Security in Mobile Database
Systems
Submitted by – ANURAG GUPTA
INDEX
 The Importance of Database
 Modern Database System
 Mobile Database
 Components of a Mobile Database
 PO & MM
 Mobile Database System Market Share
 Security in Mobile Database System
The importance of databases in modern businesses and
governmental institutions is huge and still growing. Many mission-
critical applications and business processes rely on databases.
These databases contain data of different degree of importance
and confidentiality, and are accessed by a wide variety of users.
Traditional database security provides techniques and strategies to
handle such problems with respect to database servers in a non-
mobile context.
With the rise in popularity of smartphones For many businesses
applications are going mobile that means using enterprise data in a
mobile context, thus using a mobile DBMS. With these new
developments the business data of an enterprise can be made
available to an even larger number of users and a wider range of
applications than before.
A mobile database is a database that can be connected to by a
mobile computing device over a mobile network. The client and
server have wireless connections. A cache is maintained to hold
frequent data and tractions so that they are not lost due to
connection failure.
 Corporate database server and DBMS that deals with and stores
the corporate data and provides corporate applications
 Remote database and DBMS usually manages and stores the
mobile data and provides mobile applications
 mobile database platform that includes a laptop, PDA, or other
Internet access devices
 Two-way communication links between the corporate and
mobile DBMS
DBMS’s for mobile device should be dedicated to optimizing at least one of the
following, preferably both: Power optimization & Memory Management
POWER OPTIMIZATION
• Mobile devices such as laptops, cell phones, PDA’s, and radios have a limited
power supply.
• So we needed to optimize our DBMS to use as few resources as possible
while providing the necessary functionality
MEMORY MANAGEMENT
• Memory is an important criteria as far as mobile database systems are
concerned.
• It is important to decide how much of the devices internal memory should
be dedicated to the DB
 Sybase SQL Anywhere dominates the mobile database field with
over 68%.
 IBM’s DB2 Everyplace is second market share holder.
 Third place is shared by Microsoft’s SQL Server Compact and
Oracle9i Lite.
 Apple’s IOs use DataGlass mobile database by Empathic.
The security-related techniques that are applied in the Mobile
Database Application:
1. Secure Network Connection
2. Encrypted Local Database
3. Authentication at the Web Server
4. Application provided Security
5. Client-Side Data Encryption
1. Secure Network Connection
The mobile database and the central database have to be
synchronized at specific times. The synchronization is
implemented in the system software of the mobile
database and is performed over the http protocol.
2. Encrypted Local Database
The local database on the mobile device is encrypted and each
time the user opens the mobile database, he has to enter his
password. In case the mobile device is stolen or violated by an
intruder, the data that is stored on the local database is not
readable.
3. Authentication at the Web Server
The communication between the mobile database and the
central database is performed over https. At the server side
the communication link is handled by a web server. Hence, it
is possible to take advantage of standard web server
authentication and require the user to authenticate at the
web interface level. This requirement is very important since
it provides protection for the mobile database agent that is
executed at the server side within the web server.
4. Application provided Security
For authoring operations, each user has access only to his own
data. A set of database triggers implemented in the database
server, check that the data manipulation operations of the
user are valid.
5. Client-Side Data Encryption
it very important for secure mobile database applications and
more generally for secure database applications. The user
gives a password to the client application and all his critical
data is encrypted at the client-side before it is permanently
stored in the database. This encryption guarantees the
confidentiality of the data against any database user
including the local database administrators.
P01 | Security in Mobile Database System | Anurag Gupta | BCA
P01 | Security in Mobile Database System | Anurag Gupta | BCA

P01 | Security in Mobile Database System | Anurag Gupta | BCA

  • 1.
    Security in MobileDatabase Systems Submitted by – ANURAG GUPTA
  • 2.
    INDEX  The Importanceof Database  Modern Database System  Mobile Database  Components of a Mobile Database  PO & MM  Mobile Database System Market Share  Security in Mobile Database System
  • 3.
    The importance ofdatabases in modern businesses and governmental institutions is huge and still growing. Many mission- critical applications and business processes rely on databases. These databases contain data of different degree of importance and confidentiality, and are accessed by a wide variety of users.
  • 4.
    Traditional database securityprovides techniques and strategies to handle such problems with respect to database servers in a non- mobile context. With the rise in popularity of smartphones For many businesses applications are going mobile that means using enterprise data in a mobile context, thus using a mobile DBMS. With these new developments the business data of an enterprise can be made available to an even larger number of users and a wider range of applications than before.
  • 6.
    A mobile databaseis a database that can be connected to by a mobile computing device over a mobile network. The client and server have wireless connections. A cache is maintained to hold frequent data and tractions so that they are not lost due to connection failure.
  • 7.
     Corporate databaseserver and DBMS that deals with and stores the corporate data and provides corporate applications  Remote database and DBMS usually manages and stores the mobile data and provides mobile applications  mobile database platform that includes a laptop, PDA, or other Internet access devices  Two-way communication links between the corporate and mobile DBMS
  • 8.
    DBMS’s for mobiledevice should be dedicated to optimizing at least one of the following, preferably both: Power optimization & Memory Management POWER OPTIMIZATION • Mobile devices such as laptops, cell phones, PDA’s, and radios have a limited power supply. • So we needed to optimize our DBMS to use as few resources as possible while providing the necessary functionality MEMORY MANAGEMENT • Memory is an important criteria as far as mobile database systems are concerned. • It is important to decide how much of the devices internal memory should be dedicated to the DB
  • 10.
     Sybase SQLAnywhere dominates the mobile database field with over 68%.  IBM’s DB2 Everyplace is second market share holder.  Third place is shared by Microsoft’s SQL Server Compact and Oracle9i Lite.  Apple’s IOs use DataGlass mobile database by Empathic.
  • 11.
    The security-related techniquesthat are applied in the Mobile Database Application: 1. Secure Network Connection 2. Encrypted Local Database 3. Authentication at the Web Server 4. Application provided Security 5. Client-Side Data Encryption
  • 12.
    1. Secure NetworkConnection The mobile database and the central database have to be synchronized at specific times. The synchronization is implemented in the system software of the mobile database and is performed over the http protocol.
  • 13.
    2. Encrypted LocalDatabase The local database on the mobile device is encrypted and each time the user opens the mobile database, he has to enter his password. In case the mobile device is stolen or violated by an intruder, the data that is stored on the local database is not readable.
  • 14.
    3. Authentication atthe Web Server The communication between the mobile database and the central database is performed over https. At the server side the communication link is handled by a web server. Hence, it is possible to take advantage of standard web server authentication and require the user to authenticate at the web interface level. This requirement is very important since it provides protection for the mobile database agent that is executed at the server side within the web server.
  • 16.
    4. Application providedSecurity For authoring operations, each user has access only to his own data. A set of database triggers implemented in the database server, check that the data manipulation operations of the user are valid.
  • 17.
    5. Client-Side DataEncryption it very important for secure mobile database applications and more generally for secure database applications. The user gives a password to the client application and all his critical data is encrypted at the client-side before it is permanently stored in the database. This encryption guarantees the confidentiality of the data against any database user including the local database administrators.