SlideShare a Scribd company logo
Security in Mobile Database
Systems
Submitted by – ANURAG GUPTA
INDEX
 The Importance of Database
 Modern Database System
 Mobile Database
 Components of a Mobile Database
 PO & MM
 Mobile Database System Market Share
 Security in Mobile Database System
The importance of databases in modern businesses and
governmental institutions is huge and still growing. Many mission-
critical applications and business processes rely on databases.
These databases contain data of different degree of importance
and confidentiality, and are accessed by a wide variety of users.
Traditional database security provides techniques and strategies to
handle such problems with respect to database servers in a non-
mobile context.
With the rise in popularity of smartphones For many businesses
applications are going mobile that means using enterprise data in a
mobile context, thus using a mobile DBMS. With these new
developments the business data of an enterprise can be made
available to an even larger number of users and a wider range of
applications than before.
P01 | Security in Mobile Database System | Anurag Gupta | BCA
A mobile database is a database that can be connected to by a
mobile computing device over a mobile network. The client and
server have wireless connections. A cache is maintained to hold
frequent data and tractions so that they are not lost due to
connection failure.
 Corporate database server and DBMS that deals with and stores
the corporate data and provides corporate applications
 Remote database and DBMS usually manages and stores the
mobile data and provides mobile applications
 mobile database platform that includes a laptop, PDA, or other
Internet access devices
 Two-way communication links between the corporate and
mobile DBMS
DBMS’s for mobile device should be dedicated to optimizing at least one of the
following, preferably both: Power optimization & Memory Management
POWER OPTIMIZATION
• Mobile devices such as laptops, cell phones, PDA’s, and radios have a limited
power supply.
• So we needed to optimize our DBMS to use as few resources as possible
while providing the necessary functionality
MEMORY MANAGEMENT
• Memory is an important criteria as far as mobile database systems are
concerned.
• It is important to decide how much of the devices internal memory should
be dedicated to the DB
P01 | Security in Mobile Database System | Anurag Gupta | BCA
 Sybase SQL Anywhere dominates the mobile database field with
over 68%.
 IBM’s DB2 Everyplace is second market share holder.
 Third place is shared by Microsoft’s SQL Server Compact and
Oracle9i Lite.
 Apple’s IOs use DataGlass mobile database by Empathic.
The security-related techniques that are applied in the Mobile
Database Application:
1. Secure Network Connection
2. Encrypted Local Database
3. Authentication at the Web Server
4. Application provided Security
5. Client-Side Data Encryption
1. Secure Network Connection
The mobile database and the central database have to be
synchronized at specific times. The synchronization is
implemented in the system software of the mobile
database and is performed over the http protocol.
2. Encrypted Local Database
The local database on the mobile device is encrypted and each
time the user opens the mobile database, he has to enter his
password. In case the mobile device is stolen or violated by an
intruder, the data that is stored on the local database is not
readable.
3. Authentication at the Web Server
The communication between the mobile database and the
central database is performed over https. At the server side
the communication link is handled by a web server. Hence, it
is possible to take advantage of standard web server
authentication and require the user to authenticate at the
web interface level. This requirement is very important since
it provides protection for the mobile database agent that is
executed at the server side within the web server.
P01 | Security in Mobile Database System | Anurag Gupta | BCA
4. Application provided Security
For authoring operations, each user has access only to his own
data. A set of database triggers implemented in the database
server, check that the data manipulation operations of the
user are valid.
5. Client-Side Data Encryption
it very important for secure mobile database applications and
more generally for secure database applications. The user
gives a password to the client application and all his critical
data is encrypted at the client-side before it is permanently
stored in the database. This encryption guarantees the
confidentiality of the data against any database user
including the local database administrators.
P01 | Security in Mobile Database System | Anurag Gupta | BCA
P01 | Security in Mobile Database System | Anurag Gupta | BCA

More Related Content

PPT
Lecture 4 mobile database system
PPTX
Literature Survey on Mobile Database Tools
PPT
Mobile / Nomadic Databse
PPT
Mobile Database ,alrazgi
PPTX
Mobile databases
PPTX
Mobile Database and Service Oriented Architecture
PDF
Mobile databases
PPTX
Technical Comptency_ppt
Lecture 4 mobile database system
Literature Survey on Mobile Database Tools
Mobile / Nomadic Databse
Mobile Database ,alrazgi
Mobile databases
Mobile Database and Service Oriented Architecture
Mobile databases
Technical Comptency_ppt

What's hot (20)

PDF
Collation of Mobile operatives
PDF
Sdn whitepaper
PPTX
IT infrastructure and platforms
PDF
Informix warehouse accelerator update
PPTX
Blue Central and the world of End User Computing
DOC
Mobile agents in a distributed multimedia dabase system(synopsis)
PPT
IT Infrastructure and Platforms
PDF
Visualizing Your Network Health
PDF
Visualizing your Network Health
PPS
MIS - IT Infrastructure (Part I)
PPTX
Knowledge on IT Infrastructure
DOCX
Case4 lego embracing change by combining bi with flexible information system 2
PDF
IT Inftractructures - Evolution of IT Inftractructure
PPTX
Case study 9
PPTX
MOBILE CLOUD COMPUTING: ISSUE AND OPPORTUNITIES IN LIBRARIES
PDF
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
Collation of Mobile operatives
Sdn whitepaper
IT infrastructure and platforms
Informix warehouse accelerator update
Blue Central and the world of End User Computing
Mobile agents in a distributed multimedia dabase system(synopsis)
IT Infrastructure and Platforms
Visualizing Your Network Health
Visualizing your Network Health
MIS - IT Infrastructure (Part I)
Knowledge on IT Infrastructure
Case4 lego embracing change by combining bi with flexible information system 2
IT Inftractructures - Evolution of IT Inftractructure
Case study 9
MOBILE CLOUD COMPUTING: ISSUE AND OPPORTUNITIES IN LIBRARIES
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
Ad

Similar to P01 | Security in Mobile Database System | Anurag Gupta | BCA (20)

PDF
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
PDF
accurate cleaned numbers list from frist database 01 - Google Docs.pdf
PDF
Mobile Database: The Backbone of Modern Applications
PPTX
Chapter-3 Editied.pptx It eliminates the need for individuals and businesses ...
PDF
Week 7 lecture material
PPTX
Mobile database security threats
PPT
Case Study: Synchroniztion Issues in Mobile Databases
PPT
Case Study: Synchroniztion Issues in Mobile Databases
PDF
Paper id 21201410
DOCX
cloud computing, touch screen, dms and cores
PPTX
Distributed dbms (ddbms)
PPTX
MOBILE CLOUD COMPUTING fundamental and basic
PPTX
Mcc architecture
DOCX
106248842 cc
PDF
PingPal infodeck: How to survive BYOD and mobile networks
PDF
International Journal of Engineering Research and Development
PDF
E-Score Data Management system on mobiles to survey the electrical usage
PDF
Cloud computing vs edge computing
PPT
Dstca
PDF
Offline and Online Bank Data Synchronization System
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
accurate cleaned numbers list from frist database 01 - Google Docs.pdf
Mobile Database: The Backbone of Modern Applications
Chapter-3 Editied.pptx It eliminates the need for individuals and businesses ...
Week 7 lecture material
Mobile database security threats
Case Study: Synchroniztion Issues in Mobile Databases
Case Study: Synchroniztion Issues in Mobile Databases
Paper id 21201410
cloud computing, touch screen, dms and cores
Distributed dbms (ddbms)
MOBILE CLOUD COMPUTING fundamental and basic
Mcc architecture
106248842 cc
PingPal infodeck: How to survive BYOD and mobile networks
International Journal of Engineering Research and Development
E-Score Data Management system on mobiles to survey the electrical usage
Cloud computing vs edge computing
Dstca
Offline and Online Bank Data Synchronization System
Ad

Recently uploaded (20)

PDF
-DIGITAL-INDIA.pdf one of the most prominent
PDF
Dynamic Checkweighers and Automatic Weighing Machine Solutions
DOCX
A PROPOSAL ON IoT climate sensor 2.docx
PPTX
Embeded System for Artificial intelligence 2.pptx
PPTX
PROGRAMMING-QUARTER-2-PYTHON.pptxnsnsndn
PPTX
Computers and mobile device: Evaluating options for home and work
PDF
PPT Determiners.pdf.......................
PPTX
Operating System Processes_Scheduler OSS
PPT
chapter_1_a.ppthduushshwhwbshshshsbbsbsbsbsh
PPTX
Prograce_Present.....ggation_Simple.pptx
PPTX
1.pptxsadafqefeqfeqfeffeqfqeqfeqefqfeqfqeffqe
PPTX
Entre CHtzyshshshshshshshzhhzzhhz 4MSt.pptx
PPTX
code of ethics.pptxdvhwbssssSAssscasascc
PPT
FABRICATION OF MOS FET BJT DEVICES IN NANOMETER
DOCX
fsdffdghjjgfxfdghjvhjvgfdfcbchghgghgcbjghf
PPTX
unit1d-communitypharmacy-240815170017-d032dce8.pptx
PPTX
DEATH AUDIT MAY 2025.pptxurjrjejektjtjyjjy
PPTX
A Clear View_ Interpreting Scope Numbers and Features
PPTX
Lecture-3-Computer-programming for BS InfoTech
PPTX
5. MEASURE OF INTERIOR AND EXTERIOR- MATATAG CURRICULUM.pptx
-DIGITAL-INDIA.pdf one of the most prominent
Dynamic Checkweighers and Automatic Weighing Machine Solutions
A PROPOSAL ON IoT climate sensor 2.docx
Embeded System for Artificial intelligence 2.pptx
PROGRAMMING-QUARTER-2-PYTHON.pptxnsnsndn
Computers and mobile device: Evaluating options for home and work
PPT Determiners.pdf.......................
Operating System Processes_Scheduler OSS
chapter_1_a.ppthduushshwhwbshshshsbbsbsbsbsh
Prograce_Present.....ggation_Simple.pptx
1.pptxsadafqefeqfeqfeffeqfqeqfeqefqfeqfqeffqe
Entre CHtzyshshshshshshshzhhzzhhz 4MSt.pptx
code of ethics.pptxdvhwbssssSAssscasascc
FABRICATION OF MOS FET BJT DEVICES IN NANOMETER
fsdffdghjjgfxfdghjvhjvgfdfcbchghgghgcbjghf
unit1d-communitypharmacy-240815170017-d032dce8.pptx
DEATH AUDIT MAY 2025.pptxurjrjejektjtjyjjy
A Clear View_ Interpreting Scope Numbers and Features
Lecture-3-Computer-programming for BS InfoTech
5. MEASURE OF INTERIOR AND EXTERIOR- MATATAG CURRICULUM.pptx

P01 | Security in Mobile Database System | Anurag Gupta | BCA

  • 1. Security in Mobile Database Systems Submitted by – ANURAG GUPTA
  • 2. INDEX  The Importance of Database  Modern Database System  Mobile Database  Components of a Mobile Database  PO & MM  Mobile Database System Market Share  Security in Mobile Database System
  • 3. The importance of databases in modern businesses and governmental institutions is huge and still growing. Many mission- critical applications and business processes rely on databases. These databases contain data of different degree of importance and confidentiality, and are accessed by a wide variety of users.
  • 4. Traditional database security provides techniques and strategies to handle such problems with respect to database servers in a non- mobile context. With the rise in popularity of smartphones For many businesses applications are going mobile that means using enterprise data in a mobile context, thus using a mobile DBMS. With these new developments the business data of an enterprise can be made available to an even larger number of users and a wider range of applications than before.
  • 6. A mobile database is a database that can be connected to by a mobile computing device over a mobile network. The client and server have wireless connections. A cache is maintained to hold frequent data and tractions so that they are not lost due to connection failure.
  • 7.  Corporate database server and DBMS that deals with and stores the corporate data and provides corporate applications  Remote database and DBMS usually manages and stores the mobile data and provides mobile applications  mobile database platform that includes a laptop, PDA, or other Internet access devices  Two-way communication links between the corporate and mobile DBMS
  • 8. DBMS’s for mobile device should be dedicated to optimizing at least one of the following, preferably both: Power optimization & Memory Management POWER OPTIMIZATION • Mobile devices such as laptops, cell phones, PDA’s, and radios have a limited power supply. • So we needed to optimize our DBMS to use as few resources as possible while providing the necessary functionality MEMORY MANAGEMENT • Memory is an important criteria as far as mobile database systems are concerned. • It is important to decide how much of the devices internal memory should be dedicated to the DB
  • 10.  Sybase SQL Anywhere dominates the mobile database field with over 68%.  IBM’s DB2 Everyplace is second market share holder.  Third place is shared by Microsoft’s SQL Server Compact and Oracle9i Lite.  Apple’s IOs use DataGlass mobile database by Empathic.
  • 11. The security-related techniques that are applied in the Mobile Database Application: 1. Secure Network Connection 2. Encrypted Local Database 3. Authentication at the Web Server 4. Application provided Security 5. Client-Side Data Encryption
  • 12. 1. Secure Network Connection The mobile database and the central database have to be synchronized at specific times. The synchronization is implemented in the system software of the mobile database and is performed over the http protocol.
  • 13. 2. Encrypted Local Database The local database on the mobile device is encrypted and each time the user opens the mobile database, he has to enter his password. In case the mobile device is stolen or violated by an intruder, the data that is stored on the local database is not readable.
  • 14. 3. Authentication at the Web Server The communication between the mobile database and the central database is performed over https. At the server side the communication link is handled by a web server. Hence, it is possible to take advantage of standard web server authentication and require the user to authenticate at the web interface level. This requirement is very important since it provides protection for the mobile database agent that is executed at the server side within the web server.
  • 16. 4. Application provided Security For authoring operations, each user has access only to his own data. A set of database triggers implemented in the database server, check that the data manipulation operations of the user are valid.
  • 17. 5. Client-Side Data Encryption it very important for secure mobile database applications and more generally for secure database applications. The user gives a password to the client application and all his critical data is encrypted at the client-side before it is permanently stored in the database. This encryption guarantees the confidentiality of the data against any database user including the local database administrators.