Page 149 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 149

Unit 10: Databases Security




          10.3 Mobile Databases Security                                                        Notes

          A mobile database is said to be a database that can be associated to by a mobile computing
          device over a mobile network .The client and server contain wireless connections. A cache is
          sustained to hold recurrent data and transactions so that they are not lost because of connection
          failure. A database is a structured manner to organize  information. This  could be  a list of
          contacts, price information or distance travelled. The utilization of laptops, mobiles and PDAs is
          growing and possible to augment in the future with progressively more applications locating in
          the mobile systems. While those similar analysts can’t tell us precisely which applications will
          be the most well-liked, it is obvious that a large percentage will need the use of a database of
          some class. Many applications like databases would need the ability to download information
          from an information storehouse and function on this information even when out of range or
          detached.


                 Example: An example of this is a mobile workforce. Here user would need to access and
          modernize information from files in the home directories on a server or customer proceedings
          from a database. This sort of access and work load produced by such users is dissimilar from the
          traditional workloads observed in client–server systems of today.
          With the arrival of mobile databases, now users can load up their smart phones or PDAs with
          mobile databases to substitute mission-critical data distantly without distressing  regarding
          time or distance. Mobile databases allow employees to enter data on the fly. Information can be
          harmonized with a server database later on.
          With the growth in popularity of smartphones has come an increasing requirement to secure
          them. As their introduction mobile phones have becoming risingly smaller, more strong with
          rising storage potential and have remained costly items. With the rise of their popularity so has
          the requirement to protect the devices from theft in addition to traditional threats that effect
          computers like malware and the requirement to back and protect the data on the devices.

          Database security is also an expertise within the broader discipline of   computer security. For
          many businesses applications are going mobile that signifies using enterprise data in mobile
          context, therefore using a mobile DBMS. With these new enhancements the business data of an
          enterprise can be made obtainable to an even larger number of users and a broader range of
          applications than before. To function on business data anytime and anywhere is the  major
          objective pursued by developing mobility assistance in database context. The confidentiality of
          mission-critical data must be assured, although most mobile devices  do not offer a secure
          surroundings for storage of such data. Security needs that apply to a central company database
          should apply identically and in a proper manner to the parts of the  database replicated on
          mobile devices in the field. A mobile database security infrastructure is required to fulfill this
          goal.  When producing such an infrastructure, we can benefit from the consequences of traditional
          database security work. But we also require to adapt the current techniques and approaches to
          the mobile context, and we require to produce new ones that attack some issues particular to use
          of database systems in mobile environment.
          The need of databases in contemporary businesses and governmental institutions is enormous
          and  still  mounting. Many mission-critical applications  and  business processes  depend  on
          databases. These databases enclose data of different amount of significance and discretion, and
          are used by a broad variety of users. Integrity violations for a database can have severe impact
          on  business processes;  revelation of confidential data  in some  cases has the similar effect.
          Traditional database security offers techniques and approaches to manage such problems with
          respect to database servers in a non-mobile context.






                                           LOVELY PROFESSIONAL UNIVERSITY                                   143
   144   145   146   147   148   149   150   151   152   153   154