Analisis Risiko dan Solusi Keamanan Data pada Layanan Cloud Computing di Era Industri 4.0
DOI:
https://doi.org/10.55338/jumin.v6i6.6754Keywords:
Data security, Cloud computing, Industry 4.0, Cyber risk, Threat mitigationAbstract
Era Industri 4.0 telah mendorong adopsi teknologi cloud computing secara masif sebagai fondasi transformasi digital di berbagai sektor industri, namun peningkatan penggunaan layanan ini juga memunculkan risiko keamanan data yang semakin kompleks. Penelitian ini bertujuan untuk mengklasifikasikan risiko keamanan data pada layanan cloud computing. Selain itu, penelitian ini juga mengeksplorasi solusi teknologis dan strategis yang relevan dalam konteks Industri 4.0. melalui studi literatur terhadap publikasi ilmiah lima tahun terakhir. Hasil studi menunjukkan bahwa risiko utama mencakup kebocoran data, serangan siber, akses tidak sah, dan ketidakpatuhan regulasi. Solusi yang menonjol antara lain penerapan enkripsi end-to-end, sistem deteksi intrusi berbasis kecerdasan buatan, dan penggunaan blockchain untuk audit data. Temuan juga mengungkapkan bahwa penerapan cloud computing masih menghadapi tantangan implementasi berupa keterbatasan sumber daya, anggaran, dan kesadaran keamanan, khususnya pada sektor industri kecil dan menengah (IKM). Dengan demikian, penelitian ini diharapkan dapat memberikan kontribusi dalam pengembangan strategi keamanan siber yang lebih adaptif dan terintegrasi di lingkungan cloud computing masa kini.
Downloads
References
M. Armbrust et al., “A view of cloud computing,” Commun. ACM, vol. 53, no. 4, pp. 50–58, 2015, doi: 10.1145/1721654.1721672.
G. A. Osorio, C. S. Del Real, C. A. F. Valdez, M. C. Miranda, and A. H. Garay, “Effect of inclusion of cactus pear cladodes in diets for growing-finishing lambs in central Mexico,” Acta Hortic., vol. 728, pp. 269–274, 2016.
K. SaThierbach et al., “Top Threats to Cloud Computing: Egregious Eleven,” Proc. Natl. Acad. Sci., vol. 3, no. 1, pp. 1–15, 2019, [Online]. Available: http://dx.doi.org/10.1016/j.bpj.2015.06.056%0Ahttps://academic.oup.com/bioinformatics/article-abstract/34/13/2201/4852827%0Ainternal-pdf://semisupervised-3254828305/semisupervised.ppt%0Ahttp://dx.doi.org/10.1016/j.str.2013.02.005%0Ahttp://dx.doi.org/10.10
K. Kominfo, “Undang-Undang Perlindungan Data Pribadi No. 27 Tahun 2022,” Introd. to Turkish Bus. Law, no. 016999, pp. 457–483, 2022.
L. Vaca-Cardenas, D. Avila-Pesantez, M. Vaca-Cárdenas, and J. Meza, “Trends and Challenges of HCI in the New Paradigm of Cognitive Cities,” in 2020 Seventh International Conference on eDemocracy & eGovernment (ICEDEG), 2020, pp. 120–126. doi: 10.1109/ICEDEG48599.2020.9096845.
S. Pearson, “Taking account of privacy when designing cloud computing services,” in 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, 2009, pp. 44–52. doi: 10.1109/CLOUD.2009.5071532.
V. Cardellini, G. Mencagli, D. Talia, and M. Torquati, “New Landscapes of the Data Stream Processing in the era of Fog Computing,” Futur. Gener. Comput. Syst., vol. 99, pp. 646–650, 2019, doi: https://doi.org/10.1016/j.future.2019.03.027.
K. Hashizume, D. G. Rosado, E. Fernández-Medina, and E. B. Fernandez, “An analysis of security issues for cloud computing,” J. Internet Serv. Appl., vol. 4, no. 1, pp. 1–13, 2013, doi: 10.1186/1869-0238-4-5.
J. Webster and R. T. Watson, “Analyzing the Past to Prepare for the Future: Writing a Literature Review,” MIS Q., vol. 26, no. 2, pp. xiii–xxiii, Aug. 2002, [Online]. Available: http://www.jstor.org/stable/4132319
T. Saini and S. Sinha, “Cloud Computing Security Issues and Challenges,” Integr. Cloud Comput. with Emerg. Technol. Issues, Challenges, Pract., no. March 2016, pp. 35–45, 2023, doi: 10.1201/9781003341437-4.
A. Patel, M. Taghavi, K. Bakhtiyari, and J. Celestino Júnior, “An intrusion detection and prevention system in cloud computing: A systematic review,” J. Netw. Comput. Appl., vol. 36, no. 1, pp. 25–41, 2018, doi: 10.1016/j.jnca.2012.08.007.
