2. Introduction
The purpose of this document is to provide information
to users and organizations on the security capabilities of
Worldwide Interoperability for mobile database system and
provide recommendations on securing mobile database
technologies effectively to users and organizations
employing them.
In the existing research, there is lack of integrated
presentation of solutions to all the security issues of mobile
database system, which is important for researchers and
developers of mobile database.
3. new First, security issues divided to four fields that they are
important from many aspects.
Mobile device, operating system on mobile device, mobile
database and mobile tork are four fields that we will discuss
security issues.
4. History
A mobile database is a database that can be connected to
by a mobile computingdevice over a mobile network. The
client and server have wireless connections. A cacheis
maintained to hold frequent data and transactions so that
they are not lost due connection failure
An example of this is a mobile workforce. In this scenario
user would require to access and update information from
files in the home directories on a server or customer
records from a database.
5. Need for mobile Databases
•users must be able to work without a wireless connection due to poor or
even non-existent connections.
•Applications must provide significant interactivity.
•Applications must be able to access local device/vehicle hardware, such a
printers, bar code scanners, or GPS units (for mapping or
Automatic Vehicle Location systems).
•Bandwidth must be conserved (a common requirement on wireless netwo
that charge per megabyte or data transferred).
•Users don't require access to truly live data, only recently modified data.
•Limited life of power supply(battery)
•The changing topology of network
6. Working process
• For any mobile architecture, things to be considered are:
• Users are not attached to a fixed geographical location
• Mobile computing devices: low-power, low-cost, portable
• Wireless networks
• Mobile computing constraints
7.
8. • Three parties
Mobile databases typically involve three parties:
1.fixed hosts
2.mobile units
3.base stations
9. Advantages & Disadvantages
1)Security of mobile device.
2)security of operating system on mobile device.
3)security of mobile database and security of mobile network.
4)security vulnerabilities on mobile database and try to apply
appropriate technique to decrease side affect for mobile database
security.
11. Conclusion
Distributed Database Security is integral to the design and
function of a distributed database. There are three important
pieces to Distributed database security; Physical, User, and
Network. These pieces work in conjunction with policies
standards, and procedures. Policies are directions that support
a goal.
Solutions described above must be applied to a distributed
database on a goal. Also, human factor and traits should not be
ignored in this system. Because, a user as who one uses this
system, would be considered as an effective factor for security.