Analysis of Rclone Implementation for File Sharing Security on OneDrive Cloud Storage
Abstract
Background: OneDrive provides a reliable infrastructure for storing and managing user data. However, along with the benefits, the security challenges associated with storing and sharing files in the cloud are also increasing. One of the main aspects of cloud storage security management is the file-sharing process. While OneDrive offers a few security features, such as access control and two-factor authentication, there remains a need to strengthen additional layers of security, especially when sharing files with external parties.
Objective: This research aims to analyze the effectiveness of Rclone in improving file-sharing security on OneDrive, especially File Backup and File Encryption.
Methods: This research uses the Network Development Life Cycle (NDLC) method, which includes six stages. This research focuses on three stages: analysis, design, and simulation prototyping.
Result: The application of Rclone for file sharing security on OneDrive can increase data security in cloud storage, as evidenced by three backup attempts on .doc files with an average time of 2.033 seconds and successful encryption of 4 files with an average time of 37 seconds.
Conclusion: Using Rclone as a tool to manage data security on OneDrive improves data protection and provides flexibility and efficiency in file management, making it an effective solution for file sharing security needs in cloud storage
References
[2] L. Tantowi e L. Wijayanti, “Peluang dan Tantangan Penyimpanan Cloud Storage Pada Dokumen Digital,” Shaut Al-Maktabah : Jurnal Perpustakaan, Arsip dan Dokumentasi, vol. 15, nº 1, pp. 118-131, 2023.
[3] R. P. Mellisa, M. F. Duskarnaen e A. Idrus, “Analisis Perbandingan Kinerja Layanan Cloud Computing Pada Aplikasi Dropbox, Google Drive, Dan OneDrive Dengan Metode Boehm’s Quality Model,” PINTER, pp. 72-77, 2023.
[4] A. syed, K. Purushotham e G. Shidaganti, “Cloud Storage Security Risks, Practices and Measures: A Review,” em IEEE International Conference for Innovation in Technology (INOCON), Bengaluru, India, 2020.
[5] P. Yang, N. Xiong e J. Ren, “Data Security and Privacy Protection For Cloud STorage : A Survey,” IEEE Access, vol. 8, pp. 131723-131740, 2020.
[6] N. Padhy, “An automation API to optimize the rate of transmission using Rclone from local system to cloud storage environment,” em Materials Today: Proceedings, India, 2021.
[7] R. R. Adityo, “Pengembangan Aplikasi Qiscus Meet Menggunakan Jitsi Open Source Framework,” Universitas Islam Indonesia, Yogyakarta, 2022.
[8] S. e M. I. P. Nasution, “Keamanan Dan Privasi Data Dalam Lingkungan Cloud Computing: Tantangan Dan Solusi,” urnal Mutidisiplin Saintek, vol. 1, nº 10, pp. 71-80, 2023.
[9] F. e N. Chandra, “Analisis Ancaman Keamanan Data Dalam Cloud Computing,” Journal of Computing and Multimedi Enginering, vol. 1, nº 2, pp. 71-75, 2023.
[10] M. R. Anwaruddin, R. Indriati e S. Sucipto, “Perancangan dan Implementasi Cloud Storage untuk File Sharing dan File Sinkronisasi,” em Seminar Nasional Inovasi Teknologi, Kediri, 2020.
[11] N. Padhy, R. K. Mishra e S. Mishra, “Archival solution API to upload bulk file and managing the data in cloud storage,” International Journal of Intelligent Defence Support Systems, vol. 6, nº 1, 2020.
[12] A. Dimov e S. Kirov, “Data Performance Evaluation of Cloud Storage Providers,” em Information Systems & Grid Technologies: Fifteenth International Conference ISGT, Bulgaria, 2022.
[13] S. Gamnis, M. VanderLinden e A. B. Mailewa, “Analyzing Data Encryption Efficiencies for Secure Cloud Storage: A Case Study Pcloud vs OneDrive vs Dropbox,” Advances in Technology, vol. 2, nº 1, pp. 79-98, 2022.
[14] T. Sanjaya e D. Setiyadi, “Network Development Life Cycle (NDLC) Dalam Perancangan Jaringan Komputer Pada Rumah Shalom Mahanaim,” JURNAL MAHASISWA BINA INSANI, vol. 4, nº 1, pp. 1-10, 2019.
[15] K. S. M. G. Sundayana e I. L. Kharisma, “Rancang Bangun Layanan Private cloudBerbasis Infrastructure as aService Menggunakan OpenStack dengan Metode Network Development Life Cycle(NDLC),” KLIK: Kajian Ilmiah Informatika dan Komputer, vol. 4, nº 1, pp. 252-262, 2023.
This work is licensed under a Creative Commons Attribution 4.0 International License.