Cloud Service Security: Cyber Threat Analysis and Approaches to Infrastructure and Data Protection

Cloud Service Security: Cyber Threat Analysis and Approaches to Infrastructure and Data Protection

Authors

  • Reni Kartika Suwandi Universitas Sebelas April

Keywords:

Cloud Computing, Cyber Security, Personal Data Protection, Cyber security awareness, internet users, digital behavior, cyber attacks, prevention efforts, systematic review, social engineering

Abstract

The advancement of cloud computing technology has significantly facilitated data management and operational efficiency across various sectors. However, the rapid adoption of cloud services is accompanied by an increasing number of security risks, including cyberattacks targeting cloud infrastructure and data. This study aims to analyze common types of cyber threats in cloud services and identify security approaches used to protect infrastructure and user data. The method employed is a Systematic Literature Review (SLR) of ten relevant national scientific publications from the past five years. The findings indicate that the most prevalent threats include data breaches, Distributed Denial of Service (DDoS) attacks, and unauthorized access. Commonly adopted mitigation strategies include encryption, role-based access control, network security systems, and the application of artificial intelligence for anomaly detection. This study recommends a multilayered integration of security policies, technological safeguards, and user education to strengthen the overall security posture of cloud computing environments.

References

D. M. Asviara, E. Jerliana, F. I. Aditya, A. R. Pratama, dan R. T. Nugrohos, “Analisis Efektivitas Sistem Manajemen Keamanan di Perusahaan Shopee dalam Meningkatkan Proteksi Data,” HUMANITIS: Jurnal Humaniora, Sosial dan Bisnis, vol. 2, no. 7, pp. 735–741, Jul. 2024. e-ISSN: 2988-6287

H. P. Fitrian, L. S. Lutfiah, R. F. Ash-Shidiq, dan M. M. Oktavian, “Analisis Kinerja Jaringan Komputer pada Infrastruktur Cloud Computing Menggunakan Metode Quality of Service (QoS),” JATI: Jurnal Mahasiswa Teknik Informatika, vol. 9, no. 1, Feb. 2025

R. Amaliyah, “Efektivitas Penggunaan Teknologi Artificial Intelligence terhadap Proteksi Keamanan Sistem Tata Kelola Perusahaan (Sektor Perbankan),” Info Kripto, vol. 19, no. 1, 2025. doi: 10.56706/ik.v19i1.121

H. Lubis, D. T. Awaludin, D. P. Sari, L. A. Milasari, dan S. Arifin, “Edukasi Keamanan Siber: Pelatihan Dasar Mengenali Phishing dan Proteksi Data Pribadi di Dunia Digital,” JIPITI: Jurnal Pengabdian kepada Masyarakat, vol. 2, no. 2, pp. 101–105, Mei 2025. ISSN: 3063-573X

A. K. Dewi, B. K. Sibaran, E. Saputra, Norazlina, S. Susanti, Y. Syafira, dan Y. Munakalla, “Strategi Efektif Pengendalian Internal dalam Keamanan Sistem Informasi Akuntansi untuk Perlindungan Data Keuangan,” Jurnal Ilmiah Raflesia Akuntansi, vol. 11, no. 1, 2025

M. N. Aslam, A. H. Al Anshori, dan M. Izaki, “Cloud Computing: Solusi Efektif untuk Pengelolaan Data di Era Digital,” Jurnal BATIRSI, vol. 8, no. 2, Jan. 2025. p-ISSN: 2502-3691, e-ISSN: 2502-4361

B. I. Karimi dan A. R. Yusuf, “Kebocoran Data dan Distributed Denial of Service (DDoS) dalam Cloud Computing: Systematic Literature Review,”Integrative Perspectives of Social and Science Journal (IPSSJ), 2024. e-ISSN: 3064-4011

M. A. Firmansyah, D. A. Moonap, dan M. Izaki, “Strategi Keamanan Data pada Database Cloud Computing: Pencegahan dan Perlindungan untuk Pengguna Layanan,” Jurnal BATIRSI, vol. 8, no. 2, Jan. 2025. p-ISSN: 2502-3691, e-ISSN: 2502-4361

H. Kurniawan, L. B. Handoko, dan V. Aldo, “The Implementation of AWS Cloud Technology to Enhance the Performance and Security of the Pharmacy Cashier Management System,” Jurnal Inovtek Polbeng – Seri Informatika, vol. 10, no. 1, Mar. 2025. ISSN: 2527-9866.

M. F. N. Adillah dan N. I. Utama, “Optimisasi Infrastruktur Cloud: Memanfaatkan Keunggulan Serverless dan Blockchain,” Jurnal Teknologi dan Sistem Informasi Bisnis, vol. 6, no. 3, pp. 480–487, Jul. 2024. doi:10.47233/jteksis.v613.1416.

Helmiawan, M. A., & Wiharko, T. (2018). Application of Fingerprint Security System on Motorcycles using Arduino Microcontroller. J-Tin’s-Jurnal Teknik Informatika, 2(1).

Helmiawan, M. A., Juna, D. I., & Ramdhani, B. (2018). Pengamanan Sistem Dan Data E-Voting Berbasis Network. INTERNAL (Information System Journal), 1(1), 1–10.

Helmiawan, M. A., Firmansyah, E., Fadil, I., Sofivan, Y., Mahardika, F., & Guntara, A. (2020). Analysis of web security using open web application security project 10. 2020 8th International Conference on Cyber and IT Service Management

Helmiawan, M. A., Julian, E., Cahyan, Y., & Saeppani, A. (2021). Experimental evaluation of security monitoring and notification on network intrusion detection system for server security. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….

Helmiawan, M. A., Fadil, I., Sofiyan, Y., & Firmansyah, E. (2021). Security model using intrusion detection system on cloud computing security management. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….

Helmiawan, M. A., & Nasution, A. I. (2022). The Effect of Internet Banking Use and Customer Protection Against Cyber Crime at Bank Rakyat Indonesia. Journal of Islamic Economics and Business, 2(2), 170–183.

Published

2025-08-20
Loading...