Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Enhancing Blowfish Cryptography Technique for Cassandra


Affiliations
1 Pune Institute of Computer Technology, India
     

   Subscribe/Renew Journal


The popularity of Cassandra has been increasing day by day. Cassandra is a database management system designed to handle very large amounts of data spread out across many servers. Cassandra is used by number of companies such as Twitter, Mahalo, Facebook etc, to construct their Projects. Nodes on a peer –to- peer architecture can communicate freely and no authentication or encryption is provided. As increasingly sensitive data is being stored in Cassandra databases, hence database management and security issues are important and become growing concerns. This paper gives an overview of Cassandra and its features, the cryptography techniques RSA and Blowfish and ongoing research to monitor performance of Cassandra with encryption techniques. This survey analysis the performance of Cassandra when two encryption techniques RSA and Blowfish are used.

Keywords

Cassandra, Blowfish Algorithm, RSA Algorithm.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 212

PDF Views: 2




  • Enhancing Blowfish Cryptography Technique for Cassandra

Abstract Views: 212  |  PDF Views: 2

Authors

Trupti Bhushan Bhosale
Pune Institute of Computer Technology, India
Girish Potdar
Pune Institute of Computer Technology, India

Abstract


The popularity of Cassandra has been increasing day by day. Cassandra is a database management system designed to handle very large amounts of data spread out across many servers. Cassandra is used by number of companies such as Twitter, Mahalo, Facebook etc, to construct their Projects. Nodes on a peer –to- peer architecture can communicate freely and no authentication or encryption is provided. As increasingly sensitive data is being stored in Cassandra databases, hence database management and security issues are important and become growing concerns. This paper gives an overview of Cassandra and its features, the cryptography techniques RSA and Blowfish and ongoing research to monitor performance of Cassandra with encryption techniques. This survey analysis the performance of Cassandra when two encryption techniques RSA and Blowfish are used.

Keywords


Cassandra, Blowfish Algorithm, RSA Algorithm.