Implementasi dan Evaluasi Keamanan Data at Rest Menggunakan BitLocker dan VeraCrypt

Authors

  • Erina Malinda Lubis Institut Teknologi Sepuluh Nopember Author

DOI:

https://doi.org/10.64845/jistech.v1i2.86

Keywords:

Bitlocker, Data At Rest, Enkripsi Disk, Keamanan Data, Veracrypt

Abstract

Keamanan data at rest merupakan aspek krusial dalam perlindungan informasi digital, khususnya pada perangkat penyimpanan yang rentan terhadap akses tidak sah akibat pencurian, kehilangan perangkat, maupun serangan siber. Enkripsi disk penuh menjadi salah satu solusi utama untuk menjaga kerahasiaan dan integritas data. Penelitian ini bertujuan untuk mengimplementasikan serta mengevaluasi tingkat keamanan data at rest menggunakan dua teknologi enkripsi populer, yaitu BitLocker dan VeraCrypt. Metode penelitian yang digunakan meliputi implementasi BitLocker dan VeraCrypt pada media penyimpanan dengan skenario pengujian yang sama, diikuti dengan evaluasi keamanan dan kinerja sistem. Parameter evaluasi mencakup mekanisme enkripsi, autentikasi, manajemen kunci, dampak terhadap performa sistem, serta ketahanan terhadap upaya akses tidak sah. Pengujian dilakukan melalui simulasi serangan dasar dan analisis akses data tanpa kredensial yang sah. Hasil penelitian menunjukkan bahwa baik BitLocker maupun VeraCrypt mampu memberikan perlindungan yang efektif terhadap data at rest. BitLocker unggul dalam kemudahan integrasi dan efisiensi kinerja pada sistem operasi Windows, sedangkan VeraCrypt menawarkan fleksibilitas konfigurasi dan opsi keamanan yang lebih beragam. Temuan ini menegaskan bahwa pemilihan teknologi enkripsi data at rest perlu disesuaikan dengan kebutuhan keamanan, lingkungan sistem, dan tingkat kontrol pengguna. Penelitian ini diharapkan dapat menjadi referensi dalam penerapan enkripsi data at rest untuk meningkatkan keamanan informasi.

References

Barker, E. (2020). Recommendation for key management: Part 1—General (NIST SP 800-57 Rev. 5). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-57pt1r5

Behl, A., & Behl, K. (2017). Cyberwar: The next threat to national security and what to do about it. Oxford University Press.

Bertino, E., & Sandhu, R. (2019). Database security—Concepts, approaches, and challenges. IEEE Transactions on Dependable and Secure Computing, 16(1), 1–17. https://doi.org/10.1109/TDSC.2017.2768094

Biryukov, A., Khovratovich, D., & Pustogarov, I. (2014). Cryptanalysis of disk encryption systems. IEEE Symposium on Security and Privacy, 18–34. https://doi.org/10.1109/SP.2014.14

Creswell, J. W. (2018). Research design: Qualitative, quantitative, and mixed methods approaches (5th ed.). SAGE Publications.

Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654. https://doi.org/10.1109/TIT.1976.1055638

Ferguson, N., Schneier, B., & Kohno, T. (2011). Cryptography engineering: Design principles and practical applications. Wiley.

Garfinkel, S. L., & Shelat, A. (2003). Remembrance of data passed: A study of disk sanitization practices. IEEE Security & Privacy, 1(1), 17–27. https://doi.org/10.1109/MSECP.2003.1176992

Gollmann, D. (2011). Computer security (3rd ed.). Wiley.

Green, M., & Smith, M. (2016). Cryptopals crypto challenges: Applied cryptography in practice. Journal of Cybersecurity Education, 1(2), 45–59.

ISO/IEC. (2018). ISO/IEC 27001: Information security management systems—Requirements. International Organization for Standardization.

ISO/IEC. (2022). ISO/IEC 27002: Information security controls. International Organization for Standardization.

Kahn Academy. (2022). Disk encryption and data-at-rest security. https://www.khanacademy.org/computing/computer-security

Kahn, A., & Kahn, M. (2019). Data security and privacy in information systems. Information Systems Frontiers, 21(4), 801–813. https://doi.org/10.1007/s10796-019-09906-3

Microsoft. (2023). BitLocker drive encryption overview. https://learn.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-overview

NIST. (2018). Digital identity guidelines (SP 800-63). National Institute of Standards and Technology.

NIST. (2020). Security and privacy controls for information systems and organizations (SP 800-53 Rev. 5). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-53r5

Pfleeger, C. P., Pfleeger, S. L., & Margulies, J. (2015). Security in computing (5th ed.). Pearson Education.

Ristenpart, T., & Shacham, H. (2016). Cryptographic techniques for data storage security. Communications of the ACM, 59(2), 80–89. https://doi.org/10.1145/2817744

Schneier, B. (2015). Applied cryptography (2nd ed.). Wiley.

Sharma, S., & Chen, J. (2020). Performance analysis of full disk encryption techniques. Journal of Information Security and Applications, 52, 102465. https://doi.org/10.1016/j.jisa.2020.102465

Singh, J., & Kumar, R. (2021). Comparative analysis of disk encryption tools for data-at-rest security. International Journal of Information Security Science, 10(3), 45–56.

Stallings, W. (2017). Cryptography and network security: Principles and practice (7th ed.). Pearson.

VeraCrypt. (2023). VeraCrypt documentation. https://www.veracrypt.fr/en/Documentation.html

Whitman, M. E., & Mattord, H. J. (2021). Principles of information security (7th ed.). Cengage Learning.

Zhang, Y., & Chen, X. (2022). Secure data storage and encryption mechanisms in modern operating systems. IEEE Access, 10, 55421–55434. https://doi.org/10.1109/ACCESS.2022.3178456

Downloads

Published

2025-12-14

How to Cite

Implementasi dan Evaluasi Keamanan Data at Rest Menggunakan BitLocker dan VeraCrypt. (2025). Journal of Information Systems and Technology, 1(2), 80-91. https://doi.org/10.64845/jistech.v1i2.86

Similar Articles

1-10 of 12

You may also start an advanced similarity search for this article.