Security and Privacy Enhancement in Decentralized Digital Data Sharing Environments
DOI:
https://doi.org/10.33050/vp5s1m02Keywords:
IPFS, HTTP, Security, Privacy, Data DigitalAbstract
This study examines the suitability of the IPFS as a decentralized architecture for secure digital data exchange. Traditional centralized protocols, such as HTTP, introduce structural vulnerabilities, including single points of failure, metadata exposure, and susceptibility to interception or unauthorized modification. As digital data exchange becomes increasingly essential in various sectors, ensuring data security and privacy has become a growing concern. The primary objective of this study is to evaluate IPFS’s ability to address these vulnerabilities and enhance the security and privacy of digital data-sharing environments. This research employs a structured literature review to synthesize findings from distributed-systems research, cryptographic studies, and peer-to-peer networking analyses. Additionally, the study benchmarks IPFS against traditional storage protocols, such as HTTP and FTP, to assess its advantages and limitations. The results demonstrate that IPFS offers significant advantages, including content-addressed storage, Merkle-DAG verification, and decentralized peer replication. These features improve fault tolerance, ensure data integrity, and reduce the risks of data tampering. However, limitations, such as content availability and reliance on node uptime, are also noted. While IPFS is not a complete security solution, it provides a strong foundational architecture for privacy-preserving, distributed data-sharing workflows when paired with complementary cryptographic and governance frameworks, making it a viable alternative for secure digital data exchange.
Downloads
References
[1] W. Alasmary, F. Alhaidari, A. Alhothaily, and F. Alhaidari, “Data privacy challenges in the digital age: A systematic review,” Computers & Security, vol. 117, p. 102733, 2022.
[2] T. S. Goh, J. Suteja, E. Erika, A. Simanjuntak, A. H. A. N. Karsa, and M. Angel, “Strategic management and socialpreneurship for achieving food sustainability in free lunch programs,” Aptisi Transactions on Technopreneurship (ATT), vol. 7, no. 1, pp. 13–25, 2025.
[3] P. P. Ray, “A survey on model context protocol: Architecture, state-of-the-art, challenges and future directions,” Authorea Preprints, 2025.
[4] R. Kurniaji, N. Azizah, and M. Yusup, “The influence branding of social media to improve digital business in training and consulting on instagram,” Startupreneur Business Digital (SABDA Journal), vol. 3, no. 2, pp. 171–180, 2024.
[5] H.-S. Huang, T.-S. Chang, and J.-Y. Wu, “A secure file sharing system based on ipfs and blockchain,” arXiv preprint arXiv:2205.01728, 2022. [Online]. Available: https://arxiv.org/abs/2205.01728
[6] S. S. Wulandari, M. L. B. M. Diah, and A. Asari, “Digital proficiency and entrepreneurial mindset for sme success through market savvy and tech literacy,” Aptisi Transactions on Technopreneurship (ATT), vol. 7, no. 1, pp. 26–36, 2025.
[7] K. Ito and S. Nakamura, “Improving content persistence in ipfs through adaptive replication policies,” Future Generation Computer Systems, vol. 152, pp. 312–324, 2024.
[8] R. Aprianto, C. Lukita, A. Sutarman, R. A. Sunarjo, R. N. Muti, and E. Dolan, “Facing global dynamics with effective strategy: A tasted organizational change management approach,” International Journal of Cyber and IT Service Management, vol. 5, no. 1, pp. 1–11, 2025.
[9] R. Hassan and M. Qureshi, “End-to-end encrypted data-sharing architecture using ipfs micro-clusters,” IEEE Transactions on Cloud Computing, 2023.
[10] L. Limajatini, S. Suhendra, G. A. Pangilinan, and M. G. Ilham, “Integration of artificial intelligence in the financial sector innovation, risks and opportunities,” International Journal of Cyber and IT Service Management, vol. 5, no. 1, pp. 58–70, 2025.
[11] X. Li, L. Wei, L. Wang, Y. Ma, C. Zhang, and M. Sohail, “A blockchain-based privacy-preserving authentication system for ensuring multimedia content integrity,” International journal of intelligent systems, vol. 37, no. 5, pp. 3050–3071, 2022.
[12] A. Pambudi, O. Wilson, and J. Zanubiya, “Exploring the synergy of global markets and digital innovation in business growth using smartpls,” IAIC Transactions on Sustainable Digital Innovation (ITSDI), vol. 6, no. 1, pp. 106–113, 2024.
[13] S. Islam and K. U. Apu, “Decentralized vs. centralized database solutions in blockchain: advantages, challenges, and use cases,” Global Mainstream Journal of Innovation, Engineering & Emerging Technology, vol. 3, no. 4, pp. 58–68, 2024.
[14] G. A. Pangilinan, S. Audiah, M. R. Shauqy, and O. F. P. Wahyudi, “Entrepreneurial marketing mindset as a determining factor for digital startup success,” Startupreneur Business Digital (SABDA Journal), vol. 4, no. 1, pp. 34–46, 2025.
[15] T. Nguyen and E. Park, “Performance degradation factors in peer-to-peer storage networks: A case of ipfs,” Journal of Network and Computer Applications, vol. 214, p. 103622, 2023.
[16] A. Martinez, A. Fitzroy, and A. Hogwart, “Network communication security: Challenges and solutions in the digital era,” International Journal of Cyber and IT Service Management, vol. 4, no. 1, pp. 47–52, 2024.
[17] A. Sharma and M. Singh, “Security threats in centralized and decentralized data sharing systems,” Computers & Security, vol. 125, p. 102950, 2023.
[18] R. Fahrudin, M. Hatta, Y. Yulianti, E. Erwin, and A. Zelene, “Machine learning for the next generation: A guide to matchmaking at startups,” IAIC Transactions on Sustainable Digital Innovation (ITSDI), vol. 6, no. 1, pp. 65–74, 2024.
[19] S. Goyal and P. Verma, “Zero-knowledge-based validation for decentralized storage systems,” IEEE Transactions on Dependable and Secure Computing, 2024.
[20] H. D. Natalia and A. Aprillia, “Exploring the impact of e-wom on generation z purchase intention: The mediating role of brand image and perceived quality,” IAIC Transactions on Sustainable Digital Innovation (ITSDI), vol. 6, no. 2, pp. 164–176, 2025.
[21] J. Wu and H. Liu, “Blockchain-based access control for decentralized file storage,” Future Generation Computer Systems, vol. 140, pp. 45–55, 2023.
[22] R. Hazra, P. Chatterjee, Y. Singh, G. Podder, and T. Das, “Data encryption and secure communication
protocols,” in Strategies for E-Commerce Data Security: Cloud, Blockchain, AI, and Machine Learning. IGI Global, 2024, pp. 546–570.
[23] S. Shaumiwaty, H. R. C. MOCHAMAD, and N. HENI, “Enhancing personalized learning using artificial intelligence and machine learning approaches,” BLOCKCHAIN FRONTIER TECHNOLOGY: Pandawan, vol. 4, no. 2, pp. 156–170, 2025.
[24] P. Wu and H. Gao, “Secure healthcare data exchange using ipfs and attribute-based encryption,” Computers & Security, vol. 140, p. 103911, 2024.
[25] N. N. Rafiana, “Technopreneurship strategy to grow entrepreneurship career options for students in higher education,” ADI Journal on Recent Innovation, vol. 5, no. 2, pp. 110–126, 2024.
[26] I. Gupta, A. K. Singh, C.-N. Lee, and R. Buyya, “Secure data storage and sharing techniques for data protection in cloud environments: A systematic review, analysis, and future directions,” IEEe Access, vol. 10, pp. 71 247–71 277, 2022.
[27] A. S. Elnara, B. M. Elvan, D. P. Emine, and F. A. Saraswati, “Applications for systematic smart contracts on blockchain,” Blockchain Frontier Technology, vol. 3, no. 1, pp. 1–6, 2023.
[28] R. K. Mishra, R. K. Yadav, and P. Nath, “Integration of blockchain and ipfs: healthcare data management & sharing for iot environment,” Multimedia Tools and Applications, vol. 84, no. 23, pp. 27 229–27 250, 2025.
[29] A. Sutarman, R. Aprianto, R. Adyatama, K. C. Pokkali, and M. Yusup, “Influence of digital technology & data analytics on strategic decision making,” Startupreneur Business Digital (SABDA Journal), vol. 4, no. 1, pp. 12–23, 2025.
[30] A. Chowdhury and M. Rahman, “Comparative resilience analysis of centralized vs decentralized data systems,” Computer Standards & Interfaces, vol. 94, p. 103763, 2024.
[31] M. B. Karo, B. P. Miller, and O. A. Al-Kamari, “Leveraging data utilization and predictive analytics: Driving innovation and enhancing decision making through ethical governance,” International Transactions on Education Technology (ITEE), vol. 2, no. 2, pp. 152–162, 2024.
[32] T. Chen and L. Zhao, “Simulation-based performance evaluation of ipfs under various network scenarios,” Computers & Security, vol. 142, p. 103582, 2023.
[33] T. V. Doan, Y. Psaras, J. Ott, and V. Bajpai, “Toward decentralized cloud storage with ipfs: opportunities, challenges, and future considerations,” IEEE Internet Computing, vol. 26, no. 6, pp. 7–15, 2022.
