Analisis Keamanan Data pada Sistem Informasi Berbasis Cloud dengan Enkripsi AES: Pendekatan Kuantitatif Berbasis State of the Art
DOI:
https://doi.org/10.31004/riggs.v5i1.8272Keywords:
Keamanan Data, Cloud Computing, AES, Manajemen Kunci, Kontrol Akses, State of the ArtAbstract
Penelitian ini bertujuan menganalisis pengaruh penerapan Advanced Encryption Standard (AES), manajemen kunci, dan kontrol akses terhadap keamanan data pada sistem informasi berbasis cloud pada konteks perguruan tinggi. Selain analisis kuantitatif, penelitian ini diperkuat dengan sintesis state of the art terhadap 30 artikel jurnal internasional periode 2021-2025 untuk memetakan kecenderungan riset, celah penelitian, dan dasar konseptual model. Pendekatan utama penelitian adalah kuantitatif eksplanatori dengan desain survei potong lintang. Data diperoleh dari 214 responden yang terdiri atas staf teknologi informasi, administrator sistem, pengelola data, dan personel keamanan informasi pada organisasi yang telah menerapkan sistem berbasis cloud. Instrumen menggunakan skala Likert 5 poin dan dianalisis dengan statistik deskriptif, korelasi Pearson, diagnostik multikolinearitas, serta regresi linear berganda. Hasil penelitian menunjukkan bahwa penerapan AES (beta = 0,301; p < 0,001), manajemen kunci (beta = 0,246; p < 0,001), dan kontrol akses (beta = 0,389; p < 0,001) berpengaruh positif dan signifikan terhadap keamanan data. Model penelitian juga signifikan secara simultan, F(3,210) = 115,864; p < 0,001, dengan Adjusted R2 sebesar 0,618. Sintesis literatur menunjukkan bahwa studi cloud security mutakhir semakin menekankan integrasi antara kriptografi, key lifecycle governance, dan zero-trust access control. Temuan ini menegaskan bahwa keamanan data cloud tidak cukup bertumpu pada algoritma enkripsi yang kuat saja, melainkan harus diperkuat oleh tata kelola kunci dan pembatasan akses yang konsisten. Kontribusi penelitian terletak pada penyusunan model empiris yang menggabungkan tiga kontrol inti keamanan cloud sekaligus menghubungkannya dengan peta perkembangan literatur terkini.
Downloads
References
Abdulsalam, Y. S., & Hedabou, M. (2022). Security and privacy in cloud computing: Technical review. Future Internet, 14(1), 11. https://doi.org/10.3390/fi14010011
Ajish, D. (2024). The significance of artificial intelligence in zero trust technologies: A comprehensive review. Journal of Electrical Systems and Information Technology, 11, 30. https://doi.org/10.1186/s43067-024-00155-z
Ali, S., Talpur, D. B., Abro, A., Alshudukhi, K. S., Alwakid, G. N., Humayun, M., Bashir, F., Wadho, S. A., & Shah, A. (2025). Security and privacy in multi-cloud and hybrid cloud environments: Challenges, strategies, and future directions. Computers & Security, 157, 104599. https://doi.org/10.1016/j.cose.2025.104599
Barker, E. (2020). Recommendation for key management: Part 1 - General (Rev. 5) (NIST Special Publication 800-57 Part 1 Rev. 5). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-57pt1r5
Baseri, Y., Hafid, A., Firoozjaei, M. D., Cherkaoui, S., & Ray, I. (2024). Statistical privacy protection for secure data access control in cloud. Journal of Information Security and Applications, 84, 103823. https://doi.org/10.1016/j.jisa.2024.103823
Chauhan, M., & Shiaeles, S. (2023). An analysis of cloud security frameworks, problems and proposed solutions. Network, 3(3), 422-450. https://doi.org/10.3390/network3030018
Chawki, M. (2024). An effective cloud computing model enhancing privacy in cloud computing. Information Security Journal: A Global Perspective, 33(6), 635-658. https://doi.org/10.1080/19393555.2024.2307637
Creswell, J. W., & Creswell, J. D. (2018). Research design: Qualitative, quantitative, and mixed methods approaches (5th ed.). Sage.
Dalabanjan, G., & Narayan, D. G. (2024). Enabling attribute-based access control for OpenStack cloud resources through smart contracts. Procedia Computer Science, 233, 861-871. https://doi.org/10.1016/j.procs.2024.03.275
Dawood, M., Tu, S., Xiao, C., Alasmary, H., Waqas, M., & Rehman, S. U. (2023). Cyberattacks and security of cloud computing: A complete guideline. Symmetry, 15(11), 1981. https://doi.org/10.3390/sym15111981
Dhiman, P., Saini, N., Gulzar, Y., Turaev, S., Kaur, A., Nisa, K. U., & Hamid, Y. (2024). A review and comparative analysis of relevant approaches of zero trust network model. Sensors, 24(4), 1328. https://doi.org/10.3390/s24041328
El-Sofany, H., El-Seoud, S. A., Karam, O. H., Bouallegue, B., & Ahmed, A. M. (2024). A proposed secure framework for protecting cloud-based educational systems from hacking. Egyptian Informatics Journal, 27, 100505. https://doi.org/10.1016/j.eij.2024.100505
Fernandez, E. B., & Brazhuk, A. (2024). A critical analysis of zero trust architecture (ZTA). Computer Standards & Interfaces, 89, 103832. https://doi.org/10.1016/j.csi.2024.103832
Field, A. (2018). Discovering statistics using IBM SPSS Statistics (5th ed.). Sage.
