Abstract
Mobile databases are gaining popularity as portable devices have become need based and common. One key aspect of these database systems is their ability to deal with disconnection. Many businesses today are no longer solely conducting business within the confines of their buildings. They have employees who travel, who work in different geographic areas, or occasionally work from home. Many organizations allow the mobile workers to carry their sensitive data outside the physical boundaries in order to increase the productivity and revenue. But when the device is not protected properly all the data stored in the device will be exposed to outsiders including competitors. So security for the database that resides in the mobile device is the major concern for such type of organizations. In order to secure the mobile database a secured architecture is proposed in this paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Singh, S.K.: Database Systems: Concepts, Design and Applications. Dorling Kindersley (India) Pvt. Ltd., New Delhi (2006)
Leung, A., Sheng, Y., Cruickshank, H.: The Security Challenges for Mobile Ubiquitous Services. Elsevier, Science Direct, Information Security Technical Report 12, pp. 162–171 (2007)
Lubinski, A.: Database Security meets Mobile Requirements. In: IEEE International Symposium on Database Technology and Software Engineering, pp. 445–450 (2000)
ftp://ftp.compaq.com/pub/solutions/WEF_MaximizingBusinessAgilityFlyer_4-01-03.pdf
Weider Yu, D., Amjad, T., Goel, H., Talawat, T.: An Approach of Mobile Database Design methodology for Mobile Software Solutions. In: The 3rd International Conference on Grid and Pervasive Computing - Workshops. IEEE, Los Alamitos (2008)
Connolly, T., Begg, C.: Database Systems: A Practical Approach to Design, Implementation and Management, 3rd edn. Dorling Kindersley (India) Pvt. Ltd., New Delhi (2002)
Diaa Salama Abdul, E., Kader, H.M.A., Hadhoud, M.M.: Performance Evaluation of Symmetric Encryption Algorithms. International Journal of Computer Science and Network Security 8(12) (2008)
Ravi, S., Raghunathan, A., Hattangady, S.: Security in Embedded Systems: Design Challenges. ACM Transactions on Embedded Computing Systems 3(3), 461–481 (2004)
Chandramouli, R., Bapatla, S., Subbalakshmi, K.P.: Battery Power-Aware Encryption. ACM Transactions on Information and System Security 9(2), 162–180 (2006)
Ruangchaijatupon, N., Krishnamurthy, P.: Encryption and Power Consumption in Wireless LANs. In: The Third IEEE Workshop on Wireless LANS (2001)
Han, J., Chang, H.-Y., Park, M.: EMCEM: An Efficient Multimedia Content Encryption scheme for mobile handheld devices. In: International Conference on Information Science and Security. IEEE, Los Alamitos (2008)
Weider Yu, D., Amjad, T., Goel, H., Talawat, T.: An Approach of Mobile Database Design methodology for Mobile Software Solutions. In: The 3rd International Conference on Grid and Pervasive Computing - Workshops. IEEE, Los Alamitos (2008)
Chan, D., John Roddick, F.: Summarisation for Mobile databases. Journal of Research and Practice in Information Technology 37(3), 267–284 (2005)
Li, Y., Zhang, X., Gao, Y.: Object-Oriented Data Synchronization for Mobile Database over Mobile Ad-hoc Networks. In: International Symposium on Information Science and Engineering. IEEE, Los Alamitos (2008)
Li, W., Yang, H., He, P.: The research and application of embedded mobile database. In: International Conference on Information Technology and Computer Science. IEEE Computer Society, Los Alamitos (2009)
Yun, Z., Mu, Z., Fuling, B.: A Tiered Replication Model in Embedded Database Based Mobile Geospatial Information Service. IEEE, Los Alamitos (2008)
Li, J., Wang, J.: A New Architecture Model of Mobile Database Based on Agent. In: First International Workshop on Database Technology and Applications. IEEE, Los Alamitos (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Roselin Selvarani, D. (2010). Secured Paradigm for Mobile Databases. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-14478-3_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14477-6
Online ISBN: 978-3-642-14478-3
eBook Packages: Computer ScienceComputer Science (R0)