Network Security System Optimization Using Blockchain Technology for Data Protection

Authors

  • Dian Lifia Universitas Islam Negeri Mahmud Yunus Batusangkar Author
  • Elnovia Elnovia Universitas Islam Negeri Mahmud Yunus Batusangkar Author
  • Rit Som Songkhla University, Pattani Author

Keywords:

Blockchain, Network Security, Blockchain, Data Protection, Network Security

Abstract

Data protection in digital network systems currently faces serious challenges due to the increasing complexity of cyberattacks and the vulnerabilities of conventional security systems that still rely on centralized authority. This study aims to analyze the weaknesses of conventional network security, explore the potential of blockchain technology implementation, develop an optimized blockchain-based network security model, and assess its effectiveness through field trials. A qualitative method was employed using a multi-source data triangulation strategy, including literature review, in-depth interviews with network security and blockchain experts, institutional network system observation, and system documentation analysis. The findings reveal that blockchain holds significant potential in enhancing integrity, transparency, and resilience of network security systems, particularly through decentralization and smart contract features that minimize reliance on single-point authority. The developed model is capable of real-time anomaly detection and data manipulation prevention, and it demonstrated higher effectiveness compared to conventional systems in limited trials. This study concludes that integrating blockchain into network security systems is not merely an alternative solution, but a strategic step toward a more autonomous, decentralized, and adaptive cybersecurity paradigm in response to today’s evolving digital threats

References

Alamin, Z., & Mu’min, M. A. (2025). Analisis Keamanan Jaringan pada Sistem Kendali Jarak Jauh untuk Infrastruktur Kritis. Jurnal Pengembangan Sains dan Teknologi, 1(1), 25–41. https://doi.org/10.63866/jpst.v1i1.39

Aska, M. F., Putra, D. P., & Sinambela, C. J. M. (2024). Strategi Efektif Untuk Implementasi Keamanan Siber di Era Digital. Journal of Informatic and Information Security, 5(2), 187–200. https://doi.org/10.31599/fzg80847

Bandaso, T. I., Randa, F., & Mongan, F. F. A. (2022). Blockchain technology: Bagaimana menghadapinya?–dalam perspektif akuntansi. Accounting Profession Journal (APAJI), 4(2), 97–115. https://doi.org/10.35593/apaji.v4i2.55

Bhattacharya, T., Peddi, A. V., Ponaganti, S., & Veeramalla, S. T. (2024). A survey on various security protocols of edge computing. The Journal of Supercomputing, 81(1), 310. https://doi.org/10.1007/s11227-024-06678-6

Febiola, A., Manalu, R., Said, R. A. K., Gunawan, I., Sumarno, S., & Tambunan, H. S. (2024). Analisis Sistem Keamanan Pada Sistem Operasi Windows Dengan Metode Clean Instal. Jurnal Inovasi Artificial Intelligence & Komputasional Nusantara, 1(1), 48–54.

Haddaji, A., Ayed, S., & Chaari Fourati, L. (2024). IoV security and privacy survey: Issues, countermeasures, and challenges. The Journal of Supercomputing, 80(15), 23018–23082. https://doi.org/10.1007/s11227-024-06269-5

Handoko, R. M., Trisna, B. A. A., Pratama, R. D., & Parhusip, J. (2024). Implementasi Blockchain untuk Keamanan Sistem Pembayaran Digital dan Optimasi Transaksi Keuangan (Studi Kasus Industri Fintech di Indonesia). Teknik: Jurnal Ilmu Teknik Dan Informatika, 4(2), 64–74. https://doi.org/10.51903/teknik.v4i2.589

Hermawan, A. (2024). Mengintip Celah antara Potensi dan Tantangan Big Data pada Layanan Jaminan Sosial Ketenagakerjaan Indonesia. Jurnal Jamsostek, 2(2), 185–206. https://doi.org/10.61626/jamsostek.v2i2.59

Hlado, P., & Harvankova, K. (2024). Teachers’ perceived work ability: A qualitative exploration using the Job Demands-Resources model. Humanities and Social Sciences Communications, 11(1), 304. https://doi.org/10.1057/s41599-024-02811-1

