Analisis Keamanan Data dan Perlindungan Privasi dalam Pengelolaan Big Data: Tinjauan Teknologi Enkripsi dan Anonimisasi

Penulis

  • Loso Judijanto IPOSS Jakarta-Indonesia, Indonesia
  • Pratama Dahlian Persadha Sekolah Tinggi Inteljen Negara, Indonesia
  • Indah Susilowati Institut Ilmu Kesehatan Bhakti Wiyata Kediri, Indonesia
  • Heru Kreshna Reza Universitas Esa Unggul, Indonesia
  • Melly Susanti Universitas Muhammadiyah Bengkulu Indonesia

DOI:

https://doi.org/10.54082/jupin.1151

Kata Kunci:

Big Data, Keamanan Data, Perlindungan Privasi, Pelanggaran Data, Teknologi Enkripsi

Abstrak

"Big Data" telah memicu masuknya data dalam jumlah besar dari berbagai sumber, yang membawa peluang serta tantangan dalam hal keamanan dan privasi data. Tujuan utama artikel ini adalah untuk memberikan tinjauan menyeluruh tentang penelitian ilmiah terbaru dan kemajuan dalam teknologi anonimisasi dan enkripsi yang digunakan untuk perlindungan data. Artikel ini mengevaluasi berbagai metode dan strategi yang telah dikembangkan untuk mengatasi tantangan keamanan dan privasi, termasuk teknik anonimisasi data, kontrol akses, dan enkripsi. Hasil penelitian menunjukkan adanya kemajuan signifikan dalam menciptakan metode yang lebih kuat untuk melindungi data dari akses dan pelanggaran yang tidak sah. Namun, penelitian juga mengidentifikasi beberapa tantangan yang masih ada, seperti kompleksitas teknis dalam menerapkan enkripsi skala besar, serta hambatan dalam harmonisasi regulasi privasi di berbagai yurisdiksi. Artikel ini memberikan wawasan mendalam tentang kondisi keamanan data dan privasi dalam era Big Data, mengidentifikasi potensi ancaman, dan menawarkan rekomendasi untuk arah penelitian dan pengembangan di masa depan, termasuk perlunya inovasi dalam enkripsi kuantum dan perlindungan privasi yang lebih adaptif.

Referensi

Alali, Amal S., Rashad Ali, Muhammad Kamran Jamil, Javed Ali, and Gulraiz. 2024. “Dynamic S-Box Construction Using Mordell Elliptic Curves over Galois Field and Its Applications in Image Encryption.” Mathematics 12(4):1–15. doi: 10.3390/math12040587.

Amos, Linda Susan, and Eng. Tirivangani Magadza. 2024. “5V’s of Big Data Shifted to Suite the Context of Software Code: Big Code for Big Software Projects.” Journal of Artificial Intelligence and Big Data 4(1):36–47. doi: 10.31586/jaibd.2024.911.

Azad, Poupak, Cuneyt Gurcan Akcora, and Arijit Khan. 2024. “Machine Learning for Blockchain Data Analysis: Progress and Opportunities.” Distributed Ledger Technologies: Research …. doi: 10.1145/3728474.

C, Pradeep, and Prof. Rahul Pawar. 2024. “Big Data Analytics in Cloud Environments.” International Journal of Research Publication and Reviews 5(3):4240–46. doi: 10.55248/gengpi.5.0324.07105.

Chin, Ya Chi, Chien Lung Hsu, Tzu Wei Lin, and Kuo Yu Tsai. 2024. “A Hierarchical Blockchain System for Social Economy Services.” Electronics (Switzerland) 13(20).

Chuen, David Lee Kuo. 2015. Handbook of Digital Currency: Bitcoin, Innovation, Financial Instruments, and Big Data. books.google.com.

Davies, Jack. 2023. “Enhanced Scalability and Privacy for Blockchain Data Using Merklized Transactions.” Frontiers in Blockchain 6(January):1–10. doi: 10.3389/fbloc.2023.1222614.

Guo, Xingcheng, and Xianglong Guo. 2023. “A Research on Blockchain Technology: Urban Intelligent Transportation Systems in Developing Countries.” IEEE Access 11:40724–40. doi: 10.1109/ACCESS.2023.3270100.

