Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 18676 dokumen yang sesuai dengan query
cover
Devi Thiyagarajan
"Cloud computing has revolutionized the IT industry by offering huge storage for data outsourcing and also for computation. Various security issues concerned with security and privacy of data arise in the context of data outsourcing. The framework enables clients to outsource encrypted data to the cloud, enables users to retrieve preferred documents using multiple keywords and allows the user to verify the response from the server. The strength of the proposed model relies on the discrete logarithmic problem of Hyper Elliptic Curve Cryptography (HECC) and the security of Merkle trees. The paper proposes a user verifiable multi-keyword search scheme, which focuses on: (i) construction of inverted index for the documents with keywords; (ii) index and document encryption by HECC; (iii) index and document authentication by the Merkle tree; and (iv) verification of the accuracy of response from server by top hash or root hash value of the Merkle tree. Security analysis and results demonstrate the correctness of proposed multiple keyword search (MKS) scheme. The search algorithm combined with the hash value verification process by the Merkle tree is strong enough to provide data security, privacy, and integrity. The proposed model reduces the storage overhead on both the client’s and user’s side. As the number of documents increases, the retrieval time is less, which reduces the storage overhead on both sides."
Depok: Faculty of Engineering, Universitas Indonesia, 2017
UI-IJTECH 8:4 (2017)
Artikel Jurnal  Universitas Indonesia Library
cover
Dyani Mustikarini
"Skripsi ini berisi mengenai konsep dasar, perancangan dan implementasi enkripsi data dengan RSA yang diterapkan pada private cloud Infrastucture as a Service (IaaS). Tujuan dari skripsi ini menganalisa keamanan pengiriman data dan waktu dari implementasi kriptografi RSA pada sistem Eucalyptus private cloud. Pengiriman data pada sistem virtualisasi private cloud membutuhkan enkripsi untuk mengantisipasi serangan dari man-in-the-middle sehingga penyerang tidak mengetahui isi data dengan mudah.
Hasil penelitian menunjukkan bahwa waktu eksekusi program RSA dipengaruhi oleh ukuran data dan nilai kunci RSA yang dibangkitkan. Peningkatan ukuran data akan mempengaruhi peningkatan waktu eksekusi program RSA. Peningkatan waktu eksekusi untuk format .txt sebesar 31,44%, untuk format .doc sebesar 24,83% dan untuk format .pdf sebesar 24,85%. Nilai d untuk kunci privat RSA yang besar akan sangat mempengaruhi waktu eksekusi karena membutuhkan waktu dekripsi yang lebih lama.
Sedangkan nilai e yang besar untuk kunci publik RSA tidak terlalu signifikan mempengaruhi waktu enkripsi menjadi lebih lama namun tetap berkontribusi terhadap waktu eksekusi RSA. Keamanan pengiriman data pada sistem private cloud dibutuhkan terutama dengan RSA 2048 bit dan sistem padding, namun pada skripsi ini hanya digunakan enkripsi plain RSA.

This thesis contains about fundamental concept, the design and the implementation of data encryption using RSA which is applied on private cloud Infrastucture as a Service (IaaS). The purposes of this thesis are to analyze the the data transfer security and the time of RSA cryptography appliance on Eucalyptus private cloud system. Secret data transfer on private cloud virtualization requires encryption in order to anticipated the attack from man-in-the-middle so that the attacker won?t know the contents of data easily.
The result of this research prove that RSA execution time influented by the size of data and the value of the generated RSA keys. Data size increment will influence the execution times of RSA. The increment time for .txt is 31,44%, increment time for .doc is 24,83%, and increment time for .pdf is 24,85%. Large values of d for RSA private key greatly affect the execution time because need a longer decryption time.
However, the large value of e for public keys isn?t influence the encryption time significantly but still contributes the execution time. The security of data transfer on private cloud system is needed especially using RSA 2048 bit and padding system appliance,however this thesis only implement plain RSA encryption.
"
Depok: Fakultas Teknik Universitas Indonesia, 2012
S43449
UI - Skripsi Open  Universitas Indonesia Library
cover
Lee, Gary, 1958-
Amsterdam : Elsevier, 2014
004.678 2 LEE c
Buku Teks SO  Universitas Indonesia Library
cover
Mohamad Fathurahman
"Keberadaan data center pada sistem cloud computing sangat besar artinya. Data center yang terletak pada lapisan IaaS pada sistem cloud berisi komponen fisik yang meliputi komponen komputasi seperti server dan switch dan komponen non komputasi seperti sistem pendingin dan pengaturan suhu. Seiring dengan meningkatnya jumlah pengguna data center, maka konsumsi daya listrik pada data center akan meningkat. Telah diusulkan skema penghematan energi pada data center yakni skema DVFS dan DNS.
