KONSEP ATTRIBUTE BASED ACCESS CONTROL (ABAC) PADA LEMARI PENYIMPANAN BUKTI DIGITAL (LPBD)

Moh Fadly Panende, Imam Riadi, Yudi Prayudi

Abstract


Abstract

An important factor of the investigation into cybercrime cases is the case relating to the evidence found. Electronic evidence and digital evidence found in criminal cases should be maintained from the outset, to be held accountable for justice. Sistem digital evidence storage cabinets (LPBD) is one solution to overcome the management of digital evidence is based on digital evidence cabinet (DEC), only the system is not equipped with a good access control model. The LPBD system needs to be built not only on the issue of digital evidence management, but other important components in the digital proof storage cabinet itself, access arrangements, so that the scheme or the design of access control policies on LPBD is very important. The access controls used on previous LPBDs are only done by authentication mechanisms and User authorization mechanisms, no other more complex parameters to support requests made on LPBD systems. In the absence of a good access control model design scheme for LPBD, it is necessary to design an access control policy model using the attribute-based access control approach (ABAC) because ABAC is a more flexible access control model in the application of attributes to users , and the. XACML hierarchy can support control requirements access used in digital evidence storage cabinets (LPBD).

 

ABSTRAK

Faktor penting dalam proses investigasi sebuah kasus cybercrime yaitu hal yang terkait dengan barang bukti yang ditemukan. Bukti elektronik maupun bukti digital yang ditemukan dalam sebuah kasus kejahatan harus tetap terjaga keasliannya, untuk dapat dipertanggung jawabkan dipengadilan. Sistem lemari penyimpanan bukti digital (LPBD) menjadi salah satu solusi untuk permasalahan manajemen bukti digital ini yang berdasar pada digital evidence cabinet (DEC), hanya saja sistem tersebut belum dilengkapi dengan model access control yang baik. Sistem LPBD seharusnya dibuat tidak hanya berdasar pada permasalahan-permasalahan tentang manajemen bukti digital saja, akan tetapi komponen-komponen penting lainnya dalam lemari penyimpanan bukti digital itu sendiri yaitu pengaturan aksesnya, sehingga skema atau desain access control policy terhadap LPBD menjadi sangat penting. Access control yang gunakan terhadap LPBD sebelumnya dibuat hanya dengan mekanisme authefikasi dan authorisasi user saja, tidak adanya parameter lain yang lebih kompleks untuk mendukung  sebuah request yang dilakukan pada sistem LPBD. Mengingat belum adanya skema rancangan model access control yang baik pada LPBD ini, maka perlu dilakukan perancangan model access control policy menggunakan pendekatan attribute based access control (ABAC) karena ABAC merupakan model access control yang lebih fleksibel dalam penerapan attribute terhadap user, dan hierarchy XACML yang dapat mendukung kebutuhan-kebutuhan access control yang digunakan pada lemari penyimpanan bukti digital (LPBD).

How To Cite : Panende, M.F, Prayudi, Y. Riadi, I. (2018). KONSEP ATTRIBUTE BASED ACCESS CONTROL (ABAC) PADA LEMARI PENYIMPANAN BUKTI DIGITAL (LPBD). Jurnal Teknik Informatika, 11(1), 85-94.  doi 10.15408/jti.v11i1.7220

Permalink/DOI: http://dx.doi.org/10.15408/jti.v11i1.7220

 


Keywords


ABAC, XACML, LPBD

Full Text:

PDF

References


Hu, Vincent C. et al. 2014. “Guide to Attribute Based Access Control (Abac) Definition and Considerations.” NIST Special Publication 800:162.

Kannan, A. and A. A. Abd El-Aziz. 2013. “A Comprehensive Presentation to XACML.” Third International Conference on Computational Intelligence and Information Technology (CIIT 2013) 155–61. Retrieved (http://digitallibrary.theiet.org/content/conferences/10.1049/cp.2013.2585).

Prayudi, Yudi. 2014. “PROBLEMA DAN SOLUSI DIGITAL CHAIN OF CUSTODY Yudi Prayudi Abstract.” Seminar Nasional Sains Dan Teknologi Informasi (2011).

Prayudi, Yudi and Ahmad Ashari. 2014. “Digital Evidence Cabinets : A Proposed Framework for Handling Digital Chain of Custody.” (9):30–36.Prayudi, Yudi and Tri K. Priyambodo. 2015. “Secure and Trusted Environment as a Strategy to Maintain the Integrity and Authenticity of Digital Evidence.” 299–314.

Priebe, Torsten, Wolfgang Dobmeier, Christian Schläger, and Nora Kamprath. 2007.“Supporting Attribute-Based Access Control in Authorization and Authentication Infrastructures with Ontologies.” Journal of Software 2(1):27–38.

Sandhu, Ravi. 2010. “Security Models : Past , Present and Future.” (August):1–28.Stallings, William and Lawrie Brown. 2015. Computer Security : Principles and Practice. 3rd Editio. USA: Pearson Education International.

Widatama, Krisna. 2017. “Konsep Lemari Penyimpanan Bukti Digital Menggunakan Struktur Bahasa XML.” Seminar Nasional Informatika Dan Aplikasinya Ke-3 Dengan tema “Digital Evidence and Computer Crime” 23.

Younis, Younis A., Kashif Kifayat, Madjid Merabti, and DUMMY. 2013. “An Access Control Model for Cloud Computing Environments.” Proceedings - 2nd International Conference on Advanced Computing, Networking and Security, ADCONS 2013 19(1):226–31.

Sumber Internet

Data Polda Metro Jaya, Kasus Kejahatan Cyber Terjadi di Jakarta Selama 2016, sumber https://kami.kominfo.go.id/detailpost/1-207-kejahatan-cyber-terjadi-di-jakarta-selama-2016 diakses 05, November 2017.




DOI: https://doi.org/10.15408/jti.v11i1.7220 Abstract - 0 PDF - 0

Refbacks

  • There are currently no refbacks.


Copyright (c) 2018 Moh Fadly Panende, Imam Riadi, Yudi Prayudi

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

3rd Floor, Dept. of Informatics, Faculty of Science and Technology, UIN Syarif Hidayatullah Jakarta
Jl. Ir. H. Juanda No.95, Cempaka Putih, Ciputat Timur.
Kota Tangerang Selatan, Banten 15412
Tlp/Fax: +62 21 74019 25/ +62 749 3315
Handphone: +62 8128947537
E-mail: jurnal-ti@apps.uinjkt.ac.id


Creative Commons Licence
Jurnal Teknik Informatika by Prodi Teknik Informatika Universitas Islam Negeri Syarif Hidayatullah Jakarta is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Based on a work at http://journal.uinjkt.ac.id/index.php/ti.

JTI Visitor Counter: View JTI Stats

 Flag Counter