This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Optimization of System Authentication Services using Blockchain Technology
Corresponding Author(s) : Aulyah Zakilah Ifani
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control,
Vol. 6, No. 4, November 2021
Abstract
With the development of the era, one thing that must be considered for security is the Login System. In most cases, user login information is stored on the server. This gives access to sensitive informatio, many hackers easily break into data from users. Based on these problems, this research focuses on data security authentication in the form of usernames and passwords in the login system. Authentication using blockchain is used to reduce malicious access and increase security for the authentication process. One of the innovative technologies that can solve these problems is Blockchain Technology. Using blockchain technology, hackers will find it difficult to change and modify the same data on all computers at the same time because it takes a very long time to crack the encryption code on each block of data in the entire computer network. Data storage or transactions in the blockchain are stored in the form of hashes. This makes it difficult for hackers to break into it. Tests in this study using Wireshark tools and network miner. Based on the research conducted, the test was conducted as many as 5 times with two scenarios, namely authentication of the login system before using the blockchain and after using the blockchain. The results obtained. The, system built using blockchain can secure data. The test results obtained that data in the form of usernames and passwords were converted into hashes and with the immutable nature of the blockchain, data from users could not be changed or replaced by anyone.
Keywords
Download Citation
Endnote/Zotero/Mendeley (RIS)BibTeX
- H. Lin, Z. Yan, Y. Chen, and L. Zhang, “A Survey on Network Security-Related Data Collection Technologies,” IEEE Access, vol. 6, pp. 18345–18365, 2018. https://doi.org/10.1109/ACCESS.2018.2817921
- M. Rusdan and M. Sabar, “Analisis dan Perancangan Jaringan Wireless Dengan Wireless Distribution System Menggunakan User Authentication Berbasis Multi-Factor Authentication,” Jt. (Journal Inf. Technol., vol. 02, no. 01, pp. 17–24, 2020. https://doi.org/10.47292/joint.v2i1.004
- A. W. P. Putra, A. Bhawiyuga, and M. Data, “Implementasi Autentikasi JSON Web Token ( JWT ) Sebagai Mekanisme Autentikasi Protokol MQTT Pada Perangkat NodeMCU,” J. Pengemb. Teknol. Inf. dan Ilmu Komput., vol. 2, no. 2, pp. 584–593, 2018.
- Y. N. Kunang and T. Ibadi, “Celah Keamanan Sistem Autentikasi Wireless Berbasis RADIUS,” Celah Keamanan Sist. Autentikasi Wirel. Berbas. Radius, vol. 34, no. 2, pp. 1907–5022, 2013, doi: 1. Yesi Novaria Kunang 2. Taqrim Ibadi 3. Suryayusra.
- U. Rahardja, E. P. Harahap, and D. D. Christianto, “Pengaruh Teknologi Blockchain Terhadap Tingkat Keaslian Ijazah,” Technomedia J., vol. 4, no. 2, pp. 211–222, 2019. https://doi.org/10.33050/tmj.v4i2.1107
- N. I. Fauzan, “Abstrak,” vol. 4, pp. 1–15, 2018.
- I. Riadi, R. Umar, and I. Busthomi, “Optimasi Keamanan Autentikasi dari Man in the Middle Attack ( MiTM ) Menggunakan Teknologi Blockchain,” vol. 04, pp. 15–19, 2020.
- S. Hattab and I. F. Taha Alyaseen, “Consensus Algorithms Blockchain: A comparative study,” Int. J. Perceptive Cogn. Comput., vol. 5, no. 2, pp. 66–71, 2019. https://doi.org/10.31436/ijpcc.v5i2.103
- Y. Zheng et al., “Blockchain-based privacy protection unified identity authentication,” Proc. - 2019 Int. Conf. Cyber-Enabled Distrib. Comput. Knowl. Discov. CyberC 2019, pp. 42–49, 2019. https://doi.org/10.1109/CyberC.2019.00017
- E. P. Harahap, Q. Aini, and R. K. Anam, “Pemanfaatan Teknologi Blockchain Pada Platform Crowdfunding,” Technomedia J., vol. 4, no. 2, pp. 199–210, 2019. https://doi.org/10.33050/tmj.v4i2.1108
- W. S. Raharjo, I. D. E. K. Ratri, H. Susilo, J. Wahidin, and S. Yogyakarta, “Implementasi Two Factor Authentication Dan Protokol Zero Knowledge Proof Pada Sistem Login,” vol. 3, no. April, pp. 127–136, 2017.
