Keamanan Data dalam Penggunaan IoT untuk Menghimpun dan Mengelola Big Data

Authors

  • Syahla Nadya Putri Syabrina syahla Universitas Paramadina

DOI:

https://doi.org/10.51353/byaz2867

Keywords:

Data Security, IoT, Big Data, Data Collection, Information Protection

Abstract

In the era of rapid information system growth, the utilization of the Internet of Things (IoT) and Big Data has become a primary focus for modern companies. IoT devices, which are connected to the internet, play a crucial role in collecting, transmitting, and processing data from various sources. Meanwhile, Big Data describes large and diverse datasets that, if properly leveraged, can provide numerous benefits. However, with the increasing use of IoT and Big Data, the protection of information security becomes increasingly important. The aim of this study is to analyze the main challenges in data security related to the use of IoT for managing Big Data. The research method involves a literature review of various relevant national and international journal articles. The results indicate that the main challenges include extensive data collection, data security, individual identification, user control, and third-party data access. Therefore, a balanced integration of IoT technology, Big Data, and data security practices is key to ensuring business success and sustainability in this digital era.

References

[1] Eka Mayasari and Agussalim Agussalim, “Literature Review: Big Data dan Data Analys pada Perusahaan,” J. Ilm. Sist. Inf. dan Ilmu Komput., vol. 3, no. 3, pp. 171–187, 2023, doi: 10.55606/juisik.v3i3.680.

[2] Edy Soesanto, Nova Astia Ningsih, Lili Khoerunisa, and Muhammad Ilham Faturrahman, “Keamanan Informasi Data Dalam Pemanfaatan Teknologi Informasi Pada PT Bank Central Asia (BCA),” Student Res. J., vol. 1, no. 3, pp. 227–238, 2023, doi: 10.55606/srjyappi.v1i3.334.

[3] D. J. Sengkey, P. Deniyanti Sampoerno, and T. A. Aziz, “Kemampuan Pemahaman Konsep Matematis: Sebuah Kajian Literatur,” Griya J. Math. Educ. Appl., vol. 3, no. 1, pp. 67–75, 2023, doi: 10.29303/griya.v3i1.265.

[4] S. A. Putri, Y. Nabela, M. Arifan, R. Hidayat, and M. Ikaningtyas, “Optimalisasi Proses Operasional dengan Menggabungkan Teknologi IoT dan Big Data : Studi Kasus pada PT Pertamina dalam Industri Minyak dan Gas Operational Process Optimization by Combining IoT and Big Data Technology : A Case Study on PT Pertamina in the O,” vol. 3, no. 1, pp. 1–10, 2024.

[5] S. Ceri, “Data-Centric Systems and Applications Series editors”.

[6] F. Prasetyo Eka Putra, S. Mellyana Dewi, and A. Hamzah, “Jurnal Sistim Informasi dan Teknologi https://jsisfotek.org/index.php Privasi dan Keamanan Penerapan IoT Dalam Kehidupan Sehari-Hari : Tantangan dan Implikasi,” vol. 5, no. 2, pp. 26–32, 2023, doi: 10.37034/jsisfotek.v5i1.232.

[7] N. S. Nainggolan and I. P. Nasution, “Pentingnya Keamanan Big Data Dalam Lembaga Pemerintahan Di Era Digital,” J. Sains dan Teknol., vol. 3, no. 2, pp. 253–257, 2023, doi: 10.47233/jsit.v3i2.883.

[8] Y. Daeng, J. Levin, M. Razzaq Prayudha, N. Putri Ramadhani, S. Imanuel, and A. Penerapan Sistem Keamanan Siber Terhadap Kejahatan Siber Di Indonesia Yusuf Daeng, “Analisis Penerapan Sistem Keamanan Siber TerhadapKejahatan Siber Di Indonesia,” J. Soc. Sci. Res., vol. 3, no. 6, pp. 1135–1145, 2023.

[9] R. Rizal, N. Widiyasono, and S. Yuliyanti, “Kecerdasan Buatan untuk Klasifikasi Serangan Siber pada Internet of Things Network Traffic,” Jumanji, vol. 7, no. 2, pp. 2598–8069, 2023.

[10] R. Pratama Putra et al., “Perlindungan Data Pribadi dalam Era Digital: Tinjauan Terhadap Kerangka Hukum Perlindungan Privasi,” Innov. J. Soc. Sci. Res., vol. 3, no. 6, pp. 2898–2905, 2023, [Online]. Available: https://j-innovative.org/index.php/Innovative/article/view/6662

[11] J. Manurung, A. P. E. Sihombing, and B. Pandiangan, “Sosialisasi Dan Edukasi Tentang Keamanan Data Dan Privasi Di Era Digital Untuk Meningkatkan Kesadaran Dan Perlindungan Masyarakat,” J. Pengabdi. Masy. Nauli, vol. 2, no. 1, pp. 1–7, 2023, [Online]. Available: https://ejournal.marqchainstitute.or.id/index.php/Nauli/article/view/103

[12] Khoiri Gusnanda, Nur Ulfadillah, and Titin Sumarni, “Struktur Basis Data Di Era Digital (Implementasi Pengamanan Basis Data Di Era Global ),” J. Sains dan Teknol., vol. 3, no. 7, pp. 100–111, 2024, [Online]. Available: https://ejournal.warunayama.org/kohesi

[13] H. W. Saputra and I. Komputer, “Penerapan kecerdasan buatan dalam pengujian perangkat lunak,” vol. 1, no. 2, pp. 1–16, 2024.

[14] D. Natalia and A. A. Sudiro, “Anak yang Menjadi Korban/Pelaku/Saksi; Pelindungan anak; Hak-Hak anak,” vol. 5, no. 1, 2024.

[15] T. G. Laksana and S. Mulyani, “Pengetahuan Dasar Identifikasi Dini Deteksi Serangan Kejahatan Siber Untuk Mencegah Pembobolan Data Perusahaan,” J. Ilm. Multidisiplin, vol. 3, no. 01, pp. 109–122, 2024, doi: 10.56127/jukim.v3i01.1143.

Downloads

Published

2025-06-27