“…By utiliz ing block chain, data protection can be produced (Costa et al, 2019;Pitchay et al, 2015;Sivakumar et al, 2019). Then, many people who are not responsible is difficult to interfere (Tawalbeh et al, 2015;Rotondi et al, 2019). There are many encryption methods often used to secure data (Shimbre & Deshpande, 2015;Sivakumar et al, 2019), such as: RSA, LEAP, AES, and so on (Alharby, Aldweesh, & Moorsel, 2018;Yassein et al, 2017;Tawalbeh & Saldamli, 2019).…”