Analisis Risiko dan Solusi Keamanan Data pada Layanan Cloud Computing di Era Industri 4.0

Authors

  • Hanif Hanif, Universitas Islam Negeri Sunan Kalijaga,  Indonesia
  • Bambang Sugiantoro, Universitas Islam Negeri Sunan Kalijaga,  Indonesia

DOI:

https://doi.org/10.55338/jumin.v6i6.6754

Keywords:

Data security, Cloud computing, Industry 4.0, Cyber risk, Threat mitigation

Abstract

Era Industri 4.0 telah mendorong adopsi teknologi cloud computing secara masif sebagai fondasi transformasi digital di berbagai sektor industri, namun peningkatan penggunaan layanan ini juga memunculkan risiko keamanan data yang semakin kompleks. Penelitian ini bertujuan untuk mengklasifikasikan risiko keamanan data pada layanan cloud computing. Selain itu, penelitian ini juga mengeksplorasi solusi teknologis dan strategis yang relevan dalam konteks Industri 4.0. melalui studi literatur terhadap publikasi ilmiah lima tahun terakhir. Hasil studi menunjukkan bahwa risiko utama mencakup kebocoran data, serangan siber, akses tidak sah, dan ketidakpatuhan regulasi. Solusi yang menonjol antara lain penerapan enkripsi end-to-end, sistem deteksi intrusi berbasis kecerdasan buatan, dan penggunaan blockchain untuk audit data. Temuan juga mengungkapkan bahwa penerapan cloud computing masih menghadapi tantangan implementasi berupa keterbatasan sumber daya, anggaran, dan kesadaran keamanan, khususnya pada sektor industri kecil dan menengah (IKM). Dengan demikian, penelitian ini diharapkan dapat memberikan kontribusi dalam pengembangan strategi keamanan siber yang lebih adaptif dan terintegrasi di lingkungan cloud computing masa kini.

Downloads

Download data is not yet available.

References

M. Armbrust et al., “A view of cloud computing,” Commun. ACM, vol. 53, no. 4, pp. 50–58, 2015, doi: 10.1145/1721654.1721672.

G. A. Osorio, C. S. Del Real, C. A. F. Valdez, M. C. Miranda, and A. H. Garay, “Effect of inclusion of cactus pear cladodes in diets for growing-finishing lambs in central Mexico,” Acta Hortic., vol. 728, pp. 269–274, 2016.

K. SaThierbach et al., “Top Threats to Cloud Computing: Egregious Eleven,” Proc. Natl. Acad. Sci., vol. 3, no. 1, pp. 1–15, 2019, [Online]. Available: http://dx.doi.org/10.1016/j.bpj.2015.06.056%0Ahttps://academic.oup.com/bioinformatics/article-abstract/34/13/2201/4852827%0Ainternal-pdf://semisupervised-3254828305/semisupervised.ppt%0Ahttp://dx.doi.org/10.1016/j.str.2013.02.005%0Ahttp://dx.doi.org/10.10

K. Kominfo, “Undang-Undang Perlindungan Data Pribadi No. 27 Tahun 2022,” Introd. to Turkish Bus. Law, no. 016999, pp. 457–483, 2022.

L. Vaca-Cardenas, D. Avila-Pesantez, M. Vaca-Cárdenas, and J. Meza, “Trends and Challenges of HCI in the New Paradigm of Cognitive Cities,” in 2020 Seventh International Conference on eDemocracy & eGovernment (ICEDEG), 2020, pp. 120–126. doi: 10.1109/ICEDEG48599.2020.9096845.

S. Pearson, “Taking account of privacy when designing cloud computing services,” in 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, 2009, pp. 44–52. doi: 10.1109/CLOUD.2009.5071532.

V. Cardellini, G. Mencagli, D. Talia, and M. Torquati, “New Landscapes of the Data Stream Processing in the era of Fog Computing,” Futur. Gener. Comput. Syst., vol. 99, pp. 646–650, 2019, doi: https://doi.org/10.1016/j.future.2019.03.027.

K. Hashizume, D. G. Rosado, E. Fernández-Medina, and E. B. Fernandez, “An analysis of security issues for cloud computing,” J. Internet Serv. Appl., vol. 4, no. 1, pp. 1–13, 2013, doi: 10.1186/1869-0238-4-5.

J. Webster and R. T. Watson, “Analyzing the Past to Prepare for the Future: Writing a Literature Review,” MIS Q., vol. 26, no. 2, pp. xiii–xxiii, Aug. 2002, [Online]. Available: http://www.jstor.org/stable/4132319

T. Saini and S. Sinha, “Cloud Computing Security Issues and Challenges,” Integr. Cloud Comput. with Emerg. Technol. Issues, Challenges, Pract., no. March 2016, pp. 35–45, 2023, doi: 10.1201/9781003341437-4.

