Indonesian Journal of Electrical Engineering and Computer Science Vol. 29, No. 1, January 2023, pp. 431~440 ISSN: 2502-4752, DOI: 10.11591/ijeecs.v29.i1.pp431-440 431 Journal homepage: http://ijeecs.iaescore.com Optimizing blockchain technology using a data sharing model Israa Nazeeh 1 , Teeb Hussein Hadi 2 , Zainab Qahtan Mohammed 1 , Shaymaa Taha Ahmed 1 , Qusay Kanaan Kadhim 3 1 Department of Computer Science, College of Basic Education, University of Diyala, Diyala, Iraq 2 IT Department, Technical College of Management, Middle Technical University, Baghdad, Iraq 3 Department of Computer Techniques Engineering, Bilad Alrafidain University College, Baqubah, Iraq Article Info ABSTRACT Article history: Received Jul 12, 2022 Revised Sep 13, 2022 Accepted Sep 30, 2022 The improvement of different data-sharing technology has increasingly permeated many industries as technology continues to improve. As a result, for the value of the data to be realized, data sharing and security are essential. However, a fundamental data sharing mechanism is difficult to check for electronic data usage traces. Furthermore, data providers' unwillingness to provide their data is a challenge. Taking use of the dispersed ledger, smart contract, data trust, and traceability aspects of blockchain technology. This research presents a data-sharing model based on blockchain technology optimizing to overcome the challenges in terms of security and control, of conventional centralized data sharing and management, enabling safe access to the data as a result. Moreover, the research assesses the prototype's usefulness and security. Additionally, this paper suggests a method for using blockchain technology to optimize the efficiency of data sharing. This study showed that data sharing via the blockchain technology paradigm proposed in this work is feasible, secure, controllable, and efficient. This was demonstrated in a novel way employing blockchain technology. Keywords: Blockchain technology Data sharing model Network Optimization Security This is an open access article under the CC BY-SA license. Corresponding Author: Shaymaa Taha Ahmed Department of Computer Science, College of Basic Education, Diyala University Diyala, Iraq Email: mrs.sh.ta.ah@gmail.com 1. INTRODUCTION In recent years, data have played a crucial part in both peoples' social lives and scientific study, due to the ongoing growth of big data and the internet technologies, and documents dissemination and sharing require increasingly grown in importance as a tool for advancing both social and scientific advancement. Promoting the national big data plan requires secure data interchange. In today's culture, tremendous societal shifts have occurred as a result of the massive infusion of resources into production and living that the convergence of knowledge has produced. Businesses that utilize big data to significantly help society and the economy include those that employ medical data [1], [2], financial documents [3], [4], power data [5], as well as meteorological data [6], [7]. While the development of big data technologies has made life more convenient for people, various data security issues have also been brought up [8], [9]. The constant occurrence of security events like data management security borders and resource theft is one of the most significant issues [10], [11]. Resource hurdles that have been created as a result of data security, and realizing the value of data can be challenging due to business considerations and privacy issues, additionally, the financial benefits of comparing various forms of data do not fully materialize. However, due to technical limitations, the majority of current options for sharing data cannot maintain data security [12], [13]. Common sharing data practices rely on a centralize store and server, which has several weaknesses. First off, central administration gives managers a