- S. Damai et al., “Implementasi Blockchain : Studi Kasus e-Voting,” J. Infra Petra, no. 031, 2019.
- L. Wan, D. Eyers, and H. Zhang, “Evaluating the impact of network latency on the safety of blockchain transactions,” Proc. - 2019 2nd IEEE Int. Conf. Blockchain, Blockchain 2019, pp. 194–201, 2019. https://doi.org/10.1109/Blockchain.2019.00033
- N. Lasla, L. Alsahan, M. Abdallah, and M. Younis, “Green-PoW: An Energy-Efficient Blockchain Proof-of-Work Consensus Algorithm,” pp. 1–11, 2020.
- G. Deep, R. Mohana, A. Nayyar, P. Sanjeevikumar, and E. Hossain, “Authentication protocol for cloud databases using blockchain mechanism,” Sensors (Switzerland), vol. 19, no. 20, pp. 1–13, 2019. https://doi.org/10.3390/s19204444
- H. F. Putra, W. Wirawan, and O. Penangsang, “Penerapan Blockchain dan Kriptografi untuk Keamanan Data pada Jaringan Smart Grid,” J. Tek. ITS, vol. 8, no. 1, 2019. http://dx.doi.org/10.12962/j23373539.v8i1.38525
- S. Gupta and M. Sadoghi, “Encyclopedia of Big Data Technologies,” Encycl. Big Data Technol., no. May, 2020. https://doi.org/10.1007/978-3-319-63962-8
- O. Novo, “Scalable access management in IoT using blockchain: A performance evaluation,” IEEE Internet Things J., vol. 6, no. 3, pp. 4694–4701, 2019. https://doi.org/10.1109/JIOT.2018.2879679
- H. Baharmand, N. Saeed, T. Comes, and M. Lauras, “Developing a framework for designing humanitarian blockchain projects,” Comput. Ind., vol. 131, p. 103487, 2021. https://doi.org/10.1016/j.compind.2021.103487
- T. Salman, M. Zolanvari, A. Erbad, R. Jain, and M. Samaka, “Security services using blockchains: A state of the art survey,” IEEE Commun. Surv. Tutorials, vol. 21, no. 1, pp. 858–880, 2019. https://doi.org/10.1109/COMST.2018.2863956
- S. Singh, A. S. M. Sanwar Hosen, and B. Yoon, “Blockchain Security Attacks, Challenges, and Solutions for the Future Distributed IoT Network,” IEEE Access, vol. 9, pp. 13938–13959, 2021. https://doi.org/10.1109/ACCESS.2021.3051602
- J. Fat, H. Candra, and W. Wiliam, “Sekuritisasi Data Sensor Pada Aplikasi Internet of Things (IoT) Dengan Menggunakan Blockchain Ethereum Di Jaringan Testnet,” TESLA J. Tek. Elektro, vol. 21, no. 1, p. 79, 2019. http://dx.doi.org/10.24912/tesla.v21i1.5886
- R. Zhang, R. Xue, and L. Liu, “Security and privacy on blockchain,” arXiv, vol. 1, no. 1, 2019.
- V. Singla, I. K. Malav, J. Kaur, and S. Kalra, “Develop Leave Application using Blockchain Smart Contract,” 2019 11th Int. Conf. Commun. Syst. Networks, COMSNETS 2019, vol. 2061, pp. 547–549, 2019. https://doi.org/10.1109/COMSNETS.2019.8711422
- F. Aprialim, Adnan, and A. W. Paundu, “Penerapan Blockchain dengan Integrasi Smart Contract pada Sistem Crowdfunding,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 5, no. 1, pp. 148–154, 2021. https://doi.org/10.29207/resti.v5i1.2613
- U. Rahardja, Q. Aini, M. Yusup, and A. Edliyanti, “Penerapan Teknologi Blockchain Sebagai Media Pengamanan Proses Transaksi E-Commerce,” Comput. Eng. Sci. Syst. J., vol. 5, no. 1, pp. 28–32, 2020. https://doi.org/10.24114/cess.v5i1.14893
- A. Fadlil, I. Riadi, and A. Nugrahantoro, “Data Security for School Service Top-Up Transactions Based on AES Combination Blockchain Technology,” Lontar Komput. J. Ilm. Teknol. Inf., vol. 11, no. 3, p. 155, 2020. https://doi.org/10.24843/LKJITI.2020.v11.i03.p04
- L. Ismanto, H. S. Ar, A. N. Fajar, Sfenrianto, and S. Bachtiar, “Blockchain as E-Commerce Platform in Indonesia,” J. Phys. Conf. Ser., vol. 1179, no. 1, 2019. https://doi.org/10.1088/1742-6596/1179/1/012114
- A. Rizky, S. Kurniawan, R. D. Gumelar, V. Kurniawan, and M. B. Prakoso, “Use Of blockchain technology in implementing information system security on education,” BEST (Journal Biol. Educ. Sains Technol., vol. 4, no. 1, pp. 62–70, 2021.
