28,700 research outputs found

    Pengamanan Layanan Private Cloud Storage Menggunakan HTTPS, IPTables dan SSTP

    Get PDF
    STMIK Bumigora is a computer college in the province of West Nusa Tenggara (NTB). The spread of data from 12 (twelve) sections on each staff computer or section head causes data search both within and between sections to be inefficient. The condition underlies the prototype development of Nextcloud-based Private Cloud Storage system as centralized data storage for each part. This system has been successfully created and tested and received a positive response for immediate implementation. But PusTIK as part of managing Information and Communication Technology (ICT) is still considering to delay implementation until security is done to access and transfer data between client to Private Cloud Storage Server. In addition there is also a need to remain able to access to Cloud Storage services from the Internet, especially when the academic community is on duty out of town or out of campus. The implementation of Secure Socket Tunneling Protocol (IPTables) and Secure Socket Tunneling Protocol (VPN) based Server Protocol Secure (HTTPS) and IPTables on Gateway Routers can help solve the problems encountered. Based on the analysis there is a known test results HTTPS can secure access and transfer data from client to Cloud Storage Server. While IPTables can protect Private Cloud Storage server from unwanted traffic so it can keep the service available. In addition, SSTP can bridge the need for access and security of communications to Private Cloud Storage service from the Internet

    A gap analysis of Internet-of-Things platforms

    Full text link
    We are experiencing an abundance of Internet-of-Things (IoT) middleware solutions that provide connectivity for sensors and actuators to the Internet. To gain a widespread adoption, these middleware solutions, referred to as platforms, have to meet the expectations of different players in the IoT ecosystem, including device providers, application developers, and end-users, among others. In this article, we evaluate a representative sample of these platforms, both proprietary and open-source, on the basis of their ability to meet the expectations of different IoT users. The evaluation is thus more focused on how ready and usable these platforms are for IoT ecosystem players, rather than on the peculiarities of the underlying technological layers. The evaluation is carried out as a gap analysis of the current IoT landscape with respect to (i) the support for heterogeneous sensing and actuating technologies, (ii) the data ownership and its implications for security and privacy, (iii) data processing and data sharing capabilities, (iv) the support offered to application developers, (v) the completeness of an IoT ecosystem, and (vi) the availability of dedicated IoT marketplaces. The gap analysis aims to highlight the deficiencies of today's solutions to improve their integration to tomorrow's ecosystems. In order to strengthen the finding of our analysis, we conducted a survey among the partners of the Finnish IoT program, counting over 350 experts, to evaluate the most critical issues for the development of future IoT platforms. Based on the results of our analysis and our survey, we conclude this article with a list of recommendations for extending these IoT platforms in order to fill in the gaps.Comment: 15 pages, 4 figures, 3 tables, Accepted for publication in Computer Communications, special issue on the Internet of Things: Research challenges and solution
    • …
    corecore