Implementation of Smart Agriculture Using Cloud Computing for Agricultural Data Management

Authors

  • Moh. Ali Sobit Author
  • Riko Adi Setiawan Author

Keywords:

Keywords: smart agriculture, cloud computing, Internet of Things, agricultural data management, precision agriculture

Abstract

 Advances in digital technology are driving the transformation of the agricultural sector toward data-driven systems; however, agricultural data management still faces challenges in terms of integration, accessibility, and efficiency. Objective: This study aims to implement a cloud-based smart agriculture system to improve the effectiveness of real-time agricultural data management. Methods: This study employs an experimental approach by designing and implementing an Internet of Things (IoT)-based system integrated with a cloud platform, followed by performance testing of the system, including sensor accuracy, data transmission reliability, and information accessibility. Results: The results indicate that the system can transmit data with a success rate exceeding 95% and low latency, while generating accurate data with minimal deviation from field conditions. The system also improves resource efficiency, particularly in irrigation management based on soil moisture data. Conclusion: The implementation of a cloud-based smart agriculture system has proven effective in enhancing the quality of agricultural data management, although challenges remain in network and security aspects that require further development.

Downloads

Download data is not yet available.

Author Biographies

  • Moh. Ali Sobit

    Students at Madura University

  • Riko Adi Setiawan

    Students at Madura University

References

REFERENSI

[1] F. P. E. Putra, F. Fauzan, S. Syirofi, M. Mursidi, D. Wahid, and A. Nuraini, “Sistem Pengendali Lingkungan Pertanian Dengan Wireless Sensor Network Untuk Mengoptimalkan Budidaya Hidroponik,” 2024. doi: 10.47709/digitech.v3i2.3461.

[2] F. P. E. Putra, D. A. M. Putra, A. Firdaus, and A. Hamzah, “Analisis Kecepatan Dan Kinerja Jaringan 5G (generasi ke 5) Pada Wilayah Perkotaan,” INFORMATICS Educ. Prof. J. Informatics, vol. 8, no. 1, p. 47, 2023, doi: 10.51211/itbi.v8i1.2439.

[3] F. P. E. Putra, R. W. Efendi, A. B. Tamam, and W. A. Pramadi, “Tren dan Praktik Terbaik dalam Pengembangan Web Berbasis API : Kajian Literatur terhadap Framework Laravel dan React,” Infomatek, vol. 27, no. 1, pp. 165–178, 2025, doi: 10.23969/infomatek.v27i1.25122.

[4] F. P. Eka Putra, F. Muslim, N. Hasanah, Holipah, R. Paradina, and R. Alim, “Analisis Komparasi Protokol Websocket dan MQTT Dalam Proses Push Notification,” J. Sistim Inf. dan Teknol., pp. 63–72, 2024, doi: 10.60083/jsisfotek.v5i4.325.

[5] T. Chinbat, S. Madanian, D. Airehrour, and F. Hassandoust, “Machine learning cryptography methods for IoT in healthcare,” BMC Med. Inform. Decis. Mak., vol. 24, no. 1, 2024, doi: 10.1186/s12911-024-02548-6.

[6] F. Prasetyo Eka Putra, S. R. Sutarsih, S. Sofiyulloh, P. Permana, and M. Umar Mansyur, “Optimalisasi Perancangan Aplikasi Manajemen Data Koloman, Di Desa Pulau Mandangin Sampang – Madura Berbasis Website,” Rabit J. Teknol. dan Sist. Inf. Univrab, vol. 9, no. 2, pp. 285–294, 2024, doi: 10.36341/rabit.v9i2.4840.

[7] F. P. Eka Putra, L. Fitriyah, Z. Naimah, and S. A. Rofika, “Evaluasi Kinerja Aplikasi Wireshark Dalam Monitoring Jaringan Kecil Dengan Topologi Star dan Bus,” J. Ilm. Ilk. - Ilmu Komput. Inform., vol. 8, no. 2, pp. 164–176, 2025, doi: 10.47324/ilkominfo.v8i2.343.

[8] A. Baidawi, “JARINGAN SENSOR NIRKABEL DAN IoT UNTUK KOTA PINTAR PAMEKASAN,” 2023, academia.edu. doi: 10.59697/jsik.v7i2.108.

[9] C. M. Chen, Q. Miao, S. Kumari, M. K. Khan, and J. J. P. C. Rodrigues, “A Privacy-Preserving Authentication Protocol for Electric Vehicle Battery Swapping Based on Intelligent Blockchain,” IEEE Internet Things J., vol. 11, no. 10, pp. 17538–17551, 2024, doi: 10.1109/JIOT.2024.3360280.

[10] X. Kong, L. Lu, and K. Xiong, “Privacy-preserving estimation of electric vehicle charging behavior: A federated learning approach based on differential privacy,” Internet of Things (Netherlands), vol. 28, 2024, doi: 10.1016/j.iot.2024.101344.

[11] F. Prasetyo, E. Putra, M. Riski, M. S. Yahya, and M. H. Ramadhan, “Mengenal Teknologi Jaringan Nirkabel Terbaru Teknologi 5G,” J. Sistim Inf. dan Teknol., vol. 5, no. 2, pp. 167–174, 2023, doi: 10.37034/jsisfotek.v5i1.233.

[12] S. Arifin, N. P. Dewi, . U., M. N. Arifin, and F. P. E. Putra, “Aplikasi Pengolahan Data Mahasiswa Kkn Pada Universitas Madura,” Insa. Comtech Inf. Sci. Comput. Technol. J., vol. 8, no. 2, p. 24, 2023, doi: 10.53712/jic.v8i2.2085.

[13] F. P. E. Putra, A. B. Tamam, R. W. Efendi, and Z. Muim, “Optimasi Keamanan DNS_ Eksplorasi Optimal dengan Implementasi DNS Security Extensions (DNSSEC),” Ris. dan E-Jurnal Manaj. Inform. Komput., vol. 8, no. 1, pp. 349–358, 2024, [Online]. Available: https://jurnal.polgan.ac.id/index.php/remik/article/view/13398%0Ahttps://jurnal.polgan.ac.id/index.php/remik/article/download/13398/2325

[14] Y. Li et al., “Rotary Wind-driven Triboelectric Nanogenerator for Self-Powered Airflow Temperature Monitoring of Industrial Equipment,” Adv. Sci., vol. 11, no. 13, 2024, doi: 10.1002/advs.202307382.

[15] G. Li et al., “Breaking Down Data Sharing Barrier of Smart City: A Digital Twin Approach,” IEEE Netw., vol. 38, no. 1, pp. 238–246, 2024, doi: 10.1109/MNET.140.2200512.

[16] S. Safiuddin and F. P. E. Putra, “Strategi Efisiensi Wireless Sensor Network (WSN),” INFORMATICS Educ. Prof. J. Informatics, vol. 8, no. 1, p. 52, 2023, doi: 10.51211/itbi.v8i1.2441.

[17] Fauzan Prasetyo Eka Putra, Noviyani Dwi Saputri, Fathur Rosi, and Rohilia Loati, “Optimalisasi Infrastruktur Cloud Networking melalui Integrasi SDN, NFV, dan Multi-Cloud,” 2025, researchgate.net. doi: 10.55606/jitek.v5i1.6099.

[18] C. S. Peng and C. Wang, “Adaptive Transmissions for Batteryless Periodic Sensing,” Internet of Things, vol. 5, no. 2, pp. 332–355, 2024, doi: 10.3390/iot5020017.

[19] A. Zulfikri, F. P. E. Putra, M. A. Huda, H. Hasbullah, M. Mahendra, and M. Surur, “Analisis Keamanan Jaringan Dari Serangan Malware Menggunakan Filtering Firewall Dengan Port Blocking,” 2023. doi: 10.47709/digitech.v3i2.3379.

[20] F. P. Eka Putra, A. Muzayyin, and M. U. Mansyur, “ANALISIS KUALITAS LAYANAN ABSENSI BERBASIS FINGER BERDASARKAN Quality of Service,” J. Inform., vol. 24, no. 1, pp. 17–25, 2024, doi: 10.30873/ji.v24i1.3949.

[21] A. P. K. Reddy et al., “5G new radio key performance indicators evaluation for IMT-2020 radio interface technology,” IEEE Access, vol. 9, pp. 112290–112311, 2021, doi: 10.1109/ACCESS.2021.3099845.

[22] I. Hidayatullah, M. H. Khairi, I. Maulana, and F. P. Eka Putra, “Analisis Protokol Keamanan Jaringan dalam Era Internet of Things (IoT),” Infotek J. Inform. dan Teknol., vol. 8, no. 2, pp. 356–366, 2025, doi: 10.29408/jit.v8i2.30257.

[23] F. P. Eka Putra, M. N. Arifin, K. Zulfana Imam, E. Saputra, and Sofiyullah, “Pengembangan Sistem Informasi Laboratorium Terintegerasi Sistem Akademik Menggunakan Agile Scrum,” J. Inf. dan Teknol., pp. 109–119, 2023, doi: 10.37034/jidt.v5i2.367.

