Security Management Implementation in Cloud Server

Awang Andhyka, Fawaidul Badri

Abstract


The need of servers is currently growing rapidly. Every company or school needs a server to store electronic data properly. As for email and Information Systems with cloud servers, it is expected to be accessible to users from anywhere. But in building a server there are several security problems that often occured, such as the server being hacked, and causing the data to be lost. From these problems, a study was made to produce a discussion of security management in a cloud server with a minimum cost that can be applied to a company or campus or another. In scanning security on the cloud server, Android authentication can be used. Each root user will log in to the cloud server, then Android authentication will send a data. Apart from android authentication, security can use firewall ip tables in the cloud server and added with SSL (Secure Socket Layer), in every data from, and, to the encrypted server.

 


Keywords


Server, Security, Authentication, Cloud Server, Secure Socket Layer, Firewall.

Full Text:

PDF

References


R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, I. Brandic, "Cloud computing and emerging IT platforms: Vision hype and reality for delivering computing as the 5th utility", Future Generation Computer Systems, vol. 25, no. 6, pp. 599-616, 2009

TS Chou, "Security threats on cloud computing vulnerabilities", International Journal of Computer Science & Information Technology, vol. 5, no. 3, pp. 79, Jun 2013.

S. Goyal, "Public vs Private vs Hybrid vs Community-Cloud Computing: A Critical Review", International Journal of Computer Network and Information Security., vol. 6, pp. 20-29, 2014

N. T. T. G. M. Bones, "Cloud Computing Security Issues and Challenges", International Journal of Computer Networks (IJCN), vol. 3, no. 5, 2011.

D. S. L. G. J. e. a. Fernandes, "Security Issues in Cloud environments: a survey", International Journal of Information Security, vol. 13, pp. 113, 2014M.

M. F. Bari, S. R. Chowdhury, R. Ahmed, R. Boutaba, "On orchestrating virtual network functions", Proceedings of the 2015 11th International Conference on Network and Service Management (CNSM) ser. CNSM '15, pp. 50-56, 2015.




DOI: http://dx.doi.org/10.25139/inform.v3i2.1050

Refbacks

  • There are currently no refbacks.


Copyright (c) 2018 fawaid ibad

____________________________________________________________
INFORM: Jurnal Ilmiah Bidang Teknologi Informasi dan Komunikasi
ISSN 2502-3470 (Print) | 2581-0367 (Online)

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

View Inform Stats