- Z. Wang, L. Yang, Q. Wang, D. Liu, Z. Xu, and S. Liu, “ArtChain: Blockchain-enabled platform for art marketplace,” Proc. - 2019 2nd IEEE Int. Conf. Blockchain, Blockchain 2019, pp. 447–454, 2019. https://doi.org/10.1109/Blockchain.2019.00068
- X. Zhu and D. Wang, “Research on Blockchain Application for E-Commerce, Finance and Energy,” IOP Conf. Ser. Earth Environ. Sci., vol. 252, no. 4, 2019. http://dx.doi.org/10.1088/1755-1315/252/4/042126
- A. Alam, S. M. Zia Ur Rashid, M. Abdus Salam, and A. Islam, “Towards Blockchain-Based E-voting System,” 2018 Int. Conf. Innov. Sci. Eng. Technol. ICISET 2018, pp. 351–354, 2018. https://doi.org/10.1109/ICISET.2018.8745613
- S. Shorman, M. Allaymoun, and O. Hamid, “Developing the E-Commerce Model a Consumer To Consumer Using Blockchain Network Technique,” Int. J. Manag. Inf. Technol., vol. 11, no. 02, pp. 55–64, 2019. http://dx.doi.org/10.5121/ijmit.2019.11204
- E. W. Richard Sharpe, “Wireshark User ’ s Guide,” Pp. 191, 2014.
- A. R. Shajina and P. Varalakshmi, “A novel dual authentication protocol (DAP) for multi-owners in cloud computing,” Cluster Comput., vol. 20, no. 1, pp. 507–523, 2017. https://doi.org/10.1007/s10586-017-0774-y
- X. Yang, Y. Chen, and X. Chen, “Effective scheme against 51% attack on proof-of-work blockchain with history weighted information,” Proc. - 2019 2nd IEEE Int. Conf. Blockchain, Blockchain 2019, pp. 261–265, 2019. https://doi.org/10.1109/Blockchain.2019.00041
- A. S. Anakath, S. Rajakumar, and S. Ambika, “Privacy preserving multi factor authentication using trust management,” Cluster Comput., vol. 22, pp. 10817–10823, 2019. https://doi.org/10.1007/s10586-017-1181-0
References
H. Lin, Z. Yan, Y. Chen, and L. Zhang, “A Survey on Network Security-Related Data Collection Technologies,” IEEE Access, vol. 6, pp. 18345–18365, 2018. https://doi.org/10.1109/ACCESS.2018.2817921
M. Rusdan and M. Sabar, “Analisis dan Perancangan Jaringan Wireless Dengan Wireless Distribution System Menggunakan User Authentication Berbasis Multi-Factor Authentication,” Jt. (Journal Inf. Technol., vol. 02, no. 01, pp. 17–24, 2020. https://doi.org/10.47292/joint.v2i1.004
A. W. P. Putra, A. Bhawiyuga, and M. Data, “Implementasi Autentikasi JSON Web Token ( JWT ) Sebagai Mekanisme Autentikasi Protokol MQTT Pada Perangkat NodeMCU,” J. Pengemb. Teknol. Inf. dan Ilmu Komput., vol. 2, no. 2, pp. 584–593, 2018.
Y. N. Kunang and T. Ibadi, “Celah Keamanan Sistem Autentikasi Wireless Berbasis RADIUS,” Celah Keamanan Sist. Autentikasi Wirel. Berbas. Radius, vol. 34, no. 2, pp. 1907–5022, 2013, doi: 1. Yesi Novaria Kunang 2. Taqrim Ibadi 3. Suryayusra.