[24] M. Alzamel, H. A. Rizvi, N. Altwaijry, and I. Al-Turaiki, “WebFLex: A framework forweb browsers-based peer-To-peer federated learning systems usingWebRTC,” Comput. Mater. Contin., vol. 78, no. 3, pp. 4177–4204, 2024, doi: 10.32604/cmc.2024.048370.

[25] M. Zayyadi et al., “Pemberdayaan Sekolah Inklusi Melalui E-Modul Berjenjang Sebagai Pengembangan Kompetensi Guru Dalam Pemenuhan Layanan Pendidikan Inklusif,” 2024. doi: 10.37303/peduli.v8i2.681.

[26] A. Alsumayt et al., “Efficient security level in wireless sensor networks (WSNs) using four-factors authentication over the Internet of Things (IoT),” PeerJ Comput. Sci., vol. 10, 2024, doi: 10.7717/peerj-cs.2091.

[27] Fauzan Prasetyo Eka Putra, Yogi Setiawan, Samsul Arifin, and Wahyu Hidayatullah, “Peran VPN dalam Menjaga Privasi Pengguna Jaringan Publik,” 2025, researchgate.net. doi: 10.55606/jitek.v5i1.5834.

[28] S. Karthic and S. M. Kumar, “Hybrid Optimized Deep Neural Network with Enhanced Conditional Random Field Based Intrusion Detection on Wireless Sensor Network,” Neural Process. Lett., vol. 55, no. 1, pp. 459–479, 2023, doi: 10.1007/s11063-022-10892-9.

[29] F. P. Eka Putra, . S., A. Ramadhani, and . M., “Integrasi Teknologi Kuantum dan fiber Optik untuk Meningkatkan Keamanan dan Efisiensi Jaringan Masa Depan,” J. Ilm. Ilk. - Ilmu Komput. Inform., vol. 8, no. 2, pp. 151–163, 2025, doi: 10.47324/ilkominfo.v8i2.342.

[30] Y. Fan, Y. Liao, X. Yang, M. Q. Niu, and L. Q. Chen, “A nonlinear multi-stable electromagnetic energy harvester with segmented moving magnet configuration,” Int. J. Non. Linear. Mech., vol. 178, 2025, doi: 10.1016/j.ijnonlinmec.2025.105203.

[31] O. D. Nekui, W. Wang, C. Liu, Z. Wang, and B. Ding, “IoT-Based Heartbeat Rate-Monitoring Device Powered by Harvested Kinetic Energy,” Sensors, vol. 24, no. 13, 2024, doi: 10.3390/s24134249.

[32] R. Zhu, A. Boukerche, Y. Chen, and Q. Yang, “A reliable cluster-based opportunistic routing protocol for underwater wireless sensor networks,” Comput. Networks, vol. 251, 2024, doi: 10.1016/j.comnet.2024.110622.

[33] A. A. Yinusa et al., “Development of an App for analyzing and monitoring non-linear fluid-induced vibration of nanotube using analytical and machine learning approaches,” Next Mater., vol. 9, 2025, doi: 10.1016/j.nxmate.2025.101277.

[34] F. P. Eka Putra, A. M. Ubaidillah Solichin, M. N. Wildanul Hakim, and M. T. Ramadhan, “Pemanfaatan Teknologi Wireless dan Mobile Network Berbasis 5G Untuk Pemerataan Akses Jaringan di Indonesia,” Infotek J. Inform. dan Teknol., vol. 8, no. 2, pp. 415–425, 2025, doi: 10.29408/jit.v8i2.30559.

[35] Z. Qiu, S. Maniyil, W. Peng, A. C. van der Ham, and S. Du, “A Self-Powered Bipolar Rectifierless Series-SSHI Circuit With Dual-Polarity Energy Extraction for Piezoelectric Energy Harvesting,” IEEE Trans. Power Electron., vol. 40, no. 10, pp. 15937–15948, 2025, doi: 10.1109/TPEL.2025.3577521.

[36] S. Yang, W. Zhao, C. M. Wang, W. Y. Dong, and X. Ju, “Betweenness Centrality Based Dynamic Source Routing for Flying Ad Hoc Networks in Marching Formation,” IEEE Trans. Veh. Technol., vol. 74, no. 8, pp. 12791–12798, 2025, doi: 10.1109/TVT.2025.3550336.

[37] Y. Xiuwu, J. Shiqi, and L. Yong, “Non-Uniform WSN Clustering Routing Protocol Based on Non-Cooperative Game,” Wirel. Pers. Commun., vol. 140, no. 1, pp. 561–590, 2025, doi: 10.1007/s11277-025-11737-z.

[38] B. Tang, H. Ngo, Y. Ma, and B. Alhakami, “DAO2: Overcoming Overall Storage Overflow in Intermittently Connected Sensor Networks,” IEEE/ACM Trans. Netw., vol. 31, no. 6, pp. 3143–3158, 2023, doi: 10.1109/TNET.2023.3273553.

