Studi Literatur Keamanan dan Privasi Data Sistem Cloud Computing Pada Platform Google Drive

Main Article Content

Zulkarnaim Masyhur
Adhy Rizaldy
Patmayanti Kartini

Abstract

In today's era, we can do mobilization activities anytime and anywhere. Especially with the cloud computing system that makes it easy to interact from one computer to another without consuming a lot of money. This allows us to access data and information from computers or accounts that are connected. Google Drive is a data storage and synchronization service provided by Google. Where every user can use cloud computing in the form of file sharing and editing collaboration. The purpose of this paper is to find out how the challenges and solutions for data security and user privacy are on the Google Drive platform.

Article Details

Section
Art Jun

References

I. Agus, F. Destiawati, and H. Dhika, “Perbandingan Cloud Computing Microsoft Onedrive, Dropbox, dan Google drive,” Fakt. Exacta, vol. 12, no. 1, pp. 20–27, 2019.

A. Nugroho and P. Desa, “Pelatihan pemanfaatan google drive untuk manajemen dokumen dan file di pemerintahan desa sidowangi kabupaten magelang,” no. November, 2019.

“Cloud Computing: Teori dan Implementasi - Yo Ceng Giap, Riki Riki, Didi Kurnaedi, Eko Nursanty, M. Agung Nugroho, Janner Simarmata, Yunita Ardilla - Google Books.” (accessed Jun. 16, 2021).

R. Velumadhava Rao and K. Selvamani, “Data security challenges and its solutions in cloud computing,” Procedia Comput. Sci., vol. 48, no. C, pp. 204–209, 2015, doi: 10.1016/j.procs.2015.04.171.

S. Parikli, D. Dave, R. Patel, and N. Doshi, “Security and privacy issues in cloud, fog and edge computing,” Procedia Comput. Sci., vol. 160, pp. 734–739, 2019, doi: 10.1016/j.procs.2019.11.018.

A. Srinivasan, Q. M. Abdul, and V. Vijayakumar, “Era of cloud computing: A new insight to hybrid cloud,” Procedia Comput. Sci., vol. 50, pp. 42–51, 2015, doi: 10.1016/j.procs.2015.04.059.

G. Manogaran, C. Thota, and M. V. Kumar, “MetaCloudDataStorage Architecture for Big Data Security in Cloud Computing,” Procedia Comput. Sci., vol. 87, pp. 128–133, 2016, doi: 10.1016/j.procs.2016.05.138.

F. Thabit, S. Alhomdy, and S. Jagtap, “A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions,” Int. J. Intell. Networks, vol. 2, no. March, pp. 18–33, 2021, doi: 10.1016/j.ijin.2021.03.001.

D. A. Shafiq, N. Z. Jhanjhi, and A. Abdullah, “Load balancing techniques in cloud computing environment: A review,” J. King Saud Univ. - Comput. Inf. Sci., no. xxxx, 2021, doi: 10.1016/j.jksuci.2021.02.007.

“Kriptografi untuk Keamanan Data - Harun Mukhtar - Google Books.” (accessed Jun. 17, 2021).

A. Cuzzocrea, C. K. Leung, B. H. Wodi, S. Sourav, and E. Fadda, “An effective and efficient technique for supporting privacy-preserving keyword-based search over encrypted data in clouds,” Procedia Comput. Sci., vol. 177, no. 2018, pp. 509–515, 2020, doi: 10.1016/j.procs.2020.10.070.

M. Pandia, “Meningkatkan Keamanan Data Keuangan Dengan Metode Aes Di,” pp. 35–40, 2017.

H. H. Song, “ScienceDirect Testing and Evaluation System for Cloud Computing Information Security Products,” Procedia Comput. Sci., vol. 166, pp. 84–87, 2020, doi: 10.1016/j.procs.2020.02.023.

A. Almaarif, S. Kom, S. S. Informasi, F. R. Industri, and U. Telkom, “Analysis of Network Performance Cloud With the Quality of Services Method in Microsoft Azure and Amazon Web Services Cloud Computing Technology Provider,” vol. 7, no. 2, pp. 6965–6974, 2020.

M. Marliana, “J u r n a l P R O D U K T I F | 331 KEAMANAN DAN PENCEGAHAN DATABASE CLOUD COMPUTING UNTUK PENGGUNA LAYANAN Abstraksi Cloud Computing,” vol. 3, no. 2, pp. 331–336, 2019.

“CLOUD COMPUTING: Manajemen dan Perencanaan Kapasitas - Riko Herwanto, Onno W. Purbo, RZ. Abd. Aziz - Google Books.” (accessed Jun. 18, 2021).

Maniah, E. Abdurachman, F. L. Gaol, and B. Soewito, “Survey on threats and risks in the cloud computing environment,” Procedia Comput. Sci., vol. 161, pp. 1325–1332, 2019, doi: 10.1016/j.procs.2019.11.248.

D. Hulu, B. Nadeak, and S. Aripin, “Implementasi Algoritma AES ( Advanced Encryption Standard ) Untuk Keamanan File Hasil Radiologi di RSU Imelda Medan,” vol. 4, pp. 78–86, 2020, doi: 10.30865/komik.v4i1.2590.

S. T. Ruriawan, “PENGAMANAN DATA CLOUD STORAGE DENGAN MENGGUNAKAN ADVANCED ENCRYPTION STANDARD DAN ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM PADA SECURE SOCKET LAYER BERBASIS WEBSITE SECURING CLOUD STORAGE DATA USING ADVANCED ENCRYPTION STANDARD AND ELLIPTIC CURVE DIGITA,” vol. 8, no. 2, pp. 1949–1960, 2021.

F. Shahzad, “State-of-the-art survey on cloud computing security challenges, approaches and solutions,” Procedia Comput. Sci., vol. 37, pp. 357–362, 2014, doi: 10.1016/j.procs.2014.08.053.

P. R. Kumar, P. H. Raj, and P. Jelciana, “Exploring Data Security Issues and Solutions in Cloud Computing,” Procedia Comput. Sci., vol. 125, no. 2009, pp. 691–697, 2018, doi: 10.1016/j.procs.2017.12.089.

N. H. Hussein and A. Khalid, “A survey of cloud computing security challenges and solutions,” Int. J. Comput. Sci. Inf. Secur., vol. 14, no. 1, pp. 52–56, 2016, [Online].