Security Model Using Intrusion Detection System on Cloud Computing Security Management
Security Model Using Intrusion Detection System on Cloud Computing Security Management
Abstract—The use of Cloud Computing has advantages that are related to storage on the cloud itself that opposes data,
have the potential to be an extraordinary service in supporting data theft, violating the authority, and Accountable privacy-
work procedures that can be carried out anywhere via the preserving [10], [11] of the cloud system. In this case, the
internet. Through the internet, we can carry out activities cloud security architecture discusses the system being a
anywhere, but it will also cause other problems that will arise major concern in cloud computing.
because of access via the internet, one of which is from the
security side, system and security management on a computer More than the potential advantages that can be gotten
is very crucial for securing a lot of data on it. The purpose of from the distributed computing model, this model despite
this research is to provide suggestions related to security everything has many open model issues, the believability and
management in Cloud Computing, especially in the sectors of allure model. Locking, multitenancy and disconnection
Integrity, Authority, Privacy, and Confidentiality, also propose merchants, information the board, administration versatility,
the proposed Concepts and Recommendations which are machine flexibility, Service Level Agreement (SLA) the
expected to improving security for Cloud Computing security executives, and cloud security are open exploration issues
and detection intruders who break into cloud computing known in the distributed computing model, and security on
systems using Intrusion Detection System and networks using that is a significant worry [12] of the appropriation of the
Intrusion Detection System methods. Further research can be distributed computing model in light of the fact that:
implemented and performed for improving security on cloud
• Third-party companies that manage outsourcing
computing.
security
Keywords—cloud computing, security, intrusion detection • Assets in the same location from different tenants
system, security management with different security standards.
• The level of guarantee that can change in SLA’s
I. INTRODUCTION between consumers and service providers.
Some cloud computing providers have views security
Cloud Computing has the potential to be an extraordinary requires [8], [13], [14] many security licenses, security
service in supporting work procedures that can be carried out resources, and is a problem that cannot be found at the
anywhere via the internet [1]. This simple technology is outset, especially authentication and security management
ideally used by organizations to run innovative business [15]. From this perspective, security in the cloud computing
models in organizations [2]–[4] that use information model will influence consumers and find new security
technology (IT) in their work procedures and makes it easy solutions that solve the problem.
for users to move data and application to the cloud data
center. The Cloud Model has motivated organizations to This paper analyzes security issues in cloud computing
implement cloud computing for media center applications, and its strategy in securing user data according to the concept
ranging from high computing-intensive applications to and character of cloud computing. Data privacy and service
lightweight services [5], [6]. Cloud Computing is included in availability in cloud computing are the focus on security
Strategic Planning, organizations, and companies in the issues. using only one security method cannot provide a
performance process because this model helps approve sense of security and comfort in its use. Solving cloud
Information Technology (IT) without initial investment in computing security problems and many applied technologies
infrastructure, software licensing, and other related and specific strategies must be used together to protect the
requirements [5]. At the same time, cloud computing has cloud computing system completely. The proposed security
become an option in managing important files and files to be model in cloud computing and focuses on the security
accessed wherever and whenever Multitenancy and infrastructure model, intrusion detection system (IDS) on
flexibility are the two fundamental qualities of the cloud network, security management in cloud computing by
model that make it conceivable to expand the assets collecting some of the problems identified by design,
proposed to offer types of assistance that can be utilized for problems identified with the administration delivery model,
its clients. These characteristics form the main basis of problems identified with the cloud, and problems identified
Integrity, privacy, authority, and confidentiality of the Cloud with cloud interests. This study also proposes a security
Computing system [7]–[9]. Problems that arise in the cloud model in cloud computing in the form of an infrastructure
Authorized licensed use limited to: Universitas Indonesia. Downloaded on November 09,2024 at 06:07:54 UTC from IEEE Xplore. Restrictions apply.
