Network Security System Optimization Using Blockchain Technology for Data Protection
Keywords:
Blockchain, Network Security, Blockchain, Data Protection, Network SecurityAbstract
Data protection in digital network systems currently faces serious challenges due to the increasing complexity of cyberattacks and the vulnerabilities of conventional security systems that still rely on centralized authority. This study aims to analyze the weaknesses of conventional network security, explore the potential of blockchain technology implementation, develop an optimized blockchain-based network security model, and assess its effectiveness through field trials. A qualitative method was employed using a multi-source data triangulation strategy, including literature review, in-depth interviews with network security and blockchain experts, institutional network system observation, and system documentation analysis. The findings reveal that blockchain holds significant potential in enhancing integrity, transparency, and resilience of network security systems, particularly through decentralization and smart contract features that minimize reliance on single-point authority. The developed model is capable of real-time anomaly detection and data manipulation prevention, and it demonstrated higher effectiveness compared to conventional systems in limited trials. This study concludes that integrating blockchain into network security systems is not merely an alternative solution, but a strategic step toward a more autonomous, decentralized, and adaptive cybersecurity paradigm in response to today’s evolving digital threats
References
Alamin, Z., & Mu’min, M. A. (2025). Analisis Keamanan Jaringan pada Sistem Kendali Jarak Jauh untuk Infrastruktur Kritis. Jurnal Pengembangan Sains dan Teknologi, 1(1), 25–41. https://doi.org/10.63866/jpst.v1i1.39
Aska, M. F., Putra, D. P., & Sinambela, C. J. M. (2024). Strategi Efektif Untuk Implementasi Keamanan Siber di Era Digital. Journal of Informatic and Information Security, 5(2), 187–200. https://doi.org/10.31599/fzg80847
Bandaso, T. I., Randa, F., & Mongan, F. F. A. (2022). Blockchain technology: Bagaimana menghadapinya?–dalam perspektif akuntansi. Accounting Profession Journal (APAJI), 4(2), 97–115. https://doi.org/10.35593/apaji.v4i2.55
Bhattacharya, T., Peddi, A. V., Ponaganti, S., & Veeramalla, S. T. (2024). A survey on various security protocols of edge computing. The Journal of Supercomputing, 81(1), 310. https://doi.org/10.1007/s11227-024-06678-6
Febiola, A., Manalu, R., Said, R. A. K., Gunawan, I., Sumarno, S., & Tambunan, H. S. (2024). Analisis Sistem Keamanan Pada Sistem Operasi Windows Dengan Metode Clean Instal. Jurnal Inovasi Artificial Intelligence & Komputasional Nusantara, 1(1), 48–54.
Haddaji, A., Ayed, S., & Chaari Fourati, L. (2024). IoV security and privacy survey: Issues, countermeasures, and challenges. The Journal of Supercomputing, 80(15), 23018–23082. https://doi.org/10.1007/s11227-024-06269-5
Handoko, R. M., Trisna, B. A. A., Pratama, R. D., & Parhusip, J. (2024). Implementasi Blockchain untuk Keamanan Sistem Pembayaran Digital dan Optimasi Transaksi Keuangan (Studi Kasus Industri Fintech di Indonesia). Teknik: Jurnal Ilmu Teknik Dan Informatika, 4(2), 64–74. https://doi.org/10.51903/teknik.v4i2.589
Hermawan, A. (2024). Mengintip Celah antara Potensi dan Tantangan Big Data pada Layanan Jaminan Sosial Ketenagakerjaan Indonesia. Jurnal Jamsostek, 2(2), 185–206. https://doi.org/10.61626/jamsostek.v2i2.59
