Efficiency in Cloud Computing through Serverless and Green Computing based on Microarchitecture
Abstract
PT Pelindo Multi Terminal is a subholding of PT Pelabuhan Indonesia (Persero), a State-Owned Enter-prise (SOE). PT Pelindo Multi Terminal carries out Kesehatan dan Keselamatan Kerja (K3) or Occupa-tional Health and Safety (OHS) monitoring, which currently still uses manual methods with paper. This method causes problems, such as delays in decision making and the inability to monitor events in real-time. This research aims to overcome these problems by proposing an application called "Portsafe+". Portsafe+ is developed using microservices architecture and micro frontend, with Progressive Web Apps (PWA) as the interface and Google Cloud Function as the backend. Portsafe+ was tested by measuring the response speed of the backend that responds to each request. The test results show that this application improves the response speed with 99% execution time of 880.37 ms. Based on the test results, Portsafe+ successfully overcomes the existing problems. The application of PWA technol-ogy facilitates access and improves the efficiency of OHS management compared to the previously used paper-based manual system.
Downloads
References
Ali, S., Grover, C., & Chaudhary, R. (2023). Progressive Web Apps (PWAs)—Alternate to Mobile and Web. Proceedings of Included in the following conference series: IEMISInternational Conference on Emerging Technologies in Data Mining and Information Security. 1, pp. 565–576. Singapore: Springer. doi:https://doi.org/10.1007/978-981-19-4193-1_55
Aouira, N., Khan, S., McDermott, B., Heussler, H., Haywood, A., Karaksha, A., & Bor, W. (2020). Paper based vs. electronic records for clinical audit: Evidence of documentation of medication safety monitoring in youth prescribed antipsychotics. Children and Youth Services Review, 109. doi:https://doi.org/10.1016/j.childyouth.2019.104666
Google Cloud. (2024, November 20). HTTP triggers. Retrieved from Google Cloud: https://cloud.google.com/functions/docs/calling/http
Google Developers Codelabs. (2024, Aug 24). Getting Started with Event-driven Cloud Run functions. Retrieved from Google Developers Codelabs: https://codelabs.developers.google.com/codelabs/getting-started-cloud-run-functions-event-driven#0
Jiang, Z., Wen, M., Yang, Y., Peng, C., Yang, P., & Jin, H. (2023). Effective Concurrency Testing for Go via Directional Primitive-constrained Interleaving Exploration. 38th IEEE/ACM International Conference on Automated Software Engineering (ASE). 38. Luxembourg, Luxembourg: IEEE. doi:https://doi.org/10.1109/ASE56229.2023.00086
PT. Pelindo Multi Terminal. (2024). Kebijakan dan Komitmen Mutu, K3, Keamanan, Lingkungan dan Anti Penyuapan di Lingkungan PT. Pelindo Multi Terminal. Retrieved from PT. Pelindo Multi Terminal: https://pelindomultiterminal.co.id/pages/sisman
Putra, I. B., Satwika, I. P., & Nirmala, B. P. (2020). Penerapan Progressive Web App (PWA) pada Aplikasi Manajemen Dokter Gigi Studi Kasus: Praktek Drg. Ketut Astina. Journal Of Informatic Engineering and Technology (JIETECH), 1(1), 50-58. Retrieved from https://jietech.triatmamulya.ac.id/index.php/Jietech/article/view/35
Rasha, R., Khan, M. M., Masud, M., & Al Zain, M. A. (2021). Investigain: A Productive Asset Management Web Application. Computer Systems Science & Engineering, 38(2), 151-164. doi:https://doi.org/10.32604/csse.2021.015314
Rasyid, A., Firdaus, A., Setiawan, D., Fitri, H. S., & Setialana, P. (2022). Portable Construction Maps (PCM) using location fingerprint positioning algorithm for construction worker safety. Journal of Engineering and Applied Technology, 3(1), 27-34. doi:https://doi.org/10.21831/jeatech.v3i1.43666
Riet, J. v., Malavolta, I., & Ghaleb, T. A. (2023). Optimize along the way: An industrial case study on web performance. Journal of Systems and Software, 198. doi:https://doi.org/10.1016/j.jss.2022.111593
Sobirin, M., Putra, A. N., Fertilla, N. C., & Susanti, I. I. (2022). Analysis of Types of Occupational Health and Safety Risk (K3) in Erection Work. Arrus Journal of Engineering and Technology, 2(2), 65-77. doi:https://doi.org/10.35877/jetech750
Sugianto, N. (2022). Optimalisasi Penerapan Manajemen Keselamatan Kerja di Atas Kapal MV. Zamil 301. Jakarta, Indonesia: Sekolah Tinggi Ilmu Pelayaran Jakarta. Retrieved from http://repository.stipjakarta.ac.id/bitstream/handle/123456789/2986/MAKALAH%20(2022)%20-%20NANANG%20SUGIANTO-02692%20N-1.pdf
Tsoukalos, M. (2019). Mastering Go: Create Golang production applications using network libraries, concurrency, machine learning, and advanced data structures (2nd ed.). Birmingham, UK: Packt.
Vu, A. (2021). Real-time backend architecture using Node.js, Express and Google Cloud Platform. Helsinki, Finland: Metropolia University of Applied Sciences. Retrieved from https://www.theseus.fi/bitstream/handle/10024/429165/Anh_Vu.pdf
Yuricha, Y., & Phan, I. K. (2024). Design and Development of Lecture Journal Application Using Progressive Web Application with Rapid Application Development Method. Indonesian Journal of Machine Learning and Computer Science, 4(3), 901-910. doi:https://doi.org/10.57152/malcom.v4i3.1370
Copyright (c) 2024 The Author(s)

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Copyright Notice based on COPE (Committee on Publication Ethics) for JITCS: Journal of Information Technology and Cyber Security
-
Ownership and Copyright:
- JITCS: Journal of Information Technology and Cyber Security respects the intellectual property rights of authors. The copyright for individual articles published in JITCS is retained by the respective authors, unless otherwise specified.
- The articles published in JITCS are licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License (CC BY-NC-ND 4.0), which permits use and distribution in any medium, provided the original work is properly cited, the use is non-commercial, and no modifications or adaptations are made.
- JITCS serves as the initial publisher of the articles, providing them with the first publication platform.
-
Permissions and Usage:
- Distribution for Non-Commercial Purposes: Permitted: Users are allowed to distribute the article for non-commercial purposes, provided the original work is properly cited and no modifications or adaptations are made.
- Distribution for Commercial Purposes: Not Permitted: The article may not be distributed for any commercial purposes without obtaining prior written permission from the author(s).
- Inclusion in a Collective Work (e.g., Anthology) for Non-Commercial Purposes: Permitted: Users are allowed to include the article in a collective work, such as an anthology, as long as the use is non-commercial and the work remains unchanged.
- Inclusion in a Collective Work for Commercial Purposes: Not Permitted: The article may not be included in any collective work or anthology intended for commercial purposes without prior permission from the author(s).
- Creation and Distribution of Revised Versions, Adaptations, or Derivative Works (e.g., Translation) for Non-Commercial Purposes: Not Permitted: Users may not create or distribute revised versions, adaptations, or derivative works, including translations, for non-commercial purposes.
- Creation and Distribution of Revised Versions, Adaptations, or Derivative Works for Commercial Purposes: Not Permitted: Users may not create or distribute revised versions, adaptations, or derivative works, including translations, for commercial purposes.
- Text or Data Mining for Non-Commercial Purposes: Permitted: Users are permitted to engage in text or data mining of the article for non-commercial research purposes, provided the original work is properly attributed.
- Text or Data Mining for Commercial Purposes: Not Permitted: Users may not engage in text or data mining of the article for commercial purposes without obtaining explicit permission from the author(s).
-
Attribution and Citation:
- Proper attribution and citation of the published work should be provided when using or referring to content from JITCS. This includes clearly indicating the authors, the title of the article, the journal name (JITCS), the volume/issue number, the publication year, and the article's DOI (Digital Object Identifier) when available.
- When adapting or modifying the published content, proper attribution to the original source should be given, and the adapted or modified content should be shared under the same CC BY-NC-ND 4.0 license.
-
Plagiarism and Copyright Infringement:
- JITCS considers plagiarism and copyright infringement as serious ethical violations. Authors are responsible for ensuring that their submitted work is original and does not infringe upon the copyright or intellectual property rights of others.
- Any allegations of plagiarism or copyright infringement will be investigated promptly and thoroughly. If proven, appropriate actions, including rejection of the manuscript, retraction of the published article, or other corrective measures, will be taken.
-
Open Access Licensing:
- JITCS supports open access publishing and encourages authors to consider publishing their work under the CC BY-NC-ND 4.0 license to promote the dissemination and use of knowledge in the field of information technology and cyber security.
- The specific terms and conditions of the CC BY-NC-ND 4.0 license will be clearly indicated on the published articles.
-
Policy Review: This Copyright Notice will be periodically reviewed and updated to ensure its continued relevance and compliance with copyright laws, ethical standards, and open access principles in scholarly publishing. Any updates or revisions to the notice will be communicated to the relevant stakeholders.
By adhering to this Copyright Notice, JITCS aims to protect the rights of authors, promote proper attribution and citation practices, and facilitate the responsible and legal use of the published content in accordance with the CC BY-NC-ND 4.0 license.