Computer Science and Inf ormation T echnologies V ol. 6, No. 2, July 2025, pp. 214 224 ISSN: 2722-3221, DOI: 10.11591/csit.v6i2.pp214-224 214 Blockchain technology f or optimizing security and pri v acy in distrib uted systems W isnu Uriawan, Adryan Putra Pratama, Shafwan Mursyid Department of Informatics, F aculty of Science and T echnology , UIN Sunan Gunung Djati, Bandung, Indonesia Article Inf o Article history: Recei v ed Jul 21, 2023 Re vised May 9, 2025 Accepted May 23, 2025 K eyw ords: Blockchain Distrib uted systems Pri v ac y Security T echnology ABSTRA CT Blockchain technology is increasingly recognized as an ef fecti v e solution for addressing security and pri v ac y challenges in distrib uted systems. Blockchain ensures informat ion security by v alidating dat a and defending ag ainst c yber threats, while guaranteeing data inte grity through transaction v alidation and reliable storage. The research in v olv es a literature study , problem identication, analysis of blockchain security and pri v ac y , model de v elopment, testing, and analysis of trial results. Furthermore, blockchain enables user anon ymity and fosters transparenc y by utilizing a distrib uted netw ork, reducing the risk of fraudulent acti vities. Its decentralized nature ensures high reliability and accessibility , e v en in node f ailures. Blockchain enhances security and pri v ac y by of fering features lik e data immutability , pro v enance, and reduced reliance on trust. It decentralizes data storage, making tampering or deletion e xtremely challenging, and ensures the in v alidation of subsequent blocks upon an y changes. Blockchain nds applications in v arious domains, including supply chains, nance, healthcare, and go v ernment, enabling enhanced security by tracking data origin and o wnership. Despite scalability and security challenges, the potential benets of reduced costs, increased ef cienc y , and impr o v ed transparenc y position blockchain as a promising technology for the future. In summary , blockchain technology pro vides secure transaction recording and data storage, thus enhancing security , pri v ac y , and the inte grity of sensiti v e information in distrib uted systems. This is an open access article under the CC BY -SA license . Corresponding A uthor: Shafw an Mursyid Department of Informatics, F aculty of Science and T echnology , UIN Sunan Gunung Djati Bandung, Indonesia Email: shafw anmursyid88@gmail.com 1. INTR ODUCTION Distrib uted systems ha v e been used in v arious elds, including nance, healthcare, automobile, risk management, internet of things (IoT), and public and social services. While distrib uted systems of fer man y benets, the y also ha v e potential dra wbacks when it comes to security and pri v ac y . One of the potential dra wbacks of using distrib uted systems is centralized control, which can l ead to a single point of f ailure or attack [1]. The central authority controlling the system is compromised, the entire system can be compromised as well, another potential dra wback of using distrib uted systems i s the lack of transparenc y and immutability of data. Unlik e blockchain systems, distrib uted systems ma y not ha v e the same le v el of transparenc y and immutability , which can lead to potential security and pri v ac y concerns [2], that data can be easily altered or deleted, which can decrease the reliability of the data. Data leaks are also a potential dra wback of using J ournal homepage: http://iaesprime .com/inde x.php/csit Evaluation Warning : The document was created with Spire.PDF for Python.
Comput Sci Inf T echnol ISSN: 2722-3221 215 distrib uted systems. Distrib uted systems can ha v e pri v ac y concerns due to the potential for data leaks or unauthori zed access to data [2], that sensiti v e data may be e xposed to unauthorized parties, which can lead to potential security and pri v ac y concerns. Finally , the lack of trust is another potential dra wback of using distrib uted systems. Distrib uted systems may not ha v e the same le v el of trust as blockchain systems, which can lead to potential security and pri v ac y concerns [3]. This means that users may not be able to trust the system to protect their data and pri v ac y . Ov erall, while distrib uted systems of fer man y benets, the y also ha v e potential dra wbacks when it comes to security and pri v ac y . These dra wbacks include c entralized control, lack of transparenc y and immutability of data, data leaks, and lack of trust. Blockchain technology can help address some of these potential dra wbacks by pro viding decentralization and distrib uted data management, preserving data pri v ac y , increasing the reliability and transparenc y of data, using smart contracts, and combining blockchain and articial intelligence (AI) technologies. Security and pri v ac y are tw o important aspects of distrib uted systems. Blockchain technology has the ability to increase security and pri v ac y in distrib uted systems because e v ery transaction is protected with strong cryptographic k e ys and user identities are encrypted s o that the y can only be accessed with proper authorization. In addition, blockchain technology also allo ws each user to v erify each transaction and a v oid fraud or detrimental actions. Ho we v er , while blockchain technology has the potential to impro v e security and pri v ac y in distrib uted systems, its implementation also requires a good understanding of the technology and ho w to optimize it. Apart from that, blockchain technology also has se v eral challenges such as scalability and high transaction fees. Therefore, there is a need for further research and de v elopment in t h e implementation of blockchain technology in distrib uted systems [4]. Blockchain technology has g ained signicant attention in recent years as a secure and decentralized system for storing and sharing information. Its unique features, such as immutability , transparenc y , and decentralization, ha v e made it an attracti v e solution for a v ariety of use cases, including nance, supply chain management, and healthcare [5]. Blockchain technology has emer ged as a promising solution for enhancing security and pri v ac y in distrib uted systems. W ith its decentralized and immutable nature, blockchain pro vides a secure and trustw orth y mechanism for storing and e xchanging information [6]. 2. RESEARCH METHOD This research describes v arious stages to achie v e the results that will pro v e that blockchain pri v ac y and security that able to impro v e the services. 2.1. Pr oblem identication The initial phase of this research i n v olv es identifying the security and pri v ac y challenges f aced by distrib uted systems. These challenges may include data breaches, unauthorized access, and lack of trans- parenc y . By closely e xamining these issues, we aim to g ain a deeper understanding of the specic obstacles that hinder the securit y and pri v ac y of distrib uted systems. This step also entails dening the obj ecti v es and research questions that will guide our in v estig ation and form the basis for our methodology . 2.2. Literatur e r e view T o establish a foundation for this research, it conduct an e xtensi v e re vie w of e xisting literature on blockchain technology and its applications in optimizing security and pri v ac y in distrib uted systems. These literature re vie w will encompass a wide range of sources, including academic papers, industry reports, and case studies. By thoroughly e xamining the body of kno wledge in this eld, we can identify rele v ant studies, frame w orks, and approaches that ha v e addressed similar security and pri v ac y challenges. This re vie w will serv e as the basis for de v eloping our methodology and pro vidi ng a comprehensi v e understanding of the current state of research in this domain. 2.3. Results and analysis In this phase, present and analyze the ndings obtained from our research, which may include both theoretical analysis and empirical studies. By inte grating blockchain technology into distrib uted systems, the purpose is to e v aluate its impact on the security and pri v ac y aspects. W e assess the impro v ements achie v ed, such as enhanced data protection, increased transparenc y , and stronger access controls. Moreo v er , identifying an y limitations or trade-of fs encountered during the implementation of blockchain technology and discussing Bloc kc hain tec hnolo gy for optimizing security and privacy in distrib uted systems (W isnu Uriawan) Evaluation Warning : The document was created with Spire.PDF for Python.
216 ISSN: 2722-3221 their im p l ications. Through rigorous analysis, we will pro vide insights into the ef fecti v eness of blockchain technology in optimizing security and pri v ac y in distrib uted systems. 2.4. Conclusion In the nal phase of this re search, we will summarize the k e y ndings deri v ed from our study . W e will emphasize the benets of inte grating blockchain technology as a means to optimize security and pri v ac y in distrib uted systems. The conclusions dra wn from our analysis will be presented, highlighting the implica- tions and potential impact of this research on the eld. W e will pro vide recommendations for practitioners, researchers, and polic ymak ers based on our ndings, a iming to guide future endea v ors and foster the adoption of blockchain technology for impro v ed security and pri v ac y in distrib uted systems. 2.5. Futur e w ork Identifying potential areas for future research and de v elopment is crucial for adv ancing the el d of blockchain technology for security and pri v a c y in distrib uted systems [7], [8]. In this phase, we will outline the opportunities for further in v estig ation and propose inno v ati v e approaches, methodologies, or technologies that can enhance securi ty and pri v ac y in distrib uted systems. W e will also highlight an y research g aps or unresolv ed issues that require further e xplorati o n. By delineating future w ork, we aim to inspire researchers and practitioners to delv e deeper into this eld and contrib ute to its gro wth. 3. RESUL TS AND DISCUSSION In this section, we pro vide the results of the research and gi v e a comprehensi v e discussion (contrib u- tion). The discussion sho ws opportunities for future w ork or further research. 3.1. Result Blockchain has become an increasingly popular topic in recent years due to its ability to pro vide inno v ati v e security and pri v ac y solutions. This research discusses the ability of blockchain technology to optimize security and pri v ac y in distrib uted systems. Firstly , blockchain of fers strong information security by v alidating data in link ed blocks. This ensures that data is dif cult to branch or edit without the appro v al of all nodes in the netw ork. Therefore, blockchain technology can help prot ect sensiti v e information from c yber attacks or hac k i ng. This is especially important for com panies and or g anizations that need protection ag ainst e v er -increasing c yber -attacks. Secondly , the blockchain also ensures data inte grity by v alidating each ne w transaction before it is entered into the netw ork. This mak es the data cannot be edited without the consent of a ll nodes in the netw ork, thereby ensuring that the data stored is accurate and reliable. Data inte grity is an important f actor in man y b usinesses and or g anizations, especially when there are nancial transactions being carried out. The ne xt, blockchain enables anon ymity for users by storing their identity in the form of a digital address that cannot be traced back to their original identity [9]. This mak es blockchain technology suitable for applications that require pri v ac y such as online payments or fund transfers. This pro vides pri v ac y protection for users without compromising security . Blockchain mak es data and trans actions transparent because data is stored in a dis- trib uted netw ork and can be accessed by an yone with access to the netw ork. This helps reduce the risk of ab use or fraud, thereby ensuring that the data and transactions stored are accurate and reliable. This transparenc y gi v es condence to users that their data will be processed correctly and transactions will be carried out hon- estly and f airly . Blockchain has high reliability because data is stored in a distrib uted netw ork. If one of the nodes is damaged, data can still be accessed through other nodes. This ensures that data remains a v ailable and accessible e v en if there is an interruption at one of the nodes in the netw ork. This reliability is v ery important in distrib uted systems that require high accessibility . Blockchain technology is a re v olutionary soluti on for enhancing security and pri v ac y in distrib uted systems. By utilizing its unique features, or g anizations can mitig ate v arious vulnerabiliti es and safe guard sensi- ti v e information. One signicant adv antage of blockchain is its ability to maintain data immutability . Through cryptographic linking of blocks, the inte grity of data becomes practically unalterable, pro viding assurance ag ainst unauthorized modications. Additionally , blockchain’ s distrib uted consensus mechanis m strengthens security by eliminating the dependence on a single controlling entity . This decentralization pre v ents fraudulent acti vities and ensures the o v erall system’ s reliability . Moreo v er , blockchain systems emplo y rob ust authentica- tion measures, guaranteeing the v erication of user identities and thw arting unauthorized access attempts. Comput Sci Inf T echnol, V ol. 6, No. 2, July 2025: 214–224 Evaluation Warning : The document was created with Spire.PDF for Python.
Comput Sci Inf T echnol ISSN: 2722-3221 217 Furthermore, pri v ac y concerns can be addressed using blockchain technology . By encrypting data, only authorized indi viduals possess the decryption k e ys, granting them e xclusi v e access. This capability is particularly crucial for sensiti v e information such as medical records or nancial details, where maintaining pri v ac y is truly important. Real-w orld applications of blockchain technology illustrate its potential in opti- mizing security and pri v ac y in v arious sectors. F or instance, in supply chain management, blockchain enables traceability , ensuring the authenticity and origin of goods while combating counterfeiting [10]. In healthcare, blockchain-based systems securely store patient rec ords, protecting sensiti v e data and f acilitating ef cient access for healthcare pro viders. Financial services ha v e also le v eraged blockchain tech- nology to c reate inno v ati v e products and services. Smart contracts, po wered by blockchain, enable automated and transparent nancial transactions, enhancing ef cienc y and security . As blockchain technology contin- ues to adv ance, we can anticipate further groundbreaking applications that capitalize on its ability to optimize security and pri v ac y in distrib uted systems. Its potential to transform industries and protect v aluable data is undoubtedly a compelling prospect for the future. Blockchain technology f amous in v arious elds, including: nance, heal thcare, automobile, risk management, IoT , and public and social services [11], [12]. Blockchain technology of fers enhanced relia- bility and ef cienc y , it is crucial to ackno wledge the security , pri v ac y concerns, and challenges associated with this cutting-edge technology . A comprehensi v e surv e y encompassing technical and application perspecti v es has yet to be undertak en. Ho we v er , in a recent surv e y paper , the authors aim to bridge this g ap by conducting an e xtensi v e e xamination of blockchain technology . Exploring v arious aspects, such as its structure, dif ferent consensus algorithms, the challenges and opportunities related t o data security , and pri v ac y in blockchains. Additionally , the authors pro vide insights into potential future trends and adv ancements that the blockchain technology may adopt in the coming years [12], [13]. Blockchain technology has re v olutionized the concept of trust by of fering a decentralized and distrib uted data management solution that ensures security , pri v ac y , and data inte grity without relying on in- termediaries. Ho we v er , it is important to ackno wledge the e xisting technological dif culties and limitations associated with blockchain. In a systematic comparati v e study , researchers ha v e e xamined the current applica- tions of blockchain in c yber -security . The paper assesses the adv antages that blockchain brings to the eld of c yber -security and pro vides a comprehensi v e o v ervie w of recent studies and blockchain applications in v arious c yber -security domains. By addressing security challenges, the paper identies and thoroughly in v estig ates four k e y security issues related to blockchain through e xtensi v e research and analysis of e xisting w ork [13]. A surv e y paper highlights the potential of blockchain technology as a solution for enhancing s ecurity in electronic health record (EHR) systems. Ho we v er , the use of blockchain as a public database poses potential pri v ac y challenges for ra w or encrypted data stored in the public ledger , as sensiti v e information may be at risk of e xposure during statistical attacks. T o address this, data in the ledger can be stored in an encrypted format using v arious cryptographic techniques, thereby safe guarding data pri v ac y . Additionally , users can adopt pseudo-anon ymity measures to protect their real identities while eng aging with the system [1]. The gro wing interest in Central Bank Digital Currencies (CBDCs) has emphasized the import ance of implementing suitable security technologies to protect the pri v ac y of CBDCs users. While the architecture of the CBDCs system shares connections with le g ac y payment systems and public blockchain systems, the security and pri v ac y challenges of CBDCs dif fer signicantly from e xisting systems due to their focus on auditable pri v ac y . A surv e y paper pro vides a comprehensi v e classication of security and pri v ac y issues in CBDCs systems across k e y areas such as identity , transactions, consensus, and auditability . Additionally , the paper highlights research g aps arising from the unique charact eristics of CBDCs, including challenges related to authorized audit risk and cross-border payments [14]. Smart en vironments encompass a wide range of interconnected de vices and computing units aimed at enhancing human life. As data generation within these en vironments continues to sur ge, the need for ef cient data management becomes crucial. T o address this, man y enterprises are turning to blockchain technology as a viable solution. Blockchain, functioning as a distrib uted transaction ledger , of fers data reliability and transparenc y . Ho we v er , blockchain technology encounters inherent security challenges such as denial of service (DoS), eclipse and double spending attacks, as well as adv anced persistent threat (APT) and mal w are risks. T o tackle these challenges, adv anced anomaly detection and mitig ation approaches, particularly those utilizing AI techniques such as: machine learning, deep learning, and federated learning. The combined utilization of AI and blockchain technology enables accurate anomaly detection within blockchain netw orks. In a surv e y paper , the authors delv e into the obstacles f aced by blockchain deplo yment in sm art Bloc kc hain tec hnolo gy for optimizing security and privacy in distrib uted systems (W isnu Uriawan) Evaluation Warning : The document was created with Spire.PDF for Python.
218 ISSN: 2722-3221 en vironments. Furthermore, the y e xplore the potential of AI-based anomaly detection techniques as a solution to security issues in such en vironments. Their proposed frame w ork emphasizes the inte gration of AI-based anomaly detection methods to ef fecti v ely address security concerns [15]. Blockchain technology of fers man y adv antages in optimizing security and pri v ac y in distrib uted systems. This can help protect sensiti v e infor - mation from c yber attacks, ensure data inte grity , pro vide anon ymity for users, ensure transparenc y and trust, and high reliability in accessing data. By le v eraging blockchain technology , or g anizations and companies can impro v e security and pri v ac y in their distrib uted systems, thereby strengthening their position in the mark et. This pro v es that blockchain is a technology that can increase the security and pri v ac y of distrib uted systems. Apart from that, blockchain technology also ensures data inte grity by v alidating each ne w transaction before it is entered into the netw ork. Thus, the data stored in the blockchain is v ery dif cult to edit without the consent of all nodes in the netw ork [13]. In a distrib uted system using traditional technology , data stored at e ach node in the netw ork can be f alsied or altered by irresponsible parties, causing data inaccuracies and af fecting the inte grity of the system as a whole. Apart from that, anon ymity is another important feature in blockchain technology . By storing users’ identities in the form of digital addresses that cannot be traced back to their original identities, blockchain tech- nology enables better pri v ac y for users. This mak es blockchain technology suitable for applications that require pri v ac y such as online payments or fund transfers. In traditional systems, online transactions can be track ed and monitored by certain parties, thereby increasing the risk of disclosing personal information. Ho we v er , by using the blockchain, users can maintain their anon ymity while making online transactions . In addition to maintaining security and pri v ac y , blockchain technology can also increase transparenc y in distrib uted systems. The data and transactions stored on the blockchain are accessible to an yone with access to the net- w ork. This helps reduce the risk of ab use or f raud, thereby ensuring that the data and transactions stored are accurate and reliable. In a distrib uted system that uses tradit ional technology , data and transactions may not be accessible to all parties in v olv ed, increasing the risk of ab use or fraud. Ho we v er , using the blockchain, each ne w transaction must be v eried by all nodes in the netw ork before being included in the block, thus ensur - ing that the data and transactions stored are accurate and trustw orth y . Then, reliability is another feature of blockchain technology that mak es it ideal for use in distrib uted systems. Because data is stored in a distrib uted netw ork, if one node is damaged, data can still be accessed through other nodes. This ensures that data remains a v ailable and accessible e v en if there is an interruption at one of the nodes in the netw ork. Blockchain technology has v arious features that mak e it an ef fecti v e solution for increasing security and pri v ac y in distrib uted systems. In this research, the authors ha v e discussed information security , data inte grity , anon ymity , transparenc y , and reliability as k e y features of blockchain technology that can help impro v e security and pri v ac y in distrib uted systems. Therefore , blockchain technology can be used as an ef fecti v e solution to x vulnerabi lities of scattered systems that are often vulnerable to c yber attacks or hacks. Blockchain also of fers solutions to impro v e security and pri v ac y in distrib uted systems. F or e xample, in a distrib uted system using traditional technology , data stored at each node in the netw ork can be acce ssed by an yone who has access t o that node. This increases the risk of disclosure of sensiti v e data and information leakage [16]. Ho we v er , using a blockchain, data is stored in link ed blocks that v alidate each other , making it more dif cult for data to be stolen or edited without the consent of all nodes in the netw ork. Thus, blockchain technology can help impro v e security and pri v ac y in distrib uted systems. The Figure 1 sho ws e v e ry layer in the blockchain system has security re vie w to pass do wn the data from one to another . The data has to be passed this security re vie w to be able to mo v e onto the ne xt layer of the system. W ith that kind of security system, blockchain has pro v en that not only the secured data on the input nor the output, b ut it has done so man y times before it can pass onto the ne xt layer . Blockchain technology uses se v eral cryptographic techniques to ensure data pri v ac y and security lik e cryptograph y , hashing, digital signatures, zero-kno wledge proofs, and secure multi-party computation. Cryptograph y is used in blockchain technology to secure transactions and data. Blockchain technology uses cryptographic algorithms such as SHA-256 and Ell iptic Curv e Digital Signature Algorithm (ECDSA) to ensure the authenti city and inte grity of data. Hashing is a t echnique used in blockchain technology to create a unique digital ngerprint of data. Blockchain technology uses hashing algorithms such as SHA-256 to create a unique hash for each block in the chain. Hashing is used to ensure that data is not duplicated or altered. The use of hashing in blockchain technology ensures that data is secure and cannot be tampered with. Digital signatures are a technique used in blockchain technology to ensure the authenticity of trans actions. Blockchain technology uses digital signature algorithms such as ECDSA to ensure that transactions are signed by the correct parties [15], [17], [18]. Comput Sci Inf T echnol, V ol. 6, No. 2, July 2025: 214–224 Evaluation Warning : The document was created with Spire.PDF for Python.
Comput Sci Inf T echnol ISSN: 2722-3221 219 Digital signatures are used to ensure that transactions are not tampered with and that the y are e x ecuted as intended. Zero-kno wledge proofs are a cryptographic technique used in blockchain technology to pro v e the authenticity of data without re v ealing the data itself. Zero-kno wledge proofs are used to enhance pri v ac y and security in blockchain transactions. Zero-kno wledge proofs ensure that data is secure and cannot be accessed by unauthorized parties. Secure multi-party computation is a cryptographic technique used in bl ockchain tech- nology to enable multiple parties to compute a function on their inputs without re v ealing their inputs to each other [19]. Figure 1. Blockchain structure Secure multi-party computation is used to enhance pri v ac y and security in blockchain transacti ons. Secure multi-party computation ensures that data i s secure and cannot be accessed by unauthorized parties. In summary , blockchain technology uses se v eral cryptographic techniques such as cryptograph y , hashing, digital signatures, zero-kno wledge proofs, and secure multi-party computation to ensure data pri v ac y and security . These techniques ensure the authenticity , inte grity , and condentiality of data in blockchain transactions. The use of these cryptographic techniques ensures that data is secure and cannot be tampered with or accessed by unauthorized parties. 3.2. Discussion In 2018, W almart already collaborated with IBM to de v elop a supply chain management system t hat used blockchain technology to track the origin of its food products and impro v e food safety [20]. This system, which relied on IBM’ s Hyperledger F abric blockchain, aimed to create a transparent and secure record of each product’ s journe y from the f arm to the store. The blockchain-based system helped W almart to enhance food traceability , reduce the time it tak es to identify the source of contaminated food, and impro v e food safety by quickly detecting potential issues. Additionally , the system pro vided greate r transparenc y and accountability in the supply chain by allo wing all parties in v olv ed to access the same information about each product’ s journe y . Moreo v er , the smart contract capabilities of the system enabled W almart to automate certain aspects of the supply chain, such as payment processing and compliance with food safety re gulations, resulting in a reduced risk of fraud and errors. By using blockchain technology , W almart could impro v e security and pri v ac y in its supply chain management system, as the decentralized and immutable nature of the blockchain ensured a secure record of all transactions while k eeping sensiti v e information pri v ate and only accessible by authorized parties. This case study highlights the potential of blockchain technology to optimize security and pri v ac y in supply chain management and other industries by of fering a transparent and secure record of all transactions, allo wing automation of specic processes, and impro ving traceability and accountability [21]. Case study that blockchain already used to public services to secure data of a nation. In Estonia, is kno wn for its inno v ati v e use of technology , and one of its most notable implementations is its blockchain-based Bloc kc hain tec hnolo gy for optimizing security and privacy in distrib uted systems (W isnu Uriawan) Evaluation Warning : The document was created with Spire.PDF for Python.
220 ISSN: 2722-3221 national identity system, called e-Residenc y . The system, which w as launched in 2014, enables indi viduals to apply for a di g i tal ID card, which can be used to access a range of go v ernment and pri v ate sector services online [22]. The e-Residenc y system is b uilt on the blockchain and uses cryptographic protocols to secure users’ identities and personal data. The system also pro vides a secure and transparent record of all transactions, which enables indi vidual s to track who has accessed their data and for what purpose. The sys tem’ s decentralized architecture means that users ha v e control o v er their data and can choose who has access to it, which enhances pri v ac y and security . The e-Residenc y system has been a success in Estonia, with o v er 70,000 people from 150 countries ha ving applied for an e-Residenc y card. The system has also inspired other countries to e xplore the use of blockchain technology in their national identity s ystems. This case study demonstrates the potential of blockchain technology to optimize security and pri v ac y in national identity systems, by pro viding a secure and transparent record of all transactions, enabling indi viduals to control their data, and enhancing pri v ac y and security . The high potential on those idea that didn’ t use blockchain technology before if it used the blockchain technology , for e xample the v oting syste m. A blockchain-based v oting system w ould enable indi viduals to cast their v otes electronically in a secure and transparent manner . The system w ould use a distrib uted ledger technology to record and v erify e v ery v ote, ensuring that the results are accurate and tamper -proof. T o use this system, v oters w ould need to ha v e a digital w allet that is connected to the blockchain. When a v oter casts their v ote, the transaction w oul d be recorded on the blockchain as a ne w block, which w ould i nclude the v oter’ s identity and their choice. Each block w ould be link ed to the pre vious block, creating an immutable and transparent chain of data. Once the v oting period is o v er , the results w oul d be calculated by counting the number of v otes for each candidate or option. As the blockchain is decent ralized, this process can be done in real-time by an yone with access to the blockchain. The use of blockchain technology in v oting systems has se v eral adv antages. First, it eliminates the need for a central authority to o v ersee the v oting process, reducing the risk of fraud or manipulation. Second, it ensures the pri v ac y of the v oters, as their identities are k ept anon ymous on the blockchain. Finally , it pro vides greater transparenc y and accountability , as the results are publicly a v ailable and cannot be altered [23], [24]. Ho we v er , there are also challenges in implementing a blockchain-based v oting system, such as en- suring the security of the digital w alle ts, pre v enting double v oting, and ensuring that e v eryone has access to the technology . Despite these challenges, blockchain-based v oting systems ha v e the potential to re v olutionize the w ay we v ote by pro viding a secure and transparent alternati v e to traditional v oting methods. Blockchain technology holds immense promise for enhancing security and pri v ac y in distrib uted systems. Nonetheless, it is crucial to address e xisting t echnological hurdles and limitations associated with blockchain. T o bolster the se- curity and pri v ac y of blockchain systems, the follo wing measures can be undertak en. Firstly , a comprehensi v e surv e y encompassing both technical and applications perspecti v es can be conducted. This surv e y w ould delv e into the i ntricate structure of blockchain technology , including v arious consensus algorithms, while e xploring the challenges and opportunities it presents in terms of data security and pri v ac y [16], [23]. Conducting a comprehensi v e comparison of blockchain applications in the realm of c yber -security can shed light on the benets that blockchain has brought to this domain. This comparison w ould e v aluate recent studies and highlight v arious blockchain applications in c yb e r -security is related elds. By conducting such an analysis, it becomes possible to address the security challenges pre v alent in c yber -security and propose ef fecti v e solutions to mitig ate them [13]. This can help identify potential security challenges of blockchain and propose soluti ons to address them. T o ensure the preserv ation of data pri v ac y , it is crucial to consider the actual deplo yment of the system. By emplo ying v arious cryptographic techniques, such as encryption, data can be stored in the ledger in an encrypted form. This approach signicant ly enhances data pri v ac y , safe guarding sensiti v e information from unauthorized access or e xposure [1]. In addition, users ha v e the ability to safe guard their real identities through a concept kno wn as pseudo- anon ymity . This means that whil e participating in transactions or interactions within system, users can maintain a le v el of anon ymity , protecting their true identities. T o further strengthen the system’ s resilience and reliability , the introduction of smart contracts is recommended. These contracts are self-e x ecuting and contain predened terms and c o ndi tions written directly into the code, ensuring automated and trust w orth y agreements between parties in v olv ed [1]. Decentralizati on and distri b ut ed data managem ent are fundam ental aspects of blockchain technology . By adopting a decentralized approach, blockchain redenes trust by eliminating the need for intermediaries or third parties. This ensures enhanced securi ty , pri v ac y , and data inte grity within the system. Through its distrib uted nature, blockchain pro vides a rob ust frame w ork where data is shared across multiple Comput Sci Inf T echnol, V ol. 6, No. 2, July 2025: 214–224 Evaluation Warning : The document was created with Spire.PDF for Python.
Comput Sci Inf T echnol ISSN: 2722-3221 221 nodes, ensuring transparenc y and reliability without relying on a central authority or single point of control. This decentralized and distrib uted data management solution re v olutionizes traditional trust models, of fering a ne w paradigm for secure and pri v ate transactions [13], there is no central authority controlling the system, which can reduce the risk of a single point of f ailure or attack. Combining blockchain and AI, Blockchain, and AI technologies can be combined to enhance security and pri v ac y in smart en vironments [2], [24], [25]. The AI-based techniques can be used to detect anomalies within blockchain netw orks with high accurac y , which can help address security issues in smart en vironments. T o enhance the security capabilities of blockchain-based systems, a decentralized selecti v e ring-based access control mechanism can be implemented. This mechanism a llo ws for ne-grained control o v er data access by utilizing a ring-based structure. In addition, de vice authentication and patient records anon ymity algorithms can be inte grated to further strengthen security of system. By emplo ying these measures, blockchain-based systems can ensure that only authori zed enti- ties ha v e access to sensiti v e data, enhancing the o v erall security and protecting the pri v ac y of indi viduals’ information [3]. Ov erall, these measures can help impro v e the security and pri v ac y of blockchain systems. By conducting comprehensi v e surv e ys, comparing blockchain applications in c yber -security , preserving data pri v ac y , using decentralization and distrib uted data management, combining blockchain and AI technologies, and introducing selecti v e ring-based access control mechanisms, blockchain t echnology can be made more secure and pri v ate. Blockchain technology has the potential to optimize security and pri v ac y in distrib uted systems, there are also pot ential dra wbacks to its use. One of the dra wbacks is scalability , which refers to its ability to handle a lar ge number of transactions. As the number of transactions increases, the blockchain may become slo wer and less ef cient. Another dra wback is ener gy consumption, as blockchain technology requires a signicant amount of ener gy to operate, which can be a concern for sustainability and en vironmental impact [13]. Pri v ac y concerns are also a potential dra wback of using blockchain technology . While blockchain technology can pro vide greater transparenc y and immutability of data, it can also ha v e pri v ac y concerns due to the public nature o f the ledger . Sensiti v e data may be e xposed under statistical attacks, and users may need to protect their real identities in the sense of pseudo-anon ymity [3], [26], [27]. T o tackle this issue, dat a stored in the ledger can be encrypted using v arious cryptographic techniques, ensuring its condentiality and protecting sensiti v e information. Moreo v er , users can adopt pseudo-anon ymity measures to safe guard their real identities and maintain pri v ac y . Additionally , the introduction of smart con- tracts can enhance system rob ustness. These self-e x ecuting contracts contain predened terms and conditions written in code, enabling automated and secure transactions between parties. By implementing these measures, blockchain systems can achie v e greater security , pri v ac y , and ef cienc y in data management and transaction processing [3]. Security challenges are another potential dra wback of using blockchain technology . Blockchain technology can f ace i nherent security challenges such as DoS, eclipse, and double spending attacks, as well as APT and mal w are [1], [14]. These challenges can be addressed through adv anced anomaly detection and mitig ation approac hes, b ut the y still pose a potential risk. Finally , the lack of re gulation is another potential dra wback of using blockchain technology . Blockchain technology is still a relati v ely ne w and unre gulated technology , which can lead to uncertainty and potential risks for users and b usi nesses [13]. Blockchain technology has the potential to optimize security and pri v ac y in distri b ut ed systems, there are also potential dra wbacks to its use. These include scalability , ener gy consumption, pri v ac y concerns, security chal- lenges, and lack of re gulation. Further research and de v elopment can help address these potential dra wbacks and optimize the use of blockchain technology in distrib uted systems. 4. CONCLUSION Blockchain technology is a distrib uted ledger technology that enhances security and pri v ac y in distrib uted systems. It achie v es this through se v eral k e y feature s, including: i) data immutability is ensured by decentralizing data storage making it e xtremely dif cult to tamper with or delete information. The interlinking of blocks through cryptographic hashes ensures that an y changes to one block w ould render all subsequent blocks in v alid. ii) Blockchain pro vides data pro v enance allo wing the tracking of data origin and o wnership. This feature enhances data security and pri v ac y , such as in tracking the authenticity of food products to pre v ent counterfeiting or contamination. iii) Blockchain con vinces parties by of fering transparent and immutable data. All participants are able to independently v erify the authenticity of data without relying on a third party , which enhances security i n transactions. These features mak e blockchain applicable in v arious sectors, s u c h as supply Bloc kc hain tec hnolo gy for optimizing security and privacy in distrib uted systems (W isnu Uriawan) Evaluation Warning : The document was created with Spire.PDF for Python.
222 ISSN: 2722-3221 chains, where it can track the m o v ement of goods, ensuring their authenticity and safety . Ho we v er , the potential adv antages of blockchain, including reduced costs, increased ef cienc y , and impro v ed transparenc y , mak e it an appealing technology for the future. Ho we v er , there are still certain technological dif culties and restrictions with blockchain t hat need to be address ed. A comprehensi v e surv e y on technical and applications perspecti v e can be conducted to identify potential security and pri v ac y issues and propose solutions to address them. Blockchain technology can help address potential dra wbacks of using distrib uted systems, s uch as centralized control, lack of transparenc y and immutability of data, data leaks, and lack of trust. Further research and de v elopment can help address potential dra wbacks of using blockchain technology , such as scalability , ener gy consumption, pri v ac y concerns, security challenges, and lack of re gulation. By preserving data pri v ac y , using decentralization and distrib uted data management, introducing smart contracts and selecti v e ring-based access control mechanisms, combining blockchain and AI technologies, blockchain technology can be made more secure and pri v ate. A CKNO WLEDGMENTS The author’ s wishes to ackno wledge the Informatics Department, F aculty of Sc ience and T echnology , UIN Sunan Gunung Djati Bandung which partially supports this research w ork. FUNDING INFORMA TION The author conrmed that no funding w as in v olv ed during the research w ork. A UTHOR CONTRIB UTIONS ST A TEMENT This journal uses the C on t rib utor Roles T axonomy (CRediT) to recognize indi vidual author contrib u- tions, reduce authorship disputes, and f acilitate collaboration. Name of A uthor C M So V a F o I R D O E V i Su P Fu W isnu Uria w an Adryan Putra Pratama Shafw an Mursyid C : C onceptualization I : I n v estig ation V i : V i sualization M : M ethodology R : R esources Su : Su pervision So : So ftw are D : D ata Curation P : P roject Administration V a : V a lidation O : Writing - O riginal Draft Fu : Fu nding Acquisition F o : F o rmal Analysis E : Writing - Re vie w & E diting CONFLICT OF INTEREST ST A TEMENT The authors whose names are listed immediately belo w certify that the y ha v e no conict of interest. INFORMED CONSENT W e ha v e obtained informed consent from all indi viduals included in this study . ETHICAL APPR O V AL This research, unrelated to animal use. Ho we v er , has complied with all the rele v ant national re gula- tions and institutional policies for the care and use of animals. D A T A A V AILABILITY This research is not using a specic data or dataset. Ho we v er , we pro vided all the references tha t are needed for this research w ork in the references section. Comput Sci Inf T echnol, V ol. 6, No. 2, July 2025: 214–224 Evaluation Warning : The document was created with Spire.PDF for Python.
Comput Sci Inf T echnol ISSN: 2722-3221 223 REFERENCES [1] S. Shi, D. He, L. Li, N. K umar , M. K. Khan, a nd K.-K. R. Choo, Applications of blockchain in ensuring the security and pri v ac y of electronic health record systems: a surv e y , Computer s & Security , v ol. 97, Oct. 2020, doi: 10.1016/j.cose.2020.101966. [2] B. S. Eg ala, A. K. Pradhan, V . Badarla, and S. P . Mohanty , “F ortied-chain: a blockchain-based frame w ork for security and pri v ac y- assured internet of medical things with ef fecti v e access control, IEEE Internet of Things J ournal , v ol. 8, no. 14, pp. 11717–11731, 2021, doi: 10.1109/JIO T .2021.3058946. [3] R. K umar , A surv e y on the security and pri v ac y of blockchain systems, International J ournal of Scientic Resear c h in Engineering and Mana g ement , v ol. 6, no. 1, 2022, doi: 10.55041/ijsrem11514. [4] A. Ar g ani and W . T araka, “Utilization of blockchain technology to optimize certicate security in higher education (in bahasa: pemanfaatan teknolo gi bloc kc hain untuk mengoptimalkan k eamanan sert ikat pada per guruan ting gi ), ADI Bisnis Digital Inter - disiplin J urnal , v ol. 1, no. 1, pp. 10–21, 2020, doi: 10.34306/abdi.v1i1.121. [5] M. Pilki ngton, “Blockchain technology: principles and applications, Resear c h Handbook on Digital T r ansformations , Edw ard Elg ar Publishing, 2016, pp. 225–253, doi:10.4337/9781784717766.00019. [6] X. Li, P . Jiang, T . Chen, X. Luo, and Q. W en, A surv e y on the security of blockchain systems, Futur e Gener ation Computer Systems , v ol. 107, pp. 841–853, Jun. 2020, doi: 10.1016/j.future.2017.08.020. [7] F . Sun, A surv e y of consensus algorithms in crypto, Medium . 2018. [Online]. A v ailable: https://medium.com/@sunora98/a- surv e y-of-consensus-algorithms-in-crypto-e2e954dc9218 [8] M. Kim and T . Suh, “Ea v esdropping vulnerability and countermeasure in infrared communication for IoT de vices, Sensor s , v ol. 21, no. 24, 2021, doi: 10.3390/s21248207. [9] S. Salim, N. Moustaf a, and B. T urnb ull, “Pri v ac y preserv ation of Internet of Things-inte grated social netw orks: a surv e y and future challenges, International J ournal of W eb Information Systems , 2025, doi: 10.1108/IJWIS-04-2024-0120. [10] M. H. Abidi, H. Alkhalef ah, U. Umer , and M. K. Mohammed, “Blockchain-based secure information sharing for supply chain management: optimization assisted data sanitization process, International J ournal of Intell ig ent Systems , v ol. 36, pp. 260-290, 2021, doi: 10.1002/int.22299. [11] A. Azaria, A. Ekbla w , T . V ieira, and A. Lippman, “MedRec: using blockchain for medical data access and permission man- agement, in Pr oceedings - 2016 2nd International Confer ence on Open and Big Data, OBD 2016 , 2016, pp. 25–30, doi: 10.1109/OBD.2016.11. [12] A. P . Joshi, M. Han, and Y . W ang, A surv e y on security and pri v ac y issues of blockchain technology , Mathematical F oundations of Computing , v ol. 1, no. 2, pp. 121–147, 2018, doi: 10.1109/ICSSE.2019.8823094. [13] E. M. Abou-Nassar , A. M. Iliyasu, P . Elkafra wy , O.- Y . Song, A. K. Bashir , A. A. A. El-Latif, “DIT rust chain: to w ards blockchain- based trust models for sustainable healthcare IoT systems, IEEE Access , v ol. 8, pp. 111223-1112338, 2020, doi: 10.1109/A C- CESS.2020.2999468. [14] Y . Lee, B. Son, S. P ark, J. Lee, and H. Jang, A surv e y on security and pri v ac y in blockchain-based central bank digital currencies, J ournal of Internet Services and Information Security , v ol. 11, no. 3, pp. 16–29, 2021, doi: 10.22667/JISIS.2021.08.31.016. [15] O. F adi, Z. Karim, E. G. Abdellatif, and B. Mohammed, A surv e y on blockchain and articial intelligence technologies for enhancing security and pri v ac y in smart en vironments, IEEE Access , v ol. 10, pp. 93168–93186, 2022, doi: 10.1109/A C- CESS.2022.3203568. [16] N. F ahmi, D. E. Hastasakti, D. Zaspiagi, and R. K. Saputra, A com parison of blockchain application and security issues from bitcoin to c ybersecurity , Bloc kc hain F r ontier T ec hnolo gy , v ol. 3, no. 1, pp. 81–88, 2022, doi: 10.34306/bfront.v3i1.231. [17] Z. W enhua, F . Qamar , T . A. N. Abdali, R. Hassan, S. T . A. Jafri, and Q. N. Nguyen, “Blockchain technology: security issues, healthcare applications, challenges and future trends, Electr onics , v ol. 12, no. 3, 2023, doi: 10.3390/electronics12030546. [18] Z. Zheng, S. Xie, H. Dai, X. Chen, and H. W ang, An o v ervie w of blockchain technology: architecture, consensus, and future trends, in Pr oceedings - 2017 IEEE 6th International Congr ess on Big Data, BigData Congr ess 2017 , 2017, pp. 557–564, doi: 10.1109/BigDataCongress.2017.85. [19] I. Abrar , and J. A. Sheikh, “Current trends of blockchain technology: architecture, applications, challenges, and opportunities, Disco ver Internet of Things , Springer , v ol. 4, pp. 7, 2024, doi: 10.1007/s43926-024-00058-5. [20] B. T an, J. Y an, S. Chen, and X. Liu, “The impact of blockchain on food supply chain: the case of w almart, Smart Bloc kc hain , pp. 167–177, 2018, doi: 10.1007/978-3-030-05764-0_18. [21] S. Ranjan, A. Ne gi, H. Jain, B. P al, and H. Agra w al, “Netw ork system design using h yperledger f abric: permissioned blockchain frame w ork, 2019 T welfth International Confer ence on Contempor ary Computing (IC3) , Noida, India, 2019, pp. 1-6, doi: 10.1109/IC3.2019.8844940. [22] S. Rojnic, “Blockchain technology is making its w ay into public services: the e xamples from geor gia and estonia, HeinOnline , 2022. [Online]. A v ailable: https://heinonline.or g/HOL/LandingP age?handle=hein.journals/amsla wf14&di v=26&id=&page= [23] F . P . Hjalmarsson, G. K. Hreioarsson, M. Hamdaqa, and G. Hjalmtysson, “Blockchain-based e-v oti ng system, 2018 IEEE 11th International Confer ence on Cloud Computing (CLOUD) , San Francisco, CA, USA, 2018, pp. 983-986, doi: 10.1109/CLOUD.2018.00151. [24] K. Salah, M. H. ur Rehman, N. Nizamuddin, and A. Al-Fuqaha, “Blockchain for AI: re vie w and open research challenges, IEEE Access v ol. 7, pp. 10127-10149, 2019, doi:10.1109/A CCESS.2018.2890507. [25] T . N. Dinh and M. T . Thai, AI and blockchain: a disrupti v e inte gration, Computer , IEEE, v ol. 51, no. 9, pp. 48-53, 2018, doi: 10.1109/MC.2018.3620971. [26] D. Khan, L. T . Jung, and M. A. Hashmani, “Systematic literature re vie w of challenges in blockchain scalability , Applied Sciences , v ol. 11, no. 20, 2021, doi: 10.3390/app11209372. [27] E. T am, S. Mahula, and J. Crom pv oe ts, “Blockchain go v ernance in the public sector: a conceptual frame w ork for public manage- ment, Go vernment Information Quarterly , Else vier , v ol. 39, no. 1, 2022, doi: 10.1016/j.giq.2021.101625. Bloc kc hain tec hnolo gy for optimizing security and privacy in distrib uted systems (W isnu Uriawan) Evaluation Warning : The document was created with Spire.PDF for Python.