C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, and M. Rajarajan, “A survey of intrusion detection techniques in Cloud,” J. Netw. Comput. Appl., vol. 36, no. 1, pp. 42–57, 2020, doi: https://doi.org/10.1016/j.jnca.2012.05.003.
M. A. Khan and K. Salah, “IoT security: Review, blockchain solutions, and open challenges,” Futur. Gener. Comput. Syst., vol. 82, pp. 395–411, 2018, doi: https://doi.org/10.1016/j.future.2017.11.022.
S. Ahmadi, “Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies,” J. Inf. Secur., vol. 15, no. 02, pp. 148–167, 2024, doi: 10.4236/jis.2024.152010.
M. Almutairi and F. T. Sheldon, “IoT–Cloud Integration Security: A Survey of Challenges, Solutions, and Directions,” Electron., vol. 14, no. 7, 2025, doi: 10.3390/electronics14071394.
T. Shehzadi, “Cloud Security Challenges and Solutions: A Modern Approach to Data Protection,” no. February, 2025, doi: 10.13140/RG.2.2.35913.45925.
G. Sriraman and S. R, “Slide-block: End-to-end amplified security to improve DevOps resilience through pattern-based authentication,” Heliyon, vol. 10, no. 4, p. e26312, 2024, doi: https://doi.org/10.1016/j.heliyon.2024.e26312.
Y. Liu, “Analysis of Multi-factor Authentication (MFA) Schemes in Zero Trust Architecture (ZTA): Current State, Challenges, and Future Trends,” Int. J. Comput. Appl., vol. 186, no. 57, pp. 30–36, 2024, doi: 10.5120/ijca2024924310.
A. H. A. AL-Jumaili, R. C. Muniyandi, M. K. Hasan, J. K. S. Paw, and M. J. Singh, “Big Data Analytics Using Cloud Computing Based Frameworks for Power Management Systems: Status, Constraints, and Future Recommendations,” Sensors, vol. 23, no. 6, 2023, doi: 10.3390/s23062952.
O. Richard Arogundade, “Strategic Security Risk Management in Cloud Computing: A Comprehensive Examination and Application of the Risk Management Framework,” Iarjset, vol. 11, no. 1, 2023, doi: 10.17148/iarjset.2024.11105.
F. SAMSON and O. TIMILEHIN, “Zero Trust Architecture in Multi-cloud Environments: A Security Perspective,” 2025.
E. Avdibasic, A. S. Toksanovna, and B. Durakovic, “Cybersecurity challenges in Industry 4.0: A state of the art review,” Def. Secur. Stud., vol. 3, no. August, pp. 32–49, 2022, doi: 10.37868/dss.v3.id188.
S. Budiarto, “Purwarupa Mesin Penukar Sampah Botol Menjadi Poin Berbasis IoT JURNAL MEDIA INFORMATIKA [ JUMIN ],” vol. 6, no. 3, pp. 1751–1767, 2025.
M. Serror, S. Hack, M. Henze, M. Schuba, and K. Wehrle, “Challenges and Opportunities in Securing the Industrial Internet of Things,” IEEE Trans. Ind. Informatics, vol. 17, no. 5, pp. 2985–2996, 2021, doi: 10.1109/TII.2020.3023507.
T. Zhukabayeva, L. Zholshiyeva, N. Karabayev, S. Khan, and N. Alnazzawi, “Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions,” Sensors, vol. 25, no. 1, 2025, doi: 10.3390/s25010213.
V. Gharibvand et al., Cloud based manufacturing: A review of recent developments in architectures, technologies, infrastructures, platforms and associated challenges, vol. 131, no. 1. Springer London, 2024. doi: 10.1007/s00170-024-12989-y.
H. Kayan, M. Nunes, O. Rana, P. Burnap, and C. Perera, “Cybersecurity of Industrial Cyber-Physical Systems: A Review,” ACM Comput. Surv., vol. 54, no. 11s, 2023, doi: 10.1145/3510410.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Hanif Hanif, Bambang Sugiantoro

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Most read articles by the same author(s)
- Ala Asmaul Khusna, Bambang Sugiantoro, Evaluasi Evaluasi Keamanan Informasi Dengan Indeks KAMI Pondok Pesantren Se-Magelang , Jurnal Media Informatika: Vol. 6 No. 5 (2025): Edisi Sep - Oktober 2025
- Hanif Hanif, Bambang Sugiantoro, Evaluasi Tingkat Sistem Keamanan Teknologi Informasi Menggunakan Indeks Kami Dan Cobit 5 (Studi Kasus : Ponpes Demak) , Jurnal Media Informatika: Vol. 6 No. 4 (2025): Jurnal Media Informatika
- Hanif Hanif, Bambang Sugiantoro, Literature Review: Evolusi Arsitektur Komputer dalam Konteks Sistem Organisasi Komputer , Jurnal Media Informatika: Vol. 6 No. 4 (2025): Jurnal Media Informatika
Hanif Hanif,
Universitas Islam Negeri Sunan Kalijaga,
Indonesia 








