Computer
Science
and
Inf
ormation
T
echnologies
V
ol.
6,
No.
2,
July
2025,
pp.
214
∼
224
ISSN:
2722-3221,
DOI:
10.11591/csit.v6i2.pp214-224
❒
214
Blockchain
technology
f
or
optimizing
security
and
pri
v
acy
in
distrib
uted
systems
W
isnu
Uriawan,
Adryan
Putra
Pratama,
Shafwan
Mursyid
Department
of
Informatics,
F
aculty
of
Science
and
T
echnology
,
UIN
Sunan
Gunung
Djati,
Bandung,
Indonesia
Article
Inf
o
Article
history:
Recei
v
ed
Jul
21,
2023
Re
vised
May
9,
2025
Accepted
May
23,
2025
K
eyw
ords:
Blockchain
Distrib
uted
systems
Pri
v
ac
y
Security
T
echnology
ABSTRA
CT
Blockchain
technology
is
increasingly
recognized
as
an
ef
fecti
v
e
solution
for
addressing
security
and
pri
v
ac
y
challenges
in
distrib
uted
systems.
Blockchain
ensures
informat
ion
security
by
v
alidating
dat
a
and
defending
ag
ainst
c
yber
threats,
while
guaranteeing
data
inte
grity
through
transaction
v
alidation
and
reliable
storage.
The
research
in
v
olv
es
a
literature
study
,
problem
identication,
analysis
of
blockchain
security
and
pri
v
ac
y
,
model
de
v
elopment,
testing,
and
analysis
of
trial
results.
Furthermore,
blockchain
enables
user
anon
ymity
and
fosters
transparenc
y
by
utilizing
a
distrib
uted
netw
ork,
reducing
the
risk
of
fraudulent
acti
vities.
Its
decentralized
nature
ensures
high
reliability
and
accessibility
,
e
v
en
in
node
f
ailures.
Blockchain
enhances
security
and
pri
v
ac
y
by
of
fering
features
lik
e
data
immutability
,
pro
v
enance,
and
reduced
reliance
on
trust.
It
decentralizes
data
storage,
making
tampering
or
deletion
e
xtremely
challenging,
and
ensures
the
in
v
alidation
of
subsequent
blocks
upon
an
y
changes.
Blockchain
nds
applications
in
v
arious
domains,
including
supply
chains,
nance,
healthcare,
and
go
v
ernment,
enabling
enhanced
security
by
tracking
data
origin
and
o
wnership.
Despite
scalability
and
security
challenges,
the
potential
benets
of
reduced
costs,
increased
ef
cienc
y
,
and
impr
o
v
ed
transparenc
y
position
blockchain
as
a
promising
technology
for
the
future.
In
summary
,
blockchain
technology
pro
vides
secure
transaction
recording
and
data
storage,
thus
enhancing
security
,
pri
v
ac
y
,
and
the
inte
grity
of
sensiti
v
e
information
in
distrib
uted
systems.
This
is
an
open
access
article
under
the
CC
BY
-SA
license
.
Corresponding
A
uthor:
Shafw
an
Mursyid
Department
of
Informatics,
F
aculty
of
Science
and
T
echnology
,
UIN
Sunan
Gunung
Djati
Bandung,
Indonesia
Email:
shafw
anmursyid88@gmail.com
1.
INTR
ODUCTION
Distrib
uted
systems
ha
v
e
been
used
in
v
arious
elds,
including
nance,
healthcare,
automobile,
risk
management,
internet
of
things
(IoT),
and
public
and
social
services.
While
distrib
uted
systems
of
fer
man
y
benets,
the
y
also
ha
v
e
potential
dra
wbacks
when
it
comes
to
security
and
pri
v
ac
y
.
One
of
the
potential
dra
wbacks
of
using
distrib
uted
systems
is
centralized
control,
which
can
l
ead
to
a
single
point
of
f
ailure
or
attack
[1].
The
central
authority
controlling
the
system
is
compromised,
the
entire
system
can
be
compromised
as
well,
another
potential
dra
wback
of
using
distrib
uted
systems
i
s
the
lack
of
transparenc
y
and
immutability
of
data.
Unlik
e
blockchain
systems,
distrib
uted
systems
ma
y
not
ha
v
e
the
same
le
v
el
of
transparenc
y
and
immutability
,
which
can
lead
to
potential
security
and
pri
v
ac
y
concerns
[2],
that
data
can
be
easily
altered
or
deleted,
which
can
decrease
the
reliability
of
the
data.
Data
leaks
are
also
a
potential
dra
wback
of
using
J
ournal
homepage:
http://iaesprime
.com/inde
x.php/csit
Evaluation Warning : The document was created with Spire.PDF for Python.
Comput
Sci
Inf
T
echnol
ISSN:
2722-3221
❒
215
distrib
uted
systems.
Distrib
uted
systems
can
ha
v
e
pri
v
ac
y
concerns
due
to
the
potential
for
data
leaks
or
unauthori
zed
access
to
data
[2],
that
sensiti
v
e
data
may
be
e
xposed
to
unauthorized
parties,
which
can
lead
to
potential
security
and
pri
v
ac
y
concerns.
Finally
,
the
lack
of
trust
is
another
potential
dra
wback
of
using
distrib
uted
systems.
Distrib
uted
systems
may
not
ha
v
e
the
same
le
v
el
of
trust
as
blockchain
systems,
which
can
lead
to
potential
security
and
pri
v
ac
y
concerns
[3].
This
means
that
users
may
not
be
able
to
trust
the
system
to
protect
their
data
and
pri
v
ac
y
.
Ov
erall,
while
distrib
uted
systems
of
fer
man
y
benets,
the
y
also
ha
v
e
potential
dra
wbacks
when
it
comes
to
security
and
pri
v
ac
y
.
These
dra
wbacks
include
c
entralized
control,
lack
of
transparenc
y
and
immutability
of
data,
data
leaks,
and
lack
of
trust.
Blockchain
technology
can
help
address
some
of
these
potential
dra
wbacks
by
pro
viding
decentralization
and
distrib
uted
data
management,
preserving
data
pri
v
ac
y
,
increasing
the
reliability
and
transparenc
y
of
data,
using
smart
contracts,
and
combining
blockchain
and
articial
intelligence
(AI)
technologies.
Security
and
pri
v
ac
y
are
tw
o
important
aspects
of
distrib
uted
systems.
Blockchain
technology
has
the
ability
to
increase
security
and
pri
v
ac
y
in
distrib
uted
systems
because
e
v
ery
transaction
is
protected
with
strong
cryptographic
k
e
ys
and
user
identities
are
encrypted
s
o
that
the
y
can
only
be
accessed
with
proper
authorization.
In
addition,
blockchain
technology
also
allo
ws
each
user
to
v
erify
each
transaction
and
a
v
oid
fraud
or
detrimental
actions.
Ho
we
v
er
,
while
blockchain
technology
has
the
potential
to
impro
v
e
security
and
pri
v
ac
y
in
distrib
uted
systems,
its
implementation
also
requires
a
good
understanding
of
the
technology
and
ho
w
to
optimize
it.
Apart
from
that,
blockchain
technology
also
has
se
v
eral
challenges
such
as
scalability
and
high
transaction
fees.
Therefore,
there
is
a
need
for
further
research
and
de
v
elopment
in
t
h
e
implementation
of
blockchain
technology
in
distrib
uted
systems
[4].
Blockchain
technology
has
g
ained
signicant
attention
in
recent
years
as
a
secure
and
decentralized
system
for
storing
and
sharing
information.
Its
unique
features,
such
as
immutability
,
transparenc
y
,
and
decentralization,
ha
v
e
made
it
an
attracti
v
e
solution
for
a
v
ariety
of
use
cases,
including
nance,
supply
chain
management,
and
healthcare
[5].
Blockchain
technology
has
emer
ged
as
a
promising
solution
for
enhancing
security
and
pri
v
ac
y
in
distrib
uted
systems.
W
ith
its
decentralized
and
immutable
nature,
blockchain
pro
vides
a
secure
and
trustw
orth
y
mechanism
for
storing
and
e
xchanging
information
[6].
2.
RESEARCH
METHOD
This
research
describes
v
arious
stages
to
achie
v
e
the
results
that
will
pro
v
e
that
blockchain
pri
v
ac
y
and
security
that
able
to
impro
v
e
the
services.
2.1.
Pr
oblem
identication
The
initial
phase
of
this
research
i
n
v
olv
es
identifying
the
security
and
pri
v
ac
y
challenges
f
aced
by
distrib
uted
systems.
These
challenges
may
include
data
breaches,
unauthorized
access,
and
lack
of
trans-
parenc
y
.
By
closely
e
xamining
these
issues,
we
aim
to
g
ain
a
deeper
understanding
of
the
specic
obstacles
that
hinder
the
securit
y
and
pri
v
ac
y
of
distrib
uted
systems.
This
step
also
entails
dening
the
obj
ecti
v
es
and
research
questions
that
will
guide
our
in
v
estig
ation
and
form
the
basis
for
our
methodology
.
2.2.
Literatur
e
r
e
view
T
o
establish
a
foundation
for
this
research,
it
conduct
an
e
xtensi
v
e
re
vie
w
of
e
xisting
literature
on
blockchain
technology
and
its
applications
in
optimizing
security
and
pri
v
ac
y
in
distrib
uted
systems.
These
literature
re
vie
w
will
encompass
a
wide
range
of
sources,
including
academic
papers,
industry
reports,
and
case
studies.
By
thoroughly
e
xamining
the
body
of
kno
wledge
in
this
eld,
we
can
identify
rele
v
ant
studies,
frame
w
orks,
and
approaches
that
ha
v
e
addressed
similar
security
and
pri
v
ac
y
challenges.
This
re
vie
w
will
serv
e
as
the
basis
for
de
v
eloping
our
methodology
and
pro
vidi
ng
a
comprehensi
v
e
understanding
of
the
current
state
of
research
in
this
domain.
2.3.
Results
and
analysis
In
this
phase,
present
and
analyze
the
ndings
obtained
from
our
research,
which
may
include
both
theoretical
analysis
and
empirical
studies.
By
inte
grating
blockchain
technology
into
distrib
uted
systems,
the
purpose
is
to
e
v
aluate
its
impact
on
the
security
and
pri
v
ac
y
aspects.
W
e
assess
the
impro
v
ements
achie
v
ed,
such
as
enhanced
data
protection,
increased
transparenc
y
,
and
stronger
access
controls.
Moreo
v
er
,
identifying
an
y
limitations
or
trade-of
fs
encountered
during
the
implementation
of
blockchain
technology
and
discussing
Bloc
kc
hain
tec
hnolo
gy
for
optimizing
security
and
privacy
in
distrib
uted
systems
(W
isnu
Uriawan)
Evaluation Warning : The document was created with Spire.PDF for Python.
216
❒
ISSN:
2722-3221
their
im
p
l
ications.
Through
rigorous
analysis,
we
will
pro
vide
insights
into
the
ef
fecti
v
eness
of
blockchain
technology
in
optimizing
security
and
pri
v
ac
y
in
distrib
uted
systems.
2.4.
Conclusion
In
the
nal
phase
of
this
re
search,
we
will
summarize
the
k
e
y
ndings
deri
v
ed
from
our
study
.
W
e
will
emphasize
the
benets
of
inte
grating
blockchain
technology
as
a
means
to
optimize
security
and
pri
v
ac
y
in
distrib
uted
systems.
The
conclusions
dra
wn
from
our
analysis
will
be
presented,
highlighting
the
implica-
tions
and
potential
impact
of
this
research
on
the
eld.
W
e
will
pro
vide
recommendations
for
practitioners,
researchers,
and
polic
ymak
ers
based
on
our
ndings,
a
iming
to
guide
future
endea
v
ors
and
foster
the
adoption
of
blockchain
technology
for
impro
v
ed
security
and
pri
v
ac
y
in
distrib
uted
systems.
2.5.
Futur
e
w
ork
Identifying
potential
areas
for
future
research
and
de
v
elopment
is
crucial
for
adv
ancing
the
el
d
of
blockchain
technology
for
security
and
pri
v
a
c
y
in
distrib
uted
systems
[7],
[8].
In
this
phase,
we
will
outline
the
opportunities
for
further
in
v
estig
ation
and
propose
inno
v
ati
v
e
approaches,
methodologies,
or
technologies
that
can
enhance
securi
ty
and
pri
v
ac
y
in
distrib
uted
systems.
W
e
will
also
highlight
an
y
research
g
aps
or
unresolv
ed
issues
that
require
further
e
xplorati
o
n.
By
delineating
future
w
ork,
we
aim
to
inspire
researchers
and
practitioners
to
delv
e
deeper
into
this
eld
and
contrib
ute
to
its
gro
wth.
3.
RESUL
TS
AND
DISCUSSION
In
this
section,
we
pro
vide
the
results
of
the
research
and
gi
v
e
a
comprehensi
v
e
discussion
(contrib
u-
tion).
The
discussion
sho
ws
opportunities
for
future
w
ork
or
further
research.
3.1.
Result
Blockchain
has
become
an
increasingly
popular
topic
in
recent
years
due
to
its
ability
to
pro
vide
inno
v
ati
v
e
security
and
pri
v
ac
y
solutions.
This
research
discusses
the
ability
of
blockchain
technology
to
optimize
security
and
pri
v
ac
y
in
distrib
uted
systems.
Firstly
,
blockchain
of
fers
strong
information
security
by
v
alidating
data
in
link
ed
blocks.
This
ensures
that
data
is
dif
cult
to
branch
or
edit
without
the
appro
v
al
of
all
nodes
in
the
netw
ork.
Therefore,
blockchain
technology
can
help
prot
ect
sensiti
v
e
information
from
c
yber
attacks
or
hac
k
i
ng.
This
is
especially
important
for
com
panies
and
or
g
anizations
that
need
protection
ag
ainst
e
v
er
-increasing
c
yber
-attacks.
Secondly
,
the
blockchain
also
ensures
data
inte
grity
by
v
alidating
each
ne
w
transaction
before
it
is
entered
into
the
netw
ork.
This
mak
es
the
data
cannot
be
edited
without
the
consent
of
a
ll
nodes
in
the
netw
ork,
thereby
ensuring
that
the
data
stored
is
accurate
and
reliable.
Data
inte
grity
is
an
important
f
actor
in
man
y
b
usinesses
and
or
g
anizations,
especially
when
there
are
nancial
transactions
being
carried
out.
The
ne
xt,
blockchain
enables
anon
ymity
for
users
by
storing
their
identity
in
the
form
of
a
digital
address
that
cannot
be
traced
back
to
their
original
identity
[9].
This
mak
es
blockchain
technology
suitable
for
applications
that
require
pri
v
ac
y
such
as
online
payments
or
fund
transfers.
This
pro
vides
pri
v
ac
y
protection
for
users
without
compromising
security
.
Blockchain
mak
es
data
and
trans
actions
transparent
because
data
is
stored
in
a
dis-
trib
uted
netw
ork
and
can
be
accessed
by
an
yone
with
access
to
the
netw
ork.
This
helps
reduce
the
risk
of
ab
use
or
fraud,
thereby
ensuring
that
the
data
and
transactions
stored
are
accurate
and
reliable.
This
transparenc
y
gi
v
es
condence
to
users
that
their
data
will
be
processed
correctly
and
transactions
will
be
carried
out
hon-
estly
and
f
airly
.
Blockchain
has
high
reliability
because
data
is
stored
in
a
distrib
uted
netw
ork.
If
one
of
the
nodes
is
damaged,
data
can
still
be
accessed
through
other
nodes.
This
ensures
that
data
remains
a
v
ailable
and
accessible
e
v
en
if
there
is
an
interruption
at
one
of
the
nodes
in
the
netw
ork.
This
reliability
is
v
ery
important
in
distrib
uted
systems
that
require
high
accessibility
.
Blockchain
technology
is
a
re
v
olutionary
soluti
on
for
enhancing
security
and
pri
v
ac
y
in
distrib
uted
systems.
By
utilizing
its
unique
features,
or
g
anizations
can
mitig
ate
v
arious
vulnerabiliti
es
and
safe
guard
sensi-
ti
v
e
information.
One
signicant
adv
antage
of
blockchain
is
its
ability
to
maintain
data
immutability
.
Through
cryptographic
linking
of
blocks,
the
inte
grity
of
data
becomes
practically
unalterable,
pro
viding
assurance
ag
ainst
unauthorized
modications.
