Skip to main content

Secured Paradigm for Mobile Databases

  • Conference paper
Recent Trends in Network Security and Applications (CNSA 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 89))

Included in the following conference series:

  • 3480 Accesses

Abstract

Mobile databases are gaining popularity as portable devices have become need based and common. One key aspect of these database systems is their ability to deal with disconnection. Many businesses today are no longer solely conducting business within the confines of their buildings. They have employees who travel, who work in different geographic areas, or occasionally work from home. Many organizations allow the mobile workers to carry their sensitive data outside the physical boundaries in order to increase the productivity and revenue. But when the device is not protected properly all the data stored in the device will be exposed to outsiders including competitors. So security for the database that resides in the mobile device is the major concern for such type of organizations. In order to secure the mobile database a secured architecture is proposed in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Singh, S.K.: Database Systems: Concepts, Design and Applications. Dorling Kindersley (India) Pvt. Ltd., New Delhi (2006)

    Google Scholar 

  2. Leung, A., Sheng, Y., Cruickshank, H.: The Security Challenges for Mobile Ubiquitous Services. Elsevier, Science Direct, Information Security Technical Report 12, pp. 162–171 (2007)

    Google Scholar 

  3. Lubinski, A.: Database Security meets Mobile Requirements. In: IEEE International Symposium on Database Technology and Software Engineering, pp. 445–450 (2000)

    Google Scholar 

  4. ftp://ftp.compaq.com/pub/solutions/WEF_MaximizingBusinessAgilityFlyer_4-01-03.pdf

  5. Weider Yu, D., Amjad, T., Goel, H., Talawat, T.: An Approach of Mobile Database Design methodology for Mobile Software Solutions. In: The 3rd International Conference on Grid and Pervasive Computing - Workshops. IEEE, Los Alamitos (2008)

    Google Scholar 

  6. Connolly, T., Begg, C.: Database Systems: A Practical Approach to Design, Implementation and Management, 3rd edn. Dorling Kindersley (India) Pvt. Ltd., New Delhi (2002)

    Google Scholar 

  7. http://EzineArticles.com/?expert=Eric_Giguere

  8. Diaa Salama Abdul, E., Kader, H.M.A., Hadhoud, M.M.: Performance Evaluation of Symmetric Encryption Algorithms. International Journal of Computer Science and Network Security 8(12) (2008)

    Google Scholar 

  9. Ravi, S., Raghunathan, A., Hattangady, S.: Security in Embedded Systems: Design Challenges. ACM Transactions on Embedded Computing Systems 3(3), 461–481 (2004)

    Article  Google Scholar 

  10. Chandramouli, R., Bapatla, S., Subbalakshmi, K.P.: Battery Power-Aware Encryption. ACM Transactions on Information and System Security 9(2), 162–180 (2006)

    Article  Google Scholar 

  11. Ruangchaijatupon, N., Krishnamurthy, P.: Encryption and Power Consumption in Wireless LANs. In: The Third IEEE Workshop on Wireless LANS (2001)

    Google Scholar 

  12. Han, J., Chang, H.-Y., Park, M.: EMCEM: An Efficient Multimedia Content Encryption scheme for mobile handheld devices. In: International Conference on Information Science and Security. IEEE, Los Alamitos (2008)

    Google Scholar 

  13. Weider Yu, D., Amjad, T., Goel, H., Talawat, T.: An Approach of Mobile Database Design methodology for Mobile Software Solutions. In: The 3rd International Conference on Grid and Pervasive Computing - Workshops. IEEE, Los Alamitos (2008)

    Google Scholar 

  14. Chan, D., John Roddick, F.: Summarisation for Mobile databases. Journal of Research and Practice in Information Technology 37(3), 267–284 (2005)

    Google Scholar 

  15. Li, Y., Zhang, X., Gao, Y.: Object-Oriented Data Synchronization for Mobile Database over Mobile Ad-hoc Networks. In: International Symposium on Information Science and Engineering. IEEE, Los Alamitos (2008)

    Google Scholar 

  16. Li, W., Yang, H., He, P.: The research and application of embedded mobile database. In: International Conference on Information Technology and Computer Science. IEEE Computer Society, Los Alamitos (2009)

    Google Scholar 

  17. Yun, Z., Mu, Z., Fuling, B.: A Tiered Replication Model in Embedded Database Based Mobile Geospatial Information Service. IEEE, Los Alamitos (2008)

    Google Scholar 

  18. Li, J., Wang, J.: A New Architecture Model of Mobile Database Based on Agent. In: First International Workshop on Database Technology and Applications. IEEE, Los Alamitos (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Roselin Selvarani, D. (2010). Secured Paradigm for Mobile Databases. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14478-3_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14477-6

  • Online ISBN: 978-3-642-14478-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics