Implementation of a Blockchain-Based IDS for Cloud Infrastructure

Authors

  • Putrawan Hadi Universitas Islam Al-Azhar Author
  • M. Hidayaturrahman Universitas Islam Al-Azhar Author
  • Firmansyah Universitas Islam Al-Azhar Author

DOI:

https://doi.org/10.36679/s4kira.v3i2.52

Keywords:

Intrution detection system, Blockchain,, cyber security, infrastructur cloud, technology

Abstract

Data security in cloud computing environments has become a major concern as system architectures grow increasingly complex, distributed, and open to external access. One of the essential components in maintaining system security is the Intrusion Detection System (IDS), which is responsible for identifying suspicious activities and cyberattacks. However, traditional IDS implementations face several limitations, including the vulnerability of log integrity, limited scalability in dynamic cloud environments, and reliance on centralized architectures that are prone to single points of failure and internal threats. To address these challenges, the integration of blockchain technology into IDS has emerged as an innovative solution. Blockchain offers decentralization, transparency, and immutability of records, which are highly relevant for strengthening IDS reliability and trust.This study employs a literature review methodology by examining scholarly articles, academic journals, and real-world case studies focusingon blockchain-based IDS implementations within cloud computing infrastructure. The findings suggest that using blockchain—particularly permissioned frameworks such as Hyperledger Fabric—can significantly enhance the integrity of IDS logs, enable transparent and verifiable audit trails, and support secure multi-tenant collaboration in both public and private cloud settings. Furthermore, the combination with machine learning techniques, federated learning, and Zero Trust Architecture (ZTA) increases the detection accuracy and responsiveness of the system. Nevertheless, several challenges remain, including transaction efficiency, computational overhead, and system integration complexity. Therefore, a carefully designed and optimized architecture is required tomaximize the benefits of blockchain-based IDS in cloud environments.

References

E. Stephani, Fitri Nova, and Ervan Asri, “Implementasi

dan Analisa Keamanan Jaringan IDS (Intrusion Detection

System) Menggunakan Suricata Pada Web Server,”

JITSI : Jurnal Ilmiah Teknologi Sistem Informasi, vol. 1,

no. 2, pp. 67–74, 2020, doi: 10.30630/jitsi.1.2.10.

T. D. Cahyono and W. Hadikurniawati, “Blockchain

Untuk Aplikasi Iot Healthcare: Studi Literatur,” Dinamik,

vol. 28, no. 2, pp. 53–60, 2023, doi:

35315/dinamik.v28i2.9576.

Z. Munawar, N. Indah Putri, I. Iswanto, and D.

Widhiantoro, “Analisis Keamanan Pada Teknologi

Blockchain,” Infotronik : Jurnal Teknologi Informasi dan

Elektronika, vol. 8, no. 2, p. 67, 2023, doi:

32897/infotronik.2023.8.2.2062.

I. Elan Maulani, D. Rayhan Sunandar Putra, and K.

Komarudin, “Sistem Deteksi Intrusi Cerdas: Studi

Perbandingan Algoritma Pembelajaran Mesin Untuk

Keamanan Siber,” Jurnal Sosial Teknologi, vol. 3, no. 11,

, doi: 10.59188/jurnalsostech.v3i11.987.

A. R. Zain, P. Oktivasari, N. Fauzi Soelaiman, and F.

Watsiqul Umam, “IMPLEMENTASI INTRUSION

DETECTION SYSTEM (IDS) SURICATA DAN

MANAGEMENT LOG ELK STACK UNTUK PENDETEKSIAN

KEGIATAN MINING,” Jurnal Poli-Teknologi, vol. 22, no.

, 2023, doi: 10.32722/pt.v22i1.4974.

R. Kurniawan and F. Prakoso, “Implementasi Metode IPS

(Intrusion Prevention System) dan IDS (Intrusion

Detection System) untuk Meningkatkan Keamanan

Jaringan,” SENTINEL, vol. 3, no. 1, 2020, doi:

56622/sentineljournal.v3i1.20.

H. Han, R. K. Shiwakoti, R. Jarvis, C. Mordi, and D.

Botchie, “Accounting and auditing with blockchain

technology and artificial Intelligence: A literature review,”

International Journal of Accounting Information Systems,

vol. 48, 2023, doi: 10.1016/j.accinf.2022.100598.

T. Huynh-The et al., “Blockchain for the metaverse: A

Review,” Future Generation Computer Systems, vol. 143,

, doi: 10.1016/j.future.2023.02.008.

“blockchain”.

