Covid-19: Digital Signature Impact on Higher Education Motivation Performance

Untung Rahardja(1*), Sudaryono Sudaryono(2), Nuke Puji Lestari Santoso(3), Adam Faturahman(4), Qurotul Aini(5),


(1) Universitas Raharja
(2) Universitas Raharja
(3) Universitas Raharja
(4) Universitas Raharja
(5) Universitas Raharja
(*) Corresponding Author

Abstract


At present, the process of validating documents for certain purposes cannot be done face-to-face because of the Covid-19 pandemic. Therefore, this research aims to maximize the existence of smart digital signature technology that guarantees its safety and validity without having to meet face to face. Encrypted digital signatures with RSA-SHA256 with cloud storage features that can share documents. The waterfall method for building systems, the collection of data generated for analysis by observation, and online questionnaires using Google Form.  Based on the characteristics of the system, the satisfaction factor analysis of the system with the Slovin formula processed by the SUS score resulted in a score of 95 > 70. The final result of this study is that the digital signature system has a significant impact on increasing motivation to facilitate authorization and secure documents.


Keywords


Digital Signature, Cloud Storage, Motivation, Covid-19

Article Metrics

Abstract view : 517 times

References


T. Singhal, "A Review of Coronavirus Disease-2019 (COVID-19)", The Indian Journal of Pediatrics, vol. 87, no. 4, pp. 281-286, 2020. Available: 10.1007/s12098-020-03263-6.

J. Hopman, B. Allegranzi and S. Mehtar, "Managing COVID-19 in Low- and Middle-Income Countries", JAMA, vol. 323, no. 16, p. 1549, 2020. Available: 10.1001/jama.2020.4169.

Kementerian Kesehatan Republik Indonesia. Pedoman Pencegahan dan Pengendalian Corona Virus Diaseases (COVID-19). 2020.

E. Mahase, "Covid-19: WHO declares pandemic because of “alarming levels” of spread, severity, and inaction", BMJ, p. m1036, 2020. Available: 10.1136/bmj.m1036.

A. Asyary and M. Veruswati, "Sunlight exposure increased Covid-19 recovery rates: A study in the central pandemic area of Indonesia", Science of The Total Environment, vol. 729, p. 139016, 2020. Available: 10.1016/j.scitotenv.2020.139016.

T. Hariguna, U. Rahardja, Q. Aini, and Nurfaizah, “Effect of social media activities to determinants public participate intention of e-government,” Procedia Comput. Sci., vol. 161, pp. 233–241, 2019, doi: 10.1016/j.procs.2019.11.119.

A. Haleem, M. Javaid and R. Vaishya, "Industry 4.0 and its applications in orthopaedics", Journal of Clinical Orthopaedics and Trauma, vol. 10, no. 3, pp. 615-616, 2019. Available: 10.1016/j.jcot.2018.09.015.

Y. Liao, F. Deschamps, E. Loures and L. Ramos, "Past, present and future of Industry 4.0 - a systematic literature review and research agenda proposal", International Journal of Production Research, vol. 55, no. 12, pp. 3609-3629, 2017. Available: 10.1080/00207543.2017.1308576.

Sudaryono, U. Rahardja, and E. P. Harahap, “Implementation of Information Planning and Strategies Industrial Technology 4.0 to Improve Business Intelligence Performance on Official Site APTISI,” J. Phys. Conf. Ser., vol. 1179, no. 1, pp. 0–7, 2019, doi: 10.1088/1742-6596/1179/1/012111.

Q. Aini, N. Lutfiani, F. Hanafi, and U. Rahardja, “Application of Blockchain Technology for iLearning Student Assessment,” IJCCS (Indonesian J. Comput. Cybern. Syst., vol. 14, no. 2, 2020, doi: 10.22146/ijccs.53109.

R. Chick et al., "Using Technology to Maintain the Education of Residents During the COVID-19 Pandemic", Journal of Surgical Education, 2020. Available: 10.1016/j.jsurg.2020.03.018.

Q. Aini, U. Rahardja, and A. Khoirunisa, “Blockchain Technology into Gamification on Education,” IJCCS (Indonesian J. Comput. Cybern. Syst., vol. 14, no. 2, pp. 1–10, 2020, doi: 10.22146/ijccs.53221.

