Volume 21 No 3 (2023)
 Download PDF
J. Mohamed Aslam , Dr.K. Mohan Kumar
Data stored on a cloud server isfaced a number of security problems and threat issues in the user authentication and access control mechanisms. Protecting sensitive business data in the cloud is more valuable because it should be accessed only by the authenticated personnel. The implementation of effective security mechanisms willraise the level of security competence and allows only authenticated individuals by verifying various security parameters given by humans. Sometimes the data is stolen and misused in cloud server in the previous secure authentication methods. Normally, encryption methods are used in the security mechanisms. Another method of implementing security mechanism in the cloud server is by using MAC address. This paper discusses how a MAC address is more beneficial and result-oriented than previous recognition systems.
Cloud computing, Authorized user,Security mechanism, Media Access control(MAC); Cloud Service Provider (CSP), Internet Protocol (IP).
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.