Implementasi Model Diskless dalam Data Sharing dan Peningkatan Keamanan Data dengan Metode Ucm (User Control Management)

indonesia

Authors

  • dio Prima Mulya Universitas Dharma Andalas
  • putri anggraini universitas dharma andalas
  • intanutna universitas dharma andalas
  • tiarasalsabila universitas dharma andalas
  • celsia universitas dharma andalas

DOI:

https://doi.org/10.47233/jsit.v4i2.1987

Keywords:

model diskless, data sharing, keamanan data, metode UCM, manajemen akses pengguna

Abstract

Penelitian ini bertujuan untuk menjelaskan implementasi model diskless dalam konteks data sharing dan peningkatan keamanan data menggunakan metode UCM (User Control Management). Metode UCM berkaitan dengan manajemen akses pengguna dalam lingkungan jaringan. Data sharing merupakan kebutuhan penting dalam lingkungan jaringan saat ini. Namun, tantangan seperti pengaturan akses yang tepat, perlindungan data, dan peningkatan keamanan menjadi perhatian utama. Implementasi model diskless dengan metode UCM memiliki potensi untuk meningkatkan keamanan data. Melalui penelitian ini, diharapkan akan diperoleh pemahaman yang lebih baik tentang potensi model diskless dan metode UCM dalam meningkatkan keamanan data dalam lingkungan jaringan. Hasil penelitian ini diharapkan dapat memberikan kontribusi pada pengembangan sistem data sharing yang aman dan efisien dalam lingkungan jaringan.

Downloads

Download data is not yet available.

References

Abomhara, M., & Koien, G. M. (2015). Security and privacy in the Internet of Things: Current status and open issues. In 2015 10th

International Conference for Internet Technology and Secured Transactions (ICITST) (pp. 336-341). IEEE.

Akram, W., Nauman, M., & Siddiqa, A. (2020). User access control model for IoTbased secure data sharing in the cloud environment. IEEE

Access, 8, 7878- 7887.

Almorsy, M., Grundy, J., & Muller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.

Alshamrani, A., & Alshawi, S. (2020). The importance of user access management in enhancing the security of cloud systems. Journal of

Security and Privacy, 3(3), e32.

Chandrasekaran, A., & Mahendran, M. (2018). A secure cloud-based framework for data sharing. Procedia Computer Science, 143, 675-

Chen, J., & Zhao, H. (2019). Secure data sharing scheme based on blockchain in internet of things. IEEE Access, 7, 158204-158212.

Gou, Y., & Wang, Q. (2020). Diskless Boot Technology and Its Application in Computer Teaching. In International Conference on

Advanced Computer Science and Information Systems (pp. 75-83). Springer, Cham.

Dio, P, Mulya (2020). Implementasi Multi User Operating System (OS) Dengan CCBOOT. Jurnal Teknologi dan Sistem Informasi Bisnis,

-8238

Huang, H., Li, Z., Cheng, J., & Wu, L. (2019). User behavior-based cloud data sharing scheme with fine-grained access control. IEEE

Access, 7, 144779-144789.

Kamal, S., & Alhamid, M. F. (2017). Secure data sharing model for cloud storage using attribute-based encryption. International Journal of

Grid and Utility Computing, 8(3), 199-212.

Kantarcioglu, M., & Clifton, C. (2004). Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE

Transactions on Knowledge and Data Engineering, 16(9), 1026-1037.

Kumar, S. A., & Immanuel, S. (2020). Enhanced security with user control management in cloud. In 2020 IEEE International Conference

on Engineering and Advanced Technology (ICEAT) (pp. 1-5). IEEE.

Li, W., Yu, S., & Ren, K. (2020). Secure data sharing in cloud computing: Challenges and opportunities. IEEE Internet of Things Journal,

(2), 872-888.

Park, H. J., Yoo, S., & Lim, S. (2020). Performance Analysis of Diskless Systems for Personal Computers. Computers, Materials &

Continua, 63(1), 83-97.

Sandhu, R., Ferraiolo, D., & Kuhn, D. (1996). The role-based access control model. IEEE Computer, 29(2), 38-47.

Shun, Y., Jeng, Y., & Liu, S. (2018). The design and implementation of diskless embedded linux for internet of things devices. Journal of

Low Power Electronics and Applications, 8(4), 47.

Vinothina, R., & Suresh, S. (2019). A novel user access control model for improving security in cloud computing. In 2019 International

Conference on Smart Systems and Inventive Technology (ICSSIT) (pp. 1206-1211). IEEE.

Xu, X., Shen, Z., & Zhu, Q. (2019). Identity-based encryption with user control management for cloud storage. Future Generation Computer

Systems, 97, 430-439.

Xue, Z., Wei, Y., & Han, X. (2017). A novel implementation of diskless system based on HDFS. Journal of Physics: Conference Series,

(1), 012002.

Yan, Y., Li, X., Zhou, M., & Xie, S. (2020). A novel secure cloud storage system based on blockchain and attribute-based encryption. IEEE

Access, 8, 93284- 93296

Zhou, X., Sheng, Q. Z., Qin, Y., Li, X., & Yu, Q. (2018). Secure data sharing in cloudassisted internet of things. IEEE Transactions on

Industrial Informatics, 14(7), 2992-3001.

Downloads

Published

2024-08-09

How to Cite

Mulya, dio P. ., Anggraini, putri, sari, intan utna, Salsabila, T., & Enjelica, C. (2024). Implementasi Model Diskless dalam Data Sharing dan Peningkatan Keamanan Data dengan Metode Ucm (User Control Management): indonesia. Jurnal Sains Dan Teknologi (JSIT), 4(2). https://doi.org/10.47233/jsit.v4i2.1987