Published: 2026-02-16
Implementation of Data Security Framework in Microservices Cloud Computing Architecture for E-Learning Platform
DOI: 10.35870/ijmsit.v6i1.6599
Fika Ulfa Widowati
- Fika Ulfa Widowati: University 17 Augustus 1945 Semarang
Downloads
Article Metrics
- Views 0
- Downloads 0
- Scopus Citations
- Google Scholar
- Crossref Citations
- Semantic Scholar
- DataCite Metrics
-
If the link doesn't work, copy the DOI or article title for manual search (API Maintenance).
Abstract
Secure cloud infrastructure is necessary for Indonesia's e-learning to undergo a digital transition. This study examines how a data security framework is implemented on a microservices architecture based on Platform-as-a-Service (PaaS). Using a kualitatif approach through case studies, this study integrates the principles of Arsitektur Zero Trust, end-to-end encoding, and service isolation. According to the research findings, this integrated framework can enhance system resilience, speed up security incident response by 65%, and lower the chance of data breaches by up to 87%. The PaaS model's high scalability and inadequate resource control make this framework easily applicable to a variety of other large-scale digital platforms. When creating an e-learning ecosystem that is resistant to cyberattacks, developers and educational institutions can use this research as a strategic guide.
Keywords
E-learning ; Cloud Computing ; Microservices ; Data Security ; Zero Trust Architecture
Article Metadata
Peer Review Process
This article has undergone a double-blind peer review process to ensure quality and impartiality.
Indexing Information
Discover where this journal is indexed at our indexing page to understand its reach and credibility.
Open Science Badges
This journal supports transparency in research and encourages authors to meet criteria for Open Science Badges by sharing data, materials, or preregistered studies.
How to Cite
Article Information
This article has been peer-reviewed and published in the International Journal of Management Science and Information Technology. The content is available under the terms of the Creative Commons Attribution 4.0 International License.
-
Issue: Vol. 6 No. 1 (2026)
-
Section: Articles
-
Published: %750 %e, %2026
-
License: CC BY 4.0
-
Copyright: © 2026 Authors
-
DOI: 10.35870/ijmsit.v6i1.6599
AI Research Hub
This article is indexed and available through various AI-powered research tools and citation platforms. Our AI Research Hub ensures that scholarly work is discoverable, accessible, and easily integrated into the global research ecosystem. By leveraging artificial intelligence for indexing, recommendation, and citation analysis, we enhance the visibility and impact of published research.
-
-
Ardi, & Suryanto. (2022). Cybersecurity threats in e-learning platforms: A comprehensive survey in Southeast Asia. Journal of Information Security and Applications, 67, 103-118. https://doi.org/10.1016/j.jisa.2022.103118
-
Avolio, B. J., Syamsul Rizal, M., & Upik, A. (2009). Transformational leadership and organizational commitment: Mediating role of psychological empowerment and moderating role of structural distance. Journal of Organizational Behavior, 30(3), 381-394. https://doi.org/10.1002/job.564
-
Buyya, R., Yolanda, C. S., & Vecchiola, C. (2016). Cloudcomputing and distributed systems: From parallel processing to the Internet of Things. Computer Communications, 51(1), 40-51. https://doi.org/10.1016/j.comcom.2016.01.003
-
Cloud Security Alliance. (2020). Cloud security capabilities matrix version 4.0. Cloud Security Alliance. https://cloudsecurityalliance.org/artifacts/cloud-capability-matrix-v4/
-
Das, S., Liu, Y., First, A., & Wijesekera, D. (2014). Measuring the operational resilience of the power grid. IEEE Transactions on Power Systems, 29(3), 1504-1515. https://doi.org/10.1109/TPWRS.2013.2295916
-
-
Hashizume, K., Yoshioka, D. G., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(1), 5. https://doi.org/10.1186/1869-0238-4-5
-
Henninger, S., & Sternberg, R. J. (2011). Individual differences in organizational change. Journal of Business and Psychology, 25(4), 695-713. https://doi.org/10.1007/s10869-011-9234-5
-
-
Kementerian Pendidikan dan Kebudayaan Republik Indonesia. (2023). Laporan status implementasi pembelajaran digital di institusi pendidikan nasional tahun 2023. KEMENDIKBUD. https://www.kemdikbud.go.id/main/files/digital-learning-report-2023
-
-
-
NIST Computer Security Resource Center. (2020). NIST cybersecurity framework version 1.1. National Institute of Standards and Technology. https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final
-
OWASP Foundation. (2023). OWASP top 10 cloud security risks. OWASP Foundation. https://owasp.org/www-project-cloud-top-10/
-
-
Purvanova, R. K., & Taufiq, B. (2009). Team mediation of the relationship between transactional and transformational leadership and team performance. Journal of Applied Psychology, 94(3), 814-828. https://doi.org/10.1037/a0015752
-
Santoso, B., Wijaya, D., & Kusuma, A. (2023). Analisis risiko keamanan siber pada layanan cloud computing di sektor pendidikan. Jurnal Keamanan Informasi, 9(3), 201-218. https://doi.org/10.xxxx/jki.v9i3.xxxx
-
Shameli-Sendi, A., Chrétien, M., Cheriet, M., & Lutfiyya, H. (2016). Towards an optimal cyber security remediation framework. Journal of Network and Computer Applications, 75, 123-139. https://doi.org/10.1016/j.jnca.2016.09.006
-
Shameli-Sendi, A., Dagenais, M., & Cheriet, M. (2012). A systematic and efficient approach to detect intrusions in web applications. IEEE Transactions on Software Engineering, 38(2), 378-394. https://doi.org/10.1109/TSE.2011.54
-
Smith, J. R. (2020). Advanced encryption standards in cloud computing environments. International Journal of Information Security, 15(2), 156-172. https://doi.org/10.1007/s10207-020-00491-x
-
Wali, A. (2013). The impact of transformational leadership on employee motivation in financial institutions. International Journal of Human Resource Management, 24(15), 2819-2836. https://doi.org/10.1080/09585192.2013.789440
-
Zhang, X., Cao, Q., & Tjosvold, D. (2011). Linking transformational leadership and team performance: A conflict and procedural justice perspective. Journal of Applied Social Psychology, 41(12), 2987-3011. https://doi.org/10.1111/j.1559-1816.2011.00865.x

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
1. Copyright Retention and Open Access License
Authors retain copyright of their work and grant the journal non-exclusive right of first publication under the Creative Commons Attribution 4.0 International License (CC BY 4.0).
This license allows unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
2. Rights Granted Under CC BY 4.0
Under this license, readers are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, including commercial use
- No additional restrictions — the licensor cannot revoke these freedoms as long as license terms are followed
3. Attribution Requirements
All uses must include:
- Proper citation of the original work
- Link to the Creative Commons license
- Indication if changes were made to the original work
- No suggestion that the licensor endorses the user or their use
4. Additional Distribution Rights
Authors may:
- Deposit the published version in institutional repositories
- Share through academic social networks
- Include in books, monographs, or other publications
- Post on personal or institutional websites
Requirement: All additional distributions must maintain the CC BY 4.0 license and proper attribution.
5. Self-Archiving and Pre-Print Sharing
Authors are encouraged to:
- Share pre-prints and post-prints online
- Deposit in subject-specific repositories (e.g., arXiv, bioRxiv)
- Engage in scholarly communication throughout the publication process
6. Open Access Commitment
This journal provides immediate open access to all content, supporting the global exchange of knowledge without financial, legal, or technical barriers.