Digital archiving using AES-256 encryption and role-based access control to strengthen data security at Pusdatin

Authors

  • Muhammad Naufal Arits Fikri Universitas Pertahanan Republik Indonesia, Bogor, Indonesia
  • Nisrina Labiba Sarwoko Universitas Pertahanan Republik Indonesia, Bogor, Indonesia
  • Sembada Denrineksa Bimorogo Universitas Pertahanan Republik Indonesia, Bogor, Indonesia
  • Nadiza Lediwara Universitas Pertahanan Republik Indonesia, Bogor, Indonesia
  • Aulia Khamas Heikhmakhtiar Universitas Pertahanan Republik Indonesia, Bogor, Indonesia

DOI:

https://doi.org/10.35335/mandiri.v14i3.499

Keywords:

AES 256, Data Security, Encryption, Role-Based Access Control

Abstract

The rapid development of digital technology requires organizations, particularly government agencies, to implement robust and reliable data security systems. Data security is critical as the information managed is not only operationally valuable but also strategic and sensitive. The Center for Data and Information (Pusdatin) of the Ministry of Defense of the Republic of Indonesia plays a key role in managing and safeguarding defense-related data used for strategic decision-making. Based on observations and interviews, the existing data security system is considered adequate; however, several technical weaknesses remain, particularly in file management mechanisms and unstructured user access controls, which may lead to risks of data leakage and misuse. Therefore, this study aims to enhance data and file security through the implementation of Advanced Encryption Standard (AES-256) encryption and Role-Based Access Control (RBAC). This research employs the Waterfall method for system development, including analysis, design, implementation, and testing stages. System evaluation is conducted using functional testing and access control validation to assess the effectiveness of the implemented security mechanisms. The results indicate that AES-256 successfully ensures data confidentiality and integrity, while RBAC effectively restricts user access according to predefined roles, thereby reducing unauthorized access risks. The proposed system demonstrates improved data security and management efficiency, supporting a secure, efficient, and sustainable defense information system at Pusdatin

The rapid development of digital technology requires organizations, particularly government agencies, to implement robust and reliable data security systems. Data security is critical as the information managed is not only operationally valuable but also strategic and sensitive. The Center for Data and Information (Pusdatin) of the Ministry of Defense of the Republic of Indonesia plays a key role in managing and safeguarding defense-related data used for strategic decision-making. Based on observations and interviews, the existing data security system is considered adequate; however, several technical weaknesses remain, particularly in file management mechanisms and unstructured user access controls, which may lead to risks of data leakage and misuse. Therefore, this study aims to enhance data and file security through the implementation of Advanced Encryption Standard (AES-256) encryption and Role-Based Access Control (RBAC). This research employs the Waterfall method for system development, including analysis, design, implementation, and testing stages. System evaluation is conducted using functional testing and access control validation to assess the effectiveness of the implemented security mechanisms. The results indicate that AES-256 successfully ensures data confidentiality and integrity, while RBAC effectively restricts user access according to predefined roles, thereby reducing unauthorized access risks. The proposed system demonstrates improved data security and management efficiency, supporting a secure, efficient, and sustainable defense information system at Pusdatin

References

Alvi Sholikhatin, S., Prayogo Kuncoro, A., Lutfia Munawaroh, A., & Gilang Aji Setiawan, dan. (2022). Comparative Study of RSA Asymmetric Algorithm and AES Algorithm for Data Security. Edu Komputika Journal, 9(1), 60–67. http://journal.unnes.ac.id/sju/index.php/edukom

Arenas, L. A., Yactayo-Arias, C., Quispe, S. R., & Sandoval, J. L. (2023). Leveraging Security Modeling and Information Systems Audits to Mitigate Network Vulnerabilities. International Journal of Safety and Security Engineering, 13(4), 763–771. https://doi.org/10.18280/ijsse.130420

Arun Kumar Akuthota. (2025). Role-Based Access Control (RBAC) in Modern Cloud Security Governance: An In-depth Analysis. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 11(2), 3297–3311. https://doi.org/10.32628/cseit25112793

Bumalod, M. C., & Velasco, R. M. A. (2024). Synergistic Information Security Design Implementation based on Role-Based Access Control, Information Classification, and AES Cryptographic Encryption. International Journal in Information Technology in Governance, Education and Business, 6(1), 68–85. https://doi.org/10.32664/ijitgeb.v6i1.136

Fatchur Shofyan, & Rizky Tahara Shita. (2024). Implementasi Web Service Restful API dengan Autentikasi Personal Access Tokens dan Algoritma AES 256. Jurnal Ticom: Technology of Information and Communication, 12(3), 108–114. https://doi.org/10.70309/ticom.v12i3.130

Gagan Akhmad Fauzi, & Alam Rahmatulloh. (2025). Kombinasi AES dan HMAC SHA-256 untuk Pengamanan Parameter URL dari Serangan SQL Injection. Jurnal Informatika Dan Multimedia, 17(1), 46–59. https://doi.org/10.33795/jtim.v17i1.6596

Ganesh, R., Khan, B. U. I., Khan, A. R., & Kamsin, A. Bin. (2025). A panoramic survey of the advanced encryption standard: from architecture to security analysis, key management, real-world applications, and post-quantum challenges. In International Journal of Information Security (Vol. 24, Issue 5). https://doi.org/10.1007/s10207-025-01116-x

Gunjal, M. B., & Sonawane, V. R. (2023). International Journal of INTELLIGENT SYSTEMS AND APPLICATIONS IN ENGINEERING Multi Authority Access Control Mechanism for Role Based Access Control for Data Security in the Cloud Environment. International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2023(2s), 250–264. www.ijisae.org

Hussein, Z. A., & Naser, O. A. (2025). Evaluation of AES-256 encryption and machine learning for securing GSM communications against sniffing attacks. Egyptian Informatics Journal, 32(July), 100832. https://doi.org/10.1016/j.eij.2025.100832

Logrippo, L. (2025). Data flow security in Role-based access control. Journal of Information Security and Applications, 90(April), 103997. https://doi.org/10.1016/j.jisa.2025.103997

Mishra, A., & Alzoubi, Y. I. (2023). Structured software development versus agile software development: a comparative analysis. International Journal of System Assurance Engineering and Management, 14(4), 1504–1522. https://doi.org/10.1007/s13198-023-01958-5

Mushtaq, S., & Shah, M. (2025). Threats to the Digital Ecosystem: Can Information Security Management Frameworks, Guided by Criminological Literature, Effectively Prevent Cybercrime and Protect Public Data? Computers, 14(6). https://doi.org/10.3390/computers14060219

Naimnule, F. A., Hanoe, F. A. L., Banusu, M. N., Mano, M. O., Studi, P., Informasi, T., & Timor, U. (2025). Implementation of AES Encryption for Data Security on Web-Based Information Systems in Fafinesu A Village. Sistem Kendali & Jaringan) E-ISSN, 4(3), 2808–3520. https://doi.org/10.58982/krisnadana.v4i3.836https://ejournal.sidyanusa.org/index.php/jkdn/index

Nasrullah, A. H. (2025). Secure Web-Based File Encryption Using AES-128. Journal of Embedded Systems, Security and Intelligent Systems, 6(2), 146–155. https://doi.org/10.59562/jessi.v6i2.8436

Nirwan, S., Hamidin, D., & Azzalea, S. E. (2024). Implementation of AES-256 Algorithm for Encryption on Chatting Platforms. Internet of Things and Artificial Intelligence Journal, 4(4), 616–624. https://doi.org/10.31763/iota.v4i4.804

Nizamuddin Aulia Kafa, & Dolly Virgian Shaka Yudha Sakti. (2024). Implementasi Kriptografi Berbasis Web dengan Algoritma Advanced Encryption Standard (AES) 256 dan Kompresi Huffman untuk Pengamanan File di SMK Satria. Jurnal Ticom: Technology of Information and Communication, 12(2), 50–55. https://doi.org/10.70309/ticom.v12i2.109

Pandu Cahyo Sukoco, & Afwan Anggara. (2022). Web-Based Payroll Data Security Application Using the AES Cipher Method at the Mangga Dua Store Kebumen. International Journal of Engineering Technology and Natural Sciences, 4(1), 42–51. https://doi.org/10.46923/ijets.v3i2.143

Parekh, S., & Maru, M. J. (2025). AES, DES, and RSA in Data Security: A Review. International Journal of Scientific Research and Engineering Development, 8(5). www.ijsred.com

Patterson, C. M., Nurse, J. R. C., & Franqueira, V. N. L. (2023). Learning from cyber security incidents: A systematic review and future research agenda. Computers and Security, 132. https://doi.org/10.1016/j.cose.2023.103309

Prahasti. (2022). Aplikasi Pelayanan Antrian Pasien Menggunakan Metode FCFS Menggunakan PHP dan MySQL. Jurnal Media Infotama, 18(1), 341139.

Saravanos, A., & Curinga, M. X. (2023). Simulating the Software Development Lifecycle: The Waterfall Model. Applied System Innovation, 6(6). https://doi.org/10.3390/asi6060108

Singh, J., Rani, S., & Kumar, V. (2024). Role-Based Access Control (RBAC) Enabled Secure and Efficient Data Processing Framework for IoT Networks. International Journal of Communication Networks and Information Security (IJCNIS), 16(2). https://doi.org/10.17762/ijcnis.v16i2.6697

Talluri, S., Anne, V. P., & Chadalavada, V. S. (2023). Role-Based Access Control (Rbac) in a Centralized Identity and Access Management (Iam) System. International Journal of …, 4(1), 88–95. https://iaeme.com/Home/editorial_board/IJIT

Ujung, A. M., & Nasution, M. I. P. (2023). Pentingnya Sistem Keamanan Database Untuk Melindungi Data Pribadi. Jurnal Sistem Informasi Dan Informatika, 1(2), 44–47. https://doi.org/10.47233/jiska.v1i2.929

Yousefnezhad, N., Malhi, A., Keyriläinen, T., & Främling, K. (2023). A Comprehensive Security Architecture for Information Management throughout the Lifecycle of IoT Products. Sensors, 23(6), 1–21. https://doi.org/10.3390/s23063236

Downloads

Published

2026-01-31

How to Cite

Fikri, M. N. A., Sarwoko, N. L., Bimorogo, S. D., Lediwara, N., & Heikhmakhtiar, A. K. (2026). Digital archiving using AES-256 encryption and role-based access control to strengthen data security at Pusdatin. Jurnal Mandiri IT, 14(3), 381–391. https://doi.org/10.35335/mandiri.v14i3.499

Most read articles by the same author(s)