M. Javaid, A. Haleem, R. Vaishya, S. Bahl, R. Suman and A. Vaish, "Industry 4.0 technologies and their applications in fighting COVID-19 pandemic", Diabetes & Metabolic Syndrome: Clinical Research & Reviews, vol. 14, no. 4, pp. 419-422, 2020. Available: 10.1016/j.dsx.2020.04.032.

U. Rahardja, Q. Aini, Y. I. Graha, and M. R. Tangkaw, “Gamification Framework Design of Management Education and Development in Industrial Revolution 4.0,” J. Phys. Conf. Ser., vol. 1364, no. 1, pp. 0–13, 2019, doi: 10.1088/1742-6596/1364/1/012035.

Stallings W. Cryptography and network security: principles and practice, 4th ed.Englewood Cliffs, NJ: Prentice-Hall; 2005.

Z. Sann, T. Soe, K. Knin and Z. Win, "Performance Comparison of Asymmetric Cryptography (Case study- Mail message)", APTIKOM Journal on Computer Science and Information Technologies, vol. 4, no. 3, pp. 105-111, 2019. Available: 10.11591/aptikom.j.csit.147.

H. Wang, H. Qin, M. Zhao, X. Wei, H. Shen and W. Susilo, "Blockchain-based fair payment smart contract for public cloud storage auditing", Information Sciences, vol. 519, pp. 348-362, 2020. Available: 10.1016/j.ins.2020.01.051.

J. Chen, H. Zhang, X. Zhou, C. Zhang and Q. Wang, "Practical decoy-state quantum digital signature with optimized parameters", Physica A: Statistical Mechanics and its Applications, vol. 535, p. 122341, 2019. Available: 10.1016/j.physa.2019.122341.

E. Martiri and A. Baxhaku, "Monotone digital signatures: an application in software copy protection", Procedia Technology, vol. 1, pp. 275-279, 2012. Available: 10.1016/j.protcy.2012.02.058.

N. Tiwari, "On the security of pairing-free certificateless digital signature schemes using ECC", ICT Express, vol. 1, no. 2, pp. 94-95, 2015. Available: 10.1016/j.icte.2015.12.001.

V. Bralić, H. Stančić and M. Stengård, "A blockchain approach to digital archiving: digital signature certification chain preservation", Records Management Journal, 2020. Available: 10.1108/rmj-08-2019-0043.

Zhao, M., Li, Z., Zhai, E., Tyson, G., Qian, C., Li, Z., and Zhao, L. 2018. "H2Cloud", Proceedings of the 47th International Conference on Parallel Processing - ICPP 2018 (doi: 10.1145/3225058.3225083).

T. Alam, "Cloud Computing and its role in the Information Technology", IAIC Transactions on Sustainable Digital Innovation (ITSDI), vol. 1, no. 2, pp. 108-115, 2020. Available: 10.34306/itsdi.v1i2.103.

D. M. and M. K., "Implementing Multiprime RSA Algorithm to Enhance the Data Security in Federated Cloud Computing", IJARCCE, vol. 4, no. 4, pp. 647-650, 2015. Available: 10.17148/ijarcce.2015.44149.

D. Piparo, E. Tejedor, P. Mato, L. Mascetti, J. Moscicki and M. Lamanna, "SWAN: A service for interactive analysis in the cloud", Future Generation Computer Systems, vol. 78, pp. 1071-1078, 2018. Available: 10.1016/j.future.2016.11.035.

J. James, R. Karthika and R. Nandakumar, "Design & Characterization of SHA 3- 256 Bit IP Core", Procedia Technology, vol. 24, pp. 918-924, 2016. Available: 10.1016/j.protcy.2016.05.184.

H. Michail, G. Athanasiou, G. Theodoridis, A. Gregoriades and C. Goutis, "Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions’ architectures", Microprocessors and Microsystems, vol. 45, pp. 227-240, 2016. Available: 10.1016/j.micpro.2016.05.011.

I. Algredo-Badillo, C. Feregrino-Uribe, R. Cumplido and M. Morales-Sandoval, "FPGA-based implementation alternatives for the inner loop of the Secure Hash Algorithm SHA-256", Microprocessors and Microsystems, vol. 37, no. 6-7, pp. 750-757, 2013. Available: 10.1016/j.micpro.2012.06.007.

