TEKNIK IDENTITY AND ACCESS MANAGEMENT PADA LAYANAN AMAZON WEB SERVICES

Dhimas Dirgantara, Is Mardianto

Abstract


In this era, traditional technologies such as having servers and various kinds of hardware have been abandoned by large companies, which are turning to cloud computing technology. This technology makes it easier for companies to run their business. Of the many cloud computing service providers, Amazon Web Service (AWS) is one of the first and biggest service providers. Problems that occur in the use of cloud computing technology is the provision of access rights in data management. AWS has a service to manage access control for each service, namely Identity and Access Management (IAM). This service seeks to prevent activities that lead to security breaches. The results obtained are in the form of groups that can access AWS services according to the role given.

 

Pada era ini, teknologi tradisional seperti memiliki server dan berbagai macam hardware telah ditinggalkan oleh perusahaan besar, yang beralih pada teknologi cloud computing. Teknologi ini memudahkan perusahaan dalam menjalankan bisnisnya. Dari banyaknya penyedia layanan cloud computing, Amazon Web Service (AWS) adalah salah satu penyedia layanan pertama dan yang terbesar. Masalah-masalah yang terjadi dalam penggunaan teknologi cloud computing adalah pemberian hak akses dalam melakukan manajemen data. AWS memiliki suatu layanan untuk mengatur kendali akses pada setiap layanan yaitu Identity and Access Management (IAM). Layanan ini berupaya mencegah aktivitas yang mengarah pada pelanggaran keamanan. Hasil yang didapatkan berupa group yang dapat mengakses layanan AWS sesuai dengan role yang diberikan.


Keywords


Cloud Computing; Amazon Web Service; Access Control; IAM, EC

Full Text:

PDF

References


Michael Miller, Cloud Computing: Web-Based Applications That Change the Way You

Work and Collaborate Online. Indianapolis: QUE, 2008.

P. M. Mell and T. Grance, “The NIST definition of cloud computing,” Gaithersburg, MD,

J. Wu, Z. Lei, S. Chen, and W. Shen, “An access control model for preventing virtual

machine escape attack,” Futur. Internet, vol. 9, no. 2, 2017.

D. Kim and M. G.Solomon, Fundamentals of Information Systems Security - 5th Edition,

th Editio. Canada: Jones & Bartlett Learning, 2010.

P. Case and K. V Chaudhari, “A Survey on Secure Access Control Mechanism of

Geospatial Data,” vol. 2, no. 2, pp. 188–194, 2014.

S. Osborn, R. Sandhu, and Q. Munawer, “Configuring Role-Based Access Control to

Enforce Mandatory and Discretionary Access Control Policies,” vol. 2, no. 2, pp. 85–106,

A. P. S. A. Ubale and S. S. Apte, “Comparison of ACL Based Security Models for

securing resources for Windows operating system,” pp. 63–64, 2014.

“IAM Product Details - Amazon Web Services (AWS).” [Online]. Available:

https://aws.amazon.com/iam/details/. [Accessed: 20-Mar-2018].

A. W. Services, “AWS Identity and Access Management User Guide.”

“Amazon EC2.” [Online]. Available: https://aws.amazon.com/ec2/. [Accessed: 20-Mar-

.

“Amazon Relational Database Service (RDS) – AWS.” [Online]. Available:

https://aws.amazon.com/rds/?nc2=h_m1. [Accessed: 20-Mar-2018].

“Cloud Object Storage | Store & Retrieve Data Anywhere | Amazon Simple Storage

Service.” [Online]. Available: https://aws.amazon.com/s3/?nc2=h_m1. [Accessed: 09-Jul-

.




DOI: http://dx.doi.org/10.24912/computatio.v3i1.4270

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.


Copyright of COMPUTATIO : JOURNAL OF COMPUTER SCIENCE AND INFORMATION SYSTEMS (P-ISSN : 2549-2810  E-ISSN : 2549-2829)


Indexed by:

      

 

Published by:

Fakultas Teknologi Informasi

Faculty of Information Technology, Universitas Tarumanagara
Gedung R Lantai 11
Jl. Let.Jend. S.Parman No. 1 Jakarta 11440

 

Web Analytics