Open Access Open Access  Restricted Access Subscription or Fee Access

Enhancing Blowfish Cryptography Technique for Cassandra

Trupti Bhushan Bhosale, Girish Potdar


The popularity of Cassandra has been increasing day by day. Cassandra is a database management system designed to handle very large amounts of data spread out across many servers. Cassandra is used by number of companies such as Twitter, Mahalo, Facebook etc, to construct their Projects. Nodes on a peer –to- peer architecture can communicate freely and no authentication or encryption is provided. As increasingly sensitive data is being stored in Cassandra databases, hence database management and security issues are important and become growing concerns. This paper gives an overview of Cassandra and its features, the cryptography techniques RSA and Blowfish and ongoing research to monitor performance of Cassandra with encryption techniques. This survey analysis the performance of Cassandra when two encryption techniques RSA and Blowfish are used.


Cassandra, Blowfish Algorithm, RSA Algorithm

Full Text:



J. Guillory, J. Spiegel, M. Drislane, B. Weiss, W. Donner, and J. T. Hancock, “Security Issues in NoSQL Databases,” 2011 International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11.

PrashantMalik, AvinashLakshman, “Cassandra - a decentralized structured storage system,” in The 3rd ACM SIGOPS International Workshop on Large Scale Distributed Systems and Middleware (LADIS 09), October 2009.

Jan Sipke van der Veen, Bram van der Waaij , Robert J. Meijer, “Sensor Data Storage Performance: SQL or NoSQL, Physical or Virtual ,” 2012 IEEE Fifth International Conference on Cloud Computing.

PrasannaBagade, Ashish Chandra, and Aditya B.Dhende,“Designing Performance Monitoring Tool for NoSQLCassandra Distributed Database” in 2012 International Conference on Education and e-Learning Innovations .

Malik Sikander Hayat Khiyal, Aihab Khan, and KhansaShabbir,“Performance Evaluation of Encryption Techniques for Confidentiality of Very Large Databases” in International Journal of Computer Theory and Engineering, Vol. 3, No. 6, December 2011

S. Pavithra and Mrs. E. Ramadevi, “Performance Evaluation of Symmetric Algorithms”, in Journal of Global Research in Computer Science, 3 (8), August 2012, 43-45

A.Ramesh and .A.Suruliandi, “Performance Analysis of Encryption Algorithms for Information Security”, in 2013 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2013]

Ashwak ALabaichi,Faudziah Ahmad and RamlanMahmod, “Security Analysis of Blowfish algorithm”, in ISBN: 978-1-4673-5256-7/13 ©2013 IEEE.

M.Anand Kumar and Dr.S.Karthikeyan, “Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms”, in I.J. Computer Network and Information Security, 2012, 2, 22-28.Published Online March 2012 in MECS.

PratapChnadraMandal,“ Superiority of Blowfish Algorithm”, in International Journal of Advanced Research in Computer Science and Software Engineering 2(9), September - 2012, pp. 196-201.

Yunfei Li, Qing Liu, Tong Li, “Design and Implementation of an Improved RSA Algorithm”, in 2010 International Conference on E-Health Networking, Digital Ecosystems and Technologies.

Xin Zhou,Xiaofei Tang, “Research and Implementation of RSA Algorithm for Encryption and Decryption”, in 2011 The 6th International Forum on Strategic Technology.

Suli Wang, Ganlai Liu, “File encryption and decryption system based on RSA algorithm ”, in 2011 International Conference on Computational and Information Sciences

HongjunWANGl, Zhiwen SONG2, XiaoyuNIUl, QunDINGl, “Key Generation Research of RSA Public Cryptosystem and Matlab Implement”, in 2013 International Conference on Sensor Network Security Technology and Privacy Communication System (SNS & PCS).

R Cramer, V Shoup., “Signature schemes based on the strong RSA assumption”, ACM Transactions on Information and System Security,Vol 3, No 3, pp 161-185.

Ming-Der Shieh, Jun-Hong Chen, “A new modular exponentiation architecture for efficient design of RSA cryptosystem”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2008.

ArashAkhlaghi,BadrinathJayakumar, Wa’elBelkasim, “CASSANDRA”.

JayeshKawli, “Apache Cassandra Distributed Database Management System”.

Peter Reiher, John Heidemann, David Ratner, GregSkinner, and Gerald Popek. Resolving _le conicts inthe _cus _le system. In USTC'94: Proceedings of theUSENIX Summer 1994 Technical Conference onUSENIX Summer 1994 Technical Conference, pages 12-12, Berkeley, CA, USA, 1994. USENIXAssociation.

MahadevSatyanarayanan, James J. Kistler, PuneetKumar, Maria E. Okasaki, Ellen H. Siegel, andDavid C. Steere. Coda: A highly available _le systemfor a distributed workstation environment. IEEETrans. Comput., 39(4):447-459, 1990.

AtulAdya, William J. Bolosky, Miguel Castro, GeraldCermak, Ronnie Chaiken, John R. Douceur, JonHowell, Jacob R. Lorch, Marvin Theimer, andRoger P. Wattenhofer. Farsite: Federated, available,and reliable storage for an incompletely trustedenvironment. In In Proceedings of the 5th Symposiumon Operating Systems Design and Implementation (OSDI, pages 1-14, 2002.

Sanjay Ghemawat, Howard Gobio_, and Shun-TakLeung. The google _le system. In SOSP '03:Proceedings of the nineteenth ACM symposium onOperating systems principles, pages 29-43, New York,NY, USA, 2003. ACM.

Mike Burrows. The chubby lock service forloosely-coupled distributed systems. In OSDI '06:Proceedings of the 7th symposium on Operatingsystems design and implementation, pages 335-350,Berkeley, CA, USA, 2006. USENIX Association.

B. Terry, M. M. Theimer, Karin Petersen, A. J.Demers, M. J. Spreitzer, and C. H. Hauser. Managingupdate conicts in bayou, a weakly connectedreplicated storage system. In SOSP '95: Proceedingsof the _fteenth ACM symposium on Operating systemsprinciples, pages 172-182, New York, NY, USA, 1995.ACM.

Giuseppe de Candia, DenizHastorun, MadanJampani, Gunavardhan Kakulapati, Alexilchin,SwaminathanSivasubramanian, Peter Vosshall, andWerner Vogels. Dynamo: amazon~Oshighly availablekey-value store. In Proceedings of twenty-_rst ACMSIGOPS symposium on Operating systems principles,pages 205-220. ACM, 2007.

Fay Chang, Je_rey Dean, Sanjay Ghemawat,Wilson C. Hsieh, Deborah A. Wallach, Mike Burrows,Tushar Chandra, Andrew Fikes, and Robert E.Gruber. Bigtable: A distributed storage system forstructured data. In In Proceedings of the 7thConference on USENIX Symposium on OperatingSystems Design and Implementation - Volume 7,pages 205-218, 2006.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.