[34] T. Mariyanti, I. Wijaya, C. Lukita, S. Setiawan, and E. Fletcher, “Ethical framework for artificial intelligence and urban sustainability,” Blockchain Frontier Technology, vol. 4, no. 2, pp. 98–108, 2025.
[35] M. Ma, “Application of named data networking on interplanetary file system,” Ph.D. dissertation, Waseda University, 2024.
[36] Q. Li and J. Wang, “Gateway solutions for integrating ipfs with web applications,” IEEE Transactions on Network and Service Management, vol. 19, no. 1, pp. 234–245, 2022.
[37] Z. Kedah, “Use of e-commerce in the world of business,” Startupreneur Business Digital (SABDA Journal), vol. 2, no. 1, pp. 51–60, 2023.
[38] S. Lekkala and P. Gurijala, Security and Privacy for Modern Networks. Springer, 2024.
[39] D. Bennet et al., “Advancing e-commerce smart-pls as a catalyst for improved online shopping services,” International Transactions on Education Technology (ITEE), vol. 2, no. 2, pp. 99–108, 2024.
[40] S. Hafeez, A. R. Khan, M. M. Al-Quraan, L. Mohjazi, A. Zoha, M. A. Imran, and Y. Sun, “Blockchainassisted uav communication systems: A comprehensive survey,” IEEE Open Journal of Vehicular Technology, vol. 4, pp. 558–580, 2023.
[41] J. I. Saputro, L. F. Sa’adah, Y. Syifa, K. D. Ramadhanti, and M. F. Gojali, “Transforming learning experiences with advanced educational technology solutions,” International Transactions on Education Technology (ITEE), vol. 3, no. 2, pp. 114–124, 2025.
[42] S. Rahimi and M. Mousavi, “Multi-node consistency analysis in merkle-dag-based storage,” IEEE Access, vol. 10, pp. 87 222–87 235, 2022.
[43] R. Shi, R. Cheng, B. Han, Y. Cheng, and S. Chen, “A closer look into ipfs: Accessibility, content, and performance,” Proceedings of the ACM on Measurement and Analysis of Computing Systems, vol. 8, no. 2, pp. 1–31, 2024.
[44] H. Krishnan and G. Rao, “Optimizing ipfs lookup paths using machine-learning-based peer selection,” Future Internet, vol. 17, no. 1, p. 12, 2025.
[45] Q. Chen and Y. Song, “Evaluating distributed encryption overhead in ipfs-based systems,” Information Systems, vol. 120, p. 103456, 2025.
[46] E. Daniel and F. Tschorsch, “Ipfs and friends: A qualitative comparison of next generation peer-to-peer data networks,” IEEE Communications Surveys & Tutorials, vol. 24, no. 1, pp. 31–52, 2022.
[47] OECD, Harnessing Artificial Intelligence in Social Security: Use Cases, Governance and Workforce Readiness, ser. OECD Digital Government Studies. Paris: OECD Publishing, 2025, forthcoming 10 December 2025. [Online]. Available: https://www.oecd.org/en/publications/harnessing-artificial-intelligence-in-social-security b52405c1-en.html
[48] J. Liu et al., “Achieving metadata privacy and efficient auditing in decentralized storage systems,” IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 5, pp. 3212–3224, 2022.
[49] M. S. Ahmmed, L. Khan, M. A. Mahmood, and F. Liou, “Digital twins, ai, and cybersecurity in additive manufacturing: A comprehensive review of current trends and challenges,” Machines, vol. 13, no. 8, p. 691, 2025.
[50] J. Zanubiya, L. Meria, and M. A. D. Juliansah, “Increasing consumers with satisfaction application based digital marketing strategies,” Startupreneur Business Digital (SABDA Journal), vol. 2, no. 1, pp. 12–21, 2023.
[51] A. Ibrahim and S. Noor, “Attack surface reduction in decentralized communication protocols,” Computers & Security, vol. 134, p. 103380, 2023.
[52] Z. Ullah, B. Raza, H. Shah, S. Khan, and A. Waheed, “Towards blockchain-based secure storage and trusted data sharing scheme for iot environment,” IEEE access, vol. 10, pp. 36 978–36 994, 2022.
[53] V. Sharma and S. Pathak, “Comparative study of distributed storage protocols: Performance, security, and scalability,” Information Processing & Management, vol. 60, no. 2, p. 103170, 2023.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Muhamad Yusup, Mardiana, Ageng Setiani Rafika, Otniel Feliks Putra Wahyudi, Agung Lorenzo

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
.png)