Pada penelitian ini telah disimulasikan menggunakan GreenCloud, yang merupakan ekstensi dari NS2, kepada tiga macam arsitektur data center yakni two-tier, three-tier dan three-tier high-speed dengan jenis workload adalah High Performance Computing HPC. Penerapan skema penghematan meliputi skema DVFS dan DNS saja serta DVFS dan DNS sekaligus. Dari hasil yang diperoleh menunjukkan bahwa penerapan skema DNS menunjukkan hasil terbaik karena berhasil melakukan penghematan rata-rata sebesar 63,42% pada server dan hampir 100% pada switch.

The existence of a data center in the cloud computing system was huge. Data center is located on the IaaS layer cloud systems containing physical component includes computing components such as servers and switches and non-computing components such as cooling systems and temperature regulation. Along with the increasing number of users of data center, then the electric power consumption in the data center will increase. Energy conservation schemes have been proposed in the data center is DNS and DVFS.
In this study has been simulated using GreenCloud, which is an extension of NS2, the three kinds of data center architecture these are two-tier, three-tier and three-tier high-speed with the type of data center workloads is HPC High Performance Computing. The applications of the savings schemes include schemes DVFS only, DNS only and both DVFS and DNS. From the results obtained indicate that the application of the DNS control scheme is the best because it managed to save an average of 63.42% on the server and almost 100% on the switch for all data center architecture.
"
Depok: Fakultas Teknik Universitas Indonesia, 2012
T31942
UI - Tesis Open  Universitas Indonesia Library
cover
L. Aruna
"Federated Cloud Architecture is a heterogeneous and distributed model that provides infrastructures related to the cloud by aggregating different Infrastructure-as-a-Service (IaaS) providers. In this case, it is an exciting task to select the optimal service cloud provider for the customer and then deploy it. In this paper, a new provider discovery algorithm and fuzzy sets ranking model is proposed in the modified federated architecture and then the performance is evaluated. The proposed discovery method shortlists the provider based on the Quality of Service (QoS) indicators suggested by the Service Measurement Index (SMI) with the Service Level Agreement (SLA) that provides improved performance. In addition to that, the cost is also included that represents the fulfillment at the level of the end user. The ranking mechanism is based on a Fuzzy set approach, having three general phases, such as problem decomposition, judgment of priorities and an aggregation of these priorities. With some simple rules, the fuzzy set may be combined with the QoS indicators. The Weighted Tuned Queuing Scheduling (WTOS) Algorithm is proposed to resolve the issue of starvation in the existing architecture and manage the requests effectively. Experimental results show that the proposed architecture has a better successful selection rate, average response time and less overhead, compared to the existing architecture that had supported the Cloud environment."
Depok: Faculty of Engineering, Universitas Indonesia, 2016
UI-IJTECH 7:4 (2016)
Artikel Jurnal  Universitas Indonesia Library
cover
Surya Ariansyah
"ABSTRAK<>br>
Organisasi XYZ merupakan unit TIK pusat yang melayani kebutuhan TI seluruh unit eselon 1 di lingkungan Organisasi ABC. Salah satu target Organisasi XYZ pada tahun 2015 adalah pencapaian kepuasan penguna layanan TIK sebesar 4.03 terhadap layanan cloud, layanan email dan internet dan layanan service desk. Kepuasan pengguna layanan TIK ini merupakan indikator keberhasilan Organisasi XYZ dalam memberikan layanan TIK yang prima. Akan tetapi pada tahun 2015 target pencapaian kepuasan pelanggan tidak tercapai. Salah satu penyebabnya terkait dengan layanan cloud yang mendapatkan nilai terendah. Berdasarkan pendapat pengguna hal ini disebabkan karena belum adannya evaluasi layanan cloud yang diminta oleh penyedia layanan, belum adannya kajian kebutuhan, tidak terdapat perencanaan kapasitas layanan cloud, dan sering terjadi insiden terhadap layanan kritikal yang di cloud kan. Penyebab tersebut tersebut merupakan pendapat yang belum tentu menjadi penyebab utama sehingga perlu digali lebih dalam untuk mengetahui faktor utama penyebab ketidak puasan pengguna layanan cloud server di lingkungan Organisasi ABC. Penelitian ini melakukan pengumpulan data dengan menggunakan cara wawancara sebagai data primer dan hasil SKP, observasi sebagai data sekunder, kemudian melakukan pemetaan ke Quality Model of Cloud Service