A. Patel, M. Taghavi, K. Bakhtiyari, and J. Celestino Júnior, “An intrusion detection and prevention system in cloud computing: A systematic review,” J. Netw. Comput. Appl., vol. 36, no. 1, pp. 25–41, 2018, doi: 10.1016/j.jnca.2012.08.007.

C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, and M. Rajarajan, “A survey of intrusion detection techniques in Cloud,” J. Netw. Comput. Appl., vol. 36, no. 1, pp. 42–57, 2020, doi: https://doi.org/10.1016/j.jnca.2012.05.003.

M. A. Khan and K. Salah, “IoT security: Review, blockchain solutions, and open challenges,” Futur. Gener. Comput. Syst., vol. 82, pp. 395–411, 2018, doi: https://doi.org/10.1016/j.future.2017.11.022.

S. Ahmadi, “Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies,” J. Inf. Secur., vol. 15, no. 02, pp. 148–167, 2024, doi: 10.4236/jis.2024.152010.

M. Almutairi and F. T. Sheldon, “IoT–Cloud Integration Security: A Survey of Challenges, Solutions, and Directions,” Electron., vol. 14, no. 7, 2025, doi: 10.3390/electronics14071394.

T. Shehzadi, “Cloud Security Challenges and Solutions: A Modern Approach to Data Protection,” no. February, 2025, doi: 10.13140/RG.2.2.35913.45925.

G. Sriraman and S. R, “Slide-block: End-to-end amplified security to improve DevOps resilience through pattern-based authentication,” Heliyon, vol. 10, no. 4, p. e26312, 2024, doi: https://doi.org/10.1016/j.heliyon.2024.e26312.

Y. Liu, “Analysis of Multi-factor Authentication (MFA) Schemes in Zero Trust Architecture (ZTA): Current State, Challenges, and Future Trends,” Int. J. Comput. Appl., vol. 186, no. 57, pp. 30–36, 2024, doi: 10.5120/ijca2024924310.

A. H. A. AL-Jumaili, R. C. Muniyandi, M. K. Hasan, J. K. S. Paw, and M. J. Singh, “Big Data Analytics Using Cloud Computing Based Frameworks for Power Management Systems: Status, Constraints, and Future Recommendations,” Sensors, vol. 23, no. 6, 2023, doi: 10.3390/s23062952.

O. Richard Arogundade, “Strategic Security Risk Management in Cloud Computing: A Comprehensive Examination and Application of the Risk Management Framework,” Iarjset, vol. 11, no. 1, 2023, doi: 10.17148/iarjset.2024.11105.

F. SAMSON and O. TIMILEHIN, “Zero Trust Architecture in Multi-cloud Environments: A Security Perspective,” 2025.

E. Avdibasic, A. S. Toksanovna, and B. Durakovic, “Cybersecurity challenges in Industry 4.0: A state of the art review,” Def. Secur. Stud., vol. 3, no. August, pp. 32–49, 2022, doi: 10.37868/dss.v3.id188.

S. Budiarto, “Purwarupa Mesin Penukar Sampah Botol Menjadi Poin Berbasis IoT JURNAL MEDIA INFORMATIKA [ JUMIN ],” vol. 6, no. 3, pp. 1751–1767, 2025.

M. Serror, S. Hack, M. Henze, M. Schuba, and K. Wehrle, “Challenges and Opportunities in Securing the Industrial Internet of Things,” IEEE Trans. Ind. Informatics, vol. 17, no. 5, pp. 2985–2996, 2021, doi: 10.1109/TII.2020.3023507.

T. Zhukabayeva, L. Zholshiyeva, N. Karabayev, S. Khan, and N. Alnazzawi, “Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions,” Sensors, vol. 25, no. 1, 2025, doi: 10.3390/s25010213.

V. Gharibvand et al., Cloud based manufacturing: A review of recent developments in architectures, technologies, infrastructures, platforms and associated challenges, vol. 131, no. 1. Springer London, 2024. doi: 10.1007/s00170-024-12989-y.

H. Kayan, M. Nunes, O. Rana, P. Burnap, and C. Perera, “Cybersecurity of Industrial Cyber-Physical Systems: A Review,” ACM Comput. Surv., vol. 54, no. 11s, 2023, doi: 10.1145/3510410.

Downloads

Published

2025-12-20

How to Cite

Hanif, H., & Sugiantoro, B. (2025). Analisis Risiko dan Solusi Keamanan Data pada Layanan Cloud Computing di Era Industri 4.0. Jurnal Media Informatika, 6(6), 3040-3046. https://doi.org/10.55338/jumin.v6i6.6754