The 9th International Conference on Cyber and IT Service Management (CITSM 2021)
Bengkulu, September 22-23, 2021
Authorized licensed use limited to: Universitas Indonesia. Downloaded on November 09,2024 at 06:07:54 UTC from IEEE Xplore. Restrictions apply.
The 9th International Conference on Cyber and IT Service Management (CITSM 2021)
Bengkulu, September 22-23, 2021
and manages security risks that occur, Risk assessment also provided by users who have access rights to other users to
has a role in knowing how well the security performance is have access to the data.
based on the status report which later the results of the risk
assessment become the basis for the security control manager Cloud Computing as an IT system interacts with the
to categorize the security level in cloud computing. All internet. Users browse with web services and can access any
security history and assessments are stored in a security website, the service used when accessing the internet is an
repository which serves as a security index for security Secure Shell (SSH) and File Transfer Protocol (FTP) port,
enhancements. The IDS [25]–[27] system on authentication with this condition Cloud Computing has a high risk of
control can detect attacks, intrusions and forced logins cybersecurity threats. Cloud Computing cybersecurity to
against users, there will be notifications through monitoring watch out for includes intrusions in Cloud Computing
and provide real-time warnings and attack data can be seen systems that can be cracked by intruders and unauthorized
through logs equipped with an IDS monitoring system from parties over cloud computing, Denial of Service (DDoS)
every access to cloud computing. With this proposed model, attacks and malicious malware [31], phishing threats that can
security in cloud computing can be implemented and manipulate interfaces and steal identities in cloud computing.
improved so that data and user connections to cloud Web Service also needs to be added security with risk
computing are secure. control models including Prevention, Protection, Detection,
and Response. Of the four phases used as protection of cloud
computing web services. Prevention that can be done can be
in the form of security policies, security policy reviews,
security assessments, and regular audits. Protection that can
be done can apply a Firewall, Web Application Firewall, and
Intrusion Protection System.
Authorized licensed use limited to: Universitas Indonesia. Downloaded on November 09,2024 at 06:07:54 UTC from IEEE Xplore. Restrictions apply.
The 9th International Conference on Cyber and IT Service Management (CITSM 2021)
Bengkulu, September 22-23, 2021
computing frameworks, two things that can conceivably [4] D. Yuniarto, M. Suryadi, E. Firmansyah, D. Herdiana, and A. B. A.
prompt static and dynamic spillage. Static spillage Rahman, “Integrating the Readiness and Usability Models for
Assessing the Information System Use,” in 2018 6th International
implies that information put away in server farms, Conference on Cyber and IT Service Management (CITSM), 2018, pp.
application memory, and terminal memory is gotten to 1–6.
and spilled by unapproved clients, while dynamic [5] F. Shimba, “Cloud computing: Strategies for cloud computing
spillage implies that information adjusted in the cloud adoption,” 2010.
condition is gotten to and spilled by capturing client [6] M. A. Helmiawan and I. Fadil, “PRIVATE CLOUD STORAGE IN
records or tapping system channels. These two kinds of RURAL’S MANAGEMENT AND INFORMATION SYSTEM
spillage have normally gotten extraordinary consideration USING ROADMAP FOR CLOUD COMPUTING ADOPTION
(ROCCA),” Intern. (Information Syst. Journal), vol. 2, no. 2, pp.
and are paid attention to. 172–183, 2019.
4. Security Responses, security incidents that occur in cloud [7] S. Sengupta, V. Kaulgud, and V. S. Sharma, “Cloud Computing
computing, there must be a notification to cloud Security--Trends and Research Directions,” no. May 2014, pp. 524–
531, 2011.
computing users. These emergencies must be overcome
[8] A. A. Che Fauzi, A. Noraziah, T. Herawan, and N. Mohd. Zin, “On
by responding to incidents with recovery at the system, cloud computing security issues,” Lect. Notes Comput. Sci. (including
infrastructure, cloud backup, and firewall levels. The Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol.
incident must already be in the cloud computing security 7197 LNAI, no. PART 2, pp. 560–569, 2012.
standard. [9] Y. Fauziah, “Tinjauan Keamanan Sistem Pada Teknologi Cloud
Computing,” J. Inform. Ahmad Dahlan, vol. 8, no. 1, 2014.
