Enhancing security of cloud using static IP techniques
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.1.30Keywords:
Cloud computing, Security mechanism, Authorized user, Internet Protocol (IP), Static IP, Dynamic IP, Cloud Service Provider (CSP).Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The user authentication and access control procedures for data stored on a cloud server encountered numerous security risks and concerns. Because critical company data should only be accessible by authorized workers, enhancing cloud security with static IP approaches is more beneficial. Even though the cloud providers maintain many security mechanisms, still the level of security should be raised by them due to lot of intruders who want to break their security mechanism. An encryption method is frequently used in most servers’ security mechanisms. In this security mechanism, data in the cloud server may be stolen and misused. Security mechanisms using static IP addresses are another method for data security in cloud security. This paper explains that the static IP address security mechanism is better and more goal-oriented than that of earlier security systems.Abstract
How to Cite
Downloads
Similar Articles
- Rekha Raghavendra, Shobha Gowda, Jissy Thomas, Fingerprint doorlock system using Arduino uno , The Scientific Temper: Vol. 16 No. Spl-2 (2025): The Scientific Temper
- D. Jayadurga, A. Chandrabose, Distribution of virtual machines with SVM-FFDM approach in cloud computing , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Annalakshmi D., C. Jayanthi, An asymmetric key encryption and decryption model incorporating optimization techniques for enhanced security and efficiency , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- K. Gokulkannan, M. Parthiban, Jayanthi S, Manoj Kumar T, Cost effective cloud-based data storage scheme with enhanced privacy preserving principles , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Chandrasekaran M, Rajesh P K, Optimization of cost to customer of power train in commercial vehicle using knapsack dynamic programming influenced by vehicle IoT data , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Amanda Quist Okronipa, Isaac Asampana, Jones Yeboah Nyame, Exploring e-learning system loyalty: The role of system quality and satisfaction , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Dhabha Nehal Hitendrabhai, Sudhakar S, Effect of multidirectional plyometric training along with core strengthening among tennis players on dynamic balance, vertical jump performance and agility , The Scientific Temper: Vol. 16 No. 07 (2025): The Scientific Temper
- Yasodha V, V. Sinthu Janita, AI-driven IoT routing: A hybrid deep reinforcement learning and shrike optimization framework for energy-efficient communication , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper
- R. Sakthiraman, L. Arockiam, RRFSE: RNN biased random forest and SVM ensemble for RPL DDoS in IoT-WSN environment , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Trust-based symmetric game theory for physical layer security in wi-fi communication , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- J. M. Aslam, K. M. Kumar, Enhancing cloud data security: User-centric approaches and advanced mechanisms , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper

