Database Security Meets Mobile Requirements

نویسنده

  • Astrid Lubinski
چکیده

Mobile work including mobile devices and wireless links comprehends a row of problems concerning security issues like availability, conndentiality, and accountability. Mobile processed information in database systems are distributed, heterogeneous, and repli-cated. They are endangered by various threats based on user's mobility and restricted mobile resources of portable devices and wireless links. Since mobile circumstances can be very dynamic, standard protection mechanisms do not work very well in such an environment. This paper presents various possibilities of an adaptation in order to dynamically adjust security belonging to changing contexts and to consider characteristics of the data. The purpose is achieving both, suitable protection and saving mobile resources. 1 Mobile Database Security Mobile work using mobile devices and wireless links comprehends a row of problems concerning security issues like availability, conndentiality, integrity and accountability. These requirements occur for network components as well as database systems. Mobile work including mobile database access makes ubiquitous computing, anywhere and anytime possible. The mobility requires suitable hardware and software. Mobile devices like handhelds connected via wireless networks support mobile users, especially in connection with position searching tools. New risks and challenges for security and privacy occur in this environment. The goal is the protection of mobile users and their data. Security measures must take into account the distribution of data and their heterogeneous handling regarding to security models. Scarce mobile resources make insecure communication necessary to replicate used data and increase the risk of restricting or dismissing security measures. 1.1 Mobile Conditions Mobile work is context-sensitive work with contexts describing environmental characteristics and the relationships between them. In Lubinski, 1998], the special problems of database systems in such a mobile environment are described more detailed. In this section , we summarize the main mobile circumstances causing various threats. Applications and required data are location dependent, but their access must be location transparent. Determined tasks are applicable on special whereabouts. The mobile infrastructure

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Secure Real-Time Concurrency Control Protocol for Mobile Distributed Real-Time Databases

A class of security-critical applications with the requirements of timing constraints, such as wireless stock trading, power network scheduling, real-time traffic information management, etc., demand the support of mobile distributed real-time database systems. For the class of applications, mobile distributed realtime database systems must simultaneously satisfy two requirements in guaranteein...

متن کامل

Extending the Devices Profile for Web Services for Secure Mobile Device Communication

This paper describes a new security profile and propose a security architecture for the Devices Profile for Web Services (DPWS). DPWS defines a Web Service based architecture for networked embedded devices. A requirements analysis on given use cases in the field of in-vehicle-infotainment (IVI) systems showed that the original security profile of DPWS lacks of certain security issues. Thus, our...

متن کامل

An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...

متن کامل

Security services architecture for Secure Mobile Grid Systems

Mobile Grid, is a full inheritor of the Grid with the additional feature that it supports mobile users and resources. Security is an important aspect in Grid based systems, and it is more complex to ensure this in a mobile platform owing to the limitations of resources in these devices. A Grid infrastructure that supports the participation of mobile nodes and incorporates security aspects will ...

متن کامل

A Multi{level Secure Object-oriented Database Model

This model presents a multi-level secure (MLS) database using object-oriented technology. The model is based on, and extends the requirements of the Department of Defense 5200.28-STD, DoD Trusted Computer System Evaluation Criteria (TCSEC) dated December 1985, commonly known as the Orange Book. Currently, there does not exist a database model in any technology which meets the requirements of th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000