Ghozali, I. (2021). Aplikasi analisis multivariate dengan program IBM SPSS 26 (10th ed.). Badan Penerbit Universitas Diponegoro.
Golightly, L., Modesti, P., Garcia, R., & Chang, V. (2023). Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN. Cyber Security and Applications, 1, 100015. https://doi.org/10.1016/j.csa.2023.100015
Goswami, P., Faujdar, N., Debnath, S., Khan, A. K., & Singh, G. (2024). Investigation on storage level data integrity strategies in cloud computing: Classification, security obstructions, challenges and vulnerability. Journal of Cloud Computing, 13, 45. https://doi.org/10.1186/s13677-024-00605-z
Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2019). Multivariate data analysis (8th ed.). Cengage.
Huang, J., & Yi, J. (2024). The key security management scheme of cloud storage based on blockchain and digital twins. Journal of Cloud Computing, 13, 15. https://doi.org/10.1186/s13677-023-00587-4
Kerl, M., Bodin, U., & Schelen, O. (2025). Privacy-preserving attribute-based access control using homomorphic encryption. Cybersecurity, 8, 5. https://doi.org/10.1186/s42400-024-00323-8
National Institute of Standards and Technology. (2023). Advanced Encryption Standard (AES) (FIPS 197). https://doi.org/10.6028/NIST.FIPS.197
Ni, J., Fang, G., Zhao, Y., Ren, J., Chen, L., & Ren, Y. (2024). Distributed group key management based on blockchain. Electronics, 13(11), 2216. https://doi.org/10.3390/electronics13112216
Pathak, M., Mishra, K. N., & Singh, S. P. (2024). Securing data and preserving privacy in cloud IoT-based technologies: An analysis of assessing threats and developing effective safeguard. Artificial Intelligence Review, 57, 269. https://doi.org/10.1007/s10462-024-10908-x
Punia, A., Gulia, P., Gill, N. S., Ibeke, E., Iwendi, C., & Shukla, P. K. (2024). A systematic review on blockchain-based access control systems in cloud environment. Journal of Cloud Computing, 13, 146. https://doi.org/10.1186/s13677-024-00697-7
Qureshi, M. B., Qureshi, M. S., Tahir, S., Anwar, A., Hussain, S., Uddin, M., & Chen, C.-L. (2022). Encryption techniques for smart systems data security offloaded to the cloud. Symmetry, 14(4), 695. https://doi.org/10.3390/sym14040695
Rana, S., Khoda Parast, F., Kelly, B., Wang, Y., & Kent, K. B. (2023). A comprehensive survey of cryptography key management systems. Journal of Information Security and Applications, 78, 103607. https://doi.org/10.1016/j.jisa.2023.103607
Rehman, S., Bajwa, N. T., Shah, M. A., Aseeri, A. O., & Anjum, A. (2021). Hybrid AES-ECC model for the security of data over cloud storage. Electronics, 10(21), 2673. https://doi.org/10.3390/electronics10212673
Reyana, A., Kautish, S., Juneja, S., Mohiuddin, K., Karim, F. K., Elmannai, H., Ghorashi, S., & Hamid, Y. (2023). Enhanced cloud storage encryption standard for security in distributed environments. Electronics, 12(3), 714. https://doi.org/10.3390/electronics12030714
Sekaran, U., & Bougie, R. (2019). Research methods for business: A skill-building approach (8th ed.). Wiley.
Shakor, M. Y., Khaleel, M. I., Safran, M., Alfarhood, S., & Zhu, M. (2024). Dynamic AES encryption and blockchain key management: A novel solution for cloud data security. IEEE Access, 12, 26334-26343. https://doi.org/10.1109/ACCESS.2024.3351119
Shivaramakrishna, D., & Nagaratna, M. (2023). A novel hybrid cryptographic framework for secure data storage in cloud computing: Integrating AES-OTP and RSA with adaptive key management and time-limited access control. Alexandria Engineering Journal, 84, 275-284. https://doi.org/10.1016/j.aej.2023.10.054
Sohal, M., Bharany, S., Sharma, S., Maashi, M. S., & Aljebreen, M. (2022). A hybrid multi-cloud framework using the IBBE key management system for securing data storage. Sustainability, 14(20), 13561. https://doi.org/10.3390/su142013561
Soveizi, N., Turkmen, F., & Karastoyanova, D. (2023). Security and privacy concerns in cloud-based scientific and business workflows: A systematic review. Future Generation Computer Systems, 148, 184-200. https://doi.org/10.1016/j.future.2023.05.015
Tang, X., Guo, C., Choo, K.-K. R., Jiang, X., & Liu, Y. (2024). A secure and lightweight cloud data deduplication scheme with efficient access control and key management. Computer Communications, 222, 209-219. https://doi.org/10.1016/j.comcom.2024.05.003
Ukeje, N., Gutierrez, J., & Petrova, K. (2024). Information security and privacy challenges of cloud computing for government adoption: A systematic review. International Journal of Information Security, 23, 1459-1475. https://doi.org/10.1007/s10207-023-00797-6
Wang, R., Li, C., Zhang, K., & Tu, B. (2025). Zero-trust based dynamic access control for cloud computing. Cybersecurity, 8, 12. https://doi.org/10.1186/s42400-024-00320-x
Younas, M. H., Naeem, M. M., Qureshi, A. M., Mustafa, H., Alshamrani, M. A., & Shuja, W. (2022). Cloud computing security: A survey of service-based models. Computers & Security, 114, 102580. https://doi.org/10.1016/j.cose.2021.102580
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Ragil Aryanando, Komputerio Akbar

This work is licensed under a Creative Commons Attribution 4.0 International License.


















