IMPLEMENTASI PROTONVPN UNTUK PENINGKATAN KEAMANAN AKSES ONEDRIVE PADA SISTEM OPERASI WINDOWS
DOI:
https://doi.org/10.69714/wf1ema03Keywords:
Cloud Computing, Data Security, ProtonVPN, Traffic EncryptionAbstract
As reliance on cloud computing for data management grows, the issue of user data security when accessing services via public networks is a critical concern. This study investigates the implementation of the free-tier version of ProtonVPN on the Windows operating system as a mechanism to reinforce secure access to cloud platforms. ProtonVPN was selected for its offered high-level cryptographic protocols, user-friendly nature, and zero-cost availability. The methodology involved installation, connection configuration, and access testing on major cloud platforms (Google Drive and OneDrive). Results show that using the VPN effectively obfuscates the user's IP address and secures data traffic through encryption, significantly enhancing protection when interacting with cloud services. Despite limitations such as reduced speed performance and limited server choices, this solution proves efficient in elevating the security posture of cloud computing access on Windows devices.
References
R. M. Pratama, S. Wahyuni, and A. Lubis, “Rancang Bangun Keamanan Koneksi Pribadi Melalui Open VPN Berbasis Cloud,” INTECOMS J. Inf. Technol. Comput. Sci., vol. 6, no. 1, pp. 30–35, 2023, doi: 10.31539/intecoms.v6i1.5368.
R. Gupta, D. Saxena, and A. K. Singh, “Data Security and Privacy in Cloud Computing: Concepts and Emerging Trends,” 2021, [Online]. Available: http://arxiv.org/abs/2108.09508
M. Armbrust et al., “A view of cloud computing,” Commun. ACM, vol. 53, no. 4, pp. 50–58, 2010, doi: 10.1145/1721654.1721672.
S. M. Zohaib, S. M. Sajjad, Z. Iqbal, M. Yousaf, M. Haseeb, and Z. Muhammad, “Zero Trust VPN (ZT-VPN): A Systematic Literature Review and Cybersecurity Framework for Hybrid and Remote Work,” Inf., vol. 15, no. 11, 2024, doi: 10.3390/info15110734.
J. Anyam, R. R. Singh, H. Larijani, and A. Philip, “Empirical Performance Analysis of WireGuard vs. OpenVPN in Cloud and Virtualised Environments Under Simulated Network Conditions,” Computers, vol. 14, no. 8, 2025, doi: 10.3390/computers14080326.
S. Sutejo, “Implementasi Algoritma Kriptografi Rsa (Rivest Shamir Adleman) Untuk Keamanan Data Rekam Medis Pasien,” INTECOMS J. Inf. Technol. Comput. Sci., vol. 4, no. 1, pp. 104–114, 2021, doi: 10.31539/intecoms.v4i1.2437.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Jurnal Riset Sistem Informasi

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.







