Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 7685 dokumen yang sesuai dengan query
cover
Deshpande, Prachi S.
"This book analyses the various security threats in cloud computing. A host-based IDS (HIDS) using signature verification is developed and implemented for the concerned security issues. Further, owing to the vulnerability of distributed denial of service (DDoS) attacks in cloud computing, a network based IDS (NIDS) is developed and implemented against such attacks. The performance of these IDS is verified in the Cloud scenario as well against the standard data set. Finally, a simple data storage and security model is developed and implemented for the Cloud computing scenario. The contents of this book will be of interest to researchers and professionals alike."
Singapore: Springer Nature, 2019
e20509833
eBooks  Universitas Indonesia Library
cover
Devi Thiyagarajan
"Data owners use the huge space offered by ‘Cloud’ Computing for storage of data and also for carrying out computations. To eliminate the burden of storing file locally, cloud stores them on remote servers using virtualization concepts. Therein arises one of the major issues in the field of cloud computing: security. Data owners lack in having direct control over files stored in the cloud and consequently, the problem of data security arises. An efficient scheme to provide data security, while storing data in the cloud has been proposed which makes use of Hyperelliptic curve cryptography (HECC) for encryption and decryption and Secure Hash Algorithm-3 (SHA-3) for data integrity verification. Implementation results clearly illustrate that HECC remains as a good alternative asymmetric key technique rather than ECC and RSA when securing documents in cloud."
Depok: Faculty of Engineering, Universitas Indonesia, 2015
UI-IJTECH 6:3 (2015)
Artikel Jurnal  Universitas Indonesia Library
cover
Ahmad Naufan Wicaksonoputra
"Cloud storage merupakan salah satu layanan terpopuler dalam konteks komputasi awan dengan keunggulan skalabilitas yang tidak terbatas dan aksesbilitas yang mudah. Namun, terdapat kekhawatiran akan keamanan data yang disimpan di luar kendali pengguna. Salah satu solusinya adalah dengan melakukan enkripsi pada data sebelumn penyimpanan. Masalah lain muncul karena jika ingin membagikan data tersebut, maka pengguna harus memberikan kunci miliknya atau melakukan dekripsi-enkripsi dengan kunci baru. Solusi selanjutnya adalah dengan mengimplementasikan algoritma re-enkripsi yang memungkinkan sistem membagikan data yang terenkripsi secara aman tanpa perlu mengungkap data asli atau memerlukan kunci asli. Oleh karena itu, akan dikembangkan aplikasi CloudCipher yang sudah terintegrasi dengan alat kriptografi untuk melakukan enkripsi dan dekripsi data serta memanfaatkan algoritma re-enkripsi dalam proses pembagian datanya. Dari hasil evaluasi, usability fitur cloud storage mendapatkan respon yang baik sementara fitur alat kriptografi mendapatkan respon yang kurang baik dikarenakan banyaknya istilah-istilah kriptografi yang kurang dimengerti oleh pengguna secara umum. Dari sisi performa, masing-masing proses kriptografi yang dilakukan sudah berjalan dengan baik namun masih memerlukan optimisasi lebih lanjut pada bagian komunikasi antar komponen melalui jaringan internet.

Cloud storage is one of the most popular services in the context of cloud computing, offering unlimited scalability and easy accessibility advantages. However, there are concerns about the security of data stored outside of the user's control. One solution is to encrypt the data before storing it. This leads to another issue, which is when the users need to share that encrypted data, as they either must provide their personal key or perform a decryption-encryption with a new key. The next solution is to implement a re-encryption algorithm that allows the system to securely share encrypted data without revealing the original data or requiring the original key. Therefore, CloudCipher, an application with integrated cryptographic tools, will be developed to perform data encryption and decryption that also utilize the re-encryption algorithm in its data sharing process. From the evaluation results, the usability of the cloud storage feature received positive feedback, while the cryptographic tool feature received less favourable responses due to the general users' lack of understanding of cryptography terminologies. In terms of performance, the individual cryptographic processes are running well, but further optimization is needed for communication between components over the internet network."
Depok: Fakultas Ilmu Komputer Universitas Indonesia, 2024
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Messier, Ric
"Collaboration with cloud computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions.
Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses :
- The evolving nature of information security
- The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP
- Social media and security risks in the enterprise
- The risks and rewards of allowing remote connectivity and accessibility to the enterprise network"
Waltham, MA: Syngress, 2014
e20426883
eBooks  Universitas Indonesia Library
cover
Messier, Ric
"It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses all over the city were forced to shut down while the manhunt took place over the course of the day on Friday. While retail establishments were really out of luck because no one on the streets meant no one in the stores, other businesses were able to continue to operate because of a number of technologies that allowed remote workers to get access to their files, the systems they needed and their phone systems. Any business that implemented a full Unified Communications (UC) solution could have employees also communicating with instant messaging and know who was on-line because of the presence capabilities. Additionally, news of the events spread quickly and less because of news outlets who were, quite rightly, not allowed to provide specifics about many of the activities"-- Provided by publisher."
Amsterdam : Syngress, 2014
305.8 MES c
Buku Teks SO  Universitas Indonesia Library
cover
Hwang, Kai
"The definitive guide to successfully integrating social, mobile, Big-Data analytics, cloud and IoT principles and technologies The main goal of this book is to spur the development of effective big-data computing operations on smart clouds that are fully supported by IoT sensing, machine learning and analytics systems"
Hoboken: John Wiley & Sons, 2017
004.678 2 HWA b
Buku Teks  Universitas Indonesia Library
cover
Yushu Zhang
"This book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as image processing, pattern recognition, Internet of things (IoT), and cloud computing. It will help readers grasp the knowledge of secure CS and its applications, and stimulate more readers to work on the research and development of secure CS. It discusses how CS becomes a cryptosystem, followed by the corresponding designs and analyses. The application of CS in multimedia data encryption is presented, in which the general design framework is given together with several particular frameworks including parallel CS, involvement of image processing techniques, and double protection mechanism. It also describes the applications of CS in cloud computing security and IoT security, i.e., privacy-preserving reconstruction in cloud computing and secure low-cost sampling in IoT, respectively."
Singapore: Springer Singapore, 2019
e20502525
eBooks  Universitas Indonesia Library
cover
Sosinsky, Barrie
Indianapolis: Wiley Publishing, inc., 2011
006.78 SOS c
Buku Teks  Universitas Indonesia Library
cover
Velte, Anthony T.
New York: McGraw-Hill, 2010
006.78 VEL c
Buku Teks  Universitas Indonesia Library
cover
Crookes, David
Unites States: Financial World, 2012
004.678 2 CRO c
Buku Teks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>