Page 150 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 150
Information Security and Privacy
Notes For many businesses applications are using mobile by means of enterprise data in a mobile
context, therefore using a mobile DBMS.
To function on business data anytime and anywhere is the main goal pursued by rising mobility
support in database circumstance. The confidentiality of mission- vital data must be assured,
although most mobile devices do not offer secure surroundings for storage of such data.
Security needs that apply to a central company database should apply likewise and in an suitable
manner to the parts of the database simulated on mobile devices in the field. A mobile database
security infrastructure is required to fulfill this goal.
Notes When producing such an infrastructure we can benefit from the results of customary
database security work. But we also require to adapt the obtainable techniques and
approaches to the mobile context, and we require to develop new ones that attack certain
concerns particular to use of database systems in a mobile surroundings.
Did u know? With the new enhancements the business data of an enterprise can be made
obtainable to an even larger number of users and a broader range of applications than
before.
Mobile work by means of mobile devices and wireless links figures out a row of problems
regarding security concerns such as availability, integrity and responsibility. These needs appear
for network components in addition to database systems. Mobile work involving mobile database
access makes ever-present computing, anywhere and anytime probable. The mobility needs
appropriate hardware and software. Mobile devices such as handhelds connected through wireless
networks aid mobile users, particularly in connection with position penetrating tools. New
hazards and challenges for security and privacy appear in this environment. The objective is the
defense of mobile users and their data. Security measures must consider the distribution of data
and their heterogeneous treatment concerning security models. Limited mobile resources build
insecure communication essential to imitate used data and augment the risk of limiting or
dismissing security measures.
10.3.1 Mobile Conditions
Mobile work is context-sensitive work with contexts illustrating environmental traits and the
relationships among them. In Lubinski, 1998, the particular problems of database systems in
such a mobile environment are illustrated in more detail manner. Now, we sum up the main
mobile circumstances causing different threats. Applications and needed data are location reliant,
but their access must be location see-through. Determined tasks are valid on particular
whereabouts. The mobile infrastructure limits the obtainable volume and type of data and the
data transfer. Context information figures out further which people and objects in the environment
stay. Assisting mobile work includes offering access to interesting data at the suitable location,
time and device, i.e. where and when the data are used depending on user aims, preferences,
knowledge and skills. For this point we need different information about the current
infrastructure, obtainable mobile resources, connectivity, costs and period of connections, and
bandwidths. Mobile work is characterized by uncommon and momentary short connections to
the fixed network (low connectivity) and by different access types. The mobile user accesses data
that are also used by other users or itself on dissimilar locations and devices, correspondingly.
The mobile context involves mobile work and communication attending meta data to support
users. This meta-information is included in following parts of the mobile context:
144 LOVELY PROFESSIONAL UNIVERSITY