Additionally
,
blockchain’
s
distrib
uted
consensus
mechanis
m
strengthens
security
by
eliminating
the
dependence
on
a
single
controlling
entity
.
This
decentralization
pre
v
ents
fraudulent
acti
vities
and
ensures
the
o
v
erall
system’
s
reliability
.
Moreo
v
er
,
blockchain
systems
emplo
y
rob
ust
authentica-
tion
measures,
guaranteeing
the
v
erication
of
user
identities
and
thw
arting
unauthorized
access
attempts.
Comput
Sci
Inf
T
echnol,
V
ol.
6,
No.
2,
July
2025:
214–224
Evaluation Warning : The document was created with Spire.PDF for Python.
Comput
Sci
Inf
T
echnol
ISSN:
2722-3221
❒
217
Furthermore,
pri
v
ac
y
concerns
can
be
addressed
using
blockchain
technology
.
By
encrypting
data,
only
authorized
indi
viduals
possess
the
decryption
k
e
ys,
granting
them
e
xclusi
v
e
access.
This
capability
is
particularly
crucial
for
sensiti
v
e
information
such
as
medical
records
or
nancial
details,
where
maintaining
pri
v
ac
y
is
truly
important.
Real-w
orld
applications
of
blockchain
technology
illustrate
its
potential
in
opti-
mizing
security
and
pri
v
ac
y
in
v
arious
sectors.
F
or
instance,
in
supply
chain
management,
blockchain
enables
traceability
,
ensuring
the
authenticity
and
origin
of
goods
while
combating
counterfeiting
[10].
In
healthcare,
blockchain-based
systems
securely
store
patient
rec
ords,
protecting
sensiti
v
e
data
and
f
acilitating
ef
cient
access
for
healthcare
pro
viders.
Financial
services
ha
v
e
also
le
v
eraged
blockchain
tech-
nology
to
c
reate
inno
v
ati
v
e
products
and
services.
Smart
contracts,
po
wered
by
blockchain,
enable
automated
and
transparent
nancial
transactions,
enhancing
ef
cienc
y
and
security
.
As
blockchain
technology
contin-
ues
to
adv
ance,
we
can
anticipate
further
groundbreaking
applications
that
capitalize
on
its
ability
to
optimize
security
and
pri
v
ac
y
in
distrib
uted
systems.
Its
potential
to
transform
industries
and
protect
v
aluable
data
is
undoubtedly
a
compelling
prospect
for
the
future.
Blockchain
technology
f
amous
in
v
arious
elds,
including:
nance,
heal
thcare,
automobile,
risk
management,
IoT
,
and
public
and
social
services
[11],
[12].
Blockchain
technology
of
fers
enhanced
relia-
bility
and
ef
cienc
y
,
it
is
crucial
to
ackno
wledge
the
security
,
pri
v
ac
y
concerns,
and
challenges
associated
with
this
cutting-edge
technology
.
A
comprehensi
v
e
surv
e
y
encompassing
technical
and
application
perspecti
v
es
has
yet
to
be
undertak
en.
Ho
we
v
er
,
in
a
recent
surv
e
y
paper
,
the
authors
aim
to
bridge
this
g
ap
by
conducting
an
e
xtensi
v
e
e
xamination
of
blockchain
technology
.
Exploring
v
arious
aspects,
such
as
its
structure,
dif
ferent
consensus
algorithms,
the
challenges
and
opportunities
related
t
o
data
security
,
and
pri
v
ac
y
in
blockchains.
Additionally
,
the
authors
pro
vide
insights
into
potential
future
trends
and
adv
ancements
that
the
blockchain
technology
may
adopt
in
the
coming
years
[12],
[13].
Blockchain
technology
has
re
v
olutionized
the
concept
of
trust
by
of
fering
a
decentralized
and
distrib
uted
data
management
solution
that
ensures
security
,
pri
v
ac
y
,
and
data
inte
grity
without
relying
on
in-
termediaries.
Ho
we
v
er
,
it
is
important
to
ackno
wledge
the
e
xisting
technological
dif
culties
and
limitations
associated
with
blockchain.
In
a
systematic
comparati
v
e
study
,
researchers
ha
v
e
e
xamined
the
current
applica-
tions
of
blockchain
in
c
yber
-security
.
The
paper
assesses
the
adv
antages
that
blockchain
brings
to
the
eld
of
c
yber
-security
and
pro
vides
a
comprehensi
v
e
o
v
ervie
w
of
recent
studies
and
blockchain
applications
in
v
arious
c
yber
-security
domains.
By
addressing
security
challenges,
the
paper
identies
and
thoroughly
in
v
estig
ates
four
k
e
y
security
issues
related
to
blockchain
through
e
xtensi
v
e
research
and
analysis
of
e
xisting
w
ork
[13].
A
surv
e
y
paper
highlights
the
potential
of
blockchain
technology
as
a
solution
for
enhancing
s
ecurity
in
electronic
health
record
(EHR)
systems.
Ho
we
v
er
,
the
use
of
blockchain
as
a
public
database
poses
potential
pri
v
ac
y
challenges
for
ra
w
or
encrypted
data
stored
in
the
public
ledger
,
as
sensiti
v
e
information
may
be
at
risk
of
e
xposure
during
statistical
attacks.
T
o
address
this,
data
in
the
ledger
can
be
stored
in
an
encrypted
format
using
v
arious
cryptographic
techniques,
thereby
safe
guarding
data
pri
v
ac
y
.
Additionally
,
users
can
adopt
pseudo-anon
ymity
measures
to
protect
their
real
identities
while
eng
aging
with
the
system
[1].
The
gro
wing
interest
in
Central
Bank
Digital
Currencies
(CBDCs)
has
emphasized
the
import
ance
of
implementing
suitable
security
technologies
to
protect
the
pri
v
ac
y
of
CBDCs
users.
While
the
architecture
of
the
CBDCs
system
shares
connections
with
le
g
ac
y
payment
systems
and
public
blockchain
systems,
the
security
and
pri
v
ac
y
challenges
of
CBDCs
dif
fer
signicantly
from
e
xisting
systems
due
to
their
focus
on
auditable
pri
v
ac
y
.
A
surv
e
y
paper
pro
vides
a
comprehensi
v
e
classication
of
security
and
pri
v
ac
y
issues
in
CBDCs
systems
across
k
e
y
areas
such
as
identity
,
transactions,
consensus,
and
auditability
.
Additionally
,
the
paper
highlights
research
g
aps
arising
from
the
unique
charact
eristics
of
CBDCs,
including
challenges
related
to
authorized
audit
risk
and
cross-border
payments
[14].
Smart
en
vironments
encompass
a
wide
range
of
interconnected
de
vices
and
computing
units
aimed
at
enhancing
human
life.
As
data
generation
within
these
en
vironments
continues
to
sur
ge,
the
need
for
ef
cient
data
management
becomes
crucial.
T
o
address
this,
man
y
enterprises
are
turning
to
blockchain
technology
as
a
viable
solution.
Blockchain,
functioning
as
a
distrib
uted
transaction
ledger
,
of
fers
data
reliability
and
transparenc
y
.
Ho
we
v
er
,
blockchain
technology
encounters
inherent
security
challenges
such
as
denial
of
service
(DoS),
eclipse
and
double
spending
attacks,
as
well
as
adv
anced
persistent
threat
(APT)
and
mal
w
are
risks.
T
o
tackle
these
challenges,
adv
anced
anomaly
detection
and
mitig
ation
approaches,
particularly
those
utilizing
AI
techniques
such
as:
machine
learning,
deep
learning,
and
federated
learning.
The
combined
utilization
of
AI
and
blockchain
technology
enables
accurate
anomaly
detection
within
blockchain
netw
orks.
In
a
surv
e
y
paper
,
the
authors
delv
e
into
the
obstacles
f
aced
by
blockchain
deplo
yment
in
sm
art
Bloc
kc
hain
tec
hnolo
gy
for
optimizing
security
and
privacy
in
distrib
uted
systems
(W
isnu
Uriawan)
Evaluation Warning : The document was created with Spire.PDF for Python.
218
❒
ISSN:
2722-3221
en
vironments.
Furthermore,
the
y
e
xplore
the
potential
of
AI-based
anomaly
detection
techniques
as
a
solution
to
security
issues
in
such
en
vironments.
Their
proposed
frame
w
ork
emphasizes
the
inte
gration
of
AI-based
anomaly
detection
methods
to
ef
fecti
v
ely
address
security
concerns
[15].
Blockchain
technology
of
fers
man
y
adv
antages
in
optimizing
security
and
pri
v
ac
y
in
distrib
uted
systems.
This
can
help
protect
sensiti
v
e
infor
-
mation
from
c
yber
attacks,
ensure
data
inte
grity
,
pro
vide
anon
ymity
for
users,
ensure
transparenc
y
and
trust,
and
high
reliability
in
accessing
data.
By
le
v
eraging
blockchain
technology
,
or
g
anizations
and
companies
can
impro
v
e
security
and
pri
v
ac
y
in
their
distrib
uted
systems,
thereby
strengthening
their
position
in
the
mark
et.
This
pro
v
es
that
blockchain
is
a
technology
that
can
increase
the
security
and
pri
v
ac
y
of
distrib
uted
systems.
Apart
from
that,
blockchain
technology
also
ensures
data
inte
grity
by
v
alidating
each
ne
w
transaction
before
it
is
entered
into
the
netw
ork.
Thus,
the
data
stored
in
the
blockchain
is
v
ery
dif
cult
to
edit
without
the
consent
of
all
nodes
in
the
netw
ork
[13].
In
a
distrib
uted
system
using
traditional
technology
,
data
stored
at
e
ach
node
in
the
netw
ork
can
be
f
alsied
or
altered
by
irresponsible
parties,
causing
data
inaccuracies
and
af
fecting
the
inte
grity
of
the
system
as
a
whole.
Apart
from
that,
anon
ymity
is
another
important
feature
in
blockchain
technology
.
By
storing
users’
identities
in
the
form
of
digital
addresses
that
cannot
be
traced
back
to
their
original
identities,
blockchain
tech-
nology
enables
better
pri
v
ac
y
for
users.
This
mak
es
blockchain
technology
suitable
for
applications
that
require
pri
v
ac
y
such
as
online
payments
or
fund
transfers.
In
traditional
systems,
online
transactions
can
be
track
ed
and
monitored
by
certain
parties,
thereby
increasing
the
risk
of
disclosing
personal
information.
Ho
we
v
er
,
by
using
the
blockchain,
users
can
maintain
their
anon
ymity
while
making
online
transactions
.
In
addition
to
maintaining
security
and
pri
v
ac
y
,
blockchain
technology
can
also
increase
transparenc
y
in
distrib
uted
systems.
The
data
and
transactions
stored
on
the
blockchain
are
accessible
to
an
yone
with
access
to
the
net-
w
ork.
This
helps
reduce
the
risk
of
ab
use
or
f
raud,
thereby
ensuring
that
the
data
and
transactions
stored
are
accurate
and
reliable.
In
a
distrib
uted
system
that
uses
tradit
ional
technology
,
data
and
transactions
may
not
be
accessible
to
all
parties
in
v
olv
ed,
increasing
the
risk
of
ab
use
or
fraud.
Ho
we
v
er
,
using
the
blockchain,
each
ne
w
transaction
must
be
v
eried
by
all
nodes
in
the
netw
ork
before
being
included
in
the
block,
thus
ensur
-
ing
that
the
data
and
transactions
stored
are
accurate
and
trustw
orth
y
.
Then,
reliability
is
another
feature
of
blockchain
technology
that
mak
es
it
ideal
for
use
in
distrib
uted
systems.
Because
data
is
stored
in
a
distrib
uted
netw
ork,
if
one
node
is
damaged,
data
can
still
be
accessed
through
other
nodes.
This
ensures
that
data
remains
a
v
ailable
and
accessible
e
v
en
if
there
is
an
interruption
at
one
of
the
nodes
in
the
netw
ork.
Blockchain
technology
has
v
arious
features
that
mak
e
it
an
ef
fecti
v
e
solution
for
increasing
security
and
pri
v
ac
y
in
distrib
uted
systems.
In
this
research,
the
authors
ha
v
e
discussed
information
security
,
data
inte
grity
,
anon
ymity
,
transparenc
y
,
and
reliability
as
k
e
y
features
of
blockchain
technology
that
can
help
impro
v
e
security
and
pri
v
ac
y
in
distrib
uted
systems.
Therefore
,
blockchain
technology
can
be
used
as
an
ef
fecti
v
e
solution
to
x
vulnerabi
lities
of
scattered
systems
that
are
often
vulnerable
to
c
yber
attacks
or
hacks.
Blockchain
also
of
fers
solutions
to
impro
v
e
security
and
pri
v
ac
y
in
distrib
uted
systems.
F
or
e
xample,
in
a
distrib
uted
system
using
traditional
technology
,
data
stored
at
each
node
in
the
netw
ork
can
be
acce
ssed
by
an
yone
who
has
access
t
o
that
node.
This
increases
the
risk
of
disclosure
of
sensiti
v
e
data
and
information
leakage
[16].
Ho
we
v
er
,
using
a
blockchain,
data
is
stored
in
link
ed
blocks
that
v
alidate
each
other
,
making
it
more
dif
cult
for
data
to
be
stolen
or
edited
without
the
consent
of
all
nodes
in
the
netw
ork.
Thus,
blockchain
technology
can
help
impro
v
e
security
and
pri
v
ac
y
in
distrib
uted
systems.
The
Figure
1
sho
ws
e
v
e
ry
layer
in
the
blockchain
system
has
security
re
vie
w
to
pass
do
wn
the
data
from
one
to
another
.
The
data
has
to
be
passed
this
security
re
vie
w
to
be
able
to
mo
v
e
onto
the
ne
xt
layer
of
the
system.
W
ith
that
kind
of
security
system,
blockchain
has
pro
v
en
that
not
only
the
secured
data
on
the
input
nor
the
output,
b
ut
it
has
done
so
man
y
times
before
it
can
pass
onto
the
ne
xt
layer
.
Blockchain
technology
uses
se
v
eral
cryptographic
techniques
to
ensure
data
pri
v
ac
y
and
security
lik
e
cryptograph
y
,
hashing,
digital
signatures,
zero-kno
wledge
proofs,
and
secure
multi-party
computation.
Cryptograph
y
is
used
in
blockchain
technology
to
secure
transactions
and
data.
Blockchain
technology
uses
cryptographic
algorithms
such
as
SHA-256
and
Ell
iptic
Curv
e
Digital
Signature
Algorithm
(ECDSA)
to
ensure
the
authenti
city
and
inte
grity
of
data.
Hashing
is
a
t
echnique
used
in
blockchain
technology
to
create
a
unique
digital
ngerprint
of
data.
Blockchain
technology
uses
hashing
algorithms
such
as
SHA-256
to
create
a
unique
hash
for
each
block
in
the
chain.
Hashing
is
used
to
ensure
that
data
is
not
duplicated
or
altered.
The
use
of
hashing
in
blockchain
technology
ensures
that
data
is
secure
and
cannot
be
tampered
with.
Digital
signatures
are
a
technique
used
in
blockchain
technology
to
ensure
the
authenticity
of
trans
actions.
Blockchain
technology
uses
digital
signature
algorithms
such
as
ECDSA
to
ensure
that
transactions
are
signed
by
the
correct
parties
[15],
[17],
[18].
Comput
Sci
Inf
T
echnol,
V
ol.
6,
No.
2,
July
2025:
214–224
Evaluation Warning : The document was created with Spire.PDF for Python.
Comput
Sci
Inf
T
echnol
ISSN:
2722-3221
❒
219
Digital
signatures
are
used
to
ensure
that
transactions
are
not
tampered
with
and
that
the
y
are
e
x
ecuted
as
intended.
Zero-kno
wledge
proofs
are
a
cryptographic
technique
used
in
blockchain
technology
to
pro
v
e
the
authenticity
of
data
without
re
v
ealing
the
data
itself.
Zero-kno
wledge
proofs
are
used
to
enhance
pri
v
ac
y
and
security
in
blockchain
transactions.
Zero-kno
wledge
proofs
ensure
that
data
is
secure
and
cannot
be
accessed
by
unauthorized
parties.
