Securing Distributed Database Using Elongated RSA Algorithm

Author(s):  
Sangeetha Radhakrishnan ◽  
A. Akila
2021 ◽  
Vol 13 (5) ◽  
pp. 17-26
Author(s):  
Piotr Pospiech ◽  
Aleksander Marianski ◽  
Michal Kedziora

The paper focuses onintroducing a decentralized e-voting scheme that uses blockchain to achieve security and anonymity. A blockchain network based on Ethereum was applied, to provide a decentralized and distributed database based on the Peer-to-Peer architecture. During the implementation, smart contractswere used. Thanks to this, it is possible to code the terms of the contract required to perform the transaction. The proof-of-conceptimplementation uses the blind signature protocol and encryption with the RSA algorithm. Presented in this paper scheme for blockchain decentralized voting is fully implemented and potential issues are analyzed and discussed.


2021 ◽  
Author(s):  
Piotr Pospiech ◽  
Aleksander Marianski ◽  
Michal Kedziora

The paper presents decentralized voting scheme for verified users while maintaining their anonymity. A blockchain network was applied, which is a decentralized and distributed database based on the Peer-to-Peer architecture. During the implementation, the Ethereum network was used. Thanks to this, it is possible to code the terms of the contract required to perform the transaction. Ethereum and the use of smart contracts were also discussed in paper. The implementation uses the blind signature protocol by David Chaum and encryption with the Rivest-Shamir-Adleman (RSA) algorithm. Presented in this paper scheme for blockchain decentralized voting for verified users with focus on anonymity is then fully implemented and identified potential issues are analysed and discussed.


2006 ◽  
Vol 65 (3) ◽  
pp. 261-269
Author(s):  
A. A. Burushkin ◽  
V. G. Gerasimenko ◽  
S. A. Golovin ◽  
S. V. Zhilinskii

Author(s):  
Ali Saleh Al Najjar

Absolute protection is a difficult issue to maintain the confidentiality of images through their transmission over open channels such as internet or networks and is a major concern in the media, so image Cryptography becomes an area of attraction and interest of research in the field of information security. The paper will offer proposed system that provides a special kinds of image Encryption image security, Cryptography using RSA algorithm for encrypted images by HEX function to extract HEX Code and using RSA public key algorithm, to generate cipher image text. This approach provides high security and it will be suitable for secured transmission of images over the networks or Internet.


2014 ◽  
Vol 13 (9) ◽  
pp. 4859-4867
Author(s):  
Khaled Saleh Maabreh

Distributed database management systems manage a huge amount of data as well as large and increasingly growing number of users through different types of queries. Therefore, efficient methods for accessing these data volumes will be required to provide a high and an acceptable level of system performance.  Data in these systems are varying in terms of types from texts to images, audios and videos that must be available through an optimized level of replication. Distributed database systems have many parameters like data distribution degree, operation mode and the number of sites and replication. These parameters have played a major role in any performance evaluation study. This paper investigates the main parameters that may affect the system performance, which may help with configuring the distributed database system for enhancing the overall system performance.


2001 ◽  
Author(s):  
Val Tannen ◽  
Peter Buneman ◽  
Susan Davidson
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document