Jiang, Peng, Lei Zhang, Siming You, Yee Van Fan, Raymond R. Tan, Jiří Jaromír Klemeš, and Fengqi You. 2023. “Blockchain Technology Applications in Waste Management: Overview, Challenges and Opportunities.” Journal of Cleaner Production 421. doi: 10.1016/j.jclepro.2023.138466.

Kayikci, Safak, and Taghi M. Khoshgoftaar. 2024. “Blockchain Meets Machine Learning: A Survey.” Journal of Big Data 11(1). doi: 10.1186/s40537-023-00852-y.

Mhlanga, David. 2024. “The Role of Big Data in Financial Technology toward Financial Inclusion.” Frontiers in Big Data 7. doi: 10.3389/fdata.2024.1184444.

Miao, Junfeng, Zhaoshun Wang, Zeqing Wu, Xin Ning, and Prayag Tiwari. 2024. “A Blockchain-Enabled Privacy-Preserving Authentication Management Protocol for Internet of Medical Things.” Expert Systems with Applications 237. doi: 10.1016/j.eswa.2023.121329.

Munawar, Zen, Novianti Indah Putri, Iswanto Iswanto, and Dandun Widhiantoro. 2023. “Analisis Keamanan Pada Teknologi Blockchain.” Infotronik : Jurnal Teknologi Informasi Dan Elektronika 8(2):67. doi: 10.32897/infotronik.2023.8.2.2062.

Muthubalaji, Sankaramoorthy, Naresh Kumar Muniyaraj, Sarvade Pedda Venkata Subba Rao, Kavitha Thandapani, Pasupuleti Rama Mohan, Thangam Somasundaram, and Yousef Farhaoui. 2024. “An Intelligent Big Data Security Framework Based on AEFS-KENN Algorithms for the Detection of Cyber-Attacks from Smart Grid Systems.” Big Data Mining and Analytics 7(2):399–418. doi: 10.26599/BDMA.2023.9020022.

Peng, Shaoliang, Wenxuan Bao, Hao Liu, Xia Xiao, Jiandong Shang, Lin Han, Shan Wang, Xiaolan Xie, and Yang Xu. 2023. “A Peer-to-Peer File Storage and Sharing System Based on Consortium Blockchain.” Future Generation Computer Systems 141:197–204.

Sasikumar, A., Logesh Ravi, Ketan Kotecha, Ajith Abraham, Malathi Devarajan, and Subramaniyaswamy Vairavasundaram. 2023. “A Secure Big Data Storage Framework Based on Blockchain Consensus Mechanism With Flexible Finality.” IEEE Access 11:56712–25. doi: 10.1109/ACCESS.2023.3282322.

Weerawarna, Rashikala, Shah J. Miah, and Xuefeng Shao. 2023. “Emerging Advances of Blockchain Technology in Finance: A Content Analysis.” Personal and Ubiquitous Computing 27(4):1495–1508. doi: 10.1007/s00779-023-01712-5.

Wen, Heping, Yiting Lin, Shenghao Kang, Xiangyu Zhang, and Kun Zou. 2024. “Secure Image Encryption Algorithm Using Chaos-Based Block Permutation and Weighted Bit Planes Chain Diffusion.” IScience 27(1):108610. doi: 10.1016/j.isci.2023.108610.

Wong, Simon, John Kun Woon Yeung, Yui Yip Lau, and Tomoya Kawasaki. 2023. “A Case Study of How Maersk Adopts Cloud-Based Blockchain Integrated with Machine Learning for Sustainable Practices.” Sustainability (Switzerland) 15(9).

Diterbitkan

07-05-2025

Cara Mengutip

Judijanto, L. ., Persadha, P. D., Susilowati, I. ., Reza, H. K. ., & Susanti, M. . (2025). Analisis Keamanan Data dan Perlindungan Privasi dalam Pengelolaan Big Data: Tinjauan Teknologi Enkripsi dan Anonimisasi. Jurnal Penelitian Inovatif, 5(2), 991–1000. https://doi.org/10.54082/jupin.1151

Terbitan

Bagian

Artikel