PENERAPAN AES UNTUK OTENTIKASI AKSES CLOUD COMPUTING
Abstract
ABSTRAK
Otentikasi merupakan salah satu bagian penting dari proses pengamanan data, yang bertujuan untuk membatasi tingkatan hak akses pengguna. Cloud Computing merupakan model komputasi yang mengalihkan sumber daya seperti daya komputasi, penyimpanan, jaringan dan perangkat lunak menjadi layanan di internet. Kehilangan data akibat kebocoran hak akses atau mekanisme otentikasi yang lemah diduga sebagai resiko dan ancaman paling rentan pada cloud computing. Penelitian ini mengajukan sebuah metode pengamanan untuk otentikasi hak akses menggunakan AES (Advance Encryption Standard). Password yang merupakan metode pengamanan hak akses akan dienkripsi menggunakan AES kemudian diuji coba dalam sebuah server PC yang telah diintalasi eyeOS (server private cloud). Hasil percobaan dengan menambahkan enkripsi AES untuk enkripsi password menggunakan data uji Rockyou menghasilkan skor 0.97 lebih kuat dibandingkan metode MD5 dengan selisih waktu komputasi 0.0004 mikro-detik lebih lambat. Hasil percobaan dengan menggunakan data uji MySpace menghasilkan skor 1.24 lebih kuat dibandingkan dengan metode MD5 dengan selisih waktu komputasi 0,0011 mikro-detik lebih lambat. Berdasarkan hasil penelitian menunjukkan bahwa sistem otentikasi yang dikembangkan dalam penelitian ini layak untuk diaplikasikan dalam lingkungan cloud computing.
Kata Kunci: AES (advanced encryption standard), Biometrik tanda tangan offline ,Cloud computing, manajemen otentikasi.
ABSTRACT
Authentication is one important part of the process of data security, which aims to restrict user access levels. Cloud Computing is a computational model that diverts resources such as computing power, storage, networking and software as a service on the internet. Data loss due to leakage permissions or weak authentication mechanism thought to be most vulnerable to the risks and threats to cloud computing. This study proposed a method for authentication security permissions using AES (Advanced Encryption Standard). Password is a method for securing rights access will be encrypted using the AES then tested in a server PC that has installation with eyeOS ( private cloud server ) . The experimental results by adding AES encryption for encrypting passwords using RockYou generate test data score 0.97 is stronger than MD5 method with a computing time 0.0004 microseconds slower . The experimental results using MySpace generate test data resulted in a score 1.24 stronger than MD5 method with computing time 0.0011 microseconds slower . Based on the results of the study indicate that the authentication system developed in this study feasible to be applied in a cloud computing environment .
Keyword: AES (advanced encryption standard), Biometric offline signature, Cloud computing, management authentication.
Full Text:
PDF (Bahasa Indonesia)References
Haoyong Lv, Yin Hu, (2011), Analysis and research about cloud computing security protect policy, ISIE, pp. 214-216.
Kaufman L.M, (2009) , Data security in the world of cloud computing, Security & Privacy, IEEE vol 7, pp 61-64.
Grobauer B, Walloschek T, Stocker E, (2010), Understanding cloud computing vulnerabilities, Security & Privacy, IEEE vol 9 pp 50-57.
Ziyuan Wang, (2011), Security and privacy issues within the Cloud Computing, International Conference on Computational and Information Sciences, IEEE.networks, Communications in Nonlinear Science and Numerical Simulation, 16: 3746–3759, 2011.
Prasad P, Ojha B, Shahi RR, Lal R, Vaish A, Goel U. (2011). 3 Dimensional security in cloud computing, Computer Research and Development (ICCRD), Vol 3, pp. 198-201.
Jain AK, Flynn P, Ross AA, (2008), Handbook of Biometrics, Springer, New York.
Karen Scarfone , Murugiah Souppaya, (2009), Guide to Enterprise Password Management (Draft), Computer Security Division Information Technology Laboratory National Institute of Standards and Technology , Gaithersburg, MD 20899-8930 .
Munir, R, (2006), Kriptografi, Informatika, Bandung.
William Stallings, (2003), Cryptography and Network Security: Principles and Practice, Prentice Hall, New Jersey.
Blasé, at all, (2012), How Does Your Password Measure Up?The Effect of Strength Meters on Password Creation, Carnegie Mellon University.
DOI: https://doi.org/10.21107/simantec.v4i1.1344
Refbacks
- There are currently no refbacks.
Copyright (c) 1970 Imamah h, Arif Djunaidy, Muchammad Husni
Indexed By