Secure access schemes in mobile database systems
نویسندگان
چکیده
Mobile computing is a newly emerging computing paradigm. Whether using the term mobile database system or some other form, the database concept is essential to the mobile computing environment. This work employs a more thorough yet general means of defining the mobile database system, along with several application scenarios. Possible secure access schemes are also presented for databases in a mobile computing environment. The tradeoffs of these schemes are also analyzed. Moreover, the feasibility of applying some possible secure access methods is explored, along with the potential difficulties and unresolved issues. Finally, concluding remarks and recommendations for future works are made.
منابع مشابه
DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملA Secure Real-Time Concurrency Control Protocol for Mobile Distributed Real-Time Databases
A class of security-critical applications with the requirements of timing constraints, such as wireless stock trading, power network scheduling, real-time traffic information management, etc., demand the support of mobile distributed real-time database systems. For the class of applications, mobile distributed realtime database systems must simultaneously satisfy two requirements in guaranteein...
متن کاملAlternative Schemes for Dynamic Secure VPN Deployment in UMTS
Three alternative schemes for secure Virtual Private Network (VPN) deployment over the Universal Mobile Telecommunication System (UMTS) are proposed and analyzed. The proposed schemes enable a mobile node to voluntarily establish an IPsec-based secure channel to a private network. The alternative schemes differ in the location where the IPsec functionality is placed within the UMTS network arch...
متن کاملData Protection in the Cloud - The MimoSecco Approach
Cloud Computing is a technology with vast impact on IT systems. Costs can be significantly reduced through on-demand purchase of CPU time, memory and storage, offering high flexibility. The main reason to avoid cloud technology still is security. This leads to a lack of trust in cloud services. Most cloud providers secure their systems only against external adversaries by using firewalls and se...
متن کاملSecure hierarchy-based access control in distributed environments
Access control is a fundamental concern in any system that manages resources, e.g., operating systems, file systems, databases and communications systems. The problem we address is how to specify, enforce, and implement access control in distributed environments. Starting from an access relation between users and resources, we derive a user hierarchy, a resource hierarchy, and a unified hierarc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- European Transactions on Telecommunications
دوره 12 شماره
صفحات -
تاریخ انتشار 2001