A. S. Manalu, I. M. Siregar, N. J. Panjaitan, and H.

Sugara, “RANCANG BANGUN INFRASTRUKTUR CLOUD

COMPUTING DENGAN OPENSTACK PADA JARINGAN

LOKAL MENGGUNAKAN VIRTUALBOX,” Jurnal Teknik

Informasi dan Komputer (Tekinkom), vol. 4, no. 2, 2021,

doi: 10.37600/tekinkom.v4i2.335.

R. Aditya, “Infrastruktur cloud pintar dalam sistem

layanan informasi berbasis big data,” INTEGRATED

(Journal of Information Technology and Vocational

Education), vol. 3, no. 1, 2021, doi:

17509/integrated.v3i1.64423.

]

R. Firman, Yuhefizar, and H. Amnur, “Implementasi

Openstack untuk Private Cloud pada mata kuliah

Administrasi server,” JITSI : Jurnal Ilmiah Teknologi

Sistem Informasi, vol. 1, no. 2, 2020, doi:

30630/jitsi.1.2.11.

]

N. Ramsari and A. Ginanjar, “Implementasi Infrastruktur

Server Berbasis Cloud Computing Untuk Web Service

Berbasis Teknologi Google Cloud Platform,” Conference

SENATIK STT Adisutjipto Yogyakarta, vol. 7, 2022, doi:

28989/senatik.v7i0.472.

]

M. Nina Adlini, A. Hanifa Dinda, S. Yulinda, O. Chotimah,

and S. Julia Merliyana, “METODE PENELITIAN

KUALITATIF STUDI PUSTAKA,” 2022.

]

“147.+Putu+Gede+5599-5609”.

]

M. Nina Adlini, A. Hanifa Dinda, S. Yulinda, O. Chotimah,

and S. Julia Merliyana, “METODE PENELITIAN

KUALITATIF STUDI PUSTAKA,” 2022.

]

S. Dong, K. Abbas, M. Li, and J. Kamruzzaman,

“Blockchain technology and application: an overview,”

PeerJ Comput Sci, vol. 9, 2023, doi: 10.7717/peerjcs.1705.

]

M. Abduh, T. Alawiyah, G. Apriansyah, R. A. Sirodj, and

M. W. Afgani, “Survey Design: Cross Sectional dalam

Penelitian Kualitatif,” Jurnal Pendidikan Sains dan

Komputer, vol. 3, no. 01, 2022, doi:

47709/jpsk.v3i01.1955.

]

Feny Rita Fiantika, Metodologi Penelitian Kualitatif. In

Metodologi Penelitian Kualitatif, no. Maret. 2022.

]

F. Siva, S. M. U. Assegaf, S. A. Pahlevi, and M. A.

Yaqin, “Survei Metode-Metode Software Development

Life Cycle dengan Metode Systematic Literature Review,”

ILKOMNIKA: Journal of Computer Science and Applied

Informatics, vol. 5, no. 2, 2023, doi:

28926/ilkomnika.v5i2.447.

]

I. Abraham and Y. Supriyati, “DESAIN KUASI

EKSPERIMEN DALAM PENDIDIKAN: LITERATUR

REVIEW,” Jurnal Ilmiah Mandala Education, vol. 8, no. 3,

, doi: 10.58258/jime.v8i3.3800.

]

C. R. Indahyanti, “Literatur review,” MIZANIA: Jurnal

Ekonomi Dan Akuntansi, vol. 2, no. 1, 2022, doi:

47776/mizania.v2i1.469.

]

D. Apriliawati, “Diary Study sebagai Metode

Pengumpulan Data pada Riset Kuantitatif: Sebuah

Literature Review,” Journal of Psychological Perspective,

vol. 2, no. 2, 2020, doi: 10.47679/jopp.022.12200007.

]

Y. Rifa’i, “Analisis Metodologi Penelitian Kulitatif dalam

Pengumpulan Data di Penelitian Ilmiah pada Penyusunan

Mini Riset,” Cendekia Inovatif Dan Berbudaya, vol. 1, no.

, 2023, doi: 10.59996/cendib.v1i1.155

Downloads

Published

2025-12-31

How to Cite

[1]
Putrawan Hadi, M. Hidayaturrahman, and Firmansyah , Trans., “Implementation of a Blockchain-Based IDS for Cloud Infrastructure”, SAKIRA, vol. 3, no. 2, pp. 52–58, Dec. 2025, doi: 10.36679/s4kira.v3i2.52.

Most read articles by the same author(s)

Similar Articles

11-20 of 20

You may also start an advanced similarity search for this article.