U. Somani, K. Lakhani and M. Mundra, "Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing", 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010), 2010. Available: 10.1109/pdgc.2010.5679895.

E. Febriyanto, U. Rahardja, A. Faturahman and N. Lutfiani, "Sistem Verifikasi Sertifikat Menggunakan Qrcode pada Central Event Information", Techno.Com, vol. 18, no. 1, pp. 50-63, 2019. Available: 10.33633/tc.v18i1.2078.

A. Khalique, K. Singh and S. Sood, "Implementation of Elliptic Curve Digital Signature Algorithm", International Journal of Computer Applications, vol. 2, no. 2, pp. 21-27, 2010. Available: 10.5120/631-876.

M. Kumar and K. Asiwal, "Use of Digital Signature Standard with Station to Station Key Exchange Agreement and Cloud Manager to Enhance Security in Cloud Computing", International Journal of Applied Information Systems, vol. 7, no. 8, pp. 1-5, 2014. Available: 10.5120/ijais14-451218.

S. Lee et al., "Optimization of software development life cycle quality for NPP safety software based on a risk-cost model", Annals of Nuclear Energy, vol. 135, p. 106961, 2020. Available: 10.1016/j.anucene.2019.106961.

L. Hassan, A. Dias and J. Hamari, "How motivational feedback increases user’s benefits and continued use: A study on gamification, quantified-self and social networking", International Journal of Information Management, vol. 46, pp. 151-162, 2019. Available: 10.1016/j.ijinfomgt.2018.12.004.

Hariguna, T., Harahap, E., and Salsabila, S. 2019. "Implementation of Business Intelligence Using Highlights in the YII Framework based Attendance Assessment System", Aptisi Transactions On Technopreneurship (ATT) (1:2), pp. 109-116(doi: 10.34306/att.v1i2.67).

A. Martins, A. Rosa, A. Queirós, A. Silva and N. Rocha, "European Portuguese Validation of the System Usability Scale (SUS)", Procedia Computer Science, vol. 67, pp. 293-300, 2015. Available: 10.1016/j.procs.2015.09.273.

M. Sathiyanarayanan and T. Mulling, "Map Navigation Using Hand Gesture Recognition: A Case Study Using MYO Connector on Apple Maps", Procedia Computer Science, vol. 58, pp. 50-57, 2015. Available: 10.1016/j.procs.2015.08.008.

J. Sauro and J. Lewis, Quantifying the User Experience, 2nd Edition. .

A. Sinaga, "The Comparison of Signature Verification Result Using 2DPCA Method and SSE Method", International Journal of Artificial Intelligence Research, vol. 2, no. 1, p. 14, 2018. Available: 10.29099/ijair.v2i1.38.

U. Rahardja, A. Moeins, and N. Lutfiani, “Leadership, competency, working motivation and performance of high private education lecturer with institution accreditation B: Area kopertis IV Banten province,” Man India, vol. 97, no. 24, pp. 179–192, 2017.

J. Leonard, D. Damanik and O. Amirkhasanah, "APPLICATION OF INFORMATION SESSION INFORMATION SYSTEM AS MEDIA SUBMISSION OF FINAL RESULTS COMPREHENSIVE SESSION", ADI Journal on Recent Innovation (AJRI), vol. 1, no. 1, pp. 62-70, 2019. Available: 10.34306/ajri.v1i1.115.

T. Hidayat and R. Mahardiko, "A Systematic Literature Review Method On AES Algorithm for Data Sharing Encryption On Cloud Computing", International Journal of Artificial Intelligence Research, vol. 4, no. 1, 2020. Available: 10.29099/ijair.v4i1.154.




DOI: https://doi.org/10.29099/ijair.v4i1.171

________________________________________________________

International Journal Of Artificial Intelligence Research

Organized by: Departemen Teknik Informatika STMIK Dharma Wacana
Published by: STMIK Dharma Wacana
Jl. Kenanga No.03 Mulyojati 16C Metro Barat Kota Metro Lampung
phone. +62725-7850671
Fax. +62725-7850671
Email: info@ijair.id | internationaljournalair@gmail.com | herinurdiyanto@ieee.org 

View IJAIR Statcounter

Creative Commons License
IJAIR is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.