Security in Mobile Database Systems
Security in Mobile Database Systems
Seminar Report
On
Submitted By :-
Pankaj Menaria
Yash Vyas
Kamlesh Jain
A
Seminar Report
On
Bachelor of Engineering
In
Computer Engineering
SUBMITTED BY:
Pankaj Menaria
Yash Vyas
Kamlesh Jain
SN Topic
1. INTRODUCTION
4. CONCLUSION
5. REFERENCES
developing mobility support in database
1. INTRODUCTION context. The confidentiality of mission-
critical data must be ensured, even though
most mobile devices do not provide a secure
The importance of databases in modern environment for storage of such data.
businesses and governmental institutions is Security requirements that apply to a central
huge and still growing. Many mission- company database should apply similarly and
critical applications and business processes in an appropriate manner to the parts of the
rely on databases. These databases contain database replicated on mobile devices in the
data of different degree of importance and field. A mobile database security
confidentiality, and are accessed by a wide infrastructure is needed to accomplish this
variety of users. Integrity violations for a goal. When developing such an infrastructure
database can have serious impact on business we can benefit from the results of traditional
processes; disclosure of confidential data in database security work. But we also need to
some cases has the same effect. Traditional adapt the existing techniques and strategies
database security provides techniques and to the mobile context, and we need to
strategies to handle such problems with develop new ones that attack certain issues
respect to database servers in a non-mobile specific to use of database systems in a
context. mobile environment.
1.1 SECURITY IN MOBILE DATABASE 1.2 MOBILE DATABASE
With the rise in popularity of smartphones A mobile database is a database that can be
has come an increasing need to secure them. connected to by a mobile computing device
Since their introduction mobile phones have over a mobile network. The client and server
becoming increasingly smaller, more have wireless connections. A cache is
powerful with increasing storage capacity maintained to hold frequent data and
and have remained expensive items. With the transactions so that they are not lost due to
rise of their popularity so has the need to connection failure. A database is a structured
secure the devices from theft, as well as way to organize information. This could be a
traditional threats that effect computers such list of contacts, price information or distance
as malware and the need to back and protect travelled.
the data on the devices.
The use of laptops, mobiles and PDAs is
Database security is also a specialty within increasing and likely to increase in the
the broader discipline of computer security. future[citation needed] with more and more
applications residing in the mobile systems.
While those same analysts can’t tell us
For many businesses applications are going
exactly which applications will be the most
mobile that means using enterprise data in a
popular, it is clear that a large percentage
mobile context, thus using a mobile DBMS.
will require the use of a database of some
With these new developments the business
sort. Many applications such as databases
data of an enterprise can be made available
would require the ability to download
to an even larger number of users and a
information from an information repository
wider range of applications than before.
and operate on this information even when
To work on business data anytime and out of range or disconnected.
anywhere is the major goal pursued by
An example of this is a mobile workforce. In unintended activity. Unintended activity can
this scenario user would require to access be categorized as authenticated misuse,
and update information from files in the malicious attacks or inadvertent mistakes
home directories on a server or customer made by authorized individuals or processes.
records from a database. This type of access
and work load generated by such users is Traditionally databases have been protected
different from the traditional workloads seen from external connections by firewalls or
in client–server systems of today. With the routers on the network perimeter with the
advent of mobile databases, now users can database environment existing on the internal
load up their smart phones or PDAs with network opposed to being located within a
mobile databases to exchange mission- demilitarized zone. Additional network
critical data remotely without worrying about security devices that detect and alert on
time or distance. Mobile databases let malicious database protocol traffic include
employees enter data on the fly. Information network intrusion detection systems along
can be synchronized with a server database at with host-based intrusion detection systems.
a later time.
Database security is more critical as
1.3 MOBILE SECURITY networks have become more open.
With the rise in popularity of smartphones Databases provide many layers and types of
has come an increasing need to secure them. information security, typically specified in
Since their introduction mobile phones have the data dictionary, including:
becoming increasingly smaller, more
powerful with increasing storage capacity Access control
and have remained expensive items. With the Auditing
rise of their popularity so has the need to Authentication
secure the devices from theft, as well as Encryption
traditional threats that effect computers such Integrity controls
as malware and the need to back and protect
the data on the devices.