Judijanto, L., Persadha, P. D., Susilowati, I., Reza, H. K., & Susanti, M. (2025). Analisis Keamanan Data dan Perlindungan Privasi dalam Pengelolaan Big Data: Tinjauan Teknologi Enkripsi dan Anonimisasi. Jurnal Penelitian Inovatif, 5(2), 1991–2000. https://doi.org/10.54082/jupin.1151

Maurya, V., Rishiwal, V., Yadav, M., Shiblee, M., Yadav, P., Agarwal, U., & Chaudhry, R. (2024). Blockchain-driven security for IoT networks: State-of-the-art, challenges and future directions. Peer-to-Peer Networking and Applications, 18(1), 53. https://doi.org/10.1007/s12083-024-01812-w

Mudjiyanto, B., & Roring, F. P. (2024). Tendensi politik kejahatan dunia maya. JIKA (Jurnal Ilmu Komunikasi Andalan), 7(1), 26–51. https://doi.org/10.31949/jika.v7i1.8762

Regenold, T. A., Murphy, S. E., & Reed, P. A. (2024). Designing Systemic-Thinking Tools Using Concept Maps: The Relevance of Visualizing Qualitative Data. Dalam M. Schmidt, Y. Earnshaw, M. Exter, A. Tawfik, & B. Hokanson (Ed.), Transdisciplinary Learning Experience Design: Futures, Synergies, and Innovation (hlm. 109–124). Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-76293-2_8

Safitri, E. M., Ameilindra, Z., & Yulianti, R. (2020). Analisis teknik social engineering sebagai ancaman dalam keamanan sistem informasi: Studi literatur. Jurnal Ilmiah Teknologi Informasi Dan Robotika, 2(2). https://doi.org/10.33005/jifti.v2i2.26

Saini, H., Singh, G., Dalal, S., Lilhore, U. K., Simaiya, S., & Dalal, S. (2024). Enhancing cloud network security with a trust-based service mechanism using k-anonymity and statistical machine learning approach. Peer-to-Peer Networking and Applications, 17(6), 4084–4109. https://doi.org/10.1007/s12083-024-01759-y

Sharma, N., & Arora, B. (2024). HFCCW: A Novel Hybrid Filter-Clustering-Coevolutionary Wrapper Feature Selection Approach for Network Anomaly Detection. International Journal of Machine Learning and Cybernetics, 15(11), 4887–4922. https://doi.org/10.1007/s13042-024-02187-3

Tannady, H., Isputrawan, M. F., Eirene, E., Tjandra, K., Nicholas, M., & Andry, J. F. (2023). Analisis Keamanan Sistem Informasi Terhadap Bencana Alam di Lab Komputer SMA XYZ. JBASE-Journal of Business and Audit Information Systems, 6(2). http://dx.doi.org/10.30813/jbase.v6i2.4670

Valentino, M. R. (2023). Security Analysis Of AI-Based Mobile Application For Fraud. Jurnal Komputer Indonesia, 2(1), 9–18. https://doi.org/10.37676/jki.v2i1.563

Wahana, A. N. P. D. (2025). Peran Teknologi Transparansi dan Keamanan dalam Ekonomi 5.0 pada Blockchain. Indonesian Research Journal on Education, 5(2), 359–364. https://doi.org/10.31004/irje.v5i2.2322

Wu, F., Zhou, B., Song, J., & Xie, L. (2025). Quantum-resistant blockchain and performance analysis. The Journal of Supercomputing, 81(3), 498. https://doi.org/10.1007/s11227-025-07018-y

Wu, G., Wang, H., Yang, Z., He, D., & Chan, S. (2024). Electronic Health Records Sharing Based on Consortium Blockchain. Journal of Medical Systems, 48(1), 106. https://doi.org/10.1007/s10916-024-02120-9

Zhan, D.-P., Yu, J.-P., & Yao, H. (2025). A consortium blockchain-based sealed electronic auction scheme utilizing attribute-based hybrid encryption. The Journal of Supercomputing, 81(8), 914. https://doi.org/10.1007/s11227-025-07436-y

Downloads

Published

2025-06-30

Issue

Section

Articles

How to Cite

Network Security System Optimization Using Blockchain Technology for Data Protection. (2025). Circuitum: Multidisciplinary Journal of Technology and Informatics, 1(1), 1-9. https://journal.zmsadra.or.id/index.php/mjti/article/view/45

Similar Articles

You may also start an advanced similarity search for this article.