Implementation of a Blockchain-Based IDS for Cloud Infrastructure
DOI:
https://doi.org/10.36679/s4kira.v3i2.52Keywords:
Intrution detection system, Blockchain,, cyber security, infrastructur cloud, technologyAbstract
Data security in cloud computing environments has become a major concern as system architectures grow increasingly complex, distributed, and open to external access. One of the essential components in maintaining system security is the Intrusion Detection System (IDS), which is responsible for identifying suspicious activities and cyberattacks. However, traditional IDS implementations face several limitations, including the vulnerability of log integrity, limited scalability in dynamic cloud environments, and reliance on centralized architectures that are prone to single points of failure and internal threats. To address these challenges, the integration of blockchain technology into IDS has emerged as an innovative solution. Blockchain offers decentralization, transparency, and immutability of records, which are highly relevant for strengthening IDS reliability and trust.This study employs a literature review methodology by examining scholarly articles, academic journals, and real-world case studies focusingon blockchain-based IDS implementations within cloud computing infrastructure. The findings suggest that using blockchain—particularly permissioned frameworks such as Hyperledger Fabric—can significantly enhance the integrity of IDS logs, enable transparent and verifiable audit trails, and support secure multi-tenant collaboration in both public and private cloud settings. Furthermore, the combination with machine learning techniques, federated learning, and Zero Trust Architecture (ZTA) increases the detection accuracy and responsiveness of the system. Nevertheless, several challenges remain, including transaction efficiency, computational overhead, and system integration complexity. Therefore, a carefully designed and optimized architecture is required tomaximize the benefits of blockchain-based IDS in cloud environments.
References
E. Stephani, Fitri Nova, and Ervan Asri, “Implementasi
dan Analisa Keamanan Jaringan IDS (Intrusion Detection
System) Menggunakan Suricata Pada Web Server,”
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi, vol. 1,
no. 2, pp. 67–74, 2020, doi: 10.30630/jitsi.1.2.10.
T. D. Cahyono and W. Hadikurniawati, “Blockchain
Untuk Aplikasi Iot Healthcare: Studi Literatur,” Dinamik,
vol. 28, no. 2, pp. 53–60, 2023, doi:
35315/dinamik.v28i2.9576.
Z. Munawar, N. Indah Putri, I. Iswanto, and D.
Widhiantoro, “Analisis Keamanan Pada Teknologi
Blockchain,” Infotronik : Jurnal Teknologi Informasi dan
Elektronika, vol. 8, no. 2, p. 67, 2023, doi:
32897/infotronik.2023.8.2.2062.
I. Elan Maulani, D. Rayhan Sunandar Putra, and K.
Komarudin, “Sistem Deteksi Intrusi Cerdas: Studi
Perbandingan Algoritma Pembelajaran Mesin Untuk
Keamanan Siber,” Jurnal Sosial Teknologi, vol. 3, no. 11,
, doi: 10.59188/jurnalsostech.v3i11.987.
A. R. Zain, P. Oktivasari, N. Fauzi Soelaiman, and F.
Watsiqul Umam, “IMPLEMENTASI INTRUSION
DETECTION SYSTEM (IDS) SURICATA DAN
MANAGEMENT LOG ELK STACK UNTUK PENDETEKSIAN
KEGIATAN MINING,” Jurnal Poli-Teknologi, vol. 22, no.
, 2023, doi: 10.32722/pt.v22i1.4974.
R. Kurniawan and F. Prakoso, “Implementasi Metode IPS
(Intrusion Prevention System) dan IDS (Intrusion
Detection System) untuk Meningkatkan Keamanan
Jaringan,” SENTINEL, vol. 3, no. 1, 2020, doi:
56622/sentineljournal.v3i1.20.
H. Han, R. K. Shiwakoti, R. Jarvis, C. Mordi, and D.
Botchie, “Accounting and auditing with blockchain
technology and artificial Intelligence: A literature review,”
International Journal of Accounting Information Systems,
vol. 48, 2023, doi: 10.1016/j.accinf.2022.100598.
T. Huynh-The et al., “Blockchain for the metaverse: A
Review,” Future Generation Computer Systems, vol. 143,
, doi: 10.1016/j.future.2023.02.008.
“blockchain”.
