Main Article Content

Abstract

The implementation of a cloud storage server based on SFTPGo allows users to access and manage file storage via WebGUI and SFTP clients. This study aims to develop a secure and easily accessible cloud storage system using Docker and Cloudflare Tunnel technology. The system is implemented on a Linux-based server and tested in various scenarios to ensure the reliability of WebGUI access and connectivity via the SFTP protocol. The implementation results show that the combination of SFTPGo, Docker, and Cloudflare Tunnel provides a flexible and secure storage environment. With this mechanism, users can upload and download files using predefined credentials, while ensuring that SFTP access is only possible through Cloudflare Tunnel, enhancing system security.

Keywords

Cloudflare Tunnel, Cloud Storage, Docker, SFTP, SFTPGo, WebGUI

Article Details

How to Cite
Bahalwan, Z. A., & Febriawan, D. (2025). Implementasi Server Cloud Storage Menggunakan SFTPGo, Docker, dan Cloudflare Tunnel. Jurnal Teknik Informatika Dan Komputer, 4(2), 71–76. https://doi.org/10.22236/jutikom.v4i2.18610

References

  1. Erlangga, E., Wahyudin, W., & Wihardi, Y. (2022). Pengembangan Framework Smart Mobile Cloud Learning System Untuk Pendidikan Pembelajaran Cerdas Menuju Smart Learning Environment. INFORMATION SYSTEM FOR EDUCATORS AND PROFESSIONALS : Journal of Information System, 6(2), 117. https://doi.org/10.51211/isbi.v6i2.1773
  2. Gupta, S., & Saini, A. K. (2017). Modeling Trust Based Risk Management in Cloud Adoption using Fuzzy Inference System. International Journal of Technology Diffusion, 8(1), 52–60. https://doi.org/10.4018/IJTD.2017010104
  3. Huang, L. N., & Liu, F. H. (2013). Data Storage Technology and its Development Based on Cloud Computing. Advanced Materials Research, 756–759, 1275–1279. https://doi.org/10.4028/www.scientific.net/AMR.756-759.1275
  4. Lim, M. (2020). C2CFTP: Direct and Indirect File Transfer Protocols Between Clients in Client-Server Architecture. IEEE Access, 8, 102833–102845. https://doi.org/10.1109/ACCESS.2020.2998725
  5. Malvi, A., & Painem, P. (2020). Pengamanan File Gambar pada Media Video dengan Kriptografi Algoritma RSA dan Steganografi Algoritma End of File (EOF). Informatik : Jurnal Ilmu Komputer, 16(2), 67. https://doi.org/10.52958/iftk.v16i2.1860
  6. Pawitra, I. G. N. Y., Hartati, R. S., & Divayana, Y. (2020). Rancang Bangun Aplikasi File Transfer Menggunakan Library ZeroMQ. Majalah Ilmiah Teknologi Elektro, 19(1), 55. https://doi.org/10.24843/MITE.2020.v19i01.P08
  7. Poshtkohi, A., & Ghaznavi-Ghoushchi, M. B. (2012). The xDotGrid native, cross-platform, high-performance xDFS file transfer framework. Computers & Electrical Engineering, 38(6), 1409–1432. https://doi.org/10.1016/j.compeleceng.2012.04.007
  8. Purwantoro E.S.G.S, S. (2022). Perbandingan Kinerja Clustered File System pada Cloud Storage menggunakan GlusterFS dan Ceph. INOVTEK Polbeng - Seri Informatika, 7(2), 319. https://doi.org/10.35314/isi.v7i2.2753
  9. Rachmawanto, E. H., & Sari, C. A. (2022). Gabungan Advanced Encryption Standard Dan Vigenere Cipher Untuk Pengamanan Dokumen Digital. Jurnal Informatika Polinema, 8(4), 1–8. https://doi.org/10.33795/jip.v8i4.996
  10. Robbi, F. A. A., Prasetijo, A. B., & Widianto, E. D. (2019). Perbandingan Kinerja Block Storage Ceph dan ZFS di Lingkungan Virtual. Jurnal Teknologi Dan Sistem Komputer, 7(1), 7–11. https://doi.org/10.14710/jtsiskom.7.1.2019.7-11
  11. Setiawan, S., & Gui, A. (2023). Faktor-Faktor Penentu Yang Mempengaruhi Adopsi Cloud Computing Di Indonesia. Infotech: Journal of Technology Information, 9(1), 1–8. https://doi.org/10.37365/jti.v9i1.144
  12. Sudetlin, S., Natasha, N. D., & Darusalam, U. (2018). Pemanfaatan Private Cloud Storage Berbasis Infrastructure As A Service (IAAS). JOINTECS (Journal of Information Technology and Computer Science), 3(1). https://doi.org/10.31328/jointecs.v3i1.497
  13. Suhendar, E. (2022). Tinjauan Sistematis : Implementasi Cloud Computing Terhadap Keamanan Layanan Publik. Smart Comp: Jurnalnya Orang Pintar Komputer, 11(4). https://doi.org/10.30591/smartcomp.v11i4.4245
  14. Wang, H., & Poplett, L. (2019). Developing a Practical Electronic Records Transfer Workflow for Wisconsin Public Records. Archival Issues, 40(1). https://doi.org/10.31274/archivalissues.11086
  15. Wang, X., & Wang, H. (2015). Research on Digital Library Based on Cloud Computing. https://doi.org/10.2991/iiicec-15.2015.326
  16. Yang, X., Shen, Q., Yang, Y., & Qing, S. (2011). A Way of Key Management in Cloud Storage Based on Trusted Computing (pp. 135–145). https://doi.org/10.1007/978-3-642-24403-2_11
  17. Zhu, H., Wu, L., Huang, K., & Zhou, Z. (2016). Research on Methods for Discovering and Selecting Cloud Infrastructure Services Based on Feature Modeling. Mathematical Problems in Engineering, 2016, 1–19. https://doi.org/10.1155/2016/8194832