Implementation of Secure Shell in Document Sharing Application with TCP/IP-Based Client Server
Kata Kunci:
Client server, Transfer, File sharing, Data security, Secure shellAbstrak
The network laboratory module is being reviewed, in which the author conducted data exchange using a LAN cable system and the operating systems provided by Windows or Linux for document transfer and data transmission. The idea is to create software that will perform document transfer and data reception using a sharing medium. The aim is to simplify the process for computer users to send and receive transferred documents. The advantage of client-server software for uploading images and sharing images, documents, and data such as documents and other files is that a flash drive is no longer needed to transfer data, which could potentially contain viruses that could damage the data on the user's computer. Data security is enhanced through secure shell (SSH) connection settings for computers connected via a local area network (LAN). Document sharing security utilises SSH, a cryptographic network protocol designed to securely operate network services over insecure networks that could otherwise endanger data stored on the sender's or recipient's computer.
Referensi
G. Nyabuto, “Client-server Architecture, a Review,” International Journal of Advanced Science and Computer Applications, vol. 3, no. 2, Jan. 2024, doi: 10.47679/IJASCA.V3I1.48.
Y. Klushyn, “Specialized Software Platform for Analysis of Information in Data Stores,” Computer systems and network, vol. 6, no. 2, pp. 93–106, Dec. 2024, doi: 10.23939/CSN2024.02.093.
S. M. Prasetiyo and Y. Asri, “Implementation of File Sharing and Remote Desktop Connection (RDC) by Utilizing Local Area Network (LAN),” Jurnal Inotera, vol. 9, no. 2, pp. 314–322, Aug. 2024, doi: 10.31572/INOTERA.VOL9.ISS2.2024.ID366.
D. A. J. Al-Khaffaf and M. G. Al-Hamiri, “Performance evaluation of campus network involving VLAN and broadband multimedia wireless networks using OPNET modeler,” TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 19, no. 5, pp. 1490–1497, Oct. 2021, doi: 10.12928/TELKOMNIKA.V19I5.18531.
K. J, N. J.N, S. K.O, I. M. E, and I. N. E, “Optimizing Local Area Network Performance: Insight from Riverbed Modelling,” Journal of Engineering Research and Reports, vol. 26, no. 6, pp. 212–222, May 2024, doi: 10.9734/JERR/2024/V26I61175.
R. K. Rithvik and A. Mohan, “Fingerprint Password Method Provides Improved Accuracy over Token-based Authentication for Efficient and Secure File Transfers,” E3S Web of Conferences, vol. 491, p. 04023, Feb. 2024, doi: 10.1051/E3SCONF/202449104023.
admin admin and R. Al King, “Data Security in Cloud Computing,” International Journal of Wireless and Ad Hoc Communication, vol. 7, no. 1, pp. 50–61, 2023, doi: 10.54216/IJWAC.070105.
P. Raja, S. Reddy, and K. Ravindranath, “Enhancing Secure and Reliable Data Transfer through Robust Integrity,” Journal of Electrical Systems, vol. 20, no. 1s, pp. 900–910, Mar. 2024, doi: 10.52783/JES.841.
E. Irmak, E. Kabalci, and Y. Kabalci, “Digital Transformation of Microgrids: A Review of Design, Operation, Optimization, and Cybersecurity,” Energies 2023, Vol. 16, Page 4590, vol. 16, no. 12, p. 4590, Jun. 2023, doi: 10.3390/EN16124590.
P. M. Datta and T. Acton, “Did a USB drive disrupt a nuclear program? A Defense in Depth (DiD) teaching case,” Journal of Information Technology Teaching Cases, vol. 14, no. 2, pp. 311–321, Nov. 2024, doi: 10.1177/20438869231200284;PAGE:STRING:ARTICLE/CHAPTER.
P. Weichbroth, K. Wereszko, H. Anacka, and J. Kowal, “Security of Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments,” Sensors 2023, Vol. 23, Page 3155, vol. 23, no. 6, p. 3155, Mar. 2023, doi: 10.3390/S23063155.
R. Spolaor, H. Liu, F. Turrin, M. Conti, and X. Cheng, “Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel,” Proceedings - IEEE INFOCOM, vol. 2023-May, 2023, doi: 10.1109/INFOCOM53939.2023.10229048.
Hadya. S. Hawedi, O. A. Bentaher, and K. E. I. Abodhir, “REMOTE ACCESS TO A ROUTER SECURELY USING SSH,” Journal of the Academic Forum, vol. 5, no. 1, pp. 174–189, Jan. 2021, doi: 10.59743/JAF.V5I1.177.
H. Touil, F. Hdioud, N. E. L. Akkad, and K. Satori, “The Security of SSH Protocol Public Key Sharing in the Post-Quantum Era,” International Journal of Computing, vol. 23, no. 3, pp. 317–323, Oct. 2024, doi: 10.47839/IJC.23.3.3650.
F. Boito, G. Pallez, and L. Teylo, “The role of storage target allocation in applications’ I/O performance with BeeGFS,” Proceedings - IEEE International Conference on Cluster Computing, ICCC, vol. 2022-September, pp. 267–277, 2022, doi: 10.1109/CLUSTER51413.2022.00039.
A. Pourhabibi, M. Sutherland, A. Daglis, and B. Falsafi, “Cerebros: Evading the RPC tax in datacenters,” Proceedings of the Annual International Symposium on Microarchitecture, MICRO, pp. 407–420, Oct. 2021, doi: 10.1145/3466752.3480055;CSUBTYPE:STRING:CONFERENCE.
P. File Sharing Terpusat Menggunakan Samba Server Pada Kantor Kecamatan Ratu Samban, R. Fachruddin, and E. Prasetiyo Rohmawan, “Penerapan File Sharing Terpusat Menggunakan Samba Server Pada Kantor Kecamatan Ratu Samban,” JURNAL MEDIA INFOTAMA, vol. 18, no. 2, pp. 197–207, Oct. 2022, doi: 10.37676/JMI.V18I2.2657.
H. W. Sulistyo and H. Oktavianto, “Perancangan dan Implementasi File Sharing menggunakan Samba Server,” Jurnal Aplikasi Sistem Informasi dan Elektronika, vol. 2, no. 1, pp. 24–30, Jul. 2020, doi: 10.32528/JASIE.V2I1.4039.
Unduhan
Diterbitkan
Terbitan
Bagian
Lisensi
Hak Cipta (c) 2025 Journal of Technology and Computer

Artikel ini berlisensi Creative Commons Attribution 4.0 International License.