Claim Missing Document
Check
Articles

Found 23 Documents
Search

ANALYSIS OF SECURITY CHALLENGES IN REST API IN EDGE COMPUTING-BASED IOT ECOSYSTEM: A REVIEW Sinaga, Rudolf; Samsinar, Samsinar; Fatima, Soomal; Frangky, Frangky
JIKO (Jurnal Informatika dan Komputer) Vol 8, No 2 (2025)
Publisher : Universitas Khairun

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33387/jiko.v8i2.10097

Abstract

REST APIs are the backbone of data communication in the Internet of Things (IoT)-based edge computing ecosystem because they are lightweight and flexible. However, the REST architecture's openness and the edge devices' limited resources give rise to security challenges such as MITM, spoofing, and replay attacks. This study aims to identify the key challenges of REST API security in IoT edge environments, evaluate the limitations of conventional solutions such as TLS and RSA/ECDSA algorithms, and explore the potential of Post-Quantum Signature-based digital authentication approaches (PQS). Through a comprehensive narrative literature review of 43 peer-reviewed publications (2020-2025), this research reveals two key findings: the results show that TLS generates significant overhead in memory and energy, while classical algorithms do not resist quantum threats. PQS schemes such as Falcon and Dilithium have proven more efficient and secure in limited devices. The study concludes that PQS-based lightweight authentication approaches have strong prospects for implementation in future REST API gateway architectures, particularly in supporting electronic-based governance systems (SPBEs).
A Comprehensive Study of Ethical Frameworks, Privacy Concerns, and Technological Implications for Secure Distributed Systems Sinaga, Rudolf
Systematic Literature Review Journal Vol. 1 No. 4 (2025): October: Systematic Literature Review Journal
Publisher : International Forum of Researchers and Lecturers

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70062/slrj.v1i4.150

Abstract

This systematic literature review examines the philosophy of science approaches to user security in distributed devices, such as IoT and Federated Learning. The review was conducted in response to the exponential growth of connected devices and the increasing security threats, including cyberattacks, data breaches, and unauthorized access. As distributed systems become more complex, traditional security approaches, such as cryptography and differential privacy, are often insufficient to address the ethical, philosophical, and contextual challenges that arise in these ecosystems. Distributed devices, especially in IoT and Federated Learning contexts, rely on vast amounts of personal data. This data, often stored or processed in decentralized environments, creates significant risks to user privacy and system integrity. As the number of connected devices grows, security risks multiply, creating challenges in maintaining user trust, privacy, and overall system resilience. Conventional techniques, such as encryption, only focus on technical aspects, often neglecting the deeper philosophical dimensions, such as the nature of knowledge, privacy, and fairness in these systems. These gaps highlight the need for a more nuanced approach that incorporates philosophical perspectives into security frameworks. This study uses a systematic literature review method based on the PICOC (Population, Intervention, Comparison, Outcome, Context) framework to analyze the relevance of epistemology, ontology, and ethics in strengthening system security. By examining the foundational principles of how knowledge is constructed (epistemology), what entities exist in the system (ontology), and the ethical considerations around data and user privacy (ethics), the review provides a comprehensive understanding of how philosophical concepts can be integrated into the design and implementation of security systems in distributed environments. The results reveal that epistemological principles, such as the verification and validation of data sources and models, can significantly improve the reliability and trustworthiness of distributed systems.  
Prediction of Hospital Administration Study Program Students' Graduation Using Decision Tree C4.5: Prediction of Hospital Administration Study Program Students' Graduation Using Decision Tree C4.5 Samsinar, Samsinar; Sinaga, Rudolf; Afriany, Renny
ARUMAS Vol 2 No 2 (2025): Jurnal Administrasi Rumah Sakit
Publisher : STIKES Garuda Putih

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52741/ars.v2i2.109

Abstract

The timely graduation success of students is a crucial indicator in evaluating the quality of higher education institutions. This study aims to predict the graduation rate of undergraduate students in the Hospital Administration Program at STIKES Garuda Putih Jambi using the Decision Tree C4.5 algorithm. The data utilized includes the Cumulative Grade Point Average (CGPA) of 35 students over the first four semesters. The dataset was processed using RapidMiner to generate a prediction model with CGPA as the main variable. The model evaluation indicated an accuracy level of 73.33%. This classification model successfully categorized student graduation outcomes into three groups: satisfactory, very satisfactory, and with distinction. The findings of this study are expected to provide insights for better academic decision-making, as well as enhance the quality of evaluation and learning processes in higher education institutions.