Volume 21 No 3 (2023)
Download PDF
ENHANCING CLOUD SECURITY USING MAC ADDRESS
J. Mohamed Aslam , Dr.K. Mohan Kumar
Abstract
Data stored on a cloud server isfaced a number of security problems and threat issues in the user authentication
and access control mechanisms. Protecting sensitive business data in the cloud is more valuable because it
should be accessed only by the authenticated personnel. The implementation of effective security mechanisms
willraise the level of security competence and allows only authenticated individuals by verifying various security
parameters given by humans. Sometimes the data is stolen and misused in cloud server in the previous secure
authentication methods. Normally, encryption methods are used in the security mechanisms. Another method of
implementing security mechanism in the cloud server is by using MAC address. This paper discusses how a
MAC address is more beneficial and result-oriented than previous recognition systems.
Keywords
Cloud computing, Authorized user,Security mechanism, Media Access control(MAC); Cloud Service Provider (CSP), Internet Protocol (IP).
Copyright
Copyright © Neuroquantology
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.