U. Rahardja, E. P. Harahap, and D. D. Christianto, “Pengaruh Teknologi Blockchain Terhadap Tingkat Keaslian Ijazah,” Technomedia J., vol. 4, no. 2, pp. 211–222, 2019. https://doi.org/10.33050/tmj.v4i2.1107
N. I. Fauzan, “Abstrak,” vol. 4, pp. 1–15, 2018.
I. Riadi, R. Umar, and I. Busthomi, “Optimasi Keamanan Autentikasi dari Man in the Middle Attack ( MiTM ) Menggunakan Teknologi Blockchain,” vol. 04, pp. 15–19, 2020.
S. Hattab and I. F. Taha Alyaseen, “Consensus Algorithms Blockchain: A comparative study,” Int. J. Perceptive Cogn. Comput., vol. 5, no. 2, pp. 66–71, 2019. https://doi.org/10.31436/ijpcc.v5i2.103
Y. Zheng et al., “Blockchain-based privacy protection unified identity authentication,” Proc. - 2019 Int. Conf. Cyber-Enabled Distrib. Comput. Knowl. Discov. CyberC 2019, pp. 42–49, 2019. https://doi.org/10.1109/CyberC.2019.00017
E. P. Harahap, Q. Aini, and R. K. Anam, “Pemanfaatan Teknologi Blockchain Pada Platform Crowdfunding,” Technomedia J., vol. 4, no. 2, pp. 199–210, 2019. https://doi.org/10.33050/tmj.v4i2.1108
W. S. Raharjo, I. D. E. K. Ratri, H. Susilo, J. Wahidin, and S. Yogyakarta, “Implementasi Two Factor Authentication Dan Protokol Zero Knowledge Proof Pada Sistem Login,” vol. 3, no. April, pp. 127–136, 2017.
S. Damai et al., “Implementasi Blockchain : Studi Kasus e-Voting,” J. Infra Petra, no. 031, 2019.
L. Wan, D. Eyers, and H. Zhang, “Evaluating the impact of network latency on the safety of blockchain transactions,” Proc. - 2019 2nd IEEE Int. Conf. Blockchain, Blockchain 2019, pp. 194–201, 2019. https://doi.org/10.1109/Blockchain.2019.00033
N. Lasla, L. Alsahan, M. Abdallah, and M. Younis, “Green-PoW: An Energy-Efficient Blockchain Proof-of-Work Consensus Algorithm,” pp. 1–11, 2020.
G. Deep, R. Mohana, A. Nayyar, P. Sanjeevikumar, and E. Hossain, “Authentication protocol for cloud databases using blockchain mechanism,” Sensors (Switzerland), vol. 19, no. 20, pp. 1–13, 2019. https://doi.org/10.3390/s19204444
H. F. Putra, W. Wirawan, and O. Penangsang, “Penerapan Blockchain dan Kriptografi untuk Keamanan Data pada Jaringan Smart Grid,” J. Tek. ITS, vol. 8, no. 1, 2019. http://dx.doi.org/10.12962/j23373539.v8i1.38525
S. Gupta and M. Sadoghi, “Encyclopedia of Big Data Technologies,” Encycl. Big Data Technol., no. May, 2020. https://doi.org/10.1007/978-3-319-63962-8
O. Novo, “Scalable access management in IoT using blockchain: A performance evaluation,” IEEE Internet Things J., vol. 6, no. 3, pp. 4694–4701, 2019. https://doi.org/10.1109/JIOT.2018.2879679
H. Baharmand, N. Saeed, T. Comes, and M. Lauras, “Developing a framework for designing humanitarian blockchain projects,” Comput. Ind., vol. 131, p. 103487, 2021. https://doi.org/10.1016/j.compind.2021.103487
T. Salman, M. Zolanvari, A. Erbad, R. Jain, and M. Samaka, “Security services using blockchains: A state of the art survey,” IEEE Commun. Surv. Tutorials, vol. 21, no. 1, pp. 858–880, 2019. https://doi.org/10.1109/COMST.2018.2863956
S. Singh, A. S. M. Sanwar Hosen, and B. Yoon, “Blockchain Security Attacks, Challenges, and Solutions for the Future Distributed IoT Network,” IEEE Access, vol. 9, pp. 13938–13959, 2021. https://doi.org/10.1109/ACCESS.2021.3051602
J. Fat, H. Candra, and W. Wiliam, “Sekuritisasi Data Sensor Pada Aplikasi Internet of Things (IoT) Dengan Menggunakan Blockchain Ethereum Di Jaringan Testnet,” TESLA J. Tek. Elektro, vol. 21, no. 1, p. 79, 2019. http://dx.doi.org/10.24912/tesla.v21i1.5886
