Performance Analysis of Cassandra With Regards To Cryptography Technique
The fast development and use of Internet, like the social networks, has to handle huge amounts of data. The social networks example the Facebook required high availability and scalability, billions of writes/hour and high write throughput. RDBMS does not support such features. To solve this problem of processing and storing large amounts of data robustly and efficiently, various kinds of distributed database systems have been developed and designed. Cassandra database has the features to handle very large amount of data. As Cassandra stores sensitive data, the security and management of data is important.This paper gives comparative performance analysis of Cassandra with regards to encryption standards asymmetric and symmetric considering various parameters such as Write Time, Read Time and Throughput. Experiments are performed for analyzing the performance of Cassandra with regards to symmetric algorithm and asymmetric algorithm.
J. Guillory, J. Spiegel, M. Drislane, B. Weiss, W. Donner, and J. T. Hancock, “Security Issues in NoSQL Databases,” 2011 International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11.
PrashantMalik, AvinashLakshman, “Cassandra - a decentralized structured storage system,” in The 3rd ACM SIGOPS International Workshop on Large Scale Distributed Systems and Middleware (LADIS 09), October 2009.
Jan Sipke van der Veen, Bram van der Waaij , Robert J. Meijer, “Sensor Data Storage Performance: SQL or NoSQL, Physical or Virtual ,” 2012 IEEE Fifth International Conference on Cloud Computing.
PrasannaBagade, Ashish Chandra, and Aditya B.Dhende,“Designing Performance Monitoring Tool for NoSQLCassandra Distributed Database” in 2012 International Conference on Education and e-Learning Innovations .
Malik Sikander Hayat Khiyal, Aihab Khan, and KhansaShabbir,“Performance Evaluation of Encryption Techniques for Confidentiality of Very Large Databases” in International Journal of Computer Theory and Engineering, Vol. 3, No. 6, December 2011
S. Pavithra and Mrs. E. Ramadevi, “Performance Evaluation of Symmetric Algorithms”, in Journal of Global Research in Computer Science, 3 (8), August 2012, 43-45
A.Ramesh and .A.Suruliandi, “Performance Analysis of Encryption Algorithms for Information Security”, in 2013 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2013]
Ashwak ALabaichi,Faudziah Ahmad and RamlanMahmod, “Security Analysis of Blowfish algorithm”, in ISBN: 978-1-4673-5256-7/13 ©2013 IEEE.
M.Anand Kumar and Dr.S.Karthikeyan, “Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms”, in I.J. Computer Network and Information Security, 2012, 2, 22-28.Published Online March 2012 in MECS.
PratapChnadraMandal,“ Superiority of Blowfish Algorithm”, in International Journal of Advanced Research in Computer Science and Software Engineering 2(9), September - 2012, pp. 196-201.
Tupti B. Bhosale, Prof. G. P .Potdar, "Enhancing Blowfish Cryptography Technique for Cassandra", in Volume 6 in 2011 International Conference on Computational and Information Sciences coimbatore institute of information technology international journal ISSN: 0974 – 9640.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.