Data Integrity Testing of Digital Evidence Data Capture Results on Private Cloud Computing Services

Arif Maulana Komarudin, Nur Widiyasono, Aldy Putra Aldya, Randi Rizal


Private Cloud has better advantages than other cloud services because private cloud is managed and run by the company itself so that cloud needs can be tailored to the company's needs, but allows abuse from within the company itself, as in the case study simulation of a Gojek startup company. This case occurred because of a security weakness in the system so that internal people took advantage of these weaknesses for their own benefit by leaking confidential data, acquisitions were carried out to prove and find evidence of crime, acquisitions used live acquisition techniques, namely acquisitions on an ongoing system, namely monitoring network traffic using Wireshark tools , the method in this case uses the Digital Forensics Investigating Framework (DFIF), data integrity must be properly maintained when acquiring digital evidence because to maintain the authenticity of the digital evidence obtained, then data integrity is tested on the digital evidence obtained, testing is carried out on digital evidence before and after the acquisition to see if there is a change in data integrity, the research results show that there is no change in data integrity.

Full Text:

PDF (52-58)


Q. Covert, D. Steinhagen, M. Francis, and K. Streff, “Towards a Triad for Data Privacy,†in Hawaii International Conference on System Sciences, 2020. DOI: 10.24251/HICSS.2020.535

M. F. Panende, I. Riadi, and Y. Prayudi, “Konsep Attribute Based Access Control (ABAC) Pada Lemari Penyimpanan Bukti Digital (LPBD),†JURNAL TEKNIK INFORMATIKA, vol. 11, no. 1, pp. 85–94, May 2018. DOI: 10.15408/jti.v11i1.7220

Amin Aenurahman Ali and Niken Dwi Wahyu Cahyani, “Digital Forensic Analysis on iDevice: Jailbreak iOS 12.1.1 as a Case Study,†Telkom Univesity, Bandung, 2019.

L. Singh and N. Dutta, “Routing Protocols for CRAHN: A Comparative Evaluation,†2020, pp. 3–11. DOI: 10.1007/978-981-15-1624-5_1

M. A. Adam, N. Widiyasono, and H. Mubarok, “Analisis Data Digital Evidence pada Layanan Voice Over Internet Protocol (VoIP),†Jurnal Edukasi dan Penelitian Informatika (JEPIN), vol. 2, no. 2, Nov. 2016. DOI: 10.26418/jp.v2i2.17578

E. Chintia, R. Nadiah, H. N. Ramadhani, Z. F. Haedar, A. Febriansyah, and M. Sc. E. N. A. Rakhmawati S.Kom., “Kasus Kejahatan Siber yang Paling Banyak Terjadi di Indonesia dan Penanganannya,†Journal of Information Engineering and Educational Technology, vol. 2, no. 2, p. 65, Feb. 2019. DOI: 10.26740/jieet.v2n2.p65-69

Y. | Setya and A. Suganda, “Design of Digital Evidence Collection Framework in Social Media Using SNI 27037:2014,†2022.

S. Madiyanto, H. Mubarok, and N. Widiyasono, “Mobile Forensics Investigation Proses Investigasi Mobile Forensics Pada Smartphone Berbasis IOS,†Jurnal Rekayasa Sistem & Industri (JRSI), vol. 4, no. 01, Sep. 2017. DOI: 10.25124/jrsi.v4i01.149

I. F. Editia Kurdiat, N. Widiyasono, and H. Mubarok, “Analisis Proses Investigasi Dekstop PC Yang Terhubung Layanan Private Cloud,†Jurnal Teknik Informatika dan Sistem Informasi, vol. 2, no. 2, Aug. 2016. DOI: 10.28932/jutisi.v2i2.463

N. Widiyasono, I. Riadi, and A. Luthfi, “Penerapan Metode ADAM Pada Proses Investigasi Layanan Private Cloud Computing,†Jurnal Edukasi dan Penelitian Informatika (JEPIN), vol. 2, no. 1, Jun. 2016. DOI: 10.26418/jp.v2i1.15501

D. Sudyana, N. Lizarti, and E. Erlin, “Forensic Investigation Framework on Server Side of Private Cloud Computing,†Lontar Komputer : Jurnal Ilmiah Teknologi Informasi, p. 181, Dec. 2019. DOI: 10.24843/lkjiti.2019.v10.i03.p06


  • There are currently no refbacks.