Perspektif Keamanan Pengguna Tentang Adopsi Dan Migrasi Teknologi Mobile Cloud

Munirul ula, Rizal Tjut Adek, Bustami Bustami


Keamanan adalah salah satu perhatian utama mereka yang ingin mengadopsi dan bermigrasi ke teknologi Cloud Computing. Masalah keamanan yang digunakan oleh teknologi cloud mengungkapkan bahwa mobile cloud computing meningkatkan masalah privasi dan keamanan seperti masalah identifikasi dan otentikasi, karena terkadang identitas dan otentikasi pemilik perangkat atau pemilik data yang terdapat di cloud dapat terdeteksi. Ini adalah beberapa contoh yang dapat dianggap sebagai kemunduran besar pada adaptasi Mobile Cloud Computing dan alasan mengapa beberapa perusahaan masih enggan merangkul, mengadopsi, dan bermigrasi ke teknologi ini. Penelitian ini mengulas fenomena mobile cloud computing, dan masalah keamanan dan privasi dalam area aplikasi mobile dan Cloud Computing dengan lebih menekankan pada pertimbangan keamanan dan privasi untuk merangkul dan bermigrasi ke mobile cloud computing.


Kata    kunci:  Cloud Computing, Keamanan Informasi, Privasi, Mobile Cloud Computing

Full Text:



IDC 2018 International Data Corporation, report 2015 available at

Krishnan, R. (2017). Security and Privacy in Cloud Computing.

Gasparis, I. (2017). Ensuring Users' Privacy and Security on Mobile Devices (Doctoral dissertation, University of California, Riverside).

Jones, S., Irani, Z., Sivarajah, U., & Love, P. E. (2017). Risks and rewards of cloud computing in the UK public sector: A reflection on three Organisational case studies. Information Systems Frontiers, 1- 24.

, B. B., Gupta, S., & Chaudhary, P. (2017). Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in Cloud. International Journal of Cloud Applications and Computing (IJCAC), 7(1), 1-31.

Gupta, S., & Gupta, B. B. (2017). Detection, Avoidance, and Attack Pattern Mechanisms in Modern Web Application Vulnerabilities: Present and Future Challenges. International Journal of Cloud Applications and Computing (IJCAC), 7(3), 1-43., C., Traynor, P., & Van Oorschot, P. C. (2012). Measuring SSL indicators on mobile browsers: Extended life, or end of the road?. In International Conference on Information Security (pp. 86-103). Springer, Berlin, Heidelberg.

Hosmer, C., Jeffcoat, C., Davis, M., & McGibbon, T. (2011). Use of mobile technology for information collection and dissemination. Data & Analysis Center for Software, 77.

Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing, 13(18), 1587- 1611.

Jouini, M., & Rabai, L. B. A. (2016). A Security Framework for Secure Cloud Computing Environments. International Journal of Cloud Applications and Computing (IJCAC), 6(3), 32-44.

De, D. (2016). Mobile cloud computing: architectures, algorithms and applications. CRC Press.

Alizadeh, M., Hassan, W. H., Behboodian, N., & Karamizadeh,

S. (2013). A brief review of mobile cloud computing opportunities. Research Notes in Information Science, 12, 155-160.

Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A., & Buyya, R. (2014). Cloud-based augmentation for mobile devices: motivation, taxonomies, and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 337-368.

Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications, 34(1), 1-11.

Dai, J., & Zhou, Q. (2010). A PKI-based mechanism for secure and efficient access to outsourced data. In Networking and Digital Society (ICNDS), 2010 2nd International Conference on (Vol. 1, pp. 640-643). IEEE

Ula, M., Pratama, A., Asbar, Y., Fuadi, W., Fajri, R., & Hardi, R. (2021, April). A New Model of The Student Attendance Monitoring System Using RFID Technology. In Journal of Physics: Conference Series (Vol. 1807, No. 1, p. 012026). IOP Publishing.

Khan, A. N., Kiah, M. M., Khan, S. U., & Madani, S. A. (2013). Towards secure mobile cloud computing: A survey. Future Generation Computer Systems, 29(5), 1278-1299.

Morrow, B. (2012). BYOD security challenges: control and protect your most sensitive data. Network Security, 2012(12), 5-8.

Itani, W., Kayssi, A., & Chehab, A. (2010). Energy- efficient incremental integrity for securing storage in mobile cloud computing. In Energy Aware Computing (ICEAC), 2010 International Conference on (pp. 1-2). IEEE.


Article Metrics

 Abstract Views : 29 times
 PDF Downloaded : 8 times


  • There are currently no refbacks.