Claim Missing Document
Check
Articles

Found 2 Documents
Search

Implementation of Cloud Computing Using the Roadmap for Cloud Computing Adoption (ROCCA) Method in Non-Ministry Government Institutions (Case Study of Lembaga Ilmu Pengetahuan Indonesia) Haryanto, Tony
PINISI Discretion Review Volume 3, Issue 1, September 2019
Publisher : Universitas Negeri Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1275.435 KB) | DOI: 10.26858/pdr.v3i1.13274

Abstract

Cloud computing answers some of the challenges in the ICT world, including the high investment that must be spent. This study aims to examine the adoption of the Roadmap for Cloud Computing Adoption model used for cloud computing implementation at the Indonesian Institute of Sciences. This research model uses cloud computing analysis along with each phase of ROCCA and compared with conditions in Non-Ministry Government Institutions (LPNK). The results of this study are a modification of the adoption model of ROCCA, which consists of 5 (five) stages, namely the Analysis, Design, Adoption, Migration, and Management stages. Then it resulted in the implementation of cloud computing with the implementation model of Private Cloud as a service and Infrastructure as a Service service for research institutions at the Indonesian Institute of Sciences. The implementation of cloud computing at LIPI can run well
Desain dan Analisis Sistem CyberShare Menggunakan Four Node Interplanetary File System (IPFS) Haryanto, Tony; Ramli, Kalamullah
Jurnal Informatika: Jurnal Pengembangan IT Vol 8, No 2 (2023)
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/jpit.v8i2.5141

Abstract

Cybersecurity information sharing is a proactive and collaborative measure in enhancing organizational security by exchanging cybersecurity information using a centralized repository service. However, in practice, the use of centralized services poses a threat to distributed denial-of-service (DDoS) attacks which can result in system failure and cause single point of failure as well as man-in-the-middle (MITM) attacks which can result in modification of information and theft of exchanged information. This threat results in a lack of user confidence in the confidentiality, integrity, and availability of information. This study proposes the design of a secure cybersecurity information sharing (CyberShare) system using a private interplanetary file system (IPFS) network as a decentralized information storage. Unlike centralized storage which only has a single-node, CyberShare systems use four-node IPFS interconnected with swarm keys as authentication keys. This system allows users to store and share information from the sender to the recipient of information, avoiding dependence on a central server and reducing server load. The results of the analysis show that the proposed CyberShare system can guarantee the confidentiality, integrity, and availability of cyber security information. CyberShare systems can enhance the security of the information exchanged so that organizations can safely share and utilize cybersecurity information.