Analisis Implementasi Sistem Keamanan Basis Data Berbasis Role-Based Access Control (RBAC) pada Aplikasi Enterprise Resource Planning
DOI:
https://doi.org/10.54259/satesi.v5i1.3997Keywords:
RBAC, Data Security, Access ManagementAbstract
Role-Based Access Control (RBAC) has become the main approach in improving data security in various information systems. This study analyzes the implementation of RBAC in the context of Enterprise Resource Planning (ERP) applications and cloud-based, mobile, and multi-domain systems. Using a systematic literature review (SLR) methodology, this study synthesizes findings from various studies to evaluate the effectiveness of RBAC in addressing challenges such as data privacy, regulatory compliance, and access policy complexity. The results show that the integration of intelligent technologies, such as machine learning (decision tree and random forest algorithms) for user behavior analysis, natural language processing for policy interpretation, and blockchain to record access activities with a security increase of up to 37%, can increase the flexibility and efficiency of RBAC, especially in detecting anomalies and managing dynamic policies. In addition, automation in RBAC deployments has been proven to reduce operational costs by 42% and management time by up to 65% compared to traditional manual approaches. However, RBAC implementation also faces significant challenges, including the need to adapt to complex regulations and the dynamics of a multi-domain environment. This research makes a theoretical contribution by expanding the understanding of the role of RBAC in modern data security management and offering practical recommendations for optimizing RBAC implementation. Thus, RBAC has proven to be a relevant and reliable model in answering data security needs in the digital era.
Downloads
References
H. Alrasyid, I. Istianah, Z. E. Marpaung, A. Indrijawati, and M. Irdam, “Implementasi Sistem ERP terhadap Kinerja Bisnis: Pendekatan Literatur Review,” J. Real Ris., vol. 6, no. 1, pp. 54–66, 2024, doi: 10.47647/jrr.
Y. Yuricha and I. K. Phan, “Penerapan Role Based Access Control dalam Sistem Supply Chain Management Berbasis Cloud,” MALCOM Indones. J. Mach. Learn. Comput. Sci., vol. 3, no. 2, pp. 339–348, 2023, doi: 10.57152/malcom.v3i2.1259.
Y. A. Prasetia and D. Manongga, “Role-based access control (rbac) untuk sistem otorisasi terpusat berbasis flask studi kasus pt. xyz,” JIPI (Jurnal Ilm. Penelit. dan Pembelajaran Inform., vol. 9, no. 4, pp. 1768–1778, 2024.
M. Gratia, B. Sitorus, N. Maria, and Y. N. Safa, “Tinjauan Literatur Manajemen Risiko Cyber dalam Proyek : Identifikasi , Evaluasi , dan Mitigasi Ancaman,” J. Manaj. Inform., vol. 14, no. 2, pp. 187–198, 2024, doi: 10.34010/jamika.v14i2.12887.
M. Jafar, A. M. I. T. Asfar, and A. M. I. A. Asfar, “Artificial Intellegence Dalam Pendidikan Dan Penelitian: Tantangan Dan Solusi Menghadapinya,” Simp. Nas. Kepemimp. Perguru. Tinggi Indones., vol. 1, no. 2017, pp. 1–9, 2024.
H. Salsabila and I. P. Nasution, “ANALISIS DAMPAK REGULASI PRIVASI DATA TERHADAP MANAJEMEN KEMANAN DATA DI SEKTOR BISNIS,” Kinabalu, vol. 11, no. 2, pp. 50–57, 2013.
A. Purnomo, A. Kurniasih, A. Nuraminah, and S. Hartati, “Peran Artificial Intelligence dalam Deteksi Dini Ancaman Keamanan Jaringan,” J. Minfo Polgan, vol. 13, no. 2, pp. 2044–2048, 2024, doi: https://doi.org/10.33395/jmp.v13i2.14356 e-ISSN.
A. S. Khairi and M. Alda, “Implementasi Role Based Access Control dalam Pengelolaan Hak Akses Koperasi Berbasis Mobile,” Kec. Pancur Batu, Kab. Deli Serdang, vol. 120, p. 6615683, 2024.
T. Mehra, “The Critical Role of Role-Based Access Control (RBAC) in securing backup , recovery , and storage systems,” Int. J. Sci. Res. Arch., vol. 13, no. 1, pp. 1192–1194, 2024, doi: 10.30574/ijsra.2024.13.1.1733.
S. T. Alshammari, A. Albeshri, and K. Alsubhi, “Integrating a high‐reliability multicriteria trust evaluation model with task role‐based access control for cloud services,” Symmetry (Basel)., vol. 13, no. 3, 2021, doi: 10.3390/sym13030492.
A. M. Abdul et al., “Enhancing Security of Mobile Cloud Computing by Trust- and Role-Based Access Control,” Sci. Program., p. 10, 2022, doi: 10.1155/2022/9995023.
C. Blundo, S. Cimato, and L. Siniscalchi, “Managing Constraints in Role Based Access Control,” IEEE Access, vol. 8, pp. 140497–140511, 2020, doi: 10.1109/ACCESS.2020.3011310.
R. Ghazal, A. K. Malik, N. Qadeer, B. Raza, A. R. Shahid, and H. Alquhayz, “Intelligent Role-Based Access Control Model and Framework Using Semantic Business Roles in Multi-Domain Environments,” IEEE Access, vol. 8, pp. 12253–12267, 2020, doi: 10.1109/ACCESS.2020.2965333.
N. N. Thilakarathne and D. Wickramaaarachchi, “Improved hierarchical role based access control model for cloud computing,” Int. Res. Conf. Smart Comput. Syst. Eng., 2018.
A. U. R. Butt et al., “An Optimized Role-Based Access Control Using Trust Mechanism in E-Health Cloud Environment,” IEEE Access, vol. 11, no. November, pp. 138813–138826, 2023, doi: 10.1109/ACCESS.2023.3335984.
A. Walker, J. Svacina, J. Simmons, and T. Cerny, “On Automated Role-Based Access Control Assessment in Enterprise Systems,” Lect. Notes Electr. Eng., vol. 621, pp. 375–385, 2020, doi: 10.1007/978-981-15-1465-4_38.
A. Chatterjee, Y. Pitroda, and M. Parmar, “Dynamic Role-Based Access Control for Decentralized Applications,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 12404 LNCS, pp. 185–197, 2020, doi: 10.1007/978-3-030-59638-5_13.
E. Mpamugo and G. Ansa, “Enhancing Network Security in Mobile Applications with Role-Based Access Control,” J. Inf. Syst. Informatics, vol. 6, no. 3, pp. 1872–1899, 2024, doi: 10.51519/journalisi.v6i3.863.
I. G. Susrama, Sugiarto, and W. Agustiono, Buku Ajar Enterprise Resource Planning (ERP). 2021. [Online]. Available: https://www.researchgate.net/publication/358387687
V. F. Nahuway, “Manajemen Perkantoran Modern Di Era Digitalisasi: Suatu Tinjauan Literatur,” J. Adm. Terap., vol. 3, no. 1, pp. 303–315, 2024.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 M Sahyudi, Erliyan Redy Susanto

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).