Implementasi dan Evaluasi Keamanan Data at Rest Menggunakan BitLocker dan VeraCrypt
DOI:
https://doi.org/10.64845/jistech.v1i2.86Keywords:
Bitlocker, Data At Rest, Enkripsi Disk, Keamanan Data, VeracryptAbstract
Keamanan data at rest merupakan aspek krusial dalam perlindungan informasi digital, khususnya pada perangkat penyimpanan yang rentan terhadap akses tidak sah akibat pencurian, kehilangan perangkat, maupun serangan siber. Enkripsi disk penuh menjadi salah satu solusi utama untuk menjaga kerahasiaan dan integritas data. Penelitian ini bertujuan untuk mengimplementasikan serta mengevaluasi tingkat keamanan data at rest menggunakan dua teknologi enkripsi populer, yaitu BitLocker dan VeraCrypt. Metode penelitian yang digunakan meliputi implementasi BitLocker dan VeraCrypt pada media penyimpanan dengan skenario pengujian yang sama, diikuti dengan evaluasi keamanan dan kinerja sistem. Parameter evaluasi mencakup mekanisme enkripsi, autentikasi, manajemen kunci, dampak terhadap performa sistem, serta ketahanan terhadap upaya akses tidak sah. Pengujian dilakukan melalui simulasi serangan dasar dan analisis akses data tanpa kredensial yang sah. Hasil penelitian menunjukkan bahwa baik BitLocker maupun VeraCrypt mampu memberikan perlindungan yang efektif terhadap data at rest. BitLocker unggul dalam kemudahan integrasi dan efisiensi kinerja pada sistem operasi Windows, sedangkan VeraCrypt menawarkan fleksibilitas konfigurasi dan opsi keamanan yang lebih beragam. Temuan ini menegaskan bahwa pemilihan teknologi enkripsi data at rest perlu disesuaikan dengan kebutuhan keamanan, lingkungan sistem, dan tingkat kontrol pengguna. Penelitian ini diharapkan dapat menjadi referensi dalam penerapan enkripsi data at rest untuk meningkatkan keamanan informasi.
References
Barker, E. (2020). Recommendation for key management: Part 1—General (NIST SP 800-57 Rev. 5). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-57pt1r5
Behl, A., & Behl, K. (2017). Cyberwar: The next threat to national security and what to do about it. Oxford University Press.
Bertino, E., & Sandhu, R. (2019). Database security—Concepts, approaches, and challenges. IEEE Transactions on Dependable and Secure Computing, 16(1), 1–17. https://doi.org/10.1109/TDSC.2017.2768094
Biryukov, A., Khovratovich, D., & Pustogarov, I. (2014). Cryptanalysis of disk encryption systems. IEEE Symposium on Security and Privacy, 18–34. https://doi.org/10.1109/SP.2014.14
Creswell, J. W. (2018). Research design: Qualitative, quantitative, and mixed methods approaches (5th ed.). SAGE Publications.
Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654. https://doi.org/10.1109/TIT.1976.1055638
Ferguson, N., Schneier, B., & Kohno, T. (2011). Cryptography engineering: Design principles and practical applications. Wiley.
Garfinkel, S. L., & Shelat, A. (2003). Remembrance of data passed: A study of disk sanitization practices. IEEE Security & Privacy, 1(1), 17–27. https://doi.org/10.1109/MSECP.2003.1176992
Gollmann, D. (2011). Computer security (3rd ed.). Wiley.
Green, M., & Smith, M. (2016). Cryptopals crypto challenges: Applied cryptography in practice. Journal of Cybersecurity Education, 1(2), 45–59.
ISO/IEC. (2018). ISO/IEC 27001: Information security management systems—Requirements. International Organization for Standardization.
ISO/IEC. (2022). ISO/IEC 27002: Information security controls. International Organization for Standardization.
Kahn Academy. (2022). Disk encryption and data-at-rest security. https://www.khanacademy.org/computing/computer-security
Kahn, A., & Kahn, M. (2019). Data security and privacy in information systems. Information Systems Frontiers, 21(4), 801–813. https://doi.org/10.1007/s10796-019-09906-3
Microsoft. (2023). BitLocker drive encryption overview. https://learn.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-overview
NIST. (2018). Digital identity guidelines (SP 800-63). National Institute of Standards and Technology.
NIST. (2020). Security and privacy controls for information systems and organizations (SP 800-53 Rev. 5). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-53r5
Pfleeger, C. P., Pfleeger, S. L., & Margulies, J. (2015). Security in computing (5th ed.). Pearson Education.
Ristenpart, T., & Shacham, H. (2016). Cryptographic techniques for data storage security. Communications of the ACM, 59(2), 80–89. https://doi.org/10.1145/2817744
Schneier, B. (2015). Applied cryptography (2nd ed.). Wiley.
Sharma, S., & Chen, J. (2020). Performance analysis of full disk encryption techniques. Journal of Information Security and Applications, 52, 102465. https://doi.org/10.1016/j.jisa.2020.102465
Singh, J., & Kumar, R. (2021). Comparative analysis of disk encryption tools for data-at-rest security. International Journal of Information Security Science, 10(3), 45–56.
Stallings, W. (2017). Cryptography and network security: Principles and practice (7th ed.). Pearson.
VeraCrypt. (2023). VeraCrypt documentation. https://www.veracrypt.fr/en/Documentation.html
Whitman, M. E., & Mattord, H. J. (2021). Principles of information security (7th ed.). Cengage Learning.
Zhang, Y., & Chen, X. (2022). Secure data storage and encryption mechanisms in modern operating systems. IEEE Access, 10, 55421–55434. https://doi.org/10.1109/ACCESS.2022.3178456
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Erina Malinda Lubis (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
Similar Articles
- Muhammad Idris, Pemanfaatan Machine Learning untuk Optimasi Big Data dalam Sistem Informatika Modern , Journal of Information Systems and Technology: Vol. 1 No. 1 (2025): Journal of Information Systems and Technology
- Ikhsanul Kamil Akbar, Implementasi Sistem Informasi Pengelolaan Arsip Digital Berbasis Web: Studi Kasus Dinas Pertanian Provinsi Aceh , Journal of Information Systems and Technology: Vol. 1 No. 2 (2025): Journal of Information Systems and Technology
- Cici Lestari Farida, Information Systems Perspective on Data Extraction in Social Media: Toward a Theoretical Framework , Journal of Information Systems and Technology: Vol. 1 No. 1 (2025): Journal of Information Systems and Technology
- Michael Atoran, A Low-Power Air Quality Monitoring System Based on the TI MSP430 Microcontroller Family: Design and Experimental Evaluation , Journal of Information Systems and Technology: Vol. 2 No. 1 (2026): Journal of Information Systems and Technology
- Zainal Arifin, Development of a Web-Based TOEFL E-Certificate System with QR Code Verification and AES–SHA-256 Security Framework , Journal of Information Systems and Technology: Vol. 2 No. 1 (2026): Journal of Information Systems and Technology
- Yasin Nur Rahim, Model Informatika Crowdsourcing Berbasis Wisdom of Crowds untuk Kamus Online Naskah Lontar Sasak , Journal of Information Systems and Technology: Vol. 1 No. 1 (2025): Journal of Information Systems and Technology
- Andika Pratama, Wei Zhang Liu, Development and User Satisfaction Analysis of a Web-Based Training Information System Using Laravel and RUP: Case Study at the CEdEC Department, JGU , Journal of Information Systems and Technology: Vol. 2 No. 1 (2026): Journal of Information Systems and Technology
- Nurul Hidayati, Bridging Vision and Understanding: The Central Role of Computer Vision in AI , Journal of Information Systems and Technology: Vol. 1 No. 1 (2025): Journal of Information Systems and Technology
- Moh. Habibur Rahman, Kecerdasan Buatan dalam Personalisasi Pembelajaran Online: Sebuah Tinjauan dari Pendekatan Komputer dan Sistem Informatika , Journal of Information Systems and Technology: Vol. 1 No. 1 (2025): Journal of Information Systems and Technology
- Kayode Sunday John Dada, Utilization of Library Technology Services for Academic Performance of Senior Secondary School Students in Zaria Local Government Area, Kaduna State , Journal of Information Systems and Technology: Vol. 1 No. 2 (2025): Journal of Information Systems and Technology
You may also start an advanced similarity search for this article.