5. Security Incident Audit, to prevent security incidents that [10] H. Cheng, C. Rong, M. Qian, and W. Wang, “Accountable privacy-
have occurred, previous incidents are audited and studied preserving mechanism for cloud computing based on identity-based
what can keep the cloud computing system running and encryption,” IEEE Access, vol. 6, pp. 37869–37882, 2018.
can be used by users. [11] S. Dewi, “Konsep Perlindungan Hukum Atas Privasi Dan Data
Pribadi Dikaitkan Dengan Penggunaan Cloud Computing Di
Other security problems include resource allocation and Indonesia,” DEMO 2 J., no. 94, 2016.
de-allocation related to virtual machines. Unexpected [12] W. Liu, “Research on cloud computing security problem and
leakage, for example in the memory log, can occur if the strategy,” 2012 2nd Int. Conf. Consum. Electron. Commun. Networks,
memory allocated to the virtual machine is not deleted in CECNet 2012 - Proc., pp. 1216–1219, 2012.
accordance with the procedure before it is reallocated to [13] S. Carlin and K. Curran, “Cloud computing security,” Int. J. Ambient
another virtual machine. Other problems can occur with Comput. Intell., vol. 3, no. 1, pp. 14–19, 2011.
communication, monitoring, modification, and migration of [14] M. A. AlZain, E. Pardede, B. Soh, and J. A. Thom, “Cloud computing
virtual machines. With the characteristics of multi-tenant security: From single to multi-clouds,” Proc. Annu. Hawaii Int. Conf.
Syst. Sci., pp. 5490–5499, 2012.
cloud computing, if it is not fully correct in the isolation and
[15] M. Almorsy, J. Grundy, and A. S. Ibrahim, “Collaboration-based
placement of virtual resources when used by users it will also cloud computing security management framework,” Proc. - 2011
cause problems that occur in cloud computing systems. IEEE 4th Int. Conf. Cloud Comput. CLOUD 2011, pp. 364–371,
2011.
IV. CONCLUSION [16] I. Ghafir, V. Prenosil, J. Svoboda, and M. Hammoudeh, “A survey on
With the concept of architecture and infrastructure network security monitoring systems,” in 2016 IEEE 4th
International Conference on Future Internet of Things and Cloud
created, it can be used as a reference in securing data in Workshops (FiCloudW), 2016, pp. 77–82.
cloud computing so that data leakage does not occur by
[17] M. A. Helmiawan, D. I. Juna, and B. Ramdhani, “Pengamanan Sistem
irresponsible parties. The core of this cloud computing Dan Data E-Voting Berbasis Network,” Intern. (Information Syst.
security includes security management and access control Journal), vol. 1, no. 1, pp. 1–10, 2018.
that is done by using encryption in every user activity. [18] N. Sultana, N. Chilamkurti, W. Peng, and R. Alhadad, “Survey on
Selection of user access and privacy with a key and security SDN based network intrusion detection system using machine
on the web service. Implementation of strategies insecurity is learning approaches,” Peer-to-Peer Netw. Appl., vol. 12, no. 2, pp.
also important in securing cloud computing by ensuring the 493–501, 2019.
continuity of the cloud system, proactive warnings to users, [19] N. Khan and A. Al-Yasiri, “Framework for cloud computing
adoption: A road map for Smes to cloud migration,” arXiv Prepr.
preventing data leakage by auditing the system regularly and arXiv1601.01608, 2016.
providing notifications before and after the incident, and [20] I. M. Khalil, A. Khreishah, and M. Azeem, “Cloud computing
being responsive in responding to incidents and quickly security: A survey,” Computers, vol. 3, no. 1, pp. 1–35, 2014.
recovering them as well as right. Further research can be [21] G. Kulkarni, J. Gambhir, T. Patil, and A. Dongare, “A security
implemented and performed for improving security on cloud aspects in cloud computing,” ICSESS 2012 - Proc. 2012 IEEE 3rd Int.
computing. Conf. Softw. Eng. Serv. Sci., no. June 2012, pp. 547–550, 2012.