terdiri dari 6 enam faktor yaitu Usability, Security, Reliability, Tangibility, Responsiveness dan Empathy, dari hasil pemetaan tersebut kemudian dilakukan survei dengan dengan menyebarkan kuesioner yang diisi oleh pegawai yang kompeten/ahli dalam bidang layanan cloud server atau yang bertanggung jawab di organisasi. Data yang diperoleh kemudian diolah dengan menggunaka teknik Analytical Hierarchy Process AHP . Hasilnya diperoleh bahwa faktor utama ketidakpuasan pengguna layanan cloud server adalah terkait dengan faktor tangible, reliability, usability sedangkan subfaktor adalah profesionalism, user interface aesthetic, availability, stability, learnability, dan protection, dari hasil pemataan permasalahan tersebut kemudian disusun rekomendasi perbaikan menggunakan pendekatan COBIT 5, ITIL v3, NIST SP 800-146 dan penelitian sebelumnya

ABSTRACT<>br>
XYZ Organization is a central ICT unit that serves the IT needs of all echelon 1 units within the ABC Organization. One of the target of XYZ Organization in 2015 is the achievement of ICT service user satisfaction of 4.03 to cloud service, email and internet service and service desk. User satisfaction of ICT services is an indicator of XYZ 39 s Organization success in providing excellent ICT services. However, in 2015 the target of achieving customer satisfaction is not achieved. One of the cause factors associated with cloud services that get the lowest value. Based on the user 39 s opinion this is due to the lack of an evaluation of cloud services requested by the service provider, not necessarily the needs assessment, no cloud service capacity planning, and frequent incidents of critical services in the cloud. The cause is an opinion that is not necessarily the main cause factors so it needs to be explored more deeply to determine the main factors causing dissatisfaction of cloud server service users within the ABC Organization.This study collected data using interview method as primary data and SKP result, observation as secondary data, then mapping to Quality Model of Cloud Service consist of 6 six criteria that is Usability, Security, Reliability, Tangibility, Responsiveness and Empathy. Conducting survey method by spreading questionnaires filled by competent employees experts in the field of cloud server service or responsible in organization. The data obtained is then processed by using Analytical Hierarchy Process AHP technique. The result obtained that the main factor of dissatisfaction of cloud server service user is related to tangible, reliability, usability factors then sub factors profesionalism, user interface aesthetic, availability, stability, learnability sub factors, then compiled recommendation improvement using approach COBIT 5, ITIL v3, NIST SP 800 146 and previous research"
2017
TA-Pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
Nur Fadli
"Teknologi Cloud Computing merupakan tren teknologi informasi saat ini yang memanfaatkan jaringan internet untuk penyediaan akses ke berbagai layanan TI. Teknologi ini diprediksikan akan semakin berkembang karena layanan cloud menawarkan berbagai keunggulan seperti efektivitas biaya, fleksibilitas layanan, kemudahan akses, kecepatan proses komputasi dan lain-lain. Terdapat juga faktor-faktor yang menjadi penghambat untuk adopsi cloud seperti faktor keamanan dan privasi data, lambatnya akses internet, proses migrasi yang rumit, dan lain-lain. Berbagai faktor tersebut menjadi pertimbangan organisasi untuk melihat benefit yang diperoleh jika adopsi layanan cloud dilakukan. Karya akhir ini akan mengidentifikasikan prioritas dari faktor-faktor seperti efektifitas biaya, efektivifitas keamanan, kebutuhan organisasi, koneksi internet, reliabilitas, dan kepercayaan terhadap provider dalam kaitan dengan adopsi layanan cloud computing di organisasi, serta identifikasi model layanan cloud computing yang paling sesuai untuk organisasi.
Penelitian ini mengumpulkan data dari organisasi dengan metode survey. Organisasi dipilih dengan cara purposive sampling dengan menyebarkan kuesioner yang diisi oleh staf yang kompeten/ahli dengan masalah cloud computing atau bertanggungjawab terhadap infrastruktur TI di organisasi. Data primer yang dikumpulkan selanjutnya diolah dengan metode Analytic Hierarchy Process. Hasilnya adalah bahwa urutan prioritas dari faktor-faktor yang berpengaruh dalam adopsi layanan cloud computing di organisasi adalah faktor keandalan/reliability (0.237), faktor keamanan/security (0.224) dan faktor koneksi internet (0.175). Untuk model layanan cloud yang paling sesuai untuk organisasi, urutannya adalah layanan Infrastruktur (0.557), layanan Aplikasi (0.246) dan layanan Platform (0.196).