[39] N. Malyadri et al., “A predictive energy-efficient adaptive routing methodology for Mobile Ad hoc Networks,” IET Networks, vol. 14, no. 1, 2025, doi: 10.1049/ntw2.70001.

[40] R. Stepancikova, R. Olejnik, J. Matyas, M. Masar, B. Hausnerova, and P. Slobodian, “Pressure-Driven Piezoelectric Sensors and Energy Harvesting in Biaxially Oriented Polyethylene Terephthalate Film,” Sensors, vol. 24, no. 4, 2024, doi: 10.3390/s24041275.

[41] W. Li, G. Wang, C. Yang, X. Yang, and R. Song, “An omnidirectional piezoelectric energy harvester coupling vortex-induced vibration and wake galloping,” Smart Mater. Struct., vol. 34, no. 2, 2025, doi: 10.1088/1361-665X/adaa40.

[42] Y. Peng, X. Li, K. Gu, J. Chen, S. K. Das, and X. Zhang, “Achieving Efficient and Privacy-Preserving Reverse Skyline Query Over Single Cloud,” IEEE Trans. Knowl. Data Eng., vol. 37, no. 1, pp. 29–44, 2025, doi: 10.1109/TKDE.2024.3487646.

[43] E. Giglio, G. Luzzani, V. Terranova, G. Trivigno, A. Niccolai, and F. Grimaccia, “An Efficient Artificial Intelligence Energy Management System for Urban Building Integrating Photovoltaic and Storage,” IEEE Access, vol. 11, pp. 18673–18688, 2023, doi: 10.1109/ACCESS.2023.3247636.

[44] H. B. Salameh, R. Al-Maaitah, H. Al-Obiedollah, and A. Al-Ajlouni, “Energy-Efficient Power-Controlled Resource Allocation for MIMO-Based Cognitive-Enabled B5G/6G Indoor-Flying Networks,” IEEE Access, vol. 10, pp. 106828–106840, 2022, doi: 10.1109/ACCESS.2022.3212380.

[45] X. Peng and H. Wang, “Capturing Spatial-Temporal Traffic Patterns: A Dynamic Partitioning Strategy for Heterogeneous Traffic Networks,” IEEE Access, vol. 12, pp. 131982–131992, 2024, doi: 10.1109/ACCESS.2024.3413852.

[46] J. Ye, Y. Lu, K. Wang, Q. Jiao, X. Chen, and L. Wang, “Design and Stage Analysis of a Non-Invasive Monitoring System for Determining Formaldehyde Release from Wood-Based Panels by the Chamber Method,” IEEE Access, vol. 12, pp. 137952–137969, 2024, doi: 10.1109/ACCESS.2024.3455375.

[47] S. Wu, W. Wang, and Z. Ding, “Detecting malicious DoH traffic: Leveraging small sample analysis and adversarial networks for detection,” J. Inf. Secur. Appl., vol. 84, 2024, doi: 10.1016/j.jisa.2024.103827.

[48] F. P. E. Putra, I. N. S. Degeng, S. Ulfa, and W. Kamdi, “The Evolution of Quality Education: Impacts and Challenges of Using Open Educational Resources (OER) and Open Educational Practices (OEP) in the Conceive - Design - Implement - Operate (CDIO) Framework,” TEM J., vol. 13, no. 1, pp. 386–395, 2024, doi: 10.18421/TEM131-40.

[49] J. Cai, L. Yan, A. Seyedkanani, V. Orsat, and A. Akbarzadeh, “Nano-architected GaN metamaterials with notable topology-dependent enhancement of piezoelectric energy harvesting,” Nano Energy, vol. 129, 2024, doi: 10.1016/j.nanoen.2024.109990.

[50] E. Heidari, “A novel energy-aware method for clustering and routing in IoT based on whale optimization algorithm & Harris Hawks optimization,” Computing, vol. 106, no. 3, pp. 1013–1045, 2024, doi: 10.1007/s00607-023-01252-z.

[51] W. A. Younis and S. H. Hussein, “Design of an efficient energy harvesting rectifier circuit for powering Wireless Sensor Nodes,” Int. J. Electron. Telecommun., vol. 71, no. 1, pp. 325–331, 2025, doi: 10.24425/ijet.2025.153577.

Published

01-05-2026

How to Cite

Implementation of Smart Agriculture Using Cloud Computing for Agricultural Data Management. (2026). Karapan Network Journal : Journal Computer Technology and Mobile Ad Hoc Network, 2(02). https://ejournal.omahtabing.com/knj/article/view/518

Most read articles by the same author(s)