Security Management Implementation in Cloud Server

  • Universitas Nahdlatul Ulama Sidoarjo
  • Universitas Nahdlatul Ulama Sidoarjo
Abstract views: 492 , PDF downloads: 352
Keywords: Server, Security, Authentication, Cloud Server, Secure Socket Layer, Firewall.

Abstract

The need of servers is currently growing rapidly. Every company or school needs a server to store electronic data properly. As for email and Information Systems with cloud servers, it is expected to be accessible to users from anywhere. But in building a server there are several security problems that often occured, such as the server being hacked, and causing the data to be lost. From these problems, a study was made to produce a discussion of security management in a cloud server with a minimum cost that can be applied to a company or campus or another. In scanning security on the cloud server, Android authentication can be used. Each root user will log in to the cloud server, then Android authentication will send a data. Apart from android authentication, security can use firewall ip tables in the cloud server and added with SSL (Secure Socket Layer), in every data from, and, to the encrypted server.

 

References

R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, I. Brandic, "Cloud computing and emerging IT platforms: Vision hype and reality for delivering computing as the 5th utility", Future Generation Computer Systems, vol. 25, no. 6, pp. 599-616, 2009
TS Chou, "Security threats on cloud computing vulnerabilities", International Journal of Computer Science & Information Technology, vol. 5, no. 3, pp. 79, Jun 2013.
S. Goyal, "Public vs Private vs Hybrid vs Community-Cloud Computing: A Critical Review", International Journal of Computer Network and Information Security., vol. 6, pp. 20-29, 2014
N. T. T. G. M. Bones, "Cloud Computing Security Issues and Challenges", International Journal of Computer Networks (IJCN), vol. 3, no. 5, 2011.
D. S. L. G. J. e. a. Fernandes, "Security Issues in Cloud environments: a survey", International Journal of Information Security, vol. 13, pp. 113, 2014M.
M. F. Bari, S. R. Chowdhury, R. Ahmed, R. Boutaba, "On orchestrating virtual network functions", Proceedings of the 2015 11th International Conference on Network and Service Management (CNSM) ser. CNSM '15, pp. 50-56, 2015.
Published
2018-10-03
How to Cite
, & . (2018). Security Management Implementation in Cloud Server. Inform : Jurnal Ilmiah Bidang Teknologi Informasi Dan Komunikasi, 3(2), 90-94. https://doi.org/10.25139/inform.v3i2.1050
Section
Volume 3 No. 2 2018