Secure
multi-party
computation
is
a
cryptographic
technique
used
in
bl
ockchain
tech-
nology
to
enable
multiple
parties
to
compute
a
function
on
their
inputs
without
re
v
ealing
their
inputs
to
each
other
[19].
Figure
1.
Blockchain
structure
Secure
multi-party
computation
is
used
to
enhance
pri
v
ac
y
and
security
in
blockchain
transacti
ons.
Secure
multi-party
computation
ensures
that
data
i
s
secure
and
cannot
be
accessed
by
unauthorized
parties.
In
summary
,
blockchain
technology
uses
se
v
eral
cryptographic
techniques
such
as
cryptograph
y
,
hashing,
digital
signatures,
zero-kno
wledge
proofs,
and
secure
multi-party
computation
to
ensure
data
pri
v
ac
y
and
security
.
These
techniques
ensure
the
authenticity
,
inte
grity
,
and
condentiality
of
data
in
blockchain
transactions.
The
use
of
these
cryptographic
techniques
ensures
that
data
is
secure
and
cannot
be
tampered
with
or
accessed
by
unauthorized
parties.
3.2.
Discussion
In
2018,
W
almart
already
collaborated
with
IBM
to
de
v
elop
a
supply
chain
management
system
t
hat
used
blockchain
technology
to
track
the
origin
of
its
food
products
and
impro
v
e
food
safety
[20].
This
system,
which
relied
on
IBM’
s
Hyperledger
F
abric
blockchain,
aimed
to
create
a
transparent
and
secure
record
of
each
product’
s
journe
y
from
the
f
arm
to
the
store.
The
blockchain-based
system
helped
W
almart
to
enhance
food
traceability
,
reduce
the
time
it
tak
es
to
identify
the
source
of
contaminated
food,
and
impro
v
e
food
safety
by
quickly
detecting
potential
issues.
Additionally
,
the
system
pro
vided
greate
r
transparenc
y
and
accountability
in
the
supply
chain
by
allo
wing
all
parties
in
v
olv
ed
to
access
the
same
information
about
each
product’
s
journe
y
.
Moreo
v
er
,
the
smart
contract
capabilities
of
the
system
enabled
W
almart
to
automate
certain
aspects
of
the
supply
chain,
such
as
payment
processing
and
compliance
with
food
safety
re
gulations,
resulting
in
a
reduced
risk
of
fraud
and
errors.
By
using
blockchain
technology
,
W
almart
could
impro
v
e
security
and
pri
v
ac
y
in
its
supply
chain
management
system,
as
the
decentralized
and
immutable
nature
of
the
blockchain
ensured
a
secure
record
of
all
transactions
while
k
eeping
sensiti
v
e
information
pri
v
ate
and
only
accessible
by
authorized
parties.
This
case
study
highlights
the
potential
of
blockchain
technology
to
optimize
security
and
pri
v
ac
y
in
supply
chain
management
and
other
industries
by
of
fering
a
transparent
and
secure
record
of
all
transactions,
allo
wing
automation
of
specic
processes,
and
impro
ving
traceability
and
accountability
[21].
Case
study
that
blockchain
already
used
to
public
services
to
secure
data
of
a
nation.
In
Estonia,
is
kno
wn
for
its
inno
v
ati
v
e
use
of
technology
,
and
one
of
its
most
notable
implementations
is
its
blockchain-based
Bloc
kc
hain
tec
hnolo
gy
for
optimizing
security
and
privacy
in
distrib
uted
systems
(W
isnu
Uriawan)
Evaluation Warning : The document was created with Spire.PDF for Python.
220
❒
ISSN:
2722-3221
national
identity
system,
called
e-Residenc
y
.
The
system,
which
w
as
launched
in
2014,
enables
indi
viduals
to
apply
for
a
di
g
i
tal
ID
card,
which
can
be
used
to
access
a
range
of
go
v
ernment
and
pri
v
ate
sector
services
online
[22].
The
e-Residenc
y
system
is
b
uilt
on
the
blockchain
and
uses
cryptographic
protocols
to
secure
users’
identities
and
personal
data.
The
system
also
pro
vides
a
secure
and
transparent
record
of
all
transactions,
which
enables
indi
vidual
s
to
track
who
has
accessed
their
data
and
for
what
purpose.
The
sys
tem’
s
decentralized
architecture
means
that
users
ha
v
e
control
o
v
er
their
data
and
can
choose
who
has
access
to
it,
which
enhances
pri
v
ac
y
and
security
.
The
e-Residenc
y
system
has
been
a
success
in
Estonia,
with
o
v
er
70,000
people
from
150
countries
ha
ving
applied
for
an
e-Residenc
y
card.
The
system
has
also
inspired
other
countries
to
e
xplore
the
use
of
blockchain
technology
in
their
national
identity
s
ystems.
This
case
study
demonstrates
the
potential
of
blockchain
technology
to
optimize
security
and
pri
v
ac
y
in
national
identity
systems,
by
pro
viding
a
secure
and
transparent
record
of
all
transactions,
enabling
indi
viduals
to
control
their
data,
and
enhancing
pri
v
ac
y
and
security
.
The
high
potential
on
those
idea
that
didn’
t
use
blockchain
technology
before
if
it
used
the
blockchain
technology
,
for
e
xample
the
v
oting
syste
m.
A
blockchain-based
v
oting
system
w
ould
enable
indi
viduals
to
cast
their
v
otes
electronically
in
a
secure
and
transparent
manner
.
The
system
w
ould
use
a
distrib
uted
ledger
technology
to
record
and
v
erify
e
v
ery
v
ote,
ensuring
that
the
results
are
accurate
and
tamper
-proof.
T
o
use
this
system,
v
oters
w
ould
need
to
ha
v
e
a
digital
w
allet
that
is
connected
to
the
blockchain.
When
a
v
oter
casts
their
v
ote,
the
transaction
w
oul
d
be
recorded
on
the
blockchain
as
a
ne
w
block,
which
w
ould
i
nclude
the
v
oter’
s
identity
and
their
choice.
Each
block
w
ould
be
link
ed
to
the
pre
vious
block,
creating
an
immutable
and
transparent
chain
of
data.
Once
the
v
oting
period
is
o
v
er
,
the
results
w
oul
d
be
calculated
by
counting
the
number
of
v
otes
for
each
candidate
or
option.
As
the
blockchain
is
decent
ralized,
this
process
can
be
done
in
real-time
by
an
yone
with
access
to
the
blockchain.
The
use
of
blockchain
technology
in
v
oting
systems
has
se
v
eral
adv
antages.
First,
it
eliminates
the
need
for
a
central
authority
to
o
v
ersee
the
v
oting
process,
reducing
the
risk
of
fraud
or
manipulation.
Second,
it
ensures
the
pri
v
ac
y
of
the
v
oters,
as
their
identities
are
k
ept
anon
ymous
on
the
blockchain.
Finally
,
it
pro
vides
greater
transparenc
y
and
accountability
,
as
the
results
are
publicly
a
v
ailable
and
cannot
be
altered
[23],
[24].
Ho
we
v
er
,
there
are
also
challenges
in
implementing
a
blockchain-based
v
oting
system,
such
as
en-
suring
the
security
of
the
digital
w
alle
ts,
pre
v
enting
double
v
oting,
and
ensuring
that
e
v
eryone
has
access
to
the
technology
.
Despite
these
challenges,
blockchain-based
v
oting
systems
ha
v
e
the
potential
to
re
v
olutionize
the
w
ay
we
v
ote
by
pro
viding
a
secure
and
transparent
alternati
v
e
to
traditional
v
oting
methods.
Blockchain
technology
holds
immense
promise
for
enhancing
security
and
pri
v
ac
y
in
distrib
uted
systems.
Nonetheless,
it
is
crucial
to
address
e
xisting
t
echnological
hurdles
and
limitations
associated
with
blockchain.
T
o
bolster
the
se-
curity
and
pri
v
ac
y
of
blockchain
systems,
the
follo
wing
measures
can
be
undertak
en.
Firstly
,
a
comprehensi
v
e
surv
e
y
encompassing
both
technical
and
applications
perspecti
v
es
can
be
conducted.
This
surv
e
y
w
ould
delv
e
into
the
i
ntricate
structure
of
blockchain
technology
,
including
v
arious
consensus
algorithms,
while
e
xploring
the
challenges
and
opportunities
it
presents
in
terms
of
data
security
and
pri
v
ac
y
[16],
[23].
