Enhancing security of cloud using static IP techniques
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.1.30Keywords:
Cloud computing, Security mechanism, Authorized user, Internet Protocol (IP), Static IP, Dynamic IP, Cloud Service Provider (CSP).Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The user authentication and access control procedures for data stored on a cloud server encountered numerous security risks and concerns. Because critical company data should only be accessible by authorized workers, enhancing cloud security with static IP approaches is more beneficial. Even though the cloud providers maintain many security mechanisms, still the level of security should be raised by them due to lot of intruders who want to break their security mechanism. An encryption method is frequently used in most servers’ security mechanisms. In this security mechanism, data in the cloud server may be stolen and misused. Security mechanisms using static IP addresses are another method for data security in cloud security. This paper explains that the static IP address security mechanism is better and more goal-oriented than that of earlier security systems.Abstract
How to Cite
Downloads
Similar Articles
- Hardik Talsania, Kirit Modi, Attention-Enhanced Multi-Modal Machine Learning for Cardiovascular Disease Diagnosis , The Scientific Temper: Vol. 17 No. 01 (2026): The Scientific Temper
- Kalyani K., Praveen Kumar T. D., Roopa A. N., AI-based tools for enhancing reflective practice and self-efficacy in pre-service teachers , The Scientific Temper: Vol. 16 No. 04 (2025): The Scientific Temper
- R. A. Askerov, The role of improving the business environment in agriculture in ensuring the country’s food security , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- B. Kalpana, P. Krishnamoorthy, S. Kanageswari, Anitha J. Albert, Machine learning approaches for predicting species interactions in dynamic ecosystems , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- R. Kalaiselvi, P. Meenakshi Sundaram, Unified framework for sybil attack detection in mobile ad hoc networks using machine learning approach , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- Lakshminarayani A, A Shaik Abdul Khadir, A blockchain-integrated smart healthcare framework utilizing dynamic hunting leadership algorithm with deep learning-based disease detection and classification model , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Sharada C, T N Ravi, S Panneer Arokiara, Lancaster sliced regressive keyword extraction based semantic analytics on social media documents , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper
- K. Arunkumar, K. R. Shanthy, S. Lakshmisridevi, K. Thilagam, FR-CNN: The optimal method for slicing fifth-generation networks through the application of deep learning , The Scientific Temper: Vol. 16 No. 04 (2025): The Scientific Temper
- Sanjeev Kumar, Saurabh Charaya, Rachna Mehta, Multi-Metric Evaluation Framework for Machine Learning-Based Load Prediction in e-Governance Systems , The Scientific Temper: Vol. 17 No. 01 (2026): The Scientific Temper
- Pravin P. P, J. Arunshankar, Development of digital twin for PMDC motor control loop , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
<< < 3 4 5 6 7 8 9 10 11 12 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- J. M. Aslam, K. M. Kumar, Enhancing cloud data security: User-centric approaches and advanced mechanisms , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper

