Application of the ROCCA Method in Designing and Developing Private Cloud Storage at PT. Cipta Inovasi Teknologi

Authors

  • Stephani Trivena Universitas Catur Insan Cendekia Author

Keywords:

Cloud Computing, Virtualization, Nextcloud, ROCCA, Data Integration

Abstract

Cloud computing represents a significant advancement in technology that can be effectively applied in the business sector to accelerate business processes and substantially reduce operational costs. PT. Cipta Inovasi Teknologi is one such company that has leveraged cloud computing through Nextcloud software. However, its daily operational activities continue to face several challenges, such as database merging on the parent server, data loss, and suboptimal data integration processes between divisions. These issues arise due to cloud computing access being restricted to the company’s internal internet network, hindering the exchange of information between divisions and leading to inefficient decision-making. To address these challenges, a comprehensive cloud computing design using the ROCCA (Roadmap for Cloud Computing Adoption) method is necessary. This method provides a structured workflow and clear stages in the design process. The resulting design will be developed into a prototype for use by internal company parties to facilitate data integration. The study’s findings indicate that the application of the ROCCA method effectively enhances the efficiency of personal data storage systems, improves data security, facilitates data access and sharing across divisions, and minimizes the risk of data loss. 

References

Ahmad, I., & Gani, A. (2019). Big data analytics in cloud computing: an overview. Journal of Cloud Computing, 8(1), 1-24. https://doi.org/10.1186/s13677-019-0136-1

Al-Ruithe, M., Benkhelifa, E., & Hameed, K. (2018). A systematic literature review of data governance and cloud data governance. Personal and Ubiquitous Computing, 22, 835-849. https://doi.org/10.1007/s00779-018-1155-6

Benaloh, J., Chase, M., Horvitz, E., Lauter, K., & Rane, S. (2021). On Privacy-Preserving Content Analysis of Encrypted Cloud Data. IEEE Cloud Computing, 8(4), 34-42. https://doi.org/10.1109/MCC.2021.3088861

Božić, A., & Batko, R. (2019). Cloud computing adoption issues in enterprises. Journal of Systems and Software, 150, 180-193. https://doi.org/10.1016/j.jss.2018.11.006

Chandrasekaran, K., & Eswaran, P. (2020). Big data analytics and cloud computing: Concepts, approaches, and challenges. Journal of Cloud Computing, 9(1), 1-22. https://doi.org/10.1186/s13677-020-00205-8

Chard, K., Bubendorfer, K., & Caton, S. (2020). Social cloud computing: A vision for socially motivated resource sharing. IEEE Transactions on Services Computing, 13(4), 727-739. https://doi.org/10.1109/TSC.2018.2812654

Dimitrov, D., Atanasova, T., Nikolov, G., & Delchev, V. (2019). Cloud data management using blockchain technology. Future Generation Computer Systems, 100, 67-77. https://doi.org/10.1016/j.future.2019.04.004

Gholami, M. F., Yousefi, S., & Jedari, E. (2020). Cloud data integration techniques: A survey. Journal of Network and Computer Applications, 153, 102-117. https://doi.org/10.1016/j.jnca.2020.102117

Habibzadeh, H., Song, H., & Han, Z. (2020). A Survey of Attack and Defense Techniques for On-Demand Cloud Data Centers. IEEE Access, 8, 71614-71631. https://doi.org/10.1109/ACCESS.2020.2987924

Hameed, K., Al-Ruithe, M., & Benkhelifa, E. (2017). A survey of cloud computing adoption in organizations: A roadmap for cloud computing adoption using ROCCA model. Procedia Computer Science, 113, 645-650. https://doi.org/10.1016/j.procs.2017.08.369

Kholidy, H. A., & Erradi, A. (2019). Cloud computing security and privacy: Taxonomy, concepts, and open challenges. Future Generation Computer Systems, 101, 422-445. https://doi.org/10.1016/j.future.2019.06.008

Koo, H. Y., & Cho, J. (2017). A Data integration framework for cloud manufacturing. Computers in Industry, 87, 18-30. https://doi.org/10.1016/j.compind.2016.12.005

Li, H., Yang, Y., & Xiong, Z. (2018). Data integration in cloud computing environment: A security perspective. Concurrency and Computation: Practice and Experience, 30(22), e4798. https://doi.org/10.1002/cpe.4798

Rittinghouse, J. W., & Ransome, J. F. (2017). Cloud Computing: Implementation, Management, and Security. CRC Press. https://doi.org/10.1201/b10808

Thakur, G., & Nandi, S. (2018). Cloud computing adoption strategy planning at agricultural central data. Journal of Cloud Computing, 6(1), 7-12. https://doi.org/10.1186/s13677-017-0088-7

Downloads

Published

2024-12-16