Immutability of Distributed Hash Model on Blockchain Node Storage

Untung Rahardja, Achmad Nizar Hidayanto, Ninda Lutfiani, Dyah Ayu Febiani, Qurotul Aini

Abstract


Purpose: The blockchain system uses hash functions. Hash is used in the blockchain to mark each block of data. Hash function algorithms map a string that is usually hexadecimal of any size to a sequence of fixed-size bits. This journal will discuss the distributed hash model for immutable blockchain node storage. Methods: The methodology used in the preparation of this research is mind mapping and literature review, namely the collection of scientific journals, articles, and e-books. Result: Storage of nodes on the blockchain using a distributed hash model. The distributed hash model only stores a portion of the block data at each node, and the block data is taken as a resource. A hash connects each block with the previous on the blockchain, so the entire blockchain transaction cannot be changed or deleted. Novelty: For further research will expand the research topic regarding storage immutability on the blockchain so that it becomes more completed and detailed.


Keywords


Blockchain, Immutability, Distributed Hash, Node Storage, Block Data

Full Text:

PDF

References


S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System, †Manubot, 2019.

Q. Aini, U. Rahardja, N. P. L. Santoso, and A. Oktariyani, “Aplikasi Berbasis Blockchain dalam Dunia Pendidikan dengan Metode Systematics Review,†CESS (J. Comput. Eng. Syst. Sci., vol. 6, no. 1, pp. 58–66, 2021.

M. Iansiti and K. R. Lakhani, The Truth About Blockchain, Reading, MA: Harvard Business School Publishing, 2017. [Ebook] Available: hbr.org.

“Bitcoin, Litecoin, Namecoin, Dogecoin, Peercoin, Ethereum Stats,†2021. [Online] Available: https://bitinfocharts.com [Accessed February 01, 2021].

F. P. Oganda, U. Rahardja, Q. Aini, M. Hardini, and A. S. Bist, “Blockchain: Visualization of The Bitcoin Formula,†PalArch’s J. Archaeol. Egypt/Egyptology, vol. 17, no. 6, pp. 308–321, 2020.

B. Yu, X. Li, and H. Zhao, “Virtual Block Group: A Scalable Blockchain Model with Partial Node Storage and Distributed Hash Table,†Comput. J., vol. 63, no. 10, pp. 1524–1536, 2020.

Z. Fauziah, H. Latifah, X. Omar, A. Khoirunisa, and S. Millah, “Application of Blockchain Technology in Smart Contracts: A Systematic Literature Review,†Aptisi Trans. Technopreneursh., vol. 2, no. 2, pp. 160–166, 2020.

“Mind Mapping: Pengertian, Manfaat, dan Cara Membuatnya - Glints Blog.†[Online] Available: https://glints.com/id/lowongan/mind-mapping-adalah/#.YDfB5ugzYwx [Accessed February 25, 2021].

U. Rahardja, S. Kosasi, E. P. Harahap, and Q. Aini, “Authenticity of a Diploma Using the Blockchain Approach,†Int. J., vol. 9, no. 1.2, 2020.

E. Zhang, “Antshares Whitepaper 1.0,†2016. [Online] Available: https://github.com/AntShares/AntShares/wiki/Whitepaper-1.0. [Accessed March 1, 2016].

H. F. Putra, W. Wirawan, and O. Penangsang, “Penerapan Blockchain dan Kriptografi untuk Keamanan Data pada Jaringan Smart Grid,†J. Tek. ITS, vol. 8, no. 1, pp. A11–A16, 2019.

D. Ariyus, Pengantar Ilmu Kriptografi: Teori Analisis & Implementasi. Yogyakarta: Penerbit Andi, 2008.

S. Kosasi, “Karakteristik Blockchain Teknologi dalam Pengembangan Edukasi,†ADI Bisnis Digit. Interdisiplin J., vol. 1, no. 1, pp. 87–94, 2020.

F. Agustin, Q. Aini, A. Khoirunisa, and E. A. Nabila, “Utilization of Blockchain Technology for Management E-Certificate Open Journal System,†Aptisi Trans. Manag., vol. 4, no. 2, pp. 133–138, 2020.

E. P. Harahap, Q. Aini, and R. K. Anam, “Pemanfaatan Teknologi Blockchain pada Platform Crowdfunding,†Technomedia J., vol. 4, no. 2, pp. 199–210, 2020.

R. Damanik, “Pengkodean Pesan Teks Dengan Proses Penerapan Algoritma Kriptografi Secure Hash Algorithm (SHA),†J. Inform. Kaputama, vol. 1, no. 1, pp. 48–57, 2017.

R. Munir, Kriptografi, Bandung: Informatika, 2006.

B. S. Riza, “Blockchain Dalam Pendidikan: Lapisan Logis di Bawahnya,†ADI Bisnis Digit. Interdisiplin J., vol. 1, no. 1, pp. 41–47, 2020.

T. D. Danella, “Bitcoin Sebagai Alat Pembayaran Yang Legal Dalam Transaksi Online,†J. Mhs. Fak. Huk. Univ. Brawijaya, 2015.

P. Balda and S. M. Garg, “Security Enhancement in Distributed Networking,†Int. J. Comput. Sci. Mob. Comput., vol. 4, no. 4, p. 761, 2015.

Q. Aini, N. Lutfiani, F. Hanafi, and U. Rahardja, “Application of Blockchain Technology for iLearning Student Assessment,†IJCCS (Indonesian J. Comput. Cybern. Syst., vol. 14, no. 2, 2020.

W. Stallings, Cryptography and Network Security: Principles and Practices, New Jersey: Prentice Hall, 2003.

“What Is Hashing? [Step-by-Step Guide-Under Hood Of Blockchain]â€. [Online] Available: https://blockgeeks.com/guides/what-is-hashing (Accessed February 11, 2021).




DOI: https://doi.org/10.15294/sji.v8i1.29444

Refbacks

  • There are currently no refbacks.




Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.