Analisis Keamanan dan Kenyamanan pada Cloud Computing

Authors

  • Dwina Satrinia Institut Teknologi Telkom Jakarta
  • Syifa Nurgaida Yutia Institut Teknologi Telkom Jakarta
  • Iik Muhamad Malik Matin Politeknik Negeri Jakarta

DOI:

https://doi.org/10.52661/j_ict.v4i1.111

Abstract

Cloud computing atau ‘komputasi awan’ menyajikan berbagai kemudahan untuk organisasi maupun individu dalam mengakses data dimanapun dan kapanpun. Cloud computing memiliki kelebihan seperti memberikan berbagai pilihan model layanan, jenis penyimpanan data, serta kustomisasi komputasi sehingga memberikan  manfaat yang menarik yaitu efisiensi, efektif dan hemat biaya, tetapi hal tersebut tidak membuat cloud computing aman dari ancaman serangan keamanan. Konsep keamanan dibutuhkan untuk membantu manajemen pada organisasi maupun individu dalam melindungi dan melakukan pengamanan data pada layanan cloud. Selain itu, model kenyamanan juga diperlukan untuk membantu pengguna dalam menggunakan layanan cloud.

References

[1] P. Mell and T. Grance, “The NIST Definition of Cloud Computing,” National Institute of Standards and Technology Special Publication 800-145, Department of Commerce, Gaithersburg, 2011.
[2] Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Bandic, I.: Cloud Computing and emerging IT platforms: vision, hype, and relatity for deliverling computing as the 5th utility. Future Generation Computer System 25(6), 599–616 (2009)
[3] Trent Jaeger and Joshua Schiffman, “Outlook: Cloudy with a Chance of Security Challenges and Improvements,” in IEEE Security and Privacy, 8(1), 77–80. doi:10.1109/MSP.2010.
[4] Z. Tari, "Security and Privacy in Cloud Computing," in IEEE Cloud Computing, vol. 1, no. 1, pp. 54–57, 2014.
[5] Gens, F.: New IDC IT Cloud Services Survey: Top Benefits and Challenges. In: IDC eXchange (2008)
[6] Bonguet, Adrien dan Belaiche, Martine, “A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing” (2017)
[7] Farhan Bashir Shaikh and Sajjad Haider, “Security Threats in Cloud Computing”, 6th International Conference on Internet Technology and Security Transaction, in IEEE Cloud Computing, 2011.
[8] Sarvesh Kumar, Saurabh Srivastava, Vijay Kumar, Ramashare Yadav, Kapil Sharma, “Cloud Computing with Real Life Case Studies and a new approach of solving security issues and putting data in cloud”,International Journal of Computer Science Engineering & Information Technology Research,3,1,149-154,2249-6831,March,2013
[9] Kim-Kwang Raymond Choo, “A Cloud Security Risk Management Strategy”, in IEEE Cloud Computing, 2014.
[10] Bernd Grobauer, Tobias Walloschek, and ElmarStocker, “Understanding Cloud Computing Vulnerabilities”, copublished by the IEEE Computer and Reliability Societies 1540-7993/2011 IEEE March/April 2011
[11] Principles of Information Security, 4th Ed. - Michael E. Whitman (2012)
[12] Takabi, H., Joshi, J.B.D, “Security and privacy challenges in cloud computing environment” in IEEE Journal on Security and Privacy, 1540-7993/10/$26.00, 2010
[13] Virginia N.L. Franqueira, VF InfoSec Consulting Roel J. Wieringa, “Role Based Access Control in Retrospect” in IEEE Journal on Computer Society, June 2012
[14] V. Chang and M. Ramachandran, "Towards Achieving Data Security with the Cloud Computing Adoption Framework," in IEEE Transactions on Services Computing, vol. 9, no. 1, pp. 138-151, 1 Jan.-Feb. 2016.
[15] X. Zheng, P. Martin, K. Brohman and L. D. Xu, "CLOUDQUAL: A Quality Model for Cloud Services," in IEEE Transactions on Industrial Informatics, vol. 10, no. 2, pp. 1527-1536, May 2014.

Downloads

Published

2022-07-20

How to Cite

Satrinia, D., Yutia, S. N., & Matin, I. M. M. (2022). Analisis Keamanan dan Kenyamanan pada Cloud Computing. Journal of Informatics and Communication Technology (JICT), 4(1), 85–91. https://doi.org/10.52661/j_ict.v4i1.111

Issue

Section

Articles