Implementasi Model Diskless dalam Data Sharing dan Peningkatan Keamanan Data dengan Metode Ucm (User Control Management)
indonesia
DOI:
https://doi.org/10.47233/jsit.v4i2.1987Keywords:
model diskless, data sharing, keamanan data, metode UCM, manajemen akses penggunaAbstract
Penelitian ini bertujuan untuk menjelaskan implementasi model diskless dalam konteks data sharing dan peningkatan keamanan data menggunakan metode UCM (User Control Management). Metode UCM berkaitan dengan manajemen akses pengguna dalam lingkungan jaringan. Data sharing merupakan kebutuhan penting dalam lingkungan jaringan saat ini. Namun, tantangan seperti pengaturan akses yang tepat, perlindungan data, dan peningkatan keamanan menjadi perhatian utama. Implementasi model diskless dengan metode UCM memiliki potensi untuk meningkatkan keamanan data. Melalui penelitian ini, diharapkan akan diperoleh pemahaman yang lebih baik tentang potensi model diskless dan metode UCM dalam meningkatkan keamanan data dalam lingkungan jaringan. Hasil penelitian ini diharapkan dapat memberikan kontribusi pada pengembangan sistem data sharing yang aman dan efisien dalam lingkungan jaringan.
Downloads
References
Abomhara, M., & Koien, G. M. (2015). Security and privacy in the Internet of Things: Current status and open issues. In 2015 10th
International Conference for Internet Technology and Secured Transactions (ICITST) (pp. 336-341). IEEE.
Akram, W., Nauman, M., & Siddiqa, A. (2020). User access control model for IoTbased secure data sharing in the cloud environment. IEEE
Access, 8, 7878- 7887.
Almorsy, M., Grundy, J., & Muller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
Alshamrani, A., & Alshawi, S. (2020). The importance of user access management in enhancing the security of cloud systems. Journal of
Security and Privacy, 3(3), e32.
Chandrasekaran, A., & Mahendran, M. (2018). A secure cloud-based framework for data sharing. Procedia Computer Science, 143, 675-
Chen, J., & Zhao, H. (2019). Secure data sharing scheme based on blockchain in internet of things. IEEE Access, 7, 158204-158212.
Gou, Y., & Wang, Q. (2020). Diskless Boot Technology and Its Application in Computer Teaching. In International Conference on
Advanced Computer Science and Information Systems (pp. 75-83). Springer, Cham.
Dio, P, Mulya (2020). Implementasi Multi User Operating System (OS) Dengan CCBOOT. Jurnal Teknologi dan Sistem Informasi Bisnis,
-8238
Huang, H., Li, Z., Cheng, J., & Wu, L. (2019). User behavior-based cloud data sharing scheme with fine-grained access control. IEEE
Access, 7, 144779-144789.
Kamal, S., & Alhamid, M. F. (2017). Secure data sharing model for cloud storage using attribute-based encryption. International Journal of
Grid and Utility Computing, 8(3), 199-212.
Kantarcioglu, M., & Clifton, C. (2004). Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE
Transactions on Knowledge and Data Engineering, 16(9), 1026-1037.
Kumar, S. A., & Immanuel, S. (2020). Enhanced security with user control management in cloud. In 2020 IEEE International Conference
on Engineering and Advanced Technology (ICEAT) (pp. 1-5). IEEE.
Li, W., Yu, S., & Ren, K. (2020). Secure data sharing in cloud computing: Challenges and opportunities. IEEE Internet of Things Journal,
(2), 872-888.
Park, H. J., Yoo, S., & Lim, S. (2020). Performance Analysis of Diskless Systems for Personal Computers. Computers, Materials &
Continua, 63(1), 83-97.
Sandhu, R., Ferraiolo, D., & Kuhn, D. (1996). The role-based access control model. IEEE Computer, 29(2), 38-47.
Shun, Y., Jeng, Y., & Liu, S. (2018). The design and implementation of diskless embedded linux for internet of things devices. Journal of
Low Power Electronics and Applications, 8(4), 47.
Vinothina, R., & Suresh, S. (2019). A novel user access control model for improving security in cloud computing. In 2019 International
Conference on Smart Systems and Inventive Technology (ICSSIT) (pp. 1206-1211). IEEE.
Xu, X., Shen, Z., & Zhu, Q. (2019). Identity-based encryption with user control management for cloud storage. Future Generation Computer
Systems, 97, 430-439.
Xue, Z., Wei, Y., & Han, X. (2017). A novel implementation of diskless system based on HDFS. Journal of Physics: Conference Series,
(1), 012002.
Yan, Y., Li, X., Zhou, M., & Xie, S. (2020). A novel secure cloud storage system based on blockchain and attribute-based encryption. IEEE
Access, 8, 93284- 93296
Zhou, X., Sheng, Q. Z., Qin, Y., Li, X., & Yu, Q. (2018). Secure data sharing in cloudassisted internet of things. IEEE Transactions on
Industrial Informatics, 14(7), 2992-3001.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under an Attribution 4.0 International (CC BY 4.0) that allows others to share — copy and redistribute the material in any medium or format and adapt — remix, transform, and build upon the material for any purpose, even commercially with an acknowledgment of the work's authorship and initial publication in this journal.