Optimizing Customer Data Security in Water Meter Data Management Based on RESTful API and Data Encryption Using AES-256 Algorithm

Authors

  • Syahrul Adrianto Universitas Persatuan Guru Republik Indonesia Semarang
  • Bambang Agus Herlambang Universitas Persatuan Guru Republik Indonesia Semarang
  • Ramadhan Renaldy Universitas Persatuan Guru Republik Indonesia Semarang

DOI:

https://doi.org/10.30871/jaic.v9i3.9358

Keywords:

RESTful API, Laravel, Javascript, AES-256, Water Meter

Abstract

Good, accurate and secure data management is certainly one of the main needs for companies that provide public services. This research aims to develop a web application-based information system to manage customer water meter data at a regional water company in Semarang. This system was built using the RESTful API architecture using the PHP programming language framework, namely Laravel and the development of web page displays using the Javascripts framework. The data used is the original database managed by the company every month which is managed using a database management system by meter reader officers. To increase the security of customer data, a cryptographic algorithm is used, namely the Advanced Encryption Standard (AES) algorithm with a 256-bit key length to secure data that is considered sensitive and contains high privacy. This system is intended for meter readers to update customer water meter data per month in an efficient and structured manner. This research uses a Research and Development (R&D) based software development method with system testing using black-box testing method to ensure application functionality and data exposure testing method to ensure data security in the database. The test results show that the system successfully manages customer water meter data in realtime per data sent and secures customer data.

Downloads

Download data is not yet available.

References

[1] Y. Eka and E. Arviana, “Sistem Informasi Pendapatan Jasa pada Koperasi PDAM Tirta Patriot Bekasi,” J. Tek. Komput. AMIK BSI, vol. 4, no. 1, pp. 1–8, 2018, [Online]. Available: https://ejournal.bsi.ac.id/ejurnal/index.php/jtk/article/view/2377

[2] E. D. B. Santoso, N. R. Hidayati, and F. Nugrahanti, “Rancang Bangun Sistem Pendukung Keputusan Penilaian Kinerja Karyawan dengan menggunakan Metode AHP Berbasis Desktop pada PDAM Kabupaten MAdiun,” Literasi Digit. pada Era Revolusi Ind. 4.0, pp. 66–71, 2018.

[3] M. Farizd, Aditya Kurnia Pratama, and Abdul Rezha Efrat Najaf, “Penerapan Rest Api Sistem Informasi Cinema Catalog Movie Berbasis Desktop Dan Web Service,” Pros. Semin. Nas. Teknol. dan Sist. Inf., vol. 3, no. 1, pp. 116–125, 2023, doi: 10.33005/sitasi.v3i1.441.

[4] I. Nurjaman, F. S. Utomo, and N. Hermanto, “Penerapan REST API Laravel sebagai Fondasi Back-end Aplikasi G-MOOC 4D,” J. Informatics Interact. Technol., vol. 1, no. 1, pp. 9–18, 2024.

[5] K. Gowell and Suprihadi, “Perancangan Web Service REST API Menggunakan PHP dan Framework Laravel di Tenta Tour Salatiga,” J. JTIK (Jurnal Teknol. Inf. dan Komunikasi), vol. 8, no. 1, pp. 49–57, 2024, doi: 10.35870/jtik.v8i1.1269.

[6] H. Fery Herdiyatmoko and Y. Dicka Pratama, “Rest Api Pada Toko Kelontong Untuk Transaksi Penjualan Menggunakan Framework Laravel,” Idealis Indones. J. Inf. Syst., vol. 7, no. 1, pp. 118–127, 2024, [Online]. Available: http://jom.fti.budiluhur.ac.id/index.php/IDEALIS/indexHendrikFeryHerdiyatmoko%7Chttp://jom.fti.budiluhur.ac.id/index.php/IDEALIS/index%7C

[7] M. Hasanudin, Lasmin, and M. N. Dasaprawira, “Pengujian Aplikasi Tabungan Santri Berbasis Web Dengan Menggunakan Algoritma Kriptografi Advance Encryption Standard (Aes) 256.,” JOINICS (Journal Informatics …, vol. 1, no. 1, pp. 11–18, 2022, [Online]. Available: https://jurnal.unugha.ac.id/index.php/jnc/article/view/383

[8] S. E. Damayanti and F. Permana, “Sistem Informasi Pada Usaha Wangi Project Di Limbangan Tengah Dengan Menggunakan Algoritma Linear Search Dan Aes 256,” Naratif J. Nas. Riset, Apl. dan Tek. Inform., vol. 6, no. 1, pp. 79–88, 2024, doi: 10.53580/naratif.v6i1.288.

[9] T. D. A. P. Wardhani and Y. Asriningtias, “Aplikasi Pengamanan Dokumen Digital Perusahaan Berbasis Android Menggunakan Algoritma AES-256,” JUSTIN (Jurnal Sist. dan Teknol. Informasi), vol. 12, no. 1, pp. 143–154, 2024, doi: 10.26418/justin.v12i1.71449.

[10] T. Bin Tahir, M. A. Hadi Sirad, and M. Rais, “Sistem Informasi Encrypt Dan Decrypt Dengan Algoritma AES Menggunakan Framework Laravel,” Patria Artha Technol. J., vol. 4, no. 1, pp. 41–46, 2020, doi: 10.33857/patj.v4i1.326.

[11] K. I. Santoso and R. Habibi, “Kriptografi Pada Aplikasi Komunikasi Data dengan Algoritma AES 256,” Pros. Semin. Nas. ILMU Komput. 2014 "Trusted Digit. Identity Intell. Syst., pp. 447–458, 2014, [Online]. Available: https://ilkom.unnes.ac.id/snik/2014/prosiding/

[12] R.M. Hilmy Hernandi and Joko Christian Chandra, “Implementasi Algoritme AES-256 dan AES-GCM untuk Mengamankan Dokumen Pada Sistem Data Rekam Medis Klinik Mulya,” KRESNA J. Ris. dan Pengabdi. Masy., vol. 4, no. 1, pp. 12–22, 2024, doi: 10.36080/kresna.v4i1.131.

[13] T. D. A. P. Wardhani and Y. Asriningtias, “Implementasi Algoritma AES-256 Dalam Perancangan Aplikasi Pengamanan Dokumen Digital Perusahaan Berbasis Android,” INTECOMS J. Inf. Technol. Comput. Sci., vol. 6, no. 2, pp. 1289–1293, 2024, doi: 10.31539/intecoms.v6i2.8027.

[14] B. A. Wicaksono and I. V. Paputungan, “Pengembangan REST API untuk Sistem Pelaporan dan Pengaduan dengan Laravel,” J. Portal, vol. 3, no. 2, 2022.

[15] Okpatrioka Okpatrioka, “Research And Development (R&D) Penelitian Yang Inovatif Dalam Pendidikan,” Dharma Acariya Nusant. J. Pendidikan, Bhs. dan Budaya, vol. 1, no. 1, pp. 86–100, 2023, doi: 10.47861/jdan.v1i1.154.

[16] A. E. Standard, K. Dokumen, and B. B. Testing, “1,2 1* , 2,” no. November 2018, pp. 1044–1052, 2024.

[17] D. W. T. Putra and R. Andriani, “Unified Modelling Language (UML) dalam Perancangan Sistem Informasi Permohonan Pembayaran Restitusi SPPD,” J. TeknoIf, vol. 7, no. 1, p. 32, 2019, doi: 10.21063/jtif.2019.v7.1.32-39.

[18] S. Kelly and K. Kumar, “RESTful APIs,” Unity Netw. Fundam., vol. 2, no. 1, pp. 55–89, 2022, doi: 10.1007/978-1-4842-7358-6_3.

[19] N. Anwar, M. Munawwar, M. Abduh, and N. B. Santosa, “Komparatif Performance Model Keamanan Menggunakan Metode Algoritma AES 256 bit dan RSA,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 2, no. 3, pp. 783–791, 2018, doi: 10.29207/resti.v2i3.606.

[20] V. Yuniati, G. Indriyanta, and A. Rachmat C., “Enkripsi Dan Dekripsi Dengan Algoritma Aes 256 Untuk Semua Jenis File,” J. Inform., vol. 5, no. 1, 2011, doi: 10.21460/inf.2009.51.69.

Downloads

Published

2025-06-17

How to Cite

[1]
S. Adrianto, B. Agus Herlambang, and R. Renaldy, “Optimizing Customer Data Security in Water Meter Data Management Based on RESTful API and Data Encryption Using AES-256 Algorithm”, JAIC, vol. 9, no. 3, pp. 876–882, Jun. 2025.

Issue

Section

Articles

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.