PENERAPAN AES UNTUK OTENTIKASI AKSES CLOUD COMPUTING

Imamah h, Arif Djunaidy, Muchammad Husni

Abstract


ABSTRAK
Otentikasi merupakan salah satu bagian penting dari proses pengamanan data, yang bertujuan untuk membatasi tingkatan hak akses pengguna. Cloud Computing merupakan model komputasi yang mengalihkan sumber daya seperti daya komputasi, penyimpanan, jaringan dan perangkat lunak menjadi layanan di internet. Kehilangan data akibat kebocoran hak akses atau mekanisme otentikasi yang lemah diduga sebagai resiko dan ancaman paling rentan pada cloud computing. Penelitian ini mengajukan sebuah metode pengamanan untuk otentikasi hak akses menggunakan AES (Advance Encryption Standard). Password yang merupakan metode pengamanan hak akses akan dienkripsi menggunakan AES kemudian diuji coba dalam sebuah server PC yang telah diintalasi eyeOS (server private cloud). Hasil percobaan dengan menambahkan enkripsi AES untuk enkripsi password menggunakan data uji Rockyou menghasilkan skor 0.97 lebih kuat dibandingkan metode MD5 dengan selisih waktu komputasi 0.0004 mikro-detik lebih lambat. Hasil percobaan dengan menggunakan data uji MySpace menghasilkan skor 1.24 lebih kuat dibandingkan dengan metode MD5 dengan selisih waktu komputasi 0,0011 mikro-detik lebih lambat. Berdasarkan hasil penelitian menunjukkan bahwa sistem otentikasi yang dikembangkan dalam penelitian ini layak untuk diaplikasikan dalam lingkungan cloud computing.

Kata Kunci: AES (advanced encryption standard), Biometrik tanda tangan offline ,Cloud computing, manajemen otentikasi.

ABSTRACT

Authentication is one important part of the process of data security, which aims to restrict user access levels. Cloud Computing is a computational model that diverts resources such as computing power, storage, networking and software as a service on the internet. Data loss due to leakage permissions or weak authentication mechanism thought to be most vulnerable to the risks and threats to cloud computing. This study proposed a method for authentication security permissions using AES (Advanced Encryption Standard). Password is a method for securing rights access will be encrypted using the AES then tested in a server PC that has installation with eyeOS ( private cloud server ) . The experimental results by adding AES encryption for encrypting passwords using RockYou generate test data score 0.97 is stronger than MD5 method with a computing time 0.0004 microseconds slower . The experimental results using MySpace generate test data resulted in a score 1.24 stronger than MD5 method with computing time 0.0011 microseconds slower . Based on the results of the study indicate that the authentication system developed in this study feasible to be applied in a cloud computing environment .

Keyword: AES (advanced encryption standard), Biometric offline signature, Cloud computing, management authentication.


References


Haoyong Lv, Yin Hu, (2011), Analysis and research about cloud computing security protect policy, ISIE, pp. 214-216.

Kaufman L.M, (2009) , Data security in the world of cloud computing, Security & Privacy, IEEE vol 7, pp 61-64.

Grobauer B, Walloschek T, Stocker E, (2010), Understanding cloud computing vulnerabilities, Security & Privacy, IEEE vol 9 pp 50-57.

Ziyuan Wang, (2011), Security and privacy issues within the Cloud Computing, International Conference on Computational and Information Sciences, IEEE.networks, Communications in Nonlinear Science and Numerical Simulation, 16: 3746–3759, 2011.

Prasad P, Ojha B, Shahi RR, Lal R, Vaish A, Goel U. (2011). 3 Dimensional security in cloud computing, Computer Research and Development (ICCRD), Vol 3, pp. 198-201.

Jain AK, Flynn P, Ross AA, (2008), Handbook of Biometrics, Springer, New York.

Karen Scarfone , Murugiah Souppaya, (2009), Guide to Enterprise Password Management (Draft), Computer Security Division Information Technology Laboratory National Institute of Standards and Technology , Gaithersburg, MD 20899-8930 .

Munir, R, (2006), Kriptografi, Informatika, Bandung.

William Stallings, (2003), Cryptography and Network Security: Principles and Practice, Prentice Hall, New Jersey.

Blasé, at all, (2012), How Does Your Password Measure Up?The Effect of Strength Meters on Password Creation, Carnegie Mellon University.




DOI: https://doi.org/10.21107/simantec.v4i1.1344

Refbacks

  • There are currently no refbacks.


Copyright (c) 1970 Imamah h, Arif Djunaidy, Muchammad Husni

batmantoto

slot gacor

slot gacor

slot gacor

slot olympus

slot demo

slot deposit 1000

slot gacor

slot88

rokokbet

slot88

slot gacor

rokokbet

slot resmi

rokokbet

https://sandiegohills.org/

Situs Toto

Situs Toto

Dana4d

Situs Toto

Pan4D

Toto 4d

slot777

https://lppm.stba-jia.ac.id/

slot88

https://ppki.stba-jia.ac.id/

https://pmb.iainkudus.id/

https://jim.iainkudus.id/

slot777

Situs Toto

Slot777

SITUS TOTO

PAN4D

PAN4D

Slot88

Toto 4d

situs toto

slot88

https://iboninternational.org/about-us

https://jurnalkommas.com/docs/Jurnal

https://www.wulaguda.com.au/gallery

slot thailand

bonus new member

togelin

situs toto

hokijp168

paris88

slot gacor

vegas123

situs slot

miya4d

slot gacor

mahjong ways 2

DPRBET

dollar4d

levis4d

buku mimpi

laetoto

Slot Gacor

slot pulsa

slot777

slot gacor gampang menang

Indexed By

slot

slot777

slot gacor maxwin

slot777

slot gacor

slot gacor

slot777

merahtoto

merahtoto

slot777

hijautoto

kuningtoto

game slot

kuningtoto slot

kuningtoto

link kuningtoto

birutoto

birutoto

slot gacor

ungutoto

link ungutoto

slot gacor

ungutoto

togel online 4d

tototogel

bandar togel

game online

slot gacor

situs gacor

merahtoto

kuningtoto

kuningtoto

merahtoto

hijautoto

hijautoto

hijautoto

hijautoto

birutoto

slot88