[22] E. Firmansyah et al., “Examining readiness of e-learning
REFERENCES implementation using Aydin and Tasci model: A rural university case
study in Indonesia,” AIP Conf. Proc., vol. 2331, 2021.
[1] J. Dizdarević, F. Carpio, A. Jukan, and X. Masip-Bruin, “A survey of
communication protocols for internet of things and related challenges [23] D. Yuniarto, M. Helmiawan, D. Junaedi, A. Saeppani, and Y.
of fog and cloud computing integration,” ACM Comput. Surv., vol. Sopiyan, “Factors Affecting the Use of Information Systems in
51, no. 6, pp. 1–29, 2019. Hybrid Models,” 2020.
[2] V. Sagan et al., Monitoring inland water quality using remote [24] M. A. Helmiawan, E. Firmansyah, I. Fadil, Y. Sofivan, F. Mahardika,
sensing: potential and limitations of spectral indices, bio-optical and A. Guntara, “Analysis of Web Security Using Open Web
simulations, machine learning, and cloud computing, vol. 205. 2020. Application Security Project 10,” in 2020 8th International
Conference on Cyber and IT Service Management (CITSM), 2020, pp.
[3] S. J. Putra, A. Subiyakto, I. Yunita, M. N. Gunawan, and Y.
1–5.
Durachman, “Assessing the user satisfaction perspectives of
information system: A library case study in Indonesia,” Indones. J. [25] D. Avison, G. Fitzgerald, and P. Powell, “Private Cloud Storage in
Electr. Eng. Comput. Sci., vol. 12, no. 1, pp. 95–101, 2018. Rural’S Management and Information System Using Roadmap for
Authorized licensed use limited to: Universitas Indonesia. Downloaded on November 09,2024 at 06:07:54 UTC from IEEE Xplore. Restrictions apply.
The 9th International Conference on Cyber and IT Service Management (CITSM 2021)
Bengkulu, September 22-23, 2021
Cloud Computing Adoption (Rocca),” Inf. Syst. J., vol. 17, no. 3, pp. [29] T. G. Nguyen, T. V Phan, B. T. Nguyen, C. So-In, Z. A. Baig, and S.
215–216, 2007. Sanguanpong, “Search: A collaborative and intelligent nids
[26] D. Ageyev, L. Kirichenko, T. Radivilova, M. Tawalbeh, and O. architecture for sdn-based cloud iot networks,” IEEE access, vol. 7,
Baranovskyi, “Method of self-similar load balancing in network pp. 107678–107694, 2019.
intrusion detection system,” 2018 28th Int. Conf. Radioelektronika, [30] J. T. Mościcki and M. Lamanna, “Prototyping a file sharing and
RADIOELEKTRONIKA 2018, no. 2, pp. 1–4, 2018. synchronization service with Owncloud,” in Journal of Physics:
[27] O. Al-Jarrah and A. Arafat, “Network Intrusion Detection System Conference Series, 2014, vol. 513, no. 4, p. 42034.
Using Neural Network Classification of Attack Behavior,” J. Adv. Inf. [31] A. Abdollahi and M. Fathi, “An Intrusion Detection System on Ping
Technol., vol. 6, no. 1, pp. 1–8, 2015. of Death Attacks in IoT Networks,” Wirel. Pers. Commun., vol. 112,
[28] E. Hodo et al., “Threat analysis of IoT networks using artificial neural no. 4, pp. 2057–2070, 2020.
network intrusion detection system,” 2016 Int. Symp. Networks,
Comput. Commun. ISNCC 2016, pp. 4–8, 2016.
Authorized licensed use limited to: Universitas Indonesia. Downloaded on November 09,2024 at 06:07:54 UTC from IEEE Xplore. Restrictions apply.