Keamanan Cloud Computing Tantangan dan Solusi
Main Article Content
Abstract
Cloud computing telah menjadi teknologi kunci dalam transformasi digital, memberikan keuntungan besar dalam hal skalabilitas, fleksibilitas, dan efisiensi biaya. Namun, adopsi cloud computing juga membawa tantangan keamanan yang signifikan, termasuk risiko terhadap keamanan data, manajemen identitas dan akses, kepatuhan terhadap regulasi, ancaman insider, dan masalah isolasi di lingkungan multi-tenant. Tantangan-tantangan ini dapat mengakibatkan kebocoran data, akses tidak sah, dan ketidakpatuhan terhadap standar keamanan internasional. Solusi yang diusulkan meliputi penggunaan enkripsi data, penerapan autentikasi multi-faktor dan arsitektur Zero Trust, audit keamanan berkala, pelatihan kesadaran keamanan, dan teknologi isolasi seperti Virtual Private Cloud (VPC). Dengan mengadopsi langkah-langkah ini, organisasi dapat meminimalkan risiko keamanan cloud dan memanfaatkan sepenuhnya manfaat teknologi cloud.
Article Details

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
References
Agir, N., & Mohd Matore, M. E. @ E. (2022). Literasi dan Kewarganegaraan Digital: Konsep dan Strategi Implementasi dalam Pendidikan di Malaysia. Malaysian Journal of Social Sciences and Humanities (MJSSH), 7(3), e001367. https://doi.org/10.47405/mjssh.v7i3.1367
Alsowail, R. A., & Al-Shehari, T. (2021). A Multi-Tiered Framework for Insider Threat Prevention. Electronics, 10(9), 1005. https://doi.org/10.3390/electronics10091005
Alvi Sholikhatin, S., Fitrianingsih, W., & Dhiyaulhaq, S. (2020). WORKSHOP STRATEGI PENINGKATAN POPULARITAS KONTEN SERTA MENJAGA KEAMANAN DATA PRIBADI DI BERBAGAI PLATFORM MEDIA SOSIAL. SELAPARANG Jurnal Pengabdian Masyarakat Berkemajuan, 4(1), 251. https://doi.org/10.31764/jpmb.v4i1.2929
Becker, M., & Drew, M. (2005). Overcoming the challenges in deploying user provisioning/identity access management backbone. BT Technology Journal, 23(4), 71–79. https://doi.org/10.1007/s10550-006-0009-x
Behl, A. (2011). Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation. 2011 World Congress on Information and Communication Technologies, 217–222. https://doi.org/10.1109/WICT.2011.6141247
Deorankar, A. V., & Khobragade, K. T. (2020). A Review on Various Data Sharing Strategies for Privacy of Cloud Storage. 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC), 98–101. https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00019
Devlekar, S., & Ramteke, V. (2021). Identity and Access Management: High-level Conceptual Framework. Revista Gestão Inovação e Tecnologias, 11(4), 4885–4897. https://doi.org/10.47059/revistageintec.v11i4.2511
Hadiana, A. I., Putra, E. K., & Melina, M. (2021). Tinjauan Mengenai Potensi Information Technology Infrastructure Library (ITIL) pada Model Layanan Teknologi Informasi di Usaha Kecil Mikro dan Menengah (UMKM). Informatics and Digital Expert (INDEX), 2(2). https://doi.org/10.36423/index.v2i02.582
Jansen, W., & Grance, T. (2011). Guidelines on security and privacy in public cloud computing. https://doi.org/10.6028/NIST.SP.800-144
Mishra, S., Kumar Sharma, S., & A. Alowaidi, M. (2020). Multilayer Self-defense System to Protect Enterprise Cloud. Computers, Materials & Continua, 66(1), 71–85. https://doi.org/10.32604/cmc.2020.012475
Parveen, S., Ahmad, S., & Khan, M. A. (2021). Integration of Identity Governance and Management Framework within Universities for Privileged Users. International Journal of Advanced Computer Science and Applications, 12(6). https://doi.org/10.14569/IJACSA.2021.0120664
Sambaiah.G. (2020). Imperative Requirements for Data Security in Cloud Computing. International Journal of Engineering Research And, V9(07). https://doi.org/10.17577/IJERTV9IS070455
Santosa, A. A., & Perwira Redi, A. A. N. (2021). Pemilihan Platform Tanda Tangan Digital Berdasarkan Faktor Keberlanjutan Selama Pandemi COVID-19 Menggunakan Metode AHP. Digital Zone: Jurnal Teknologi Informasi Dan Komunikasi, 12(2). https://doi.org/10.31849/digitalzone.v12i2.8014
Smith, H. A., & McKeen, J. D. (2011). The Identity Management Challenge. Communications of the Association for Information Systems, 28. https://doi.org/10.17705/1CAIS.02811
Soemitro, D. P., Wicaksono, M. A., & Putri, N. A. (2023). Penal Provisions in the Personal Data Protection Law: A Comparative Legal Study between Indonesia and Singapore. SIGn Jurnal Hukum, 5(1), 155–167. https://doi.org/10.37276/sjh.v5i1.272
Sreelatha, G., Babu, A. V., & Midhunchakkarvarthy, D. (2020). A Survey on Cloud Attack Detection using Machine Learning Techniques. International Journal of Computer Applications, 175(34), 21–27. https://doi.org/10.5120/ijca2020920887
Srivastava, S., & Sudhish, P. S. (2015). Security in cloud computing systems: A review of challenges and solutions for security in distributed computing environments. 2015 39th National Systems Conference (NSC), 1–5. https://doi.org/10.1109/NATSYS.2015.7489088
Syailendra, M. R. (2021). PERLINDUNGAN DATA PRIBADI TERHADAP TINDAKAN PENYEBARAN SEX TAPE MENURUT HUKUM POSITIF DI INDONESIA. Jurnal Muara Ilmu Sosial, Humaniora, Dan Seni, 5(2), 440. https://doi.org/10.24912/jmishumsen.v5i2.12506.2021