Index:
The Importance of Database
Modern Database System
Mobile Database
Components of a Mobile Database
PO & MM
Mobile Database System Market Share
Security in Mobile Database System
2. INDEX
The Importance of Database
Modern Database System
Mobile Database
Components of a Mobile Database
PO & MM
Mobile Database System Market Share
Security in Mobile Database System
3. The importance of databases in modern businesses and
governmental institutions is huge and still growing. Many mission-
critical applications and business processes rely on databases.
These databases contain data of different degree of importance
and confidentiality, and are accessed by a wide variety of users.
4. Traditional database security provides techniques and strategies to
handle such problems with respect to database servers in a non-
mobile context.
With the rise in popularity of smartphones For many businesses
applications are going mobile that means using enterprise data in a
mobile context, thus using a mobile DBMS. With these new
developments the business data of an enterprise can be made
available to an even larger number of users and a wider range of
applications than before.
5.
6. A mobile database is a database that can be connected to by a
mobile computing device over a mobile network. The client and
server have wireless connections. A cache is maintained to hold
frequent data and tractions so that they are not lost due to
connection failure.
7. Corporate database server and DBMS that deals with and stores
the corporate data and provides corporate applications
Remote database and DBMS usually manages and stores the
mobile data and provides mobile applications
mobile database platform that includes a laptop, PDA, or other
Internet access devices
Two-way communication links between the corporate and
mobile DBMS
8. DBMS’s for mobile device should be dedicated to optimizing at least one of the
following, preferably both: Power optimization & Memory Management
POWER OPTIMIZATION
• Mobile devices such as laptops, cell phones, PDA’s, and radios have a limited
power supply.
• So we needed to optimize our DBMS to use as few resources as possible
while providing the necessary functionality
MEMORY MANAGEMENT
• Memory is an important criteria as far as mobile database systems are
concerned.
• It is important to decide how much of the devices internal memory should
be dedicated to the DB
9.
10. Sybase SQL Anywhere dominates the mobile database field with
over 68%.
IBM’s DB2 Everyplace is second market share holder.
Third place is shared by Microsoft’s SQL Server Compact and
Oracle9i Lite.
Apple’s IOs use DataGlass mobile database by Empathic.
11. The security-related techniques that are applied in the Mobile
Database Application:
1. Secure Network Connection
2. Encrypted Local Database
3. Authentication at the Web Server
4. Application provided Security
5. Client-Side Data Encryption
12. 1. Secure Network Connection
The mobile database and the central database have to be
synchronized at specific times. The synchronization is
implemented in the system software of the mobile
database and is performed over the http protocol.
13. 2. Encrypted Local Database
The local database on the mobile device is encrypted and each
time the user opens the mobile database, he has to enter his
password. In case the mobile device is stolen or violated by an
intruder, the data that is stored on the local database is not
readable.
14. 3. Authentication at the Web Server
The communication between the mobile database and the
central database is performed over https. At the server side
the communication link is handled by a web server. Hence, it
is possible to take advantage of standard web server
authentication and require the user to authenticate at the
web interface level. This requirement is very important since
it provides protection for the mobile database agent that is
executed at the server side within the web server.
15.
16. 4. Application provided Security
For authoring operations, each user has access only to his own
data. A set of database triggers implemented in the database
server, check that the data manipulation operations of the
user are valid.
17. 5. Client-Side Data Encryption
it very important for secure mobile database applications and
more generally for secure database applications. The user
gives a password to the client application and all his critical
data is encrypted at the client-side before it is permanently
stored in the database. This encryption guarantees the
confidentiality of the data against any database user
including the local database administrators.