1.5 NEED FOR MOBILE DATABASE
A recent report from McAfee titled" 2011
Mobile users must be able to work
Threats Predictions", outlines the company’s
without a wireless connection due to
concerns about the changing ―threats
poor or even non-existent connections.
landscape‖ thanks in part to increases in
Applications must provide significant
malware sophistication and targeting and
interactivity.
how they relate to seven areas — including
Applications must be able to access
social media, mobile Apple-related products
local device/vehicle hardware, such as
and applications.
printers, bar code scanners, or GPS
Although viruses are a key concern, the units (for mapping or Automatic
actual number of viruses targeting mobile Vehicle Location systems).
Bandwidth must be conserved (a
phones in the wild has not been widespread.
common requirement on wireless
1.4 DATABASE SECURITY networks that charge per megabyte or
data transferred).
Database security is the system, processes, Users don't require access to truly live
and procedures that protect a database from data, only recently modified data.
Limited life of power supply(battery) the mobile unit's transaction and data support
The changing topology of network to whichever base station covers the mobile
unit's new location.
If your application meets any of those
requirements, the chances are good that you 2) Products
will be required to build a mobile database
application with synchronization. Sybase Inc.’s SQL Anywhere dominates the
mobile-database field, with about 68 percent
Mobile database system architecture of the mobile database market. IBM’s DB2
Everyplace is a relational database and
For any mobile architecture, things to be enterprise synchronization server that
considered are: extends enterprise applications to mobile
devices. Microsoft SQL Server Compact and
Users are not attached to a fixed Oracle9i Lite are similar mobile databases.
geographical location Products from lesser-known vendors, such as
Mobile computing devices: low-power, SQLBase from Gupta Technologies LLC of
low-cost, portable Redwood Shores, Calif., HanDBase from
Wireless networks DDH Software Inc. of Lake Worth, Fla.and
Mobile computing constraints Database Viewer Plus from Cellica
Corporation NY, might serve your needs
1) Three parties equally well.
Mobile databases typically involve three 3) Sybase's SQL Anywhere
parties: fixed hosts, mobile units, and base
stations. Fixed hosts perform the transaction SQL Anywhere offers enterprise-caliber
and data management functions with the help databases that scale from 64-bit servers with
of database servers. Mobile units are portable thousands of users down to small handheld
computers that move around a geographical devices. SQL Anywhere’s data exchange
region that includes the cellular network (or technologies extend information in corporate
"cells") that these units use to communicate applications and enterprise systems to
to base stations. (Note that these networks databases running in mission-critical
need not be cellular telephone networks.) frontline environments. Design and
Base stations are two-way radios, management tools within SQL Anywhere
installations in fixed locations, that pass enable developers to implement and deploy
communications with the mobile units to and frontline applications and equip
from the fixed hosts. They are typically low- administrators to easily manage and support
power devices such as mobile phones, them.
portable phones, or wireless routers.
8) Others
Borland's JDataStore
2. MOBILE DATABASE
SYSTEMS
A system where wired and wireless networks are integrated for establishing communication.
PSTN
AC HLR
H-set High (100-800 mW) Low (5-10 mW) Low (5-10 mW)
power use
Speech Low (8-13 Kbps) High (32 Kpbs) High (32 Kpbs)
coding
rate
Delay or High ( 600 ms) Low (10 ms) Low ( 20 ms)
latency
Wireless Components
Base Station (BS): A network element that are call processing, signaling, maintenance,
interconnects the mobile station (or Mobile and diagnostics. The BS communicates to its
unit (MU)) to the network via the air mobile unit via the air interface, and to
interface. Each cell in the network has a BS MTSO by dedicated communication link
associated with it. The primary function of a such as T1 trunks. Communication links on
BS is to maintain the air interface, or the BS to the MTSO interface are also
medium, for communication to any mobile classified into voice links and signaling link.