Cloud Computing technology is a recent information technology trends that utilize the Internet connections to provide access to a range of IT services. This technology is expected to further evolve as cloud services offer many advantages such as cost effectiveness, service flexibility, ease of access, swift computing process, etc. There are also some factors listed as an obstacle in cloud computing adoption such as security concern, data privacy, slow internet access, migration process, etc. These various factors will be considered by organization to analyze the benefits obtained if cloud service adoption is performed. This thesis will identify the priority of factors such as cost effectiveness, security effectiveness, organization needs, internet connection, reliability, and trust in cloud provider in influencing cloud service adoption in organizations and also identifying cloud service model that most suited with organizations.
This study collects data from organizations using survey methods. Organizations selected by purposive sampling in which questionnaires filled out by competent staff or cloud computing experts in organization or staff that responsible for IT infrastructure. Primary data collected then processed using Analytic Hierarchy Process. This resulting prioritization of factors that influencing adoption of cloud services in the organization which are : Reliability factor (0.237), Security factor (0.224) and Internet connection factor (0.175). In determining cloud service model that suited with organization needs, the priority order are : Infrastructure services (0.557), Application services (0.246) and Platform services (0.196).
"
Depok: Fakultas Ilmu Komputer Universitas Indonesia, 2013
TA-Pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
Ghilman Fatih
"Penelitian ini bertujuan untuk mengembangkan kerangka kesesuaian suatu institusi pemerintah di Indonesia dalam mengadopsi cloud computing. Pengembangan kerangka tersebut dibagi menjadi dua yaitu: 1) kerangka untuk menentukan perlu tidaknya sebuah organisasi mengadopsi cloud, dan 2) kerangka untuk menentukan tipe cloud deployment yang sesuai. Kerangka pertama dikembangkan dengan memodifikasi model Misra Mondal yang dilakukan dengan melakukan wawancara dengan pakar di bidang adopsi cloud untuk institusi pemerintah. Kerangka kedua dikembangkan dengan menggunakan gabungan antara BCOR, Entropi dan TOPSIS, yang validasi modelnya dilakukan dengan mengirimkan kuesioner kepada pelaku TI di pemerintahan. Selain itu, sebuah studi juga dilakukan ke Dinas Komunikasi dan Informatika kota Depok untuk menguji aplikasi dari kerangka yang sudah dikembangkan.
Hasil studi kasus yang dilakukan di Dinas Kominfo kota Depok menunjukkan institusi ini sudah cocok jika melakukan adopsi cloud computing. Selain itu, hasil dari penelitian pengembangan kerangka tipe cloud deployment menunjukkan bahwa faktor yang paling dianggap penting oleh pelaku TI di pemerintah adalah keamanan data. Dan juga, tipe deployment yang paling sesuai diimplementasikan di sana adalah private cloud.

The purpose of this study is to develop framework of Indonesian government institutions' suitability in adopting cloud technology. The proposed framework comprises the following: 1) a framework for determining an organization necessity to adopt the cloud, and 2) a framework for determining the appropriate type of cloud deployment. The first framework was developed by modifying the Misra Mondal?s model, which was done by conducting interviews with experts in the areas of cloud adoption for government institutions. The second framework was developed using a combination of BCOR, Entropy and TOPSIS, in which the validation of the model was done by distributing questionnaires to the IT specialist in government institution. In addition, a study was also conducted to department of Communication and Information in Depok city to test the application of the framework that has been developed.
The results of a case study conducted in the department of Communication and Information in Depok City showed this institution is highly suitable to adopt cloud computing. In addition, the result of this study indicates that the factors considered important by most IT specialist in government institution is data protection. Moreover, private cloud is considered as the most appropriate cloud deployment model to be implemented.
"
Depok: Fakultas Ilmu Komputer Universitas Indonesia, 2013
S-Pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Velte, Anthony T.
New York: McGraw-Hill, 2010
006.78 VEL c
Buku Teks SO  Universitas Indonesia Library
cover
Crookes, David
Unites States: Financial World, 2012
004.678 2 CRO c
Buku Teks SO  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>