A. S. Manalu, I. M. Siregar, N. J. Panjaitan, and H.
Sugara, “RANCANG BANGUN INFRASTRUKTUR CLOUD
COMPUTING DENGAN OPENSTACK PADA JARINGAN
LOKAL MENGGUNAKAN VIRTUALBOX,” Jurnal Teknik
Informasi dan Komputer (Tekinkom), vol. 4, no. 2, 2021,
doi: 10.37600/tekinkom.v4i2.335.
R. Aditya, “Infrastruktur cloud pintar dalam sistem
layanan informasi berbasis big data,” INTEGRATED
(Journal of Information Technology and Vocational
Education), vol. 3, no. 1, 2021, doi:
17509/integrated.v3i1.64423.
]
R. Firman, Yuhefizar, and H. Amnur, “Implementasi
Openstack untuk Private Cloud pada mata kuliah
Administrasi server,” JITSI : Jurnal Ilmiah Teknologi
Sistem Informasi, vol. 1, no. 2, 2020, doi:
30630/jitsi.1.2.11.
]
N. Ramsari and A. Ginanjar, “Implementasi Infrastruktur
Server Berbasis Cloud Computing Untuk Web Service
Berbasis Teknologi Google Cloud Platform,” Conference
SENATIK STT Adisutjipto Yogyakarta, vol. 7, 2022, doi:
28989/senatik.v7i0.472.
]
M. Nina Adlini, A. Hanifa Dinda, S. Yulinda, O. Chotimah,
and S. Julia Merliyana, “METODE PENELITIAN
KUALITATIF STUDI PUSTAKA,” 2022.
]
“147.+Putu+Gede+5599-5609”.
]
M. Nina Adlini, A. Hanifa Dinda, S. Yulinda, O. Chotimah,
and S. Julia Merliyana, “METODE PENELITIAN
KUALITATIF STUDI PUSTAKA,” 2022.
]
S. Dong, K. Abbas, M. Li, and J. Kamruzzaman,
“Blockchain technology and application: an overview,”
PeerJ Comput Sci, vol. 9, 2023, doi: 10.7717/peerjcs.1705.
]
M. Abduh, T. Alawiyah, G. Apriansyah, R. A. Sirodj, and
M. W. Afgani, “Survey Design: Cross Sectional dalam
Penelitian Kualitatif,” Jurnal Pendidikan Sains dan
Komputer, vol. 3, no. 01, 2022, doi:
47709/jpsk.v3i01.1955.
]
Feny Rita Fiantika, Metodologi Penelitian Kualitatif. In
Metodologi Penelitian Kualitatif, no. Maret. 2022.
]
F. Siva, S. M. U. Assegaf, S. A. Pahlevi, and M. A.
Yaqin, “Survei Metode-Metode Software Development
Life Cycle dengan Metode Systematic Literature Review,”
ILKOMNIKA: Journal of Computer Science and Applied
Informatics, vol. 5, no. 2, 2023, doi:
28926/ilkomnika.v5i2.447.
]
I. Abraham and Y. Supriyati, “DESAIN KUASI
EKSPERIMEN DALAM PENDIDIKAN: LITERATUR
REVIEW,” Jurnal Ilmiah Mandala Education, vol. 8, no. 3,
, doi: 10.58258/jime.v8i3.3800.
]
C. R. Indahyanti, “Literatur review,” MIZANIA: Jurnal
Ekonomi Dan Akuntansi, vol. 2, no. 1, 2022, doi:
47776/mizania.v2i1.469.
]
D. Apriliawati, “Diary Study sebagai Metode
Pengumpulan Data pada Riset Kuantitatif: Sebuah
Literature Review,” Journal of Psychological Perspective,
vol. 2, no. 2, 2020, doi: 10.47679/jopp.022.12200007.
]
Y. Rifa’i, “Analisis Metodologi Penelitian Kulitatif dalam
Pengumpulan Data di Penelitian Ilmiah pada Penyusunan
Mini Riset,” Cendekia Inovatif Dan Berbudaya, vol. 1, no.
, 2023, doi: 10.59996/cendib.v1i1.155
Downloads
Published
Issue
Section
License
Organized by : Universitas Islam Al-Azhar
Published by : Universitas Islam Al-Azhar
E-mail: sakira@unizar.ac.id | ilmukomputer@unizar.ac.id


