Analisis Keamanan Cloud Dengan Zero Trust Dan Blockchain Yang Tangguh
Abstract
This study integrates Zero Trust Architecture (ZTA) and Blockchain to strengthen cloud computing security. In the digital era, cloud computing has become a mainstream technology for data storage and processing globally. However, traditional perimeter-based security models have proven ineffective in dealing with modern threats, such as insider threats increasing by 60% and ransomware attacks on major cloud computing providers in 2022 resulting in billions of dollars in losses, highlighting the weaknesses of existing security models. Zero Trust Architecture (ZTA) offers a solution with a granular access control approach and layered authentication, but its implementation still faces challenges in efficiency and scalability, Blockchain, with its decentralized technology and immutable records, improves data transparency and integrity, but its use is often constrained by high energy consumption and latency. This study aims to explore between ZTA and Blockchain as innovative solutions to improve cloud security. By combining ZTA-based access control and Blockchain transparency, this study develops a security model that is resilient to both internal and external threats. Simulations show that ZTA and Blockchain integrity can reduce insider threats by 35% and increase data audit efficiency by 20%. This approach not only offers stronger protection but also provides an adaptive and transparent system for rapidly evolving cloud infrastructure.
References
F. Khoda Parast, C. Sindhav, S. Nikam, H. Izadi Yekta, K. B. Kent, and S. Hakak, “Cloud computing security: A survey of service-based models,” Comput. Secur., vol. 114, pp. 1–18, 2022, doi: 10.1016/j.cose.2021.102580.
A. D. PW and E. I. H. Ujianto, “Analisis Sistem Keamanan Pada Cloud Computing Menggunakan Metode Attack-Centric (Security System Analysis of Cloud Computing Using Attack-Centric Method),” Progresif J. Ilm. Komput., vol. 16, no. 1, pp. 57–68, 2020.
Y. Kusnanto, M. A. Nugroho, and R. Kartadie, “IMPLEMENTASI ZERO TRUST ARCHITECTURE UNTUK MENINGKATKAN KEAMANAN JARINGAN : PENDEKATAN,” vol. 9, no. 4, pp. 2357–2364, 2024.
A. Gupta, R. Gupta, D. Jadav, S. Tanwar, N. Kumar, and M. Shabaz, “Proxy smart contracts for zero trust architecture implementation in Decentralised Oracle Networks based applications,” Comput. Commun., vol. 206, pp. 10–21, 2023, doi: https://doi.org/10.1016/j.comcom.2023.04.022.
Y. Kim et al., “Exploring Effective Zero Trust Architecture for Defense Cybersecurity: A Study,” KSII Trans. Internet Inf. Syst., vol. 18, no. 9, pp. 2665–2691, 2024, doi: 10.3837/tiis.2024.09.011.
S. Ruoti, B. Kaiser, A. Yerukhimovich, J. Clark, and R. Cunningham, “Blockchain technology: What is it good for?,” Commun. ACM, vol. 63, no. 1, pp. 46–53, 2020, doi: 10.1145/3369752.
L. Alevizos, V. Thong Ta, and M. Hashem Eiza, “IEEE Augmenting Zero Trust Architecture to Endpoints Using Blockchain: A State-of-The-Art Review,” 9999.
Y. Xiao et al., “Decentralized Spectrum Access System: Vision, Challenges, and a Blockchain Solution,” IEEE Wirel. Commun., vol. 29, no. 1, pp. 220–228, 2022, doi: 10.1109/MWC.101.2100354.
B. Zhang, J. Xu, X. Wang, Z. Zhao, S. Chen, and X. Zhang, “Research on the Construction of Grain Food Multi-Chain Blockchain Based on Zero-Knowledge Proof,” Foods, vol. 12, no. 8, 2023, doi: 10.3390/foods12081600.
N. F. Syed, S. W. Shah, A. Shaghaghi, A. Anwar, Z. Baig, and R. Doss, “Zero Trust Architecture (ZTA): A Comprehensive Survey,” IEEE Access, vol. 10, pp. 57143–57179, 2022, doi: 10.1109/ACCESS.2022.3174679.
T. Studies, “Zero Trust Architecture: Enhancing Cybersecurity in Enterprise Networks,” pp. 54–59, 2024, doi: 10.32996/jcsts.
S. Ahmadi, “Zero Trust Architecture in Cloud Networks: Application, Challenges and Future Opportunities,” J. Eng. Res. Reports, vol. 26, no. 2, pp. 215–228, 2024, doi: 10.9734/jerr/2024/v26i21083.
A. Khanna, A. Sah, V. Bolshev, A. Burgio, and V. Panchenko, “Sensors-22-05238 (2) (1).Pdf,” 2022.
M. Rakhmansyah, U. Rahardja, N. P. L. Santoso, A. Khoirunisa, and A. Faturahman, “Smart Digital Signature berbasis Blockchain pada Pendidikan Tinggi menggunakan Metode SWOT,” ADI Bisnis Digit. Interdisiplin J., vol. 2, no. 1 Juni, pp. 39–47, 2021, doi: 10.34306/abdi.v2i1.325.
T. W. E. Suryawijaya, “Memperkuat Keamanan Data melalui Teknologi Blockchain: Mengeksplorasi Implementasi Sukses dalam Transformasi Digital di Indonesia,” J. Stud. Kebijak. Publik, vol. 2, no. 1, pp. 55–68, 2023, doi: 10.21787/jskp.2.2023.55-68.
A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “Blockchain for IoT security and privacy: The case study of a smart home,” 2017 IEEE Int. Conf. Pervasive Comput. Commun. Work. PerCom Work. 2017, no. March, pp. 618–623, 2017, doi: 10.1109/PERCOMW.2017.7917634.
B. T. Yulianto et al., “Rancang Bangun Private Server Menggunakan Platform Proxmox dan Penerapan Zero Trust Model dengan Cloudflare,” Desember.
G. R. Nabilla, “Tren Keamanan Informasi berbasis Blockchain di Masa Kini dan di Masa Mendatang.” [Online]. Available: https://www.researchgate.net/publication/370073770
T. Huynh-The et al., “Blockchain for the metaverse: A Review,” Futur. Gener. Comput. Syst., vol. 143, pp. 401–419, 2023, doi: 10.1016/j.future.2023.02.008.
S. Sarkar, G. Choudhary, S. K. Shandilya, A. Hussain, and H. Kim, “Security of Zero Trust Networks in Cloud Computing: A Comparative Review,” Sustain., vol. 14, no. 18, pp. 1–21, 2022, doi: 10.3390/su141811213.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Analisis Keamanan Cloud Dengan Zero Trust Dan Blockchain Yang Tangguh
Pages: 36 - 43
Copyright (c) 2024 Farhan Nur Aziz Bisri, Harry Pribadi Fitrian, Neni Neni, Muhammad Willy Al Fathir, Muhammad Jaisy Hizbulloh

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).