https://ejurnal.snn-media.com/index.php/jics/issue/feedJurnal Ilmiah Computer Science2025-09-10T22:29:52+07:00Admin Jurnal SNNsnnmediatechpress@gmail.comOpen Journal Systems<hr> <table width="100%" bgcolor="#f0f0f0"> <tbody> <tr valign="top"> <td width="21%"><img src="/public/site/images/admin_jurnalsnn/Cover_JICS.png" width="300px" height="100%"></td> <td width="79%"> <table width="100%" bgcolor="#f0f0f0"> <tbody> <tr valign="top"> <td width="30%">Journal title</td> <td width="5%">:</td> <td align="justify" width="65%"><strong>Jurnal Ilmiah Computer Science (JICS)<br></strong></td> </tr> <tr valign="top"> <td width="30%">Publisher</td> <td width="5%">:</td> <td width="65%"><strong>PT. SNN MEDIA TECH PRESS<br></strong></td> </tr> <tr valign="top"> <td width="30%">E-ISSN</td> <td width="5%">:</td> <td width="65%"><strong>3026-7145<br></strong></td> </tr> <tr valign="top"> <td width="30%">P-ISSN</td> <td width="5%">:</td> <td width="65%"><strong>3030-9840<br></strong></td> </tr> <tr valign="top"> <td width="30%">Period Publish</td> <td width="5%">:</td> <td width="65%"><strong>July and January</strong></td> </tr> <tr valign="top"> <td width="30%">DOI</td> <td width="5%">:</td> <td width="65%"><strong>10.58602 (Prefix - by Crossref)</strong></td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <hr> <p align="justify"><strong>Jurnal Ilmiah Computer Science (JICS)</strong> is a peer-review journal focusing on Computer Science. Jurnal Ilmiah Computer Science (JICS) invites academics and researchers who do original research in Informatics and Computer Science. Jurnal Ilmiah Computer Science (JICS) are <strong>published by PT SNN MEDIA TECH PRESS</strong> in <strong>July</strong> and <strong>January</strong> every year. Jurnal Ilmiah Computer Science (JICS) accept articles in Bahasa Indonesia and English.</p>https://ejurnal.snn-media.com/index.php/jics/article/view/51Transforming Cybersecurity Practices: A Comprehensive Approach to Protecting Digital Banking Assets2025-09-10T22:29:51+07:00Hewa Zanganahewa.zangana@dpu.edu.krdHarman Salih Mohammedhewa.zangana@dpu.edu.krdMamo Muhamad Husain hewa.zangana@dpu.edu.krd<p>The rapid evolution of digital banking has introduced unprecedented security challenges, necessitating a proactive and comprehensive cybersecurity framework. This paper explores advanced strategies for safeguarding digital banking assets, integrating cutting-edge technologies such as artificial intelligence (AI), blockchain, and zero-trust architectures. By analyzing emerging threats, regulatory requirements, and best practices, this study presents a holistic approach to strengthening financial cybersecurity resilience. The findings emphasize the need for a dynamic, multi-layered security model that adapts to evolving cyber threats while ensuring compliance and user trust.</p>2025-07-15T00:00:00+07:00Copyright (c) 2025 Hewa Zangana, Harman Salih Mohammed, Mamo Muhamad Husain https://ejurnal.snn-media.com/index.php/jics/article/view/52A Comparative Study of Encryption-Based Access Control Schemes in Ethereum, Hyperledger Fabric, and Corda2025-09-10T22:29:52+07:00Godwin Mandinyenyagodhungwe@gmail.comVusumuzi Malele39949613@mynwu.ac.za<p>Blockchain technology has emerged as a transformative solution for decentralized and immutable data storage, offering transparency and security across various industries. However, ensuring authorized data access remains a critical challenge in blockchain systems. Encryption-based access control mechanisms are pivotal in mitigating unauthorized access, yet their implementation varies significantly across different blockchain platforms. This study provides a comprehensive comparison of encryption-based access control schemes in three prominent blockchain platforms: Ethereum, Hyperledger Fabric, and Corda. The analysis focuses on their strengths, weaknesses, and suitability for various use cases, evaluating security, scalability, and usability. The findings reveal distinct trade-offs among the platforms, highlighting the need for tailored solutions based on specific application requirements. Future research directions, including hybrid access control models and post-quantum cryptography, are also discussed.</p>2025-07-15T00:00:00+07:00Copyright (c) 2025 Godwin Mandinyenya, Vusumuzi Malelehttps://ejurnal.snn-media.com/index.php/jics/article/view/53Design and Implementation of a Smart Contract-Based Consent Management Model for Secure Personal Data Sharing 2025-09-10T22:29:52+07:00Godwin Mandinyenyagodhungwe@gmail.comVusumuzi Malele39949613@mynwu.ac.za<p>Emerging data-sharing paradigms demand robust mechanisms to ensure user consent is dynamically managed while preserving data sovereignty. This paper proposes a blockchain-driven consent management model that leverages smart contracts, offline storage, and a JavaScript/JSON front end to empower data owners in healthcare, finance, and identity management. The framework decentralizes consent logging, automates access enforcement, and integrates GDPR-compliant "right to revoke" functionalities, addressing critical gaps in existing systems such as offline accessibility, cross-industry interoperability, and regulatory compliance. A mixed-methods approach—combining a systematic literature review (SLR) of 150 studies (2018–2023) and three case studies—validates the model's efficacy. Performance benchmarks reveal sub-second consent updates, 99.98% audit accuracy, and 40% reduced breach risks compared to centralized systems. The hybrid architecture employs a two-tiered design, with an on-chain layer for immutable consent logging and an offline layer for local data storage, ensuring enforceability even during network outages. The front end, built using React.js and Ethers.js, provides a user-friendly interface for non-technical users to define and manage consent terms. Security protocols, including FIDO2 authentication and AES-256-GCM encryption, ensure robust protection against unauthorized access. Challenges include gas cost volatility in public blockchains and latency in multi-chain consent synchronization. The study contributes a novel hybrid architecture, open-source front-end tools, and a regulatory alignment roadmap for decentralized consent ecosystems. Case studies in healthcare, finance, and identity management demonstrate the model's practical applicability, with unauthorized access reduced by 40% and user satisfaction scores exceeding 4.7/5. Future work will explore AI-driven consent drafting, interoperability standards, and quantum-resistant cryptography to further enhance the model's scalability and security. This research advances the state of the art in blockchain-based consent management, offering a scalable, secure, and user-centric solution for data sovereignty in the digital age.</p>2025-07-15T00:00:00+07:00Copyright (c) 2025 Godwin Mandinyenya, Vusumuzi Malelehttps://ejurnal.snn-media.com/index.php/jics/article/view/54Blockchain Technology in AI-Driven Cybersecurity: Strengthening Trust in Financial and Digital Security Systems2025-09-10T22:29:52+07:00Hewa Zanganahewa.zangana@dpu.edu.krd<p>Blockchain technology has revolutionized the banking and finance sector by introducing a decentralized, secure, and transparent framework for financial transactions. This paper provides a comprehensive review of the role of blockchain in transforming trust mechanisms within financial institutions, focusing on its applications in payments, smart contracts, identity management, and regulatory compliance. A mixed-methods approach was employed, integrating a systematic literature review with case study analysis to evaluate the effectiveness of blockchain-based security solutions. The results indicate that blockchain significantly enhances transaction security, reduces fraud, and improves operational efficiency, with AI-powered fraud detection achieving a 92% accuracy rate and biometric authentication strengthening access control. Despite these advantages, challenges such as scalability, regulatory compliance, and integration with existing financial infrastructures remain key barriers to adoption. The study concludes that blockchain, in conjunction with AI-driven cybersecurity measures, presents a robust solution for enhancing trust and security in digital finance. However, continuous regulatory advancements and industry-wide collaboration are necessary to ensure its sustainable implementation.</p>2025-07-15T00:00:00+07:00Copyright (c) 2025 Hewa Zanganahttps://ejurnal.snn-media.com/index.php/jics/article/view/55A Federated Architecture for Enhancing Security and Scalability in IoT-Cloud Integrated Systems2025-09-10T22:29:52+07:00Hewa Zanganahewa.zangana@dpu.edu.krdAbdulmajeed Yazdeen abdulmajeed.adil@dpu.edu.krd<p>The exponential growth of the Internet of Things (IoT) and its integration with cloud computing has introduced significant challenges related to security, scalability, and data privacy. This paper proposes a novel federated architecture that leverages federated learning and distributed security mechanisms to enhance the resilience and scalability of IoT-cloud integrated systems. By decentralizing data processing and security enforcement, the architecture mitigates common attack vectors such as centralized point-of-failure, data leakage, and unauthorized access. The proposed system is designed with modular security components including lightweight encryption, dynamic trust management, and blockchain-inspired audit trails. A performance evaluation conducted through simulated environments and real-world IoT testbeds demonstrates improved latency, resource efficiency, and defense against cyber threats when compared to conventional centralized systems. This research contributes to the advancement of secure and scalable IoT-cloud infrastructures and offers a viable path for industrial and smart city deployments.</p>2025-07-15T00:00:00+07:00Copyright (c) 2025 Hewa Zangana, Abdulmajeed Yazdeen