Universitas Bhayangkara Jakarta Raya

Institutional Repositories

FITRIYANI, AIDA Comparative Analysis of Key Management Service Performance on AWS, Google Cloud, and Oracle Cloud with Performance Testing. Comparative Analysis of Key Management Service Performance on AWS, Google Cloud, and Oracle Cloud with Performance Testing.

This is the latest version of this item.

[img] Text
43_CITSM2023-PAPER-Comparative Analysis of Key Management Service.pdf

Download (474kB)
[img] Text
turnitiin-17%- 43_CITSM2023.pdf.pdf

Download (2MB)
[img] Text
43_GABUNGAN-COVER-EDITOR-DFTARISI-PAPER.pdf

Download (918kB)
[img] Text
43_GABUNGAN-COVER-EDITOR-DFTARISI-PAPER-SERTIFIKAT-COMPARATIVE ANALYSIS.pdf

Download (1MB)

Abstract

Although switching to cloud technology for free exclusive can give cost advantage and efficiency, it requires policies, processes, and practices best security level business calculated. Based on survey to industry experts, available problem security in cloud computing, including data breaches identified as a problem security top need _ attention more. Most entry way sense to prevent data breach involves practice security in data storage, for example data encryption. But if happen lost key encryption, then it will also data loss. It supported by abundance data breaches that have occurred in the last 5 years recently, especially in Indonesia. To overcome security and management issues key encryption, some cloud providers provide Key Management Services (KMS) services. This research will compare the performance of Key Management Services from cloud providers AWS, Google Cloud, and Oracle Cloud with load testing methods, stress testing, and benchmark testing. The parameters assessed from this research are response time, error rate, throughput, and latency. The resulting research results are recommendations for the best cloud providers in Key Management Services. The result shows AWS can say better compared Google Cloud and Oracle because constant error rate lower from Google Cloud and Oracle, competitive response time and latency. Throughput (requests per second) obtained almost always more excels at every testing. Keywords— Performance Analysis, Cloud Computing, Cloud Security, Data Breaches, JMeter

Item Type: Article
Subjects: Teknologi dan Ilmu Terapan > Teknik Informatika
Depositing User: Aida Fitriyani
Date Deposited: 16 Sep 2024 23:43
Last Modified: 16 Sep 2024 23:43
URI: http://repository.ubharajaya.ac.id/id/eprint/31781

Available Versions of this Item

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year