Claim Missing Document
Check
Articles

Found 2 Documents
Search

Kerangka Konseptual Keamanan Layanan Sistem dalam Ekosistem Platform Digital Multilapis Dalimunthe, Fadli; Maulana, Arif; Situmeang , Muhammad Partua Langka; Alfarisi, Muhammad Rasyya; Harahap, Jakbar Ali
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 1 (2026): JIKUM: Jurnal Ilmu Komputer, Mei 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i1.173

Abstract

The rapid growth of digital services and API utilization in multi-layered platform ecosystems has expanded attack surfaces, increasing systemic security risks. Traditional security approaches focusing on individual components are insufficient to address cross-layer vulnerabilities, especially in cloud-native, microservices-based architectures. This study aims to develop a holistic conceptual framework for system service security in multi-layered digital platforms by identifying key layers, analyzing interdependencies, and mapping risks and controls across infrastructure, platform/middleware, applications, and governance layers. Using a qualitative literature review of publications since 2020, thematic and conceptual analyses were conducted to synthesize existing technical and governance practices. The proposed framework integrates defense-in-depth mechanisms, including network segmentation, API hardening, service mesh with mutual TLS, secure software development lifecycle, identity and access management, and governance policies, highlighting cross-layer dependencies and systemic risk propagation. Additionally, it addresses the trade-off between security and system performance, proposing adaptive and contextual strategies such as lightweight cryptography, selective protection, and orchestrated controls. The results suggest that security must be designed end-to-end, considering technical, operational, and governance dimensions, to ensure resilience, service availability, and user trust in complex digital platform ecosystems. This framework provides a theoretical and practical reference for designing robust, adaptive, and measurable security architectures.
Implementasi Pengamanan Data Menggunakan Kombinasi Algoritma Kriptografi AES-256 dan Teknik Steganografi End-of-File (EOF) Pada Media Citra Digital Harahap, Jakbar Ali; Aulia, Muhammad; Alfarisi, Muhammad Rasyya; Sohaimi, Soty
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 1 (2026): JIKUM: Jurnal Ilmu Komputer, Mei 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i1.188

Abstract

In the contemporary digital landscape, the security and confidentiality of information exchange have emerged as paramount concerns due to the increasing sophistication of cyber threats. This study proposes an integrated security framework through the development of "PrivaSel," a hybrid application that synergizes advanced cryptography and steganography to achieve dual-layer protection. The system employs the Advanced Encryption Standard (AES) with a robust 256-bit key length, implemented in Cipher Block Chaining (CBC) mode to ensure high-level data confidentiality and resistance against frequency analysis attacks. Key derivation is further strengthened using the PBKDF2 algorithm with 100,000 iterations and a random salt to mitigate brute-force vulnerabilities. For the covert layer, the system utilizes the End-of-File (EOF) steganography technique, which embeds encrypted payloads into diverse container media including images and videos without altering the spatial pixel data. Developed using a Python-based FastAPI backend and a responsive HTML5/Tailwind CSS frontend, the application facilitates seamless asynchronous processing. Empirical testing through histogram analysis confirms that the EOF method maintains absolute visual integrity, yielding a Mean Squared Error (MSE) of 0.00 and an infinite Peak Signal-to-Noise Ratio (PSNR). The results demonstrate that while the file size increases linearly relative to the payload and metadata overhead, the hidden information remains imperceptible to statistical analysis and can be flawlessly retrieved only with the authorized password, providing a reliable solution for secure multi-file data transmission.