Hlado, P., & Harvankova, K. (2024). Teachers’ perceived work ability: A qualitative exploration using the Job Demands-Resources model. Humanities and Social Sciences Communications, 11(1), 304. https://doi.org/10.1057/s41599-024-02811-1
Judijanto, L., Persadha, P. D., Susilowati, I., Reza, H. K., & Susanti, M. (2025). Analisis Keamanan Data dan Perlindungan Privasi dalam Pengelolaan Big Data: Tinjauan Teknologi Enkripsi dan Anonimisasi. Jurnal Penelitian Inovatif, 5(2), 1991–2000. https://doi.org/10.54082/jupin.1151
Maurya, V., Rishiwal, V., Yadav, M., Shiblee, M., Yadav, P., Agarwal, U., & Chaudhry, R. (2024). Blockchain-driven security for IoT networks: State-of-the-art, challenges and future directions. Peer-to-Peer Networking and Applications, 18(1), 53. https://doi.org/10.1007/s12083-024-01812-w
Mudjiyanto, B., & Roring, F. P. (2024). Tendensi politik kejahatan dunia maya. JIKA (Jurnal Ilmu Komunikasi Andalan), 7(1), 26–51. https://doi.org/10.31949/jika.v7i1.8762
Regenold, T. A., Murphy, S. E., & Reed, P. A. (2024). Designing Systemic-Thinking Tools Using Concept Maps: The Relevance of Visualizing Qualitative Data. Dalam M. Schmidt, Y. Earnshaw, M. Exter, A. Tawfik, & B. Hokanson (Ed.), Transdisciplinary Learning Experience Design: Futures, Synergies, and Innovation (hlm. 109–124). Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-76293-2_8
Safitri, E. M., Ameilindra, Z., & Yulianti, R. (2020). Analisis teknik social engineering sebagai ancaman dalam keamanan sistem informasi: Studi literatur. Jurnal Ilmiah Teknologi Informasi Dan Robotika, 2(2). https://doi.org/10.33005/jifti.v2i2.26
Saini, H., Singh, G., Dalal, S., Lilhore, U. K., Simaiya, S., & Dalal, S. (2024). Enhancing cloud network security with a trust-based service mechanism using k-anonymity and statistical machine learning approach. Peer-to-Peer Networking and Applications, 17(6), 4084–4109. https://doi.org/10.1007/s12083-024-01759-y
Sharma, N., & Arora, B. (2024). HFCCW: A Novel Hybrid Filter-Clustering-Coevolutionary Wrapper Feature Selection Approach for Network Anomaly Detection. International Journal of Machine Learning and Cybernetics, 15(11), 4887–4922. https://doi.org/10.1007/s13042-024-02187-3
Tannady, H., Isputrawan, M. F., Eirene, E., Tjandra, K., Nicholas, M., & Andry, J. F. (2023). Analisis Keamanan Sistem Informasi Terhadap Bencana Alam di Lab Komputer SMA XYZ. JBASE-Journal of Business and Audit Information Systems, 6(2). http://dx.doi.org/10.30813/jbase.v6i2.4670
Valentino, M. R. (2023). Security Analysis Of AI-Based Mobile Application For Fraud. Jurnal Komputer Indonesia, 2(1), 9–18. https://doi.org/10.37676/jki.v2i1.563
Wahana, A. N. P. D. (2025). Peran Teknologi Transparansi dan Keamanan dalam Ekonomi 5.0 pada Blockchain. Indonesian Research Journal on Education, 5(2), 359–364. https://doi.org/10.31004/irje.v5i2.2322
Wu, F., Zhou, B., Song, J., & Xie, L. (2025). Quantum-resistant blockchain and performance analysis. The Journal of Supercomputing, 81(3), 498. https://doi.org/10.1007/s11227-025-07018-y
Wu, G., Wang, H., Yang, Z., He, D., & Chan, S. (2024). Electronic Health Records Sharing Based on Consortium Blockchain. Journal of Medical Systems, 48(1), 106. https://doi.org/10.1007/s10916-024-02120-9
Zhan, D.-P., Yu, J.-P., & Yao, H. (2025). A consortium blockchain-based sealed electronic auction scheme utilizing attribute-based hybrid encryption. The Journal of Supercomputing, 81(8), 914. https://doi.org/10.1007/s11227-025-07436-y
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Dian Lifia, Elnovia Elnovia, Rit Som (Author)

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.