Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : Advance Sustainable Science, Engineering and Technology (ASSET)

The Implementation and Analysis of The Proof of Work Consensus in Blockchain Therry, Alvin Christian Davidson; Ardiansyah, Rizka; Pusadan, Mohammad Yazdi; Joefrie, Yuri Yudhaswana; Kasim, Anita Ahmad
Advance Sustainable Science, Engineering and Technology Vol 6, No 1 (2024): November-January
Publisher : Universitas PGRI Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26877/asset.v6i1.17878

Abstract

Communication in peer-to-peer (P2P) networks presents challenges in maintaining security, data integrity, and decentralization. Consensus mechanisms play a crucial role in addressing these challenges by validating data and ensuring that each entity has synchronized data without intermediaries. This research focuses on the implementation and analysis of the Proof of Work (PoW) consensus mechanism, widely used in blockchain, to enhance understanding of its functions, benefits, and workings or flow. This research, conducted using the Go programming language, successfully implements Proof of Work (PoW) as a security measure, ensuring data integrity, and preventing manipulation. Through black-box testing, this research confirms the functionality and reliability of the implemented Proof of Work (PoW) consensus. These findings contribute to a deeper understanding of consensus mechanisms, offering insights to optimize blockchain protocols and foster trust among entities. This research highlights the relevance of sustainable Proof of Work (PoW) in blockchain technology, emphasizing its role in enhancing security and ensuring data integrity in decentralized networks.
Implementation of Data Layer In Blockchain Network Using SHA256 Hashing Algorithm Sondakh, Clivent Gerhard; Ardiansyah, Rizka; Joefrie, Yuri Yudhaswana; Angreni, Dwi Shinta; Pusadan, Mohammad Yazdi
Advance Sustainable Science, Engineering and Technology Vol 6, No 2 (2024): February - April
Publisher : Universitas PGRI Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26877/asset.v6i2.18103

Abstract

The escalating demand for secure data management in blockchain systems has prompted the exploration of advanced cryptographic techniques. Leveraging the SHA256 hashing algorithm, this implementation aims to fortify data integrity, confidentiality, and authentication within the blockchain network. By meticulously examining the algorithm's application, the research demonstrates its efficacy in ensuring tamper-resistant data storage and retrieval, quantifying improvements in security percentages and specific metrics. The integration of SHA256 within the data layer is explored in technical detail, highlighting the concrete benefits of heightened security and immutability. The analysis discusses practical implications and delves into potential advancements in blockchain technology, offering valuable insights for researchers, developers, and practitioners seeking to bolster the robustness of data layers in blockchain networks.
Implementing Blockchain For Publishing and Verifying Digital Certificates On EduTech Maroso, Akwan; Angreni, Dwi Shinta; Ardiansyah, Rizka; Dwiwijaya, Kadek Agus
Advance Sustainable Science, Engineering and Technology Vol 6, No 2 (2024): February - April
Publisher : Universitas PGRI Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26877/asset.v6i2.18262

Abstract

This study investigates the application of blockchain technology in enhancing the security and authenticity of digital certificates. Addressing key challenges such as fraud and the lack of a standardized verification process, the paper proposes a comprehensive framework aimed at fortifying the integrity of digital credentials. This framework is the utilization of blockchain as a distributed ledger, serving as a tamper-proof repository for recording certification transactions. Through this decentralized ledger, each certification issuance and verification action is securely recorded, enhancing trust and transparency in the certification process. The methodology includes the integration of a decentralized ledger for immutable record-keeping  and implementation of smart contracts for automated authenticity checks, and the use of cryptographic measures to ensure data security. This approach promises significant implications for various sectors reliant on credential verification, advocating for a broader adoption of blockchain in digital certificates systems.
Developing Decentralized Data Storage Network Using Blockchain Technology to Prevent Data Alteration Putra, Ryan Adi; Ardiansyah, Rizka; Pusadan, Mohammad Yazdi; Kasim, Anita Ahmad; Joefrie, Yuri Yudhaswana
Advance Sustainable Science, Engineering and Technology Vol 6, No 1 (2024): November-January
Publisher : Universitas PGRI Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26877/asset.v6i1.17772

Abstract

In the face of escalating global data exchange, the pronounced vulnerability oftraditional centralized storage networks to manipulation and attacks poses a pressing challenge. Digital service providers, entrusted with vast datasets, grapple with the formidable task of ensuring the security, integrity, and continuous availability of their stored information. This paper tackles these multifaceted issues by proposing a decentralized data storage network empowered by blockchain technology. This approach systematically mitigates the inherent susceptibilities of centralized systems, thereby providing heightened resilience against unauthorized alterations and malicious attacks that compromise digital information integrity. Moreover, the decentralized model holds significant promise for securing public data. By leveraging the transparency and immutability of blockchain ledgers, this approach not only safeguards against unauthorized access but also actively fosters transparency and accountability in data management. This makes it particularly well-suited for ensuring the security and integrity of public data, addressing concerns related to trust and reliability in the ever-evolving landscape of information exchange.