R. Zhang, R. Xue, and L. Liu, “Security and privacy on blockchain,” arXiv, vol. 1, no. 1, 2019.
V. Singla, I. K. Malav, J. Kaur, and S. Kalra, “Develop Leave Application using Blockchain Smart Contract,” 2019 11th Int. Conf. Commun. Syst. Networks, COMSNETS 2019, vol. 2061, pp. 547–549, 2019. https://doi.org/10.1109/COMSNETS.2019.8711422
F. Aprialim, Adnan, and A. W. Paundu, “Penerapan Blockchain dengan Integrasi Smart Contract pada Sistem Crowdfunding,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 5, no. 1, pp. 148–154, 2021. https://doi.org/10.29207/resti.v5i1.2613
U. Rahardja, Q. Aini, M. Yusup, and A. Edliyanti, “Penerapan Teknologi Blockchain Sebagai Media Pengamanan Proses Transaksi E-Commerce,” Comput. Eng. Sci. Syst. J., vol. 5, no. 1, pp. 28–32, 2020. https://doi.org/10.24114/cess.v5i1.14893
A. Fadlil, I. Riadi, and A. Nugrahantoro, “Data Security for School Service Top-Up Transactions Based on AES Combination Blockchain Technology,” Lontar Komput. J. Ilm. Teknol. Inf., vol. 11, no. 3, p. 155, 2020. https://doi.org/10.24843/LKJITI.2020.v11.i03.p04
L. Ismanto, H. S. Ar, A. N. Fajar, Sfenrianto, and S. Bachtiar, “Blockchain as E-Commerce Platform in Indonesia,” J. Phys. Conf. Ser., vol. 1179, no. 1, 2019. https://doi.org/10.1088/1742-6596/1179/1/012114
A. Rizky, S. Kurniawan, R. D. Gumelar, V. Kurniawan, and M. B. Prakoso, “Use Of blockchain technology in implementing information system security on education,” BEST (Journal Biol. Educ. Sains Technol., vol. 4, no. 1, pp. 62–70, 2021.
Z. Wang, L. Yang, Q. Wang, D. Liu, Z. Xu, and S. Liu, “ArtChain: Blockchain-enabled platform for art marketplace,” Proc. - 2019 2nd IEEE Int. Conf. Blockchain, Blockchain 2019, pp. 447–454, 2019. https://doi.org/10.1109/Blockchain.2019.00068
X. Zhu and D. Wang, “Research on Blockchain Application for E-Commerce, Finance and Energy,” IOP Conf. Ser. Earth Environ. Sci., vol. 252, no. 4, 2019. http://dx.doi.org/10.1088/1755-1315/252/4/042126
A. Alam, S. M. Zia Ur Rashid, M. Abdus Salam, and A. Islam, “Towards Blockchain-Based E-voting System,” 2018 Int. Conf. Innov. Sci. Eng. Technol. ICISET 2018, pp. 351–354, 2018. https://doi.org/10.1109/ICISET.2018.8745613
S. Shorman, M. Allaymoun, and O. Hamid, “Developing the E-Commerce Model a Consumer To Consumer Using Blockchain Network Technique,” Int. J. Manag. Inf. Technol., vol. 11, no. 02, pp. 55–64, 2019. http://dx.doi.org/10.5121/ijmit.2019.11204
E. W. Richard Sharpe, “Wireshark User ’ s Guide,” Pp. 191, 2014.
A. R. Shajina and P. Varalakshmi, “A novel dual authentication protocol (DAP) for multi-owners in cloud computing,” Cluster Comput., vol. 20, no. 1, pp. 507–523, 2017. https://doi.org/10.1007/s10586-017-0774-y
X. Yang, Y. Chen, and X. Chen, “Effective scheme against 51% attack on proof-of-work blockchain with history weighted information,” Proc. - 2019 2nd IEEE Int. Conf. Blockchain, Blockchain 2019, pp. 261–265, 2019. https://doi.org/10.1109/Blockchain.2019.00041
A. S. Anakath, S. Rajakumar, and S. Ambika, “Privacy preserving multi factor authentication using trust management,” Cluster Comput., vol. 22, pp. 10817–10823, 2019. https://doi.org/10.1007/s10586-017-1181-0