Published: 2026-10-01
Pengembangan Service Masking Data dengan Metode Scramble pada Sistem TXX: Studi Kasus PT XYZ
DOI: 10.35870/jtik.v10i4.6349
Fani Amanatul Khaliq, Wasis Haryono
- Fani Amanatul Khaliq: Universitas Pamulang
- Wasis Haryono: Universitas Pamulang
Article Metrics
- Scopus Citations
- Google Scholar
- Crossref Citations
- Semantic Scholar
- DataCite Metrics
-
If the link doesn't work, copy the DOI or article title for manual search (API Maintenance).
Abstract
The advancement of digitalization in financial institutions demands secure system development practices, particularly regarding the use of customer data in development and UAT environments. In the TXX core system, the use of raw data without sanitization poses a potential risk of sensitive information leaks. This study aims to develop a data sanitization service using a scrambling method capable of scrambling personal data without altering the structure, format, or integrity of the testing process. The research method employs a research and development approach, comprising system analysis, database and service flow design, implementation of a TAFC-based prototype, and functional and structural testing. The implementation resulted in three main modules: Parameter Scramble, Agent Service Scramble, and Routine Service, which are integrated with PT XYZ’s development environment. Black-box testing results indicate that all interface functions and service processes operate as expected. White-box testing of the program structure ensured that the internal logic, flow control, and multithreading mechanisms operated stably without race conditions. Additionally, usability testing using the System Usability Scale on 14 respondents yielded a score of 77, which falls into the “Good” and acceptable category.
Keywords
Service Making Data; Metode Scramble; Sistem TXX
Peer Review Process
This article has undergone a double-blind peer review process to ensure quality and impartiality.
Indexing Information
Discover where this journal is indexed at our indexing page.
Open Science Badges
This journal supports transparency in research and encourages authors to meet criteria for Open Science Badges.
How to Cite
Article Information
This article has been peer-reviewed and published in the Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi). The content is available under the terms of the Creative Commons Attribution 4.0 International License.
-
Issue: Vol. 10 No. 4 (2026)
-
Section: Computer & Communication Science
-
Published: 2026-10-01
-
License: CC BY 4.0
-
Copyright: © 2026 Authors
-
DOI: 10.35870/jtik.v10i4.6349
AI Research Hub
This article is indexed and available through various AI-powered research tools and citation platforms. Our AI Research Hub ensures that scholarly work is discoverable, accessible, and easily integrated into the global research ecosystem.
-
-
-
-
-
Duan, X., Shao, Z., Wang, W., Zhang, E., Yue, D., Qin, C., & Nam, H. (2022). A Steganography Model Data Protection Method Based on Scrambling Encryption. Computers, Materials & Continua, 72(3), 5363–5375. https://doi.org/10.32604/cmc.2022.027807.
-
-
-
-
Koç, H., Erdoğan, A. M., Barjakly, Y., & Peker, S. (2021). UML Diagrams in Software Engineering Research: A Systematic Literature Review. Proceedings, 74(1), 13. https://doi.org/10.3390/proceedings2021074013.
-
-
-
Pooja Badgujar. (2021). Implementing Data Masking Techniques for Privacy Protection. Journal of Technological Innovations, 2(4). https://doi.org/10.93153/5yysvh44.
-
Pulungan, S. M., Febrianti, R., Lestari, T., Gurning, N., & Fitriana, N. (2023). Analisis Teknik Entity-Relationship Diagram Dalam Perancangan Database. Jurnal Ekonomi Manajemen Dan Bisnis (JEMB), 1(2), 143–147. https://doi.org/10.47233/jemb.v1i2.533.
-
Sa’adah, N., Astawa, I. G. P., & Sudarsono, A. (2018). Trusted Data Transmission Using Data Scrambling Security Method with Asymmetric Key Algorithm for Synchronization. EMITTER International Journal of Engineering Technology, 6(2), 217–235. https://doi.org/10.24003/emitter.v6i2.267.
-
-
-
-
Vijay Sai, R., & Saravanan, S. (2018). A Review on Security in Cache Memories. Indian Journal of Science and Technology, 9(48), 1–6. https://doi.org/10.17485/ijst/2016/v9i48/96037.
-
Vijay Sai, R., Saravanan, S., & Anandkumar, V. (2015). Implementation of a Novel Data Scrambling based Security Measure in Memories for VLSI Circuits. Indian Journal of Science and Technology, 8(35), 1–6. https://doi.org/10.17485/ijst/2015/v8i35/86798.
-

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
1. Copyright Retention and Open Access License
Authors retain copyright of their work and grant the journal non-exclusive right of first publication under the Creative Commons Attribution 4.0 International License (CC BY 4.0).
This license allows unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
2. Rights Granted Under CC BY 4.0
Under this license, readers are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, including commercial use
- No additional restrictions — the licensor cannot revoke these freedoms as long as license terms are followed
3. Attribution Requirements
All uses must include:
- Proper citation of the original work
- Link to the Creative Commons license
- Indication if changes were made to the original work
- No suggestion that the licensor endorses the user or their use
4. Additional Distribution Rights
Authors may:
- Deposit the published version in institutional repositories
- Share through academic social networks
- Include in books, monographs, or other publications
- Post on personal or institutional websites
Requirement: All additional distributions must maintain the CC BY 4.0 license and proper attribution.
5. Self-Archiving and Pre-Print Sharing
Authors are encouraged to:
- Share pre-prints and post-prints online
- Deposit in subject-specific repositories (e.g., arXiv, bioRxiv)
- Engage in scholarly communication throughout the publication process
6. Open Access Commitment
This journal provides immediate open access to all content, supporting the global exchange of knowledge without financial, legal, or technical barriers.