Enhancing Blowfish Cryptography Technique for Cassandra
Abstract
Keywords
Full Text:
PDFReferences
J. Guillory, J. Spiegel, M. Drislane, B. Weiss, W. Donner, and J. T. Hancock, “Security Issues in NoSQL Databases,” 2011 International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11.
PrashantMalik, AvinashLakshman, “Cassandra - a decentralized structured storage system,” in The 3rd ACM SIGOPS International Workshop on Large Scale Distributed Systems and Middleware (LADIS 09), October 2009.
Jan Sipke van der Veen, Bram van der Waaij , Robert J. Meijer, “Sensor Data Storage Performance: SQL or NoSQL, Physical or Virtual ,” 2012 IEEE Fifth International Conference on Cloud Computing.
PrasannaBagade, Ashish Chandra, and Aditya B.Dhende,“Designing Performance Monitoring Tool for NoSQLCassandra Distributed Database” in 2012 International Conference on Education and e-Learning Innovations .
Malik Sikander Hayat Khiyal, Aihab Khan, and KhansaShabbir,“Performance Evaluation of Encryption Techniques for Confidentiality of Very Large Databases” in International Journal of Computer Theory and Engineering, Vol. 3, No. 6, December 2011
S. Pavithra and Mrs. E. Ramadevi, “Performance Evaluation of Symmetric Algorithms”, in Journal of Global Research in Computer Science, 3 (8), August 2012, 43-45
A.Ramesh and .A.Suruliandi, “Performance Analysis of Encryption Algorithms for Information Security”, in 2013 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2013]
Ashwak ALabaichi,Faudziah Ahmad and RamlanMahmod, “Security Analysis of Blowfish algorithm”, in ISBN: 978-1-4673-5256-7/13 ©2013 IEEE.
M.Anand Kumar and Dr.S.Karthikeyan, “Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms”, in I.J. Computer Network and Information Security, 2012, 2, 22-28.Published Online March 2012 in MECS.
PratapChnadraMandal,“ Superiority of Blowfish Algorithm”, in International Journal of Advanced Research in Computer Science and Software Engineering 2(9), September - 2012, pp. 196-201.
Yunfei Li, Qing Liu, Tong Li, “Design and Implementation of an Improved RSA Algorithm”, in 2010 International Conference on E-Health Networking, Digital Ecosystems and Technologies.
Xin Zhou,Xiaofei Tang, “Research and Implementation of RSA Algorithm for Encryption and Decryption”, in 2011 The 6th International Forum on Strategic Technology.
Suli Wang, Ganlai Liu, “File encryption and decryption system based on RSA algorithm ”, in 2011 International Conference on Computational and Information Sciences
HongjunWANGl, Zhiwen SONG2, XiaoyuNIUl, QunDINGl, “Key Generation Research of RSA Public Cryptosystem and Matlab Implement”, in 2013 International Conference on Sensor Network Security Technology and Privacy Communication System (SNS & PCS).
R Cramer, V Shoup., “Signature schemes based on the strong RSA assumption”, ACM Transactions on Information and System Security,Vol 3, No 3, pp 161-185.
Ming-Der Shieh, Jun-Hong Chen, “A new modular exponentiation architecture for efficient design of RSA cryptosystem”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2008.
ArashAkhlaghi,BadrinathJayakumar, Wa’elBelkasim, “CASSANDRA”.
JayeshKawli, “Apache Cassandra Distributed Database Management System”.
Peter Reiher, John Heidemann, David Ratner, GregSkinner, and Gerald Popek. Resolving _le conicts inthe _cus _le system. In USTC'94: Proceedings of theUSENIX Summer 1994 Technical Conference onUSENIX Summer 1994 Technical Conference, pages 12-12, Berkeley, CA, USA, 1994. USENIXAssociation.
MahadevSatyanarayanan, James J. Kistler, PuneetKumar, Maria E. Okasaki, Ellen H. Siegel, andDavid C. Steere. Coda: A highly available _le systemfor a distributed workstation environment. IEEETrans. Comput., 39(4):447-459, 1990.
AtulAdya, William J. Bolosky, Miguel Castro, GeraldCermak, Ronnie Chaiken, John R. Douceur, JonHowell, Jacob R. Lorch, Marvin Theimer, andRoger P. Wattenhofer. Farsite: Federated, available,and reliable storage for an incompletely trustedenvironment. In In Proceedings of the 5th Symposiumon Operating Systems Design and Implementation (OSDI, pages 1-14, 2002.
Sanjay Ghemawat, Howard Gobio_, and Shun-TakLeung. The google _le system. In SOSP '03:Proceedings of the nineteenth ACM symposium onOperating systems principles, pages 29-43, New York,NY, USA, 2003. ACM.
Mike Burrows. The chubby lock service forloosely-coupled distributed systems. In OSDI '06:Proceedings of the 7th symposium on Operatingsystems design and implementation, pages 335-350,Berkeley, CA, USA, 2006. USENIX Association.
B. Terry, M. M. Theimer, Karin Petersen, A. J.Demers, M. J. Spreitzer, and C. H. Hauser. Managingupdate conicts in bayou, a weakly connectedreplicated storage system. In SOSP '95: Proceedingsof the _fteenth ACM symposium on Operating systemsprinciples, pages 172-182, New York, NY, USA, 1995.ACM.
Giuseppe de Candia, DenizHastorun, MadanJampani, Gunavardhan Kakulapati, Alexilchin,SwaminathanSivasubramanian, Peter Vosshall, andWerner Vogels. Dynamo: amazon~Oshighly availablekey-value store. In Proceedings of twenty-_rst ACMSIGOPS symposium on Operating systems principles,pages 205-220. ACM, 2007.
Fay Chang, Je_rey Dean, Sanjay Ghemawat,Wilson C. Hsieh, Deborah A. Wallach, Mike Burrows,Tushar Chandra, Andrew Fikes, and Robert E.Gruber. Bigtable: A distributed storage system forstructured data. In In Proceedings of the 7thConference on USENIX Symposium on OperatingSystems Design and Implementation - Volume 7,pages 205-218, 2006.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.