Jurnal Ilmiah Computer Science https://ejurnal.snn-media.com/index.php/jics <hr> <table width="100%" bgcolor="#f0f0f0"> <tbody> <tr valign="top"> <td width="21%"><img src="/public/site/images/admin_jurnalsnn/Cover_JICS.png" width="300px" height="100%"></td> <td width="79%"> <table width="100%" bgcolor="#f0f0f0"> <tbody> <tr valign="top"> <td width="30%">Journal title</td> <td width="5%">:</td> <td align="justify" width="65%"><strong>Jurnal Ilmiah Computer Science (JICS)<br></strong></td> </tr> <tr valign="top"> <td width="30%">Publisher</td> <td width="5%">:</td> <td width="65%"><strong>PT. SNN MEDIA TECH PRESS<br></strong></td> </tr> <tr valign="top"> <td width="30%">E-ISSN</td> <td width="5%">:</td> <td width="65%"><strong>3026-7145<br></strong></td> </tr> <tr valign="top"> <td width="30%">P-ISSN</td> <td width="5%">:</td> <td width="65%"><strong>3030-9840<br></strong></td> </tr> <tr valign="top"> <td width="30%">Period Publish</td> <td width="5%">:</td> <td width="65%"><strong>July and January</strong></td> </tr> <tr valign="top"> <td width="30%">DOI</td> <td width="5%">:</td> <td width="65%"><strong>10.58602 (Prefix - by Crossref)</strong></td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <hr> <p align="justify"><strong>Jurnal Ilmiah Computer Science (JICS)</strong> is a peer-review journal focusing on Computer Science. Jurnal Ilmiah Computer Science (JICS) invites academics and researchers who do original research in Informatics and Computer Science. Jurnal Ilmiah Computer Science (JICS) are <strong>published by PT SNN MEDIA TECH PRESS</strong> in <strong>July</strong> and <strong>January</strong> every year. Jurnal Ilmiah Computer Science (JICS) accept articles in Bahasa Indonesia and English.</p> PT. SNN MEDIA TECH PRESS en-US Jurnal Ilmiah Computer Science 3030-9840 Transforming Cybersecurity Practices: A Comprehensive Approach to Protecting Digital Banking Assets https://ejurnal.snn-media.com/index.php/jics/article/view/51 <p>The rapid evolution of digital banking has introduced unprecedented security challenges, necessitating a proactive and comprehensive cybersecurity framework. This paper explores advanced strategies for safeguarding digital banking assets, integrating cutting-edge technologies such as artificial intelligence (AI), blockchain, and zero-trust architectures. By analyzing emerging threats, regulatory requirements, and best practices, this study presents a holistic approach to strengthening financial cybersecurity resilience. The findings emphasize the need for a dynamic, multi-layered security model that adapts to evolving cyber threats while ensuring compliance and user trust.</p> Hewa Zangana Harman Salih Mohammed Mamo Muhamad Husain Copyright (c) 2025 Hewa Zangana, Harman Salih Mohammed, Mamo Muhamad Husain https://creativecommons.org/licenses/by-sa/4.0 2025-07-15 2025-07-15 4 1 1 9 10.58602/jics.v4i1.51 A Comparative Study of Encryption-Based Access Control Schemes in Ethereum, Hyperledger Fabric, and Corda https://ejurnal.snn-media.com/index.php/jics/article/view/52 <p>Blockchain technology has emerged as a transformative solution for decentralized and immutable data storage, offering transparency and security across various industries. However, ensuring authorized data access remains a critical challenge in blockchain systems. Encryption-based access control mechanisms are pivotal in mitigating unauthorized access, yet their implementation varies significantly across different blockchain platforms. This study provides a comprehensive comparison of encryption-based access control schemes in three prominent blockchain platforms: Ethereum, Hyperledger Fabric, and Corda. The analysis focuses on their strengths, weaknesses, and suitability for various use cases, evaluating security, scalability, and usability. The findings reveal distinct trade-offs among the platforms, highlighting the need for tailored solutions based on specific application requirements. Future research directions, including hybrid access control models and post-quantum cryptography, are also discussed.</p> Godwin Mandinyenya Vusumuzi Malele Copyright (c) 2025 Godwin Mandinyenya, Vusumuzi Malele https://creativecommons.org/licenses/by-sa/4.0 2025-07-15 2025-07-15 4 1 10 22 10.58602/jics.v4i1.52 Design and Implementation of a Smart Contract-Based Consent Management Model for Secure Personal Data Sharing https://ejurnal.snn-media.com/index.php/jics/article/view/53 <p>Emerging data-sharing paradigms demand robust mechanisms to ensure user consent is dynamically managed while preserving data sovereignty. This paper proposes a&nbsp;blockchain-driven consent management model&nbsp;that leverages&nbsp;smart contracts,&nbsp;offline storage, and a&nbsp;JavaScript/JSON front end&nbsp;to empower data owners in healthcare, finance, and identity management. The framework decentralizes consent logging, automates access enforcement, and integrates&nbsp;GDPR-compliant "right to revoke" functionalities, addressing critical gaps in existing systems such as&nbsp;offline accessibility,&nbsp;cross-industry interoperability, and&nbsp;regulatory compliance. A&nbsp;mixed-methods approach—combining a systematic literature review (SLR) of 150 studies (2018–2023) and three case studies—validates the model's efficacy. Performance benchmarks reveal&nbsp;sub-second consent updates,&nbsp;99.98% audit accuracy, and&nbsp;40% reduced breach risks&nbsp;compared to centralized systems. The hybrid architecture employs a&nbsp;two-tiered design, with an on-chain layer for immutable consent logging and an offline layer for local data storage, ensuring enforceability even during network outages. The front end, built using&nbsp;React.js&nbsp;and&nbsp;Ethers.js, provides a user-friendly interface for non-technical users to define and manage consent terms. Security protocols, including&nbsp;FIDO2 authentication&nbsp;and&nbsp;AES-256-GCM encryption, ensure robust protection against unauthorized access. Challenges include&nbsp;gas cost volatility&nbsp;in public blockchains and&nbsp;latency&nbsp;in multi-chain consent synchronization. The study contributes a&nbsp;novel hybrid architecture,&nbsp;open-source front-end tools, and a&nbsp;regulatory alignment roadmap&nbsp;for decentralized consent ecosystems. Case studies in healthcare, finance, and identity management demonstrate the model's practical applicability, with&nbsp;unauthorized access reduced by 40%&nbsp;and&nbsp;user satisfaction scores exceeding 4.7/5. Future work will explore&nbsp;AI-driven consent drafting,&nbsp;interoperability standards, and&nbsp;quantum-resistant cryptography&nbsp;to further enhance the model's scalability and security. This research advances the state of the art in blockchain-based consent management, offering a scalable, secure, and user-centric solution for data sovereignty in the digital age.</p> Godwin Mandinyenya Vusumuzi Malele Copyright (c) 2025 Godwin Mandinyenya, Vusumuzi Malele https://creativecommons.org/licenses/by-sa/4.0 2025-07-15 2025-07-15 4 1 23 38 10.58602/jics.v4i1.53 Blockchain Technology in AI-Driven Cybersecurity: Strengthening Trust in Financial and Digital Security Systems https://ejurnal.snn-media.com/index.php/jics/article/view/54 <p>Blockchain technology has revolutionized the banking and finance sector by introducing a decentralized, secure, and transparent framework for financial transactions. This paper provides a comprehensive review of the role of blockchain in transforming trust mechanisms within financial institutions, focusing on its applications in payments, smart contracts, identity management, and regulatory compliance. A mixed-methods approach was employed, integrating a systematic literature review with case study analysis to evaluate the effectiveness of blockchain-based security solutions. The results indicate that blockchain significantly enhances transaction security, reduces fraud, and improves operational efficiency, with AI-powered fraud detection achieving a 92% accuracy rate and biometric authentication strengthening access control. Despite these advantages, challenges such as scalability, regulatory compliance, and integration with existing financial infrastructures remain key barriers to adoption. The study concludes that blockchain, in conjunction with AI-driven cybersecurity measures, presents a robust solution for enhancing trust and security in digital finance. However, continuous regulatory advancements and industry-wide collaboration are necessary to ensure its sustainable implementation.</p> Hewa Zangana Copyright (c) 2025 Hewa Zangana https://creativecommons.org/licenses/by-sa/4.0 2025-07-15 2025-07-15 4 1 49 49 10.58602/jics.v4i1.54 A Federated Architecture for Enhancing Security and Scalability in IoT-Cloud Integrated Systems https://ejurnal.snn-media.com/index.php/jics/article/view/55 <p>The exponential growth of the Internet of Things (IoT) and its integration with cloud computing has introduced significant challenges related to security, scalability, and data privacy. This paper proposes a novel federated architecture that leverages federated learning and distributed security mechanisms to enhance the resilience and scalability of IoT-cloud integrated systems. By decentralizing data processing and security enforcement, the architecture mitigates common attack vectors such as centralized point-of-failure, data leakage, and unauthorized access. The proposed system is designed with modular security components including lightweight encryption, dynamic trust management, and blockchain-inspired audit trails. A performance evaluation conducted through simulated environments and real-world IoT testbeds demonstrates improved latency, resource efficiency, and defense against cyber threats when compared to conventional centralized systems. This research contributes to the advancement of secure and scalable IoT-cloud infrastructures and offers a viable path for industrial and smart city deployments.</p> Hewa Zangana Abdulmajeed Yazdeen Copyright (c) 2025 Hewa Zangana, Abdulmajeed Yazdeen https://creativecommons.org/licenses/by-sa/4.0 2025-07-15 2025-07-15 4 1 50 59 10.58602/jics.v4i1.55