Conducting
a
comprehensi
v
e
comparison
of
blockchain
applications
in
the
realm
of
c
yber
-security
can
shed
light
on
the
benets
that
blockchain
has
brought
to
this
domain.
This
comparison
w
ould
e
v
aluate
recent
studies
and
highlight
v
arious
blockchain
applications
in
c
yb
e
r
-security
is
related
elds.
By
conducting
such
an
analysis,
it
becomes
possible
to
address
the
security
challenges
pre
v
alent
in
c
yber
-security
and
propose
ef
fecti
v
e
solutions
to
mitig
ate
them
[13].
This
can
help
identify
potential
security
challenges
of
blockchain
and
propose
soluti
ons
to
address
them.
T
o
ensure
the
preserv
ation
of
data
pri
v
ac
y
,
it
is
crucial
to
consider
the
actual
deplo
yment
of
the
system.
By
emplo
ying
v
arious
cryptographic
techniques,
such
as
encryption,
data
can
be
stored
in
the
ledger
in
an
encrypted
form.
This
approach
signicant
ly
enhances
data
pri
v
ac
y
,
safe
guarding
sensiti
v
e
information
from
unauthorized
access
or
e
xposure
[1].
In
addition,
users
ha
v
e
the
ability
to
safe
guard
their
real
identities
through
a
concept
kno
wn
as
pseudo-
anon
ymity
.
This
means
that
whil
e
participating
in
transactions
or
interactions
within
system,
users
can
maintain
a
le
v
el
of
anon
ymity
,
protecting
their
true
identities.
T
o
further
strengthen
the
system’
s
resilience
and
reliability
,
the
introduction
of
smart
contracts
is
recommended.
These
contracts
are
self-e
x
ecuting
and
contain
predened
terms
and
c
o
ndi
tions
written
directly
into
the
code,
ensuring
automated
and
trust
w
orth
y
agreements
between
parties
in
v
olv
ed
[1].
Decentralizati
on
and
distri
b
ut
ed
data
managem
ent
are
fundam
ental
aspects
of
blockchain
technology
.
By
adopting
a
decentralized
approach,
blockchain
redenes
trust
by
eliminating
the
need
for
intermediaries
or
third
parties.
This
ensures
enhanced
securi
ty
,
pri
v
ac
y
,
and
data
inte
grity
within
the
system.
Through
its
distrib
uted
nature,
blockchain
pro
vides
a
rob
ust
frame
w
ork
where
data
is
shared
across
multiple
Comput
Sci
Inf
T
echnol,
V
ol.
6,
No.
2,
July
2025:
214–224
Evaluation Warning : The document was created with Spire.PDF for Python.
Comput
Sci
Inf
T
echnol
ISSN:
2722-3221
❒
221
nodes,
ensuring
transparenc
y
and
reliability
without
relying
on
a
central
authority
or
single
point
of
control.
This
decentralized
and
distrib
uted
data
management
solution
re
v
olutionizes
traditional
trust
models,
of
fering
a
ne
w
paradigm
for
secure
and
pri
v
ate
transactions
[13],
there
is
no
central
authority
controlling
the
system,
which
can
reduce
the
risk
of
a
single
point
of
f
ailure
or
attack.
Combining
blockchain
and
AI,
Blockchain,
and
AI
technologies
can
be
combined
to
enhance
security
and
pri
v
ac
y
in
smart
en
vironments
[2],
[24],
[25].
The
AI-based
techniques
can
be
used
to
detect
anomalies
within
blockchain
netw
orks
with
high
accurac
y
,
which
can
help
address
security
issues
in
smart
en
vironments.
T
o
enhance
the
security
capabilities
of
blockchain-based
systems,
a
decentralized
selecti
v
e
ring-based
access
control
mechanism
can
be
implemented.
This
mechanism
a
llo
ws
for
ne-grained
control
o
v
er
data
access
by
utilizing
a
ring-based
structure.
In
addition,
de
vice
authentication
and
patient
records
anon
ymity
algorithms
can
be
inte
grated
to
further
strengthen
security
of
system.
By
emplo
ying
these
measures,
blockchain-based
systems
can
ensure
that
only
authori
zed
enti-
ties
ha
v
e
access
to
sensiti
v
e
data,
enhancing
the
o
v
erall
security
and
protecting
the
pri
v
ac
y
of
indi
viduals’
information
[3].
Ov
erall,
these
measures
can
help
impro
v
e
the
security
and
pri
v
ac
y
of
blockchain
systems.
By
conducting
comprehensi
v
e
surv
e
ys,
comparing
blockchain
applications
in
c
yber
-security
,
preserving
data
pri
v
ac
y
,
using
decentralization
and
distrib
uted
data
management,
combining
blockchain
and
AI
technologies,
and
introducing
selecti
v
e
ring-based
access
control
mechanisms,
blockchain
t
echnology
can
be
made
more
secure
and
pri
v
ate.
Blockchain
technology
has
the
potential
to
optimize
security
and
pri
v
ac
y
in
distrib
uted
systems,
there
are
also
pot
ential
dra
wbacks
to
its
use.
One
of
the
dra
wbacks
is
scalability
,
which
refers
to
its
ability
to
handle
a
lar
ge
number
of
transactions.
As
the
number
of
transactions
increases,
the
blockchain
may
become
slo
wer
and
less
ef
cient.
Another
dra
wback
is
ener
gy
consumption,
as
blockchain
technology
requires
a
signicant
amount
of
ener
gy
to
operate,
which
can
be
a
concern
for
sustainability
and
en
vironmental
impact
[13].
Pri
v
ac
y
concerns
are
also
a
potential
dra
wback
of
using
blockchain
technology
.
While
blockchain
technology
can
pro
vide
greater
transparenc
y
and
immutability
of
data,
it
can
also
ha
v
e
pri
v
ac
y
concerns
due
to
the
public
nature
o
f
the
ledger
.
Sensiti
v
e
data
may
be
e
xposed
under
statistical
attacks,
and
users
may
need
to
protect
their
real
identities
in
the
sense
of
pseudo-anon
ymity
[3],
[26],
[27].
T
o
tackle
this
issue,
dat
a
stored
in
the
ledger
can
be
encrypted
using
v
arious
cryptographic
techniques,
ensuring
its
condentiality
and
protecting
sensiti
v
e
information.
Moreo
v
er
,
users
can
adopt
pseudo-anon
ymity
measures
to
safe
guard
their
real
identities
and
maintain
pri
v
ac
y
.
Additionally
,
the
introduction
of
smart
con-
tracts
can
enhance
system
rob
ustness.
These
self-e
x
ecuting
contracts
contain
predened
terms
and
conditions
written
in
code,
enabling
automated
and
secure
transactions
between
parties.
By
implementing
these
measures,
blockchain
systems
can
achie
v
e
greater
security
,
pri
v
ac
y
,
and
ef
cienc
y
in
data
management
and
transaction
processing
[3].
Security
challenges
are
another
potential
dra
wback
of
using
blockchain
technology
.
Blockchain
technology
can
f
ace
i
nherent
security
challenges
such
as
DoS,
eclipse,
and
double
spending
attacks,
as
well
as
APT
and
mal
w
are
[1],
[14].
These
challenges
can
be
addressed
through
adv
anced
anomaly
detection
and
mitig
ation
approac
hes,
b
ut
the
y
still
pose
a
potential
risk.
Finally
,
the
lack
of
re
gulation
is
another
potential
dra
wback
of
using
blockchain
technology
.
Blockchain
technology
is
still
a
relati
v
ely
ne
w
and
unre
gulated
technology
,
which
can
lead
to
uncertainty
and
potential
risks
for
users
and
b
usi
nesses
[13].
Blockchain
technology
has
the
potential
to
optimize
security
and
pri
v
ac
y
in
distri
b
ut
ed
systems,
there
are
also
potential
dra
wbacks
to
its
use.
These
include
scalability
,
ener
gy
consumption,
pri
v
ac
y
concerns,
security
chal-
lenges,
and
lack
of
re
gulation.
Further
research
and
de
v
elopment
can
help
address
these
potential
dra
wbacks
and
optimize
the
use
of
blockchain
technology
in
distrib
uted
systems.
4.
CONCLUSION
Blockchain
technology
is
a
distrib
uted
ledger
technology
that
enhances
security
and
pri
v
ac
y
in
distrib
uted
systems.
It
achie
v
es
this
through
se
v
eral
k
e
y
feature
s,
including:
i)
data
immutability
is
ensured
by
decentralizing
data
storage
making
it
e
xtremely
dif
cult
to
tamper
with
or
delete
information.
The
interlinking
of
blocks
through
cryptographic
hashes
ensures
that
an
y
changes
to
one
block
w
ould
render
all
subsequent
blocks
in
v
alid.
ii)
Blockchain
pro
vides
data
pro
v
enance
allo
wing
the
tracking
of
data
origin
and
o
wnership.
This
feature
enhances
data
security
and
pri
v
ac
y
,
such
as
in
tracking
the
authenticity
of
food
products
to
pre
v
ent
counterfeiting
or
contamination.
iii)
Blockchain
con
vinces
parties
by
of
fering
transparent
and
immutable
data.
All
participants
are
able
to
independently
v
erify
the
authenticity
of
data
without
relying
on
a
third
party
,
which
enhances
security
i
n
transactions.
These
features
mak
e
blockchain
applicable
in
v
arious
sectors,
s
u
c
h
as
supply
Bloc
kc
hain
tec
hnolo
gy
for
optimizing
security
and
privacy
in
distrib
uted
systems
(W
isnu
Uriawan)
Evaluation Warning : The document was created with Spire.PDF for Python.
222
❒
ISSN:
2722-3221
chains,
where
it
can
track
the
m
o
v
ement
of
goods,
ensuring
their
authenticity
and
safety
.
Ho
we
v
er
,
the
potential
adv
antages
of
blockchain,
including
reduced
costs,
increased
ef
cienc
y
,
and
impro
v
ed
transparenc
y
,
mak
e
it
an
appealing
technology
for
the
future.
Ho
we
v
er
,
there
are
still
certain
technological
dif
culties
and
restrictions
with
blockchain
t
hat
need
to
be
address
ed.
A
comprehensi
v
e
surv
e
y
on
technical
and
applications
perspecti
v
e
can
be
conducted
to
identify
potential
security
and
pri
v
ac
y
issues
and
propose
solutions
to
address
them.
Blockchain
technology
can
help
address
potential
dra
wbacks
of
using
distrib
uted
systems,
s
uch
as
centralized
control,
lack
of
transparenc
y
and
immutability
of
data,
data
leaks,
and
lack
of
trust.
Further
research
and
de
v
elopment
can
help
address
potential
dra
wbacks
of
using
blockchain
technology
,
such
as
scalability
,
ener
gy
consumption,
pri
v
ac
y
concerns,
security
challenges,
and
lack
of
re
gulation.
By
preserving
data
pri
v
ac
y
,
using
decentralization
and
distrib
uted
data
management,
introducing
smart
contracts
and
selecti
v
e
ring-based
access
control
mechanisms,
combining
blockchain
and
AI
technologies,
blockchain
technology
can
be
made
more
secure
and
pri
v
ate.
A
CKNO
WLEDGMENTS
The
author’
s
wishes
to
ackno
wledge
the
Informatics
Department,
F
aculty
of
Sc
ience
and
T
echnology
,
UIN
Sunan
Gunung
Djati
Bandung
which
partially
supports
this
research
w
ork.
FUNDING
INFORMA
TION
The
author
conrmed
that
no
funding
w
as
in
v
olv
ed
during
the
research
w
ork.
A
UTHOR
CONTRIB
UTIONS
ST
A
TEMENT
This
journal
uses
the
C
on
t
rib
utor
Roles
T
axonomy
(CRediT)
to
recognize
indi
vidual
author
contrib
u-
tions,
reduce
authorship
disputes,
and
f
acilitate
collaboration.
Name
of
A
uthor
C
M
So
V
a
F
o
I
R
D
O
E
V
i
Su
P
Fu
W
isnu
Uria
w
an
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
Adryan
Putra
Pratama
✓
✓
✓
✓
✓
✓
✓
Shafw
an
Mursyid
✓
✓
✓
✓
✓
✓
✓
C
:
C
onceptualization
I
:
I
n
v
estig
ation
V
i
:
V
i
sualization
M
:
M
ethodology
R
:
R
esources
Su
:
Su
pervision
So
:
So
ftw
are
D
:
D
ata
Curation
P
:
P
roject
Administration
V
a
:
V
a
lidation
O
:
Writing
-
O
riginal
Draft
Fu
:
Fu
nding
Acquisition
F
o
:
F
o
rmal
Analysis
E
:
Writing
-
Re
vie
w
&
E
diting
CONFLICT
OF
INTEREST
ST
A
TEMENT
The
authors
whose
names
are
listed
immediately
belo
w
certify
that
the
y
ha
v
e
no
conict
of
interest.
INFORMED
CONSENT
W
e
ha
v
e
obtained
informed
consent
from
all
indi
viduals
included
in
this
study
.
ETHICAL
APPR
O
V
AL
This
research,
unrelated
to
animal
use.
Ho
we
v
er
,
has
complied
with
all
the
rele
v
ant
national
re
gula-
tions
and
institutional
policies
for
the
care
and
use
of
animals.
D
A
T
A
A
V
AILABILITY
This
research
is
not
using
a
specic
data
or
dataset.
Ho
we
v
er
,
we
pro
vided
all
the
references
tha
t
are
needed
for
this
research
w
ork
in
the
references
section.
Comput
Sci
Inf
T
echnol,
V
ol.
6,
No.
2,
July
2025:
214–224
Evaluation Warning : The document was created with Spire.PDF for Python.
Comput
Sci
Inf
T
echnol
ISSN:
2722-3221
❒
223
REFERENCES
[1]
S.
Shi,
D.
He,
L.
Li,
N.
K
umar
,
M.
K.
Khan,
a
nd
K.-K.
R.
Choo,
“
Applications
of
blockchain
in
ensuring
the
security
and
pri
v
ac
y
of
electronic
health
record
systems:
a
surv
e
y
,
”
Computer
s
&
Security
,
v
ol.
97,
Oct.
2020,
doi:
10.1016/j.cose.2020.101966.
[2]
B.
S.
Eg
ala,
A.
K.
Pradhan,
V
.
Badarla,
and
S.
P
.
Mohanty
,
“F
ortied-chain:
a
blockchain-based
frame
w
ork
for
security
and
pri
v
ac
y-
assured
internet
of
medical
things
with
ef
fecti
v
e
access
control,
”
IEEE
Internet
of
Things
J
ournal
,
v
ol.
8,
no.
14,
pp.
11717–11731,
2021,
doi:
10.1109/JIO
T
.2021.3058946.
[3]
R.
K
umar
,
“
A
surv
e
y
on
the
security
and
pri
v
ac
y
of
blockchain
systems,
”
International
J
ournal
of
Scientic
Resear
c
h
in
Engineering
and
Mana
g
ement
,
v
ol.
6,
no.
1,
2022,
doi:
10.55041/ijsrem11514.
[4]
A.
Ar
g
ani
and
W
.
T
araka,
“Utilization
of
blockchain
technology
to
optimize
certicate
security
in
higher
education
(in
bahasa:
pemanfaatan
teknolo
gi
bloc
kc
hain
untuk
mengoptimalkan
k
eamanan
sert
ikat
pada
per
guruan
ting
gi
),
”
ADI
Bisnis
Digital
Inter
-
disiplin
J
urnal
,
v
ol.
1,
no.
1,
pp.
10–21,
2020,
doi:
10.34306/abdi.v1i1.121.
[5]
M.
Pilki
ngton,
“Blockchain
technology:
principles
and
applications,
”
Resear
c
h
Handbook
on
Digital
T
r
ansformations
,
Edw
ard
Elg
ar
Publishing,
2016,
pp.
225–253,
doi:10.4337/9781784717766.00019.
[6]
X.
Li,
P
.
Jiang,
T
.
Chen,
X.
Luo,
and
Q.
W
en,
“
A
surv
e
y
on
the
security
of
blockchain
systems,
”
Futur
e
Gener
ation
Computer
Systems
,
v
ol.
107,
pp.
841–853,
Jun.
2020,
doi:
10.1016/j.future.2017.08.020.
[7]
F
.
Sun,
“
A
surv
e
y
of
consensus
algorithms
in
crypto,
”
Medium
.
