Implementasi dan Evaluasi Keamanan Data at Rest Menggunakan BitLocker dan VeraCrypt
DOI:
https://doi.org/10.64845/jistech.v1i2.86Keywords:
Bitlocker, Data At Rest, Enkripsi Disk, Keamanan Data, VeracryptAbstract
Keamanan data at rest merupakan aspek krusial dalam perlindungan informasi digital, khususnya pada perangkat penyimpanan yang rentan terhadap akses tidak sah akibat pencurian, kehilangan perangkat, maupun serangan siber. Enkripsi disk penuh menjadi salah satu solusi utama untuk menjaga kerahasiaan dan integritas data. Penelitian ini bertujuan untuk mengimplementasikan serta mengevaluasi tingkat keamanan data at rest menggunakan dua teknologi enkripsi populer, yaitu BitLocker dan VeraCrypt. Metode penelitian yang digunakan meliputi implementasi BitLocker dan VeraCrypt pada media penyimpanan dengan skenario pengujian yang sama, diikuti dengan evaluasi keamanan dan kinerja sistem. Parameter evaluasi mencakup mekanisme enkripsi, autentikasi, manajemen kunci, dampak terhadap performa sistem, serta ketahanan terhadap upaya akses tidak sah. Pengujian dilakukan melalui simulasi serangan dasar dan analisis akses data tanpa kredensial yang sah. Hasil penelitian menunjukkan bahwa baik BitLocker maupun VeraCrypt mampu memberikan perlindungan yang efektif terhadap data at rest. BitLocker unggul dalam kemudahan integrasi dan efisiensi kinerja pada sistem operasi Windows, sedangkan VeraCrypt menawarkan fleksibilitas konfigurasi dan opsi keamanan yang lebih beragam. Temuan ini menegaskan bahwa pemilihan teknologi enkripsi data at rest perlu disesuaikan dengan kebutuhan keamanan, lingkungan sistem, dan tingkat kontrol pengguna. Penelitian ini diharapkan dapat menjadi referensi dalam penerapan enkripsi data at rest untuk meningkatkan keamanan informasi.
References
Barker, E. (2020). Recommendation for key management: Part 1—General (NIST SP 800-57 Rev. 5). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-57pt1r5
Behl, A., & Behl, K. (2017). Cyberwar: The next threat to national security and what to do about it. Oxford University Press.
Bertino, E., & Sandhu, R. (2019). Database security—Concepts, approaches, and challenges. IEEE Transactions on Dependable and Secure Computing, 16(1), 1–17. https://doi.org/10.1109/TDSC.2017.2768094
Biryukov, A., Khovratovich, D., & Pustogarov, I. (2014). Cryptanalysis of disk encryption systems. IEEE Symposium on Security and Privacy, 18–34. https://doi.org/10.1109/SP.2014.14
Creswell, J. W. (2018). Research design: Qualitative, quantitative, and mixed methods approaches (5th ed.). SAGE Publications.
Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654. https://doi.org/10.1109/TIT.1976.1055638
Ferguson, N., Schneier, B., & Kohno, T. (2011). Cryptography engineering: Design principles and practical applications. Wiley.
Garfinkel, S. L., & Shelat, A. (2003). Remembrance of data passed: A study of disk sanitization practices. IEEE Security & Privacy, 1(1), 17–27. https://doi.org/10.1109/MSECP.2003.1176992
Gollmann, D. (2011). Computer security (3rd ed.). Wiley.
Green, M., & Smith, M. (2016). Cryptopals crypto challenges: Applied cryptography in practice. Journal of Cybersecurity Education, 1(2), 45–59.
ISO/IEC. (2018). ISO/IEC 27001: Information security management systems—Requirements. International Organization for Standardization.
ISO/IEC. (2022). ISO/IEC 27002: Information security controls. International Organization for Standardization.
Kahn Academy. (2022). Disk encryption and data-at-rest security. https://www.khanacademy.org/computing/computer-security
Kahn, A., & Kahn, M. (2019). Data security and privacy in information systems. Information Systems Frontiers, 21(4), 801–813. https://doi.org/10.1007/s10796-019-09906-3
Microsoft. (2023). BitLocker drive encryption overview. https://learn.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-overview
NIST. (2018). Digital identity guidelines (SP 800-63). National Institute of Standards and Technology.
NIST. (2020). Security and privacy controls for information systems and organizations (SP 800-53 Rev. 5). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-53r5
Pfleeger, C. P., Pfleeger, S. L., & Margulies, J. (2015). Security in computing (5th ed.). Pearson Education.
Ristenpart, T., & Shacham, H. (2016). Cryptographic techniques for data storage security. Communications of the ACM, 59(2), 80–89. https://doi.org/10.1145/2817744
Schneier, B. (2015). Applied cryptography (2nd ed.). Wiley.
Sharma, S., & Chen, J. (2020). Performance analysis of full disk encryption techniques. Journal of Information Security and Applications, 52, 102465. https://doi.org/10.1016/j.jisa.2020.102465
Singh, J., & Kumar, R. (2021). Comparative analysis of disk encryption tools for data-at-rest security. International Journal of Information Security Science, 10(3), 45–56.
Stallings, W. (2017). Cryptography and network security: Principles and practice (7th ed.). Pearson.
VeraCrypt. (2023). VeraCrypt documentation. https://www.veracrypt.fr/en/Documentation.html
Whitman, M. E., & Mattord, H. J. (2021). Principles of information security (7th ed.). Cengage Learning.
Zhang, Y., & Chen, X. (2022). Secure data storage and encryption mechanisms in modern operating systems. IEEE Access, 10, 55421–55434. https://doi.org/10.1109/ACCESS.2022.3178456
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Erina Malinda Lubis (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
Similar Articles
- Sadiat Lola Atte , Artificial Intelligence (AI) for Information Services Delivery by Librarians in Universities in Northwest Nigeria: Case Study of Kashim Ibrahim Library, Ahmadu Bello University, Zaria , Journal of Information Systems and Technology: Vol. 1 No. 2 (2025): Journal of Information Systems and Technology
- Egi Al Fansyah, Muharman Lubis, Muhammad Dwi Hary Sandy, Towards Adaptive Cybersecurity in Smart Cities: Threat Trends, Mitigation Strategies, and Future Scenarios , Journal of Information Systems and Technology: Vol. 2 No. 1 (2026): Journal of Information Systems and Technology
You may also start an advanced similarity search for this article.



