Teknik Virtualisasi Penyimpanan pada Google Drive Guna Meningkatkan Keamanan dan Isolasi dalam Infrastruktur TI

Authors

  • Hatfina Rustamin Institut Teknologi Bacharuddin Jusuf Habibie
  • Afiqah Afiqah Institut Teknologi Bacharuddin Jusuf Habibie

DOI:

https://doi.org/10.59841/ignite.v2i3.1598

Keywords:

Storage virtualization, Google Drive, Cloud Storage, Key Encryption

Abstract

Storage virtualization has become a key data management technology in the digital age, providing an efficient and secure solution for growing storage needs. Google Drive has adopted this technology to optimize user data management, including designing a security architecture, implementing data encryption in transit and at rest, and managing encryption keys. Access control using two-factor authentication (2FA). A reliable data backup and recovery system ensures fast recovery in the event of an accident. The technology enables additional features such as deduplication, compression, and version control that increase storage efficiency and flexibility. As a result, Google Drive offers secure, efficient and reliable cloud storage that allows users to manage data from multiple devices, confident that their data is protected.

 

 

References

Arifin, R. D. (2023, October 20). Google Drive. Retrieved from https://dianisa.com/pengertian-google-drive/

Canva. (n.d.). Canva: Aplikasi visual untuk semua. Retrieved from https://g.co/kgs/3LLv6nU

Cara Penggunaan Google Drive. (2024, January). Mengenal Google Drive: Cara penggunaannya. Pusat Informasi Belajar. https://pusatinformasi.belajar.id/hc/id/articles/4436809990681-Mengenal-Google-Drive-Cara-Penggunaannya

Husen, Z., & Surbakti, M. S. (2020). Membangun server dan jaringan komputer dengan Linux Ubuntu. Syiah Kuala University Press.

Jolin, S., & Manggu, B. (2023). Pengaruh pemanfaatan mobile banking dan kualitas pelayanan pada Bank BRI Cabang Bengkayang terhadap kepuasan nasabah. Jurnal Manuhara: Pusat Penelitian Ilmu Manajemen dan Bisnis, 1(4), 11–25.

Jurgenson, S. (2023, April 28). Mobile cloud computing: Melepaskan potensinya untuk aplikasi Anda. AppMaster. https://appmaster.io/id/blog/komputasi-awan-seluler-mengeluarkan-potensi-untuk-aplikasi-anda

Kolahi, S. S., Treseangrat, K., & Sarrafpour, B. (2015). Analysis of UDP DDoS flood cyber attack and defense mechanisms on web server with Linux Ubuntu 13. In Proceedings of the 2015 International Conference on Communications, Signal Processing, and their Applications (ICCSPA’15) (pp. 1–5). IEEE.

Maulidya, B. S. (2024). Pengembangan aplikasi pada era modern 2024. LIBRARIA: Jurnal Perpustakaan, 11(2), 323–346.

Megavitry, R., Hakim, R. R. Al, Amperawati, S., Jannah, A., Ismiasih, Aisyah, S., & Kamarudin, A. P. (2022). Peran teknologi era modern. PT Global Ekskutif Teknologi.

Pratama, D. R. (2023, May 11). What is Linux kernel. Alibaba Cloud. https://www.alibabacloud.com/blog/what-is-linux-kernel_599980

StickPNG. (n.d.). [Image of StickPNG]. Retrieved from https://images.app.goo.gl/Wm3ehxaRuFN7t2wXA

Syahza, A. (2021). Metodologi penelitian. UR Press.

Tabassum, M., & Mathew, K. (2014). Software evolution analysis of Linux (Ubuntu) OS. In Proceedings of the 2014 International Conference on Computational Science and Technology (ICCST) (pp. 1–7). IEEE.

Tamimi, M., & Sopiah. (2022). Entrepreneurship and business management: The influence of leadership style on employee performance: A systematic literature review. International Journal of Entrepreneurship and Business Management, 1(2), 128–138.

Волох, С. (2018). Ubuntu Linux с нуля. БХВ-Петербург.

Published

2024-07-26

How to Cite

Hatfina Rustamin, & Afiqah Afiqah. (2024). Teknik Virtualisasi Penyimpanan pada Google Drive Guna Meningkatkan Keamanan dan Isolasi dalam Infrastruktur TI. Journal Islamic Global Network for Information Technology and Entrepreneurship, 2(3), 41–48. https://doi.org/10.59841/ignite.v2i3.1598