Enhancing security of cloud using static IP techniques
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.1.30Keywords:
Cloud computing, Security mechanism, Authorized user, Internet Protocol (IP), Static IP, Dynamic IP, Cloud Service Provider (CSP).Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The user authentication and access control procedures for data stored on a cloud server encountered numerous security risks and concerns. Because critical company data should only be accessible by authorized workers, enhancing cloud security with static IP approaches is more beneficial. Even though the cloud providers maintain many security mechanisms, still the level of security should be raised by them due to lot of intruders who want to break their security mechanism. An encryption method is frequently used in most servers’ security mechanisms. In this security mechanism, data in the cloud server may be stolen and misused. Security mechanisms using static IP addresses are another method for data security in cloud security. This paper explains that the static IP address security mechanism is better and more goal-oriented than that of earlier security systems.Abstract
How to Cite
Downloads
Similar Articles
- A. Angelpreethi, M. Lakshmi Priya, R. Kavitha, DeepPre-OM: An Enhanced Pre-processing Framework for Opinion Classification of Microblog Data , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
- Ambica Batas, Udayakumara Ramakrishna B.N, Abuse of Dominant Position in the Realm of the Professional Sports Industry , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Sindhu S, L. Arockiam, DRMF: Optimizing machine learning accuracy in IoT crop recommendation with domain rules and MissForest imputation , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Aditi Sharma, Atal Bihari Bajpai, Naina Srivastava, Yunus Ali, Anjali Thapa, Naveen Gaurav, Arun Kumar, Effect of Growth Regulators and in vitro Clonal Propagation of Adhatoda vasica , The Scientific Temper: Vol. 13 No. 01 (2022): The Scientific Temper
- G GAYATHRI DEVI, Dr R Radha, Dark web exploitation of women and children: Understanding the phenomenon and combating its impact , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Indrajeet Mishra, Estimation of the covalent binding parameters and the ground state wave functions in complexes doped with vanadyl ion , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- A. Rukmani, C. Jayanthi, Fuzzy optimization trust aware clustering approach for the detection of malicious node in the wireless sensor networks , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- S. Gomathi, C. Radhika, A secure messaging application using steganography and AES encryption a dual-layer secure messaging system , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- Priyanka Patel, Bhaskar Pandya, Indian myths and modernity: Their application in Tagore, Anand, and Narayan’s selected short stories , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper
- Rakesh Kumar Singh, Dr. Chander Mohan Negi, Evaluating Direct Benefit Transfer as a Policy Instrument for Achieving Sustainable Development Goals: Evidence from Uttar Pradesh , The Scientific Temper: Vol. 17 No. 02 (2026): The Scientific Temper
<< < 11 12 13 14 15 16 17 18 19 20 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- J. M. Aslam, K. M. Kumar, Enhancing cloud data security: User-centric approaches and advanced mechanisms , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper

