Analisis Peran Blockchain dalam Zero-Trust Architecture untuk Penguatan Identitas Digital dan Privasi Data
DOI:
https://doi.org/10.70294/jimu.v4i01.1330Kata Kunci:
Blockchain, Zero-Trust Architecture, Identitas Digital, Privasi DataAbstrak
Perkembangan era digital meningkatkan risiko terhadap identitas digital dan privasi data, sehingga dibutuhkan mekanisme keamanan yang lebih adaptif. Zero-Trust Architecture (ZTA) hadir dengan prinsip “never trust, always verify”, sementara blockchain menawarkan sistem desentralisasi yang transparan dan tahan manipulasi. Kajian ini bertujuan menganalisis peran blockchain dalam memperkuat ZTA, khususnya pada aspek autentikasi dan pengelolaan identitas. Melalui pendekatan kualitatif berbasis studi kasus dengan analisis literatur dan dokumen, hasil menunjukkan bahwa penerapan Decentralized Identifiers (DID) dan Self-Sovereign Identity (SSI) memungkinkan pengguna mengendalikan data pribadi, serta memperkuat auditabilitas, verifikasi berlapis, dan privasi melalui smart contract serta zero-knowledge proofs. Namun, integrasi blockchain-ZTA masih menghadapi tantangan berupa skalabilitas, manajemen kunci, dan kepatuhan regulasi. Oleh karena itu, diperlukan pendekatan hybrid dan regulasi yang adaptif agar integrasi ini dapat menjadi fondasi keamanan digital yang andal dan berkelanjutan.
Unduhan
Referensi
Allsop, D. B., Chelladurai, J. M., Kimball, E. R., Marks, L. D., & Hendricks, J. J. (2022). Qualitative Methods with Nvivo Software: A Practical Guide for Analyzing Qualitative Data. Psych, 4(2), 142–159. https://doi.org/10.3390/psych4020013
Bandara, E., Liang, X., Foytik, P., Shetty, S., & Zoysa, K. De. (2021). A Blockchain and Self-Sovereign Identity Empowered Digital Identity Platform. Proceedings - International Conference on Computer Communications and Networks, ICCCN, 2021-July(January 2022). https://doi.org/10.1109/ICCCN52240.2021.9522184
Butincu, C. N., & Alexandrescu, A. (2024). Design Aspects of Decentralized Identifiers and Self-Sovereign Identity Systems. IEEE Access, 12(February), 60928–60942. https://doi.org/10.1109/ACCESS.2024.3394537
Carcary, M. (2020). The Research Audit Trail: Methodological Guidance for Application in Practice. Electronic Journal of Business Research Methods, 18(2), 166–177. https://doi.org/10.34190/JBRM.18.2.008
Chaudhry, U. B., & Hydros, A. K. M. (2023). Zero-trust-based security model against data breaches in the banking sector: A blockchain consensus algorithm. IET Blockchain, 3(2), 98–115. https://doi.org/10.1049/blc2.12028
Choe, Y., Lee, J., & Lee, G. (2022). Exploring Values via the Innovative Application of Social Media with Parks Amid COVID-19: A Qualitative Content Analysis of Text and Images Using ATLAS.ti. Sustainability (Switzerland), 14(20). https://doi.org/10.3390/su142013026
da Fonseca, L. M. M., Barzegar, H. R., & Pahl, C. (2023). Decentralized Identification and Information Exchange in Distributed, Blockchain-Based Internet Architectures: A Technology Review. International Conference on Web Information Systems and Technologies, WEBIST - Proceedings, Webist, 535–544. https://doi.org/10.5220/0012254900003584
De Salve, A., Di Francesco Maesa, D., Mori, P., Ricci, L., & Puccia, A. (2023). A multi-layer trust framework for Self Sovereign Identity on blockchain. Online Social Networks and Media, 37–38(February), 100265. https://doi.org/10.1016/j.osnem.2023.100265
Di Francesco Maesa, D., Lisi, A., Mori, P., Ricci, L., & Boschi, G. (2023). Self sovereign and blockchain based access control: Supporting attributes privacy with zero knowledge. Journal of Network and Computer Applications, 212(July 2022), 103577. https://doi.org/10.1016/j.jnca.2022.103577
Enaya, A., Fernando, X., & Kashef, R. (2025). Survey of Blockchain-Based Applications for IoT. Applied Sciences (Switzerland), 15(8). https://doi.org/10.3390/app15084562
Garzon, S. R., Segat, C., & Kupper, A. (2025). Governance of Ledger-Anchored Decentralized Identifiers. Proceedings - 2025 Crypto Valley Conference, CVC 2025, 44–55. https://doi.org/10.1109/CVC65719.2025.00014
Ghasemshirazi, S., Shirvani, G., & Alipour, M. A. (2023). Zero Trust: Applications, Challenges, and Opportunities.
Godyn, M., Kedziora, M., Ren, Y., Liu, Y., & Song, H. H. (2022). Analysis of solutions for a blockchain compliance with GDPR. Scientific Reports, 12(1), 1–11. https://doi.org/10.1038/s41598-022-19341-y
Harrell, D. T., Usman, M., Hanson, L., Abdul-Moheeth, M., Desai, I., Shriram, J., de Oliveira, E., Bautista, J. R., Meyer, E. T., & Khurshid, A. (2022). Technical Design and Development of a Self-Sovereign Identity Management Platform for Patient-Centric Health Care using Blockchain Technology. Blockchain in Healthcare Today, 5(Special issue), 1–12. https://doi.org/10.30953/bhty.v5.196
Horne, D. (2025). Zero Trust Architecture. Encyclopedia of Cryptography, Security and Privacy, Third Edition, 2809–2814. https://doi.org/10.1007/978-3-030-71522-9_1638
Kim, G., & Ryou, J. (2023). Digital Authentication System in Avatar Using DID and SBT. Mathematics, 11(20). https://doi.org/10.3390/math11204387
Kriswandaru, A. S., Pratiwi, B., Laksito, J., Ariani, W., & Sholikatun, S. (2025). Analisis Yuridis terhadap Penggunaan Teknologi Blockchain dalam Pengamanan Data Pribadi: Studi Kasus di Indonesia. Perkara : Jurnal Ilmu Hukum Dan Politik, 2(4), 531–540. https://doi.org/10.51903/perkara.v2i4.2225
Krul, E., Paik, H., Ruj, S., & Kanhere, S. S. (2024). SoK: Trusting Self-Sovereign Identity. In Proceedings on Privacy Enhancing Technologies (Vol. 2024, Issue 3). Association for Computing Machinery. https://doi.org/10.56553/popets-2024-0079
Mandinyenya, G., & Malele, V. (2025). A Hybrid Framework for Enhancing Privacy in Blockchain-Based Personal Data Sharing using Off-Chain Storage and Zero-Knowledge Proofs. Journal of Information Systems and Informatics, 7(2), 1977–2005. https://doi.org/10.51519/journalisi.v7i2.1119
Mazzocca, C., Acar, A., Uluagac, S., Montanari, R., Bellavista, P., & Conti, M. (2025). A Survey on Decentralized Identifiers and Verifiable Credentials. IEEE Communications Surveys and Tutorials, 1–32. https://doi.org/10.1109/COMST.2025.3543197
Mutahhar, A., Khanzada, T. J. S., & Shahid, M. F. (2025). Enhanced Scalability and Security in Blockchain-Based Transportation Systems for Mass Gatherings. Information, 16(8), 641. https://doi.org/10.3390/info16080641
Nie, S., Ren, J., Wu, R., Han, P., Han, Z., & Wan, W. (2025). Zero-Trust Access Control Mechanism Based on Blockchain and Inner-Product Encryption in the Internet of Things in a 6G Environment. Sensors, 25(2), 1–27. https://doi.org/10.3390/s25020550
Nikhil Ghadge. (2024). Analyzing the Role of Blockchain in Identity and Access Management Systems. International Journal of Science and Research Archive, 12(1), 2249–2256. https://doi.org/10.30574/ijsra.2024.12.1.1019
Pava-Díaz, R. A., Gil-Ruiz, J., & López-Sarmiento, D. A. (2024). Self-sovereign identity on the blockchain: Contextual analysis and quantification of SSI principles implementation. Frontiers in Blockchain, 7(August), 1–15. https://doi.org/10.3389/fbloc.2024.1443362
Polychronaki, M., Xevgenis, M. G., Kogias, D. G., & Leligou, H. C. (2024). Decentralized Identity Management for Metaverse-Enhanced Education: A Literature Review. Electronics (Switzerland), 13(19). https://doi.org/10.3390/electronics13193887
Schumm, D., Muller, K. O. E., & Stiller, B. (2025). Are We There Yet? A Study of Decentralized Identity Applications. IEEE Access, 13, 125232–125259. https://doi.org/10.1109/ACCESS.2025.3588170
Singh, A., Pareek, V., & Sharma, A. (2024). A Review on Blockchain for Fintech using Zero Trust Architecture. Journal of Information and Organizational Sciences, 48(1), 191–213. https://doi.org/10.31341/jios.48.1.11
Suryawijaya, T. W. E. (2023). Memperkuat Keamanan Data melalui Teknologi Blockchain: Mengeksplorasi Implementasi Sukses dalam Transformasi Digital di Indonesia. Jurnal Studi Kebijakan Publik, 2(1), 55–68. https://doi.org/10.21787/jskp.2.2023.55-68
Wang, F., Gai, Y., & Zhang, H. (2024). Blockchain user digital identity big data and information security process protection based on network trust. Journal of King Saud University - Computer and Information Sciences, 36(4), 102031. https://doi.org/10.1016/j.jksuci.2024.102031
Wendelborn, C., Anger, M., & Schickhardt, C. (2023). What is data stewardship? Towards a comprehensive understanding. Journal of Biomedical Informatics, 140(March), 104337. https://doi.org/10.1016/j.jbi.2023.104337
Xie, T., Gai, K., Yu, J., Zhu, L., & Xiao, B. (2025). SLVC-DIDA: Signature-less Verifiable Credential-based Issuer-hiding and Multi-party Authentication for Decentralized Identity. Did.