unit within its cell. Other functions of BS
Mobile Units (MU): conversation. This can be a laptop, a
palmtop, or a cell phone, or any other mobile
Also called Mobile Systems (MS) or Mobile device. A MU also stores (a) Mobile
Hosts (MH). It consists of three components: Identification Number (MIN), (b) Electronic
(a) transceiver, (b) antenna, and (c) user Serial Number (EIN), and (C) Station Class
interface. The user interface exists only at Mark (SCM). These are transmitted upon
MU, which consists of a display, a keypad power on, cell initiated sampling, and cell
for entering information, and an audio origination.
interface for speaking and hearing voice
MSC (MTSO)
BS
MS Wireless
MS
component
Cell
BS
Base Station BS BS
Large cells.
Low density
Small cells.
High density
Smaller cells.
Higher density
The entire coverage area is a group of a number of cells. The size of cell depends upon the
power of the base stations.
MSC PSTN
Problems with cellular structure Service providers must be able to
communicate with each other. Needs
How to maintain continuous some standard.
communication between two parties in the Mobile station constraints.
presence of mobility? Integration of a new service provider
Solution: Handoff into the network. A roaming
subscriber must be able to detect this
How to maintain continuous new provider.
communication between two parties in the Service providers must be able to
presence of mobility? communicate with each other. Needs
Solution: Roaming some standard.
Quick MU response to a service
How to locate of a mobile unit in the provider’s availability.
entire coverage area? Limited battery life.
Solution: Location management
Two basic operations in roaming
Roaming management are
Roaming is a facility, which allows a Registration (Location update): The
subscriber to enjoy uninterrupted process of informing the presence or arrival
communication from anywhere in the entire of a MU to a cell.
coverage space. Location tracking: the process of
A mobile network coverage space may locating the desired MU.
be managed by a number of different service
providers. They must cooperate with each Registration (Location update): There are six
other to provide roaming facility. different types of registration.
Roaming can be provided only if some Power-down registration. Done by the
administrative and technical constraints are MU when it intends to switch itself
met. off.
Power-up registration. Opposite to
Administrative constraints power-down registration. When an
MU is switched on, it registers.
Billing. Deregistration. A MU decides to
Subscription agreement. acquire control channel service on a
Call transfer charges. different type of network (public,
User profile and database sharing. private, or residential).
Any other policy constraints.
Registration (Location update): There are six
Technical constraints different types of registration.
PSTN
DB DB HLR VLR
DBS DBS M SC M SC
BSC BSC
Fixe d host
Fixe d host BS
MU
MU
MU BS
BS
MU MU
MDS Data Management Issues frequency and download the desired data
from the broadcast to their local cache. A
How to improve data availability to user broadcast (file on the air) is similar to a
queries using limited bandwidth? disk file but located on the air. The
contents of the broadcast reflects the data
Possible schemes demands of mobile units. This can be
Semantic data caching: The cache achieved through data access history,
contents is decided by the results of which can be fed to the data broadcasting
earlier transactions or by semantic system. For efficient access the broadcast
data set. file use index or some other method.
Data Broadcast on wireless channels
Semantic caching How MDS looks at the database data?
Client maintains a semantic
description of the data in its cache Data classification
instead of maintaining a list of pages Location Dependent Data (LDD)
or tuples. Location Independent Data (LID)
The server processes simple predicates
on the database and the results are Location Dependent Data (LDD)
cached at the client.
The class of data whose value is functionally
Data Broadcast (Broadcast disk) dependent on location. Thus, the value of
A set of most frequently accessed data is the location determines the correct value of
made available by continuously the data.
broadcasting it on some fixed radio Location Data value
frequency. Mobile Units can tune to this Examples: City tax, City area, etc.
LDD must be processed under the
Location Independent Data (LID) location constraints. Thus, the tax data
of Pune