RANCANG BANGUN MODEL KONTROL AKSES DINAMIS BERBASIS KONTEKS PADA ARSITEKTUR ZERO TRUST

##plugins.themes.academic_pro.article.main##

Ruth Amelia Vega S. Meliala
Dedy Kiswanto
Salsa Nabila Harahap
Revidamurti Dly

Abstract

The rapid development of digital systems and interconnected environments has created new challenges in securing data. Traditional perimeter-based security models are no longer adequate to protect sensitive information from internal and external threats. This study proposes the design and implementation of a Context-Based Dynamic Access Control Model within the Zero Trust Architecture (ZTA) framework. The proposed system integrates contextual authentication, adaptive risk evaluation, and a dynamic policy engine to implement more granular access control in multi-user web applications. The prototype was developed using Node.js, Express.js, and MySQL, featuring multi-factor authentication, contextual verification via OTP, session management, and security notifications.The test results indicate that the system is capable of detecting changes in access context, enforcing re-authentication, and recording all user activities for auditing and anomaly detection purposes. The integration of contextual authentication, adaptive access control, and Zero Trust principles has been proven to enhance data protection and user accountability without reducing system usability..

##plugins.themes.academic_pro.article.details##

How to Cite
Vega S. Meliala, R. A., Kiswanto, D., Harahap, S. N., & Dly, R. (2026). RANCANG BANGUN MODEL KONTROL AKSES DINAMIS BERBASIS KONTEKS PADA ARSITEKTUR ZERO TRUST. Jurnal Informatika Progres, 18(1), 12-22. https://doi.org/10.56708/progres.v18i1.500

References

Agustina, E. R., & Achmad, F. (2019). Perancangan spesifikasi keamanan kontrol akses pada aplikasi layanan informasi di lingkungan instansi pemerintah. Jurnal Teknologi Informasi dan Ilmu Komputer, 6(2), 195–200. https://doi.org/10.25126/jtiik.2019621304
Efendi, R., Wahyono, T., & Widiasari, I. R. (2024). Uji kerentanan keamanan pada aplikasi berbasis web menggunakan metode vulnerability assessment. AITI: Jurnal Teknologi Informasi, 21(Maret), 44–57.
Haeruddin, H., Favian, F., & Prasetyo, S. E. (2024). Implementasi zero trust network untuk meningkatkan keamanan jaringan menggunakan Ferrumgate dengan metode NDLC. Infotech: Journal of Technology Information, 10(2), 307–318. https://doi.org/10.37365/jti.v10i2.324
Haeruddin, H., Prasetyo, S. E., & Mindy, A. (2025). Implementasi multi-factor authentication untuk optimalisasi keamanan akses data di PT. ABC. Jurnal Manajemen Informatika (JAMIKA), 15(1), 85096. https://doi.org/10.34010/5rdjmw37
Hose, F., Censaka, F., & Wijaya, R. A. (2025). Analisis peran blockchain dalam zero-trust architecture untuk penguatan identitas digital dan privasi data. JIMU: Jurnal Ilmiah Multidisipliner, 4(1), 568–578.
Junga, D., & Sulistyo, W. (2025). Implementasi port knocking dinamis berbasis waktu pada router untuk pengamanan akses SSH. IT-Explore: Jurnal Penerapan Teknologi Informasi dan Komunikasi, 4(1), 106–115. https://doi.org/10.24246/itexplore.v4i1.2025.pp106-115
Laksono, A. C., & Sari, B. W. (2025). Pengembangan framework tata kelola akses multi-tenant untuk mitigasi ancaman insider di cloud publik. Jurnal Informatika Teknologi dan Sains (JINTEKS), 7(3), 1520–1527. https://doi.org/10.51401/jinteks.v7i3.6574
Lubis, A. A., Pinem, J., Lubis, M. A. S., & Kiswanto, D. (2022). Implementasi Roundcube pada mail server untuk lingkungan Program Studi Ilmu Komputer UNIMED. Blend Sains Jurnal Teknik, 1(3), 194–201. https://doi.org/10.56211/blendsains.v1i3.163
Mugianto, D. R., & Budiarto, R. (2024). Evaluasi pengujian keamanan arsitektur zero trust network pada jaringan smart home untuk mengatasi serangan data sniffing. Syntax Literate: Jurnal Ilmiah Indonesia, 9(11), 6703–6718. https://doi.org/10.36418/syntax-literate.v9i11.16898
Mukhlisin, M., & Agung Firmansyah, R. (2025). Zero trust architecture: Solusi keamanan dan privasi untuk institusi pendidikan, systematic literature review. JATI (Jurnal Mahasiswa Teknik Informatika), 9(4), 6926–6935. https://doi.org/10.36040/jati.v9i4.14344
Pananto, R. C., & Damayanti, S. (2023). Jurnal ilmu komputer. Biomaterials, 7(12), 85–90.
Pribadi Fitrian, H., Nur Aziz Bisri, F., Willy Al Fathir, M., & Jaisy Hizbulloh, M. (2024). Analisis keamanan cloud dengan zero trust dan blockchain yang tangguh. Journal Global Tecnology Computer, 4(1), 36–43. https://doi.org/10.47065/jogtc.v4i1.6432
Zuhriyanto, I., & Astari, S. R. (2025). Penerapan zero trust architecture untuk mitigasi ancaman pembajakan akun WhatsApp. JITU: Journal Informatic Technology and Communication, 9(1), 50–58. https://doi.org/10.36596/jitu.v9i1.1815

Most read articles by the same author(s)