2018.
[Online].
A
v
ailable:
https://medium.com/@sunora98/a-
surv
e
y-of-consensus-algorithms-in-crypto-e2e954dc9218
[8]
M.
Kim
and
T
.
Suh,
“Ea
v
esdropping
vulnerability
and
countermeasure
in
infrared
communication
for
IoT
de
vices,
”
Sensor
s
,
v
ol.
21,
no.
24,
2021,
doi:
10.3390/s21248207.
[9]
S.
Salim,
N.
Moustaf
a,
and
B.
T
urnb
ull,
“Pri
v
ac
y
preserv
ation
of
Internet
of
Things-inte
grated
social
netw
orks:
a
surv
e
y
and
future
challenges,
”
International
J
ournal
of
W
eb
Information
Systems
,
2025,
doi:
10.1108/IJWIS-04-2024-0120.
[10]
M.
H.
Abidi,
H.
Alkhalef
ah,
U.
Umer
,
and
M.
K.
Mohammed,
“Blockchain-based
secure
information
sharing
for
supply
chain
management:
optimization
assisted
data
sanitization
process,
”
International
J
ournal
of
Intell
ig
ent
Systems
,
v
ol.
36,
pp.
260-290,
2021,
doi:
10.1002/int.22299.
[11]
A.
Azaria,
A.
Ekbla
w
,
T
.
V
ieira,
and
A.
Lippman,
“MedRec:
using
blockchain
for
medical
data
access
and
permission
man-
agement,
”
in
Pr
oceedings
-
2016
2nd
International
Confer
ence
on
Open
and
Big
Data,
OBD
2016
,
2016,
pp.
25–30,
doi:
10.1109/OBD.2016.11.
[12]
A.
P
.
Joshi,
M.
Han,
and
Y
.
W
ang,
“
A
surv
e
y
on
security
and
pri
v
ac
y
issues
of
blockchain
technology
,
”
Mathematical
F
oundations
of
Computing
,
v
ol.
1,
no.
2,
pp.
121–147,
2018,
doi:
10.1109/ICSSE.2019.8823094.
[13]
E.
M.
Abou-Nassar
,
A.
M.
Iliyasu,
P
.
Elkafra
wy
,
O.-
Y
.
Song,
A.
K.
Bashir
,
A.
A.
A.
El-Latif,
“DIT
rust
chain:
to
w
ards
blockchain-
based
trust
models
for
sustainable
healthcare
IoT
systems,
”
IEEE
Access
,
v
ol.
8,
pp.
111223-1112338,
2020,
doi:
10.1109/A
C-
CESS.2020.2999468.
[14]
Y
.
Lee,
B.
Son,
S.
P
ark,
J.
Lee,
and
H.
Jang,
“
A
surv
e
y
on
security
and
pri
v
ac
y
in
blockchain-based
central
bank
digital
currencies,
”
J
ournal
of
Internet
Services
and
Information
Security
,
v
ol.
11,
no.
3,
pp.
16–29,
2021,
doi:
10.22667/JISIS.2021.08.31.016.
[15]
O.
F
adi,
Z.
Karim,
E.
G.
Abdellatif,
and
B.
Mohammed,
“
A
surv
e
y
on
blockchain
and
articial
intelligence
technologies
for
enhancing
security
and
pri
v
ac
y
in
smart
en
vironments,
”
IEEE
Access
,
v
ol.
10,
pp.
93168–93186,
2022,
doi:
10.1109/A
C-
CESS.2022.3203568.
[16]
N.
F
ahmi,
D.
E.
Hastasakti,
D.
Zaspiagi,
and
R.
K.
Saputra,
“
A
com
parison
of
blockchain
application
and
security
issues
from
bitcoin
to
c
ybersecurity
,
”
Bloc
kc
hain
F
r
ontier
T
ec
hnolo
gy
,
v
ol.
3,
no.
1,
pp.
81–88,
2022,
doi:
10.34306/bfront.v3i1.231.
[17]
Z.
W
enhua,
F
.
Qamar
,
T
.
A.
N.
Abdali,
R.
Hassan,
S.
T
.
A.
Jafri,
and
Q.
N.
Nguyen,
“Blockchain
technology:
security
issues,
healthcare
applications,
challenges
and
future
trends,
”
Electr
onics
,
v
ol.
12,
no.
3,
2023,
doi:
10.3390/electronics12030546.
[18]
Z.
Zheng,
S.
Xie,
H.
Dai,
X.
Chen,
and
H.
W
ang,
“
An
o
v
ervie
w
of
blockchain
technology:
architecture,
consensus,
and
future
trends,
”
in
Pr
oceedings
-
2017
IEEE
6th
International
Congr
ess
on
Big
Data,
BigData
Congr
ess
2017
,
2017,
pp.
557–564,
doi:
10.1109/BigDataCongress.2017.85.
[19]
I.
Abrar
,
and
J.
A.
Sheikh,
“Current
trends
of
blockchain
technology:
architecture,
applications,
challenges,
and
opportunities,
”
Disco
ver
Internet
of
Things
,
Springer
,
v
ol.
4,
pp.
7,
2024,
doi:
10.1007/s43926-024-00058-5.
[20]
B.
T
an,
J.
Y
an,
S.
Chen,
and
X.
Liu,
“The
impact
of
blockchain
on
food
supply
chain:
the
case
of
w
almart,
”
Smart
Bloc
kc
hain
,
pp.
167–177,
2018,
doi:
10.1007/978-3-030-05764-0_18.
[21]
S.
Ranjan,
A.
Ne
gi,
H.
Jain,
B.
P
al,
and
H.
Agra
w
al,
“Netw
ork
system
design
using
h
yperledger
f
abric:
permissioned
blockchain
frame
w
ork,
”
2019
T
welfth
International
Confer
ence
on
Contempor
ary
Computing
(IC3)
,
Noida,
India,
2019,
pp.
1-6,
doi:
10.1109/IC3.2019.8844940.
[22]
S.
Rojnic,
“Blockchain
technology
is
making
its
w
ay
into
public
services:
the
e
xamples
from
geor
gia
and
estonia,
”
HeinOnline
,
2022.
[Online].
A
v
ailable:
https://heinonline.or
g/HOL/LandingP
age?handle=hein.journals/amsla
wf14&di
v=26&id=&page=
[23]
F
.
P
.
Hjalmarsson,
G.
K.
Hreioarsson,
M.
Hamdaqa,
and
G.
Hjalmtysson,
“Blockchain-based
e-v
oti
ng
system,
”
2018
IEEE
11th
International
Confer
ence
on
Cloud
Computing
(CLOUD)
,
San
Francisco,
CA,
USA,
2018,
pp.
983-986,
doi:
10.1109/CLOUD.2018.00151.
[24]
K.
Salah,
M.
H.
ur
Rehman,
N.
Nizamuddin,
and
A.
Al-Fuqaha,
“Blockchain
for
AI:
re
vie
w
and
open
research
challenges,
”
IEEE
Access
v
ol.
7,
pp.
10127-10149,
2019,
doi:10.1109/A
CCESS.2018.2890507.
[25]
T
.
N.
Dinh
and
M.
T
.
Thai,
“
AI
and
blockchain:
a
disrupti
v
e
inte
gration,
”
Computer
,
IEEE,
v
ol.
51,
no.
9,
pp.
48-53,
2018,
doi:
10.1109/MC.2018.3620971.
[26]
D.
Khan,
L.
T
.
Jung,
and
M.
A.
Hashmani,
“Systematic
literature
re
vie
w
of
challenges
in
blockchain
scalability
,
”
Applied
Sciences
,
v
ol.
11,
no.
20,
2021,
doi:
10.3390/app11209372.
[27]
E.
T
am,
S.
Mahula,
and
J.
Crom
pv
oe
ts,
“Blockchain
go
v
ernance
in
the
public
sector:
a
conceptual
frame
w
ork
for
public
manage-
ment,
”
Go
vernment
Information
Quarterly
,
Else
vier
,
v
ol.
39,
no.
1,
2022,
doi:
10.1016/j.giq.2021.101625.
Bloc
kc
hain
tec
hnolo
gy
for
optimizing
security
and
privacy
in
distrib
uted
systems
(W
isnu
Uriawan)
Evaluation Warning : The document was created with Spire.PDF for Python.