- S. Sindhu, L. Arockiam, A lightweight selective stacking framework for IoT crop recommendation , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Anli Suresh, Sandhiya M., Investment model on the causation of inclining attributes towards bank investment options in the investor’s portfolio , The Scientific Temper: Vol. 16 No. Spl-2 (2025): The Scientific Temper
- Thangatharani T, M. Subalakshmi, Development of an adaptive machine learning framework for real-time anomaly detection in cybersecurity , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper
- Manpreet Kaur, Shweta Mishra, A smart grid data privacy-preserving aggregation approach with authentication , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- T. Ramyaveni, V. Maniraj, Hyperparameter tuning of diabetes prediction using machine learning algorithm with pelican optimization algorithm , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Shaik Khaleel Ahamed, Neerav Nishant, Ayyakkannu Selvaraj, Nisarg Gandhewar, Srithar A, K.K.Baseer, Investigating privacy-preserving machine learning for healthcare data sharing through federated learning , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Temesgen Asfaw, Customer churn prediction using machine-learning techniques in the case of commercial bank of Ethiopia , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Nitika, Kuldeep Chaudhary, A critical review of social media advertising literature: Visualization and bibliometric approach , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Somalee Mahapatra, Manoranjan Dash, Subhashis Mohanty, Adoption of artificial intelligence and the internet of things in dental biomedical waste management , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Abhishek Dwivedi, Nikhat Raza Khan, Reconfiguration of Automated Manufacturing Systems Using Gated Graph Neural Networks , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
<< < 6 7 8 9 10 11 12 13 14 15 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- J. M. Aslam, K. M. Kumar, Enhancing cloud data security: User-centric approaches and advanced mechanisms , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper

