Please use this identifier to cite or link to this item: http://repository.ipb.ac.id/handle/123456789/56069
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorNeyman, Shelvie Nidya
dc.contributor.authorRendy
dc.date.accessioned2012-07-25T06:44:14Z
dc.date.available2012-07-25T06:44:14Z
dc.date.issued2012
dc.identifier.urihttp://repository.ipb.ac.id/handle/123456789/56069
dc.description.abstractGeographic Information System (GIS) is an important part of information systems because GIS contains classified spatial data and information in any fields. This research is focused on securing GIS vector data (shapefiles) and also reading the shapefiles. A shapefile combines maps and tables, both have a related information on each other. The usage of Rijndael (AES) cryptography algorithm and Key Derivation Function (KDF) would assist in improving the security of shapefiles. However, besides cryptography algorithm, authentication service is also implemented to improve the security mechanism in order to prevent unauthorized users gain full access to the application which provides the shapefile security. The application was executed using fifteen shapefiles and analyzed in terms of loading time, size, and iteration count between the encrypted and non-encrypted shapefiles. The biggest shapefile (33.79 MB) could be decrypted and displayed in two seconds with 10000 iterations (ten times in complexity from the standard iteration, which is 1000) and fifteen characters of salt. By using this application, authorized users could read their shapefiles with common functions (zoom, extent, pan, etc) and protect the classified one with no penalty in overall performance.en
dc.subjectBogor Agricultural University (IPB)en
dc.subjectshapefile.en
dc.subjectspatial dataen
dc.subjectcryptographyen
dc.subjectGeographic Information Systems (GIS)en
dc.titleAplikasi Keamanan Data Shapefile Menggunakan Algoritme Kriptografi AESen
Appears in Collections:UT - Computer Science

Files in This Item:
File Description SizeFormat 
G12ren.pdf
  Restricted Access
Full text1.15 MBAdobe PDFView/Open
G12ren_Abstrak.pdf
  Restricted Access
Abstrak453.34 kBAdobe PDFView/Open
G12ren_BAB I Pendahuluan.pdf
  Restricted Access
BAB I498.25 kBAdobe PDFView/Open
G12ren_BAB II Tinjauan Pustaka.pdf
  Restricted Access
BAB II703.69 kBAdobe PDFView/Open
G12ren_BAB III Metode Penelitian.pdf
  Restricted Access
BAB III555.85 kBAdobe PDFView/Open
G12ren_BAB IV Hasil dan Pembahasan.pdf
  Restricted Access
BAB IV943.39 kBAdobe PDFView/Open
G12ren_BAB V kesimpulan dan Saran.pdf
  Restricted Access
BAB V477.96 kBAdobe PDFView/Open
G12ren_Cover.pdf
  Restricted Access
Cover543.85 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.