Keamanan Cloud Computing Tantangan dan Solusi

Main Article Content

Yossi Indrawati Syuhardi
Eko Tri Asmoro

Abstract

Cloud computing telah menjadi teknologi kunci dalam transformasi digital, memberikan keuntungan besar dalam hal skalabilitas, fleksibilitas, dan efisiensi biaya. Namun, adopsi cloud computing juga membawa tantangan keamanan yang signifikan, termasuk risiko terhadap keamanan data, manajemen identitas dan akses, kepatuhan terhadap regulasi, ancaman insider, dan masalah isolasi di lingkungan multi-tenant. Tantangan-tantangan ini dapat mengakibatkan kebocoran data, akses tidak sah, dan ketidakpatuhan terhadap standar keamanan internasional. Solusi yang diusulkan meliputi penggunaan enkripsi data, penerapan autentikasi multi-faktor dan arsitektur Zero Trust, audit keamanan berkala, pelatihan kesadaran keamanan, dan teknologi isolasi seperti Virtual Private Cloud (VPC). Dengan mengadopsi langkah-langkah ini, organisasi dapat meminimalkan risiko keamanan cloud dan memanfaatkan sepenuhnya manfaat teknologi cloud.

Article Details

How to Cite
Syuhardi, Y. I., & Asmoro, E. T. (2024). Keamanan Cloud Computing Tantangan dan Solusi. Journal of Multidisciplinary Inquiry in Science, Technology and Educational Research, 1(4), 1997–2004. https://doi.org/10.32672/mister.v1i4.2171
Section
Articles
Author Biographies

Yossi Indrawati Syuhardi, Universitas Indraprasta PGRI

Prodi Teknik Informatika, Universitas Indraprasta PGRI

Eko Tri Asmoro, Universitas Indraprasta PGRI

Prodi Teknik Informatika, Universitas Indraprasta PGRI

References

Agir, N., & Mohd Matore, M. E. @ E. (2022). Literasi dan Kewarganegaraan Digital: Konsep dan Strategi Implementasi dalam Pendidikan di Malaysia. Malaysian Journal of Social Sciences and Humanities (MJSSH), 7(3), e001367. https://doi.org/10.47405/mjssh.v7i3.1367

Alsowail, R. A., & Al-Shehari, T. (2021). A Multi-Tiered Framework for Insider Threat Prevention. Electronics, 10(9), 1005. https://doi.org/10.3390/electronics10091005

Alvi Sholikhatin, S., Fitrianingsih, W., & Dhiyaulhaq, S. (2020). WORKSHOP STRATEGI PENINGKATAN POPULARITAS KONTEN SERTA MENJAGA KEAMANAN DATA PRIBADI DI BERBAGAI PLATFORM MEDIA SOSIAL. SELAPARANG Jurnal Pengabdian Masyarakat Berkemajuan, 4(1), 251. https://doi.org/10.31764/jpmb.v4i1.2929

Becker, M., & Drew, M. (2005). Overcoming the challenges in deploying user provisioning/identity access management backbone. BT Technology Journal, 23(4), 71–79. https://doi.org/10.1007/s10550-006-0009-x

Behl, A. (2011). Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation. 2011 World Congress on Information and Communication Technologies, 217–222. https://doi.org/10.1109/WICT.2011.6141247

Deorankar, A. V., & Khobragade, K. T. (2020). A Review on Various Data Sharing Strategies for Privacy of Cloud Storage. 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC), 98–101. https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00019

Devlekar, S., & Ramteke, V. (2021). Identity and Access Management: High-level Conceptual Framework. Revista Gestão Inovação e Tecnologias, 11(4), 4885–4897. https://doi.org/10.47059/revistageintec.v11i4.2511

Hadiana, A. I., Putra, E. K., & Melina, M. (2021). Tinjauan Mengenai Potensi Information Technology Infrastructure Library (ITIL) pada Model Layanan Teknologi Informasi di Usaha Kecil Mikro dan Menengah (UMKM). Informatics and Digital Expert (INDEX), 2(2). https://doi.org/10.36423/index.v2i02.582

Jansen, W., & Grance, T. (2011). Guidelines on security and privacy in public cloud computing. https://doi.org/10.6028/NIST.SP.800-144

Mishra, S., Kumar Sharma, S., & A. Alowaidi, M. (2020). Multilayer Self-defense System to Protect Enterprise Cloud. Computers, Materials & Continua, 66(1), 71–85. https://doi.org/10.32604/cmc.2020.012475

Parveen, S., Ahmad, S., & Khan, M. A. (2021). Integration of Identity Governance and Management Framework within Universities for Privileged Users. International Journal of Advanced Computer Science and Applications, 12(6). https://doi.org/10.14569/IJACSA.2021.0120664

Sambaiah.G. (2020). Imperative Requirements for Data Security in Cloud Computing. International Journal of Engineering Research And, V9(07). https://doi.org/10.17577/IJERTV9IS070455

Santosa, A. A., & Perwira Redi, A. A. N. (2021). Pemilihan Platform Tanda Tangan Digital Berdasarkan Faktor Keberlanjutan Selama Pandemi COVID-19 Menggunakan Metode AHP. Digital Zone: Jurnal Teknologi Informasi Dan Komunikasi, 12(2). https://doi.org/10.31849/digitalzone.v12i2.8014

Smith, H. A., & McKeen, J. D. (2011). The Identity Management Challenge. Communications of the Association for Information Systems, 28. https://doi.org/10.17705/1CAIS.02811

Soemitro, D. P., Wicaksono, M. A., & Putri, N. A. (2023). Penal Provisions in the Personal Data Protection Law: A Comparative Legal Study between Indonesia and Singapore. SIGn Jurnal Hukum, 5(1), 155–167. https://doi.org/10.37276/sjh.v5i1.272

Sreelatha, G., Babu, A. V., & Midhunchakkarvarthy, D. (2020). A Survey on Cloud Attack Detection using Machine Learning Techniques. International Journal of Computer Applications, 175(34), 21–27. https://doi.org/10.5120/ijca2020920887

Srivastava, S., & Sudhish, P. S. (2015). Security in cloud computing systems: A review of challenges and solutions for security in distributed computing environments. 2015 39th National Systems Conference (NSC), 1–5. https://doi.org/10.1109/NATSYS.2015.7489088

Syailendra, M. R. (2021). PERLINDUNGAN DATA PRIBADI TERHADAP TINDAKAN PENYEBARAN SEX TAPE MENURUT HUKUM POSITIF DI INDONESIA. Jurnal Muara Ilmu Sosial, Humaniora, Dan Seni, 5(2), 440. https://doi.org/10.24912/jmishumsen.v5i2.12506.2021