Page 150 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 150

Information  Security and Privacy




                    Notes          For many businesses applications are using mobile by means of  enterprise data in a  mobile
                                   context, therefore using a mobile DBMS.
                                   To function on business data anytime and anywhere is the main goal pursued by rising mobility
                                   support in database circumstance. The confidentiality of mission- vital data must be assured,
                                   although most mobile  devices do  not  offer  secure surroundings  for  storage  of such  data.
                                   Security needs that apply to a central company database should apply likewise and in an suitable
                                   manner to the parts of the database simulated on mobile devices in the field. A mobile database
                                   security infrastructure is required to fulfill this goal.





                                     Notes  When producing such an infrastructure we can benefit from the results of customary
                                     database security  work. But  we also  require to  adapt  the  obtainable techniques  and
                                     approaches to the mobile context, and we require to develop new ones that attack certain
                                     concerns particular to use of database systems in a mobile surroundings.



                                     Did u know? With the new enhancements the business data of an enterprise can be made
                                     obtainable to an even larger number of users and a broader range of applications than
                                     before.
                                   Mobile work by means of mobile devices and wireless links figures out a row of problems
                                   regarding security concerns such as availability, integrity and responsibility. These needs appear
                                   for network components in addition to database systems. Mobile work involving mobile database
                                   access makes ever-present computing,  anywhere and anytime probable. The mobility needs
                                   appropriate hardware and software. Mobile devices such as handhelds connected through wireless
                                   networks  aid mobile users, particularly in connection with position penetrating tools.  New
                                   hazards and challenges for security and privacy appear in this environment. The objective is the
                                   defense of mobile users and their data. Security measures must consider the distribution of data
                                   and their heterogeneous treatment concerning security models. Limited mobile resources build
                                   insecure communication essential  to imitate  used data  and augment the risk  of limiting  or
                                   dismissing security measures.

                                   10.3.1 Mobile Conditions


                                   Mobile work is context-sensitive work with contexts illustrating environmental traits and the
                                   relationships among them. In Lubinski, 1998, the particular problems of database systems in
                                   such a mobile environment are illustrated in more detail manner. Now, we sum up the main
                                   mobile circumstances causing different threats. Applications and needed data are location reliant,
                                   but their  access  must  be location  see-through.  Determined  tasks  are  valid  on  particular
                                   whereabouts. The mobile infrastructure limits the obtainable volume and type of data and the
                                   data transfer. Context information figures out further which people and objects in the environment
                                   stay. Assisting mobile work includes offering access to interesting data at the suitable location,
                                   time and device, i.e. where and when the data are used depending on user aims, preferences,
                                   knowledge  and  skills.  For  this  point  we  need  different  information  about  the  current
                                   infrastructure, obtainable mobile resources, connectivity, costs and period of connections, and
                                   bandwidths. Mobile work is characterized by uncommon and momentary short connections to
                                   the fixed network (low connectivity) and by different access types. The mobile user accesses data
                                   that are also used by other users or itself on dissimilar locations and devices, correspondingly.
                                   The mobile context involves mobile work and communication attending meta data to support
                                   users. This meta-information is included in following parts of the mobile context:




          144                               LOVELY PROFESSIONAL UNIVERSITY
   145   146   147   148   149   150   151   152   153   154   155