Mobile Database Security Threats By N.Avani(08Q61A0584)
Introduction The purpose of this document is to provide information to users and organizations on the security capabilities of Worldwide Interoperability for mobile database system and provide recommendations on securing mobile database technologies effectively to users and organizations employing them. In the existing research, there is lack of integrated presentation of solutions to all the security issues of mobile database system, which is important for researchers and developers of mobile database.
new First, security issues divided to four fields that they areimportant from many aspects. Mobile device, operating system on mobile device, mobiledatabase and mobile tork are four fields that we will discusssecurity issues.
History A mobile database is a database that can be connected toby a mobile computingdevice over a mobile network. Theclient and server have wireless connections. A cacheismaintained to hold frequent data and transactions so that they are not lost due connection failure An example of this is a mobile workforce. In this scenariouser would require to access and update information fromfiles in the home directories on a server or customerrecords from a database.
Need for mobile Databases•users must be able to work without a wireless connection due to poor or even non-existent connections.•Applications must provide significant interactivity.•Applications must be able to access local device/vehicle hardware, such aprinters, bar code scanners, or GPS units (for mapping or Automatic Vehicle Location systems).•Bandwidth must be conserved (a common requirement on wireless netwo that charge per megabyte or data transferred).•Users dont require access to truly live data, only recently modified data.•Limited life of power supply(battery)•The changing topology of network
Working process• For any mobile architecture, things to be considered are:• Users are not attached to a fixed geographical location• Mobile computing devices: low-power, low-cost, portable• Wireless networks• Mobile computing constraints
• Three partiesMobile databases typically involve three parties:1.fixed hosts2.mobile units3.base stations
Advantages & Disadvantages1)Security of mobile device.2)security of operating system on mobile device.3)security of mobile database and security of mobile network.4)security vulnerabilities on mobile database and try to applyappropriate technique to decrease side affect for mobile databasesecurity.
Disadvantages1)Device corruption2)Malicious software or viruses on mobile devices
ConclusionDistributed Database Security is integral to the design andfunction of a distributed database. There are three importantpieces to Distributed database security; Physical, User, andNetwork. These pieces work in conjunction with policiesstandards, and procedures. Policies are directions that supporta goal.Solutions described above must be applied to a distributeddatabase on a goal. Also, human factor and traits should not beignored in this system. Because, a user as who one uses thissystem, would be considered as an effective factor for security.