Security Level Significance in DApps Blockchain-Based Document Authentication


  • Qurotul Aini University of Raharja
  • Danny Manongga Satya Wacana Christian University
  • Untung Rahardja University of Raharja
  • Irwan Sembiring Satya Wacana Christian University
  • Vonda Elmanda university of raharja
  • Adam Faturahman University of Raharja
  • Nuke Puji Lestari Santoso University of Raharja



Decentralized Application, Blockchain, Authentication, Software Systems, Smart Contract


In the development of the Industrial revolution 4.0 to improve and modify the world's industry by integrating production lines, and extraordinary results in the field of technology and information marked its emergence. It can be used to enhance document security systems using Blockchain technology. Blockchain Innovation Authentication has attracted great attention in the world of science and capital markets. The persistent problems of the many available digital currencies and the various tricks of early coin offerings also welcome the well-known discussion of emerging innovations in the field of education. The importance of this paper follows the improvement of the blockchain framework to reveal the importance of decentralized applications (dApps) and blockchain on the future value in education. This study uses a descriptive method, which is a research method used to describe problems that occur in the present or ongoing, aiming to describe what happened as it should when the research was conducted. the novelty of cutting-edge dApps and talk about the title of blockchain progress to meet the positive attributes of future dApps. Readers will come to the conclusion of dApp research and know the continuous improvement in blockchain . 


A. Tandon, P. Kaur, M. Mantymaki, and A. Dhir, “Blockchain applications in management: A bibliometric analysis and literature review,” Technol. Forecast. Soc. Change, vol. 166, p. 120649, 2021.

F. Elghaish et al., “Blockchain and the ‘Internet of Things’’ for the construction industry: research trends and opportunities” Autom. Constr., vol. 132, p. 103942, 2021.

W. Y. Ng et al., “Blockchain applications in health care for COVID-19 and beyond: a systematic review,” Lancet Digit. Heal., vol. 3, no. 12, pp. e819–e829, 2021.

M. Massaro, “Digital transformation in the healthcare sector through blockchain technology. Insights from academic research and business developments,” Technovation, p. 102386, 2021.

C. Esposito, M. Ficco, and B. B. Gupta, “Blockchain-based authentication and authorization for smart city applications,” Inf. Process. Manag., vol. 58, no. 2, p. 102468, 2021.

E. Guustaaf, U. Rahardja, Q. Aini, H. W. Maharani, and N. A. Santoso, “Blockchain-based education project,” Aptisi Trans. Manag., vol. 5, no. 1, pp. 46–61, 2021.

Y. Xie et al., “Applications of blockchain in the medical field: Narrative review,” J. Med. Internet Res., vol. 23, no. 10, p. e28613, 2021.

M. K. Lim, Y. Li, C. Wang, and M.-L. Tseng, “A literature review of blockchain technology applications in supply chains: A comprehensive analysis of themes, methodologies and industries,” Comput. Ind. Eng., vol. 154, p. 107133, 2021.

T.-M. Choi and T. Siqin, “Blockchain in logistics and production from Blockchain 1.0 to Blockchain 5.0: An intra-inter-organizational framework,” Transp. Res. Part E Logist. Transp. Rev., vol. 160, p. 102653, 2022.

B. E. Giri, D. Manongga, and A. Iriani, “Using social networking analysis (SNA) to analyze collaboration between students (case Study: Students of open University in Kupang),” Int. J. Comput. Appl, vol. 85, pp. 44–49, 2014.

I. D. Astuti, S. Rajab, and D. Setiyouji, “Cryptocurrency Blockchain Technology in the Digital Revolution Era,” Aptisi Trans. Technopreneursh., vol. 4, no. 1, pp. 9–15, 2022.

A. P. Balcerzak, E. Nica, E. Rogalska, M. Poliak, T. Kliestik, and O.-M. Sabie, “Blockchain technology and smart contracts in decentralized governance systems,” Adm. Sci., vol. 12, no. 3, p. 96, 2022.

U. Rahardja, A. S. Bist, M. Hardini, Q. Aini, and E. P. Harahap, “Authentication of Covid-19 Patient Certification with Blockchain Protocol”.

B. Sundarakani, A. Ajaykumar, and A. Gunasekaran, “Big data driven supply chain design and applications for blockchain: An action research using case study approach,” Omega, vol. 102, p. 102452, 2021.

F. Volter, N. Urbach, and J. Padget, “Trusting the trust machine: Evaluating trust signals of blockchain applications,” Int. J. Inf. Manage., p. 102429, 2021.

R. Somya, D. Manongga, and M. A. I. Pakereng, “Service-oriented business intelligence (SoBI) for academic and financial data integration in university,” in 2018 International Seminar on Application for Technology of Information and Communication, 2018, pp. 1–5.

R. T. Palar, D. Manongga, and W. H. Utomo, “An appropriate cloud computing business model and its services for developing countries: A comparison of cloud computing business model in Indonesia,” Int. J. Comput. Appl., vol. 43, no. 18, 2012.

H. Jang, S. H. Han, and J. H. Kim, “User perspectives on blockchain technology: user-centered evaluation and design strategies for dapps,” IEEE Access, vol. 8, pp. 226213–226223, 2020.

H. Latifah and Z. Fauziah, “Blockchain Teaching Simulation Using Gamification,” Aptisi Trans. Technopreneursh., vol. 4, no. 2, pp. 184–191, 2022.

P. A. Christianto, E. Sediyono, and I. Sembiring, “Modification of Case-Based Reasoning Similarity Formula to Enhance the Performance of Smart System in Handling the Complaints of in vitro Fertilization Program Patients,” Healthc. Inform. Res., vol. 28, no. 3, p. 267, 2022.

Y. Wang, Z. Li, G. Gou, G. Xiong, C. Wang, and Z. Li, “Identifying DApps and user behaviors on ethereum via encrypted traffic,” in International Conference on Security and Privacy in Communication Systems, 2020, pp. 62–83.

C. Udokwu, P. Brandtner, A. Norta, A. Kormiltsyn, and R. Matulevicius, “Implementation and evaluation of the DAOM framework and support tool for designing blockchain decentralized applications,” Int. J. Inf. Technol., vol. 13, no. 6, pp. 2245–2263, 2021.

S. Roopashree, J. Anitha, T. R. Mahesh, V. V. Kumar, W. Viriyasitavat, and A. Kaur, “An IoT based authentication system for therapeutic herbs measured by local descriptors using machine learning approach,” Measurement, vol. 200, p. 111484, 2022.

C. Wang, D. Wang, G. Xu, and D. He, “Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0,” Sci. China Inf. Sci., vol. 65, no. 1, pp. 1–15, 2022.

Y. Zheng, W. Liu, C. Gu, and C.-H. Chang, “PUF-based mutual authentication and key exchange protocol for peer-to-peer IoT applications,” IEEE Trans. Dependable Secur. Comput., 2022.

A. H. Sodhro, A. I. Awad, J. van de Beek, and G. Nikolakopoulos, “Intelligent authentication of 5G healthcare devices: A survey,” Internet of Things, p. 100610, 2022.

S. Shamshad, M. F. Ayub, K. Mahmood, S. Kumari, S. A. Chaudhry, and C.-M. Chen, “An enhanced scheme for mutual authentication for healthcare services,” Digit. Commun. Networks, vol. 8, no. 2, pp. 150–161, 2022.

D. Apriliasari and B. A. P. Seno, “Inovasi Pemanfaatan Blockchain dalam Meningkatkan Keamanan Kekayaan Intelektual Pendidikan,” J. MENTARI Manajemen, Pendidik. dan Teknol. Inf., vol. 1, no. 1, pp. 68–76, 2022.

M. Shen, H. Lu, F. Wang, H. Liu, and L. Zhu, “Secure and Efficient Blockchain-assisted Authentication for Edge-Integrated Internet-of-Vehicles,” IEEE Trans. Veh. Technol., 2022.

P. A. Sunarya, “Penerapan Sertifikat pada Sistem Keamanan menggunakan Teknologi Blockchain,” J. MENTARI Manajemen, Pendidik. dan Teknol. Inf., vol. 1, no. 1, pp. 58–67, 2022.

S. R. Akhila, Y. Alotaibi, O. I. Khalaf, and S. Alghamdi, “Authentication and Resource Allocation Strategies during Handoff for 5G IoVs Using Deep Learning,” Energies, vol. 15, no. 6, p. 2006, 2022.

T. Schmidbauer, J. Keller, and S. Wendzel, “Challenging channels: Encrypted covert channels within challenge-response authentication,” in Proceedings of the 17th International Conference on Availability, Reliability and Security, 2022, pp. 1–10.

B. Rawat, A. S. Bist, D. Supriyanti, V. Elmanda, and S. N. Sari, “AI and Nanotechnology for Healthcare: A survey,” APTISI Trans. Manag., vol. 7, no. 1, pp. 86–91, 2023.

V. Elmanda, A. E. Purba, Y. P. A. Sanjaya, and D. Julianingsih, “Efektivitas Program Magang Siswa SMK di Kota Serang Dengan Menggunakan Metode CIPP di Era Adaptasi New Normal Pandemi Covid-19,” ADI Bisnis Digit. Interdisiplin J., vol. 3, no. 1, pp. 5–15, 2022.




How to Cite

Aini, Q. ., Manongga, D. ., Rahardja, U. ., Sembiring, . I. ., Elmanda, V., Faturahman, A., & Santoso, . N. P. L. . (2022). Security Level Significance in DApps Blockchain-Based Document Authentication. Aptisi Transactions on Technopreneurship (ATT), 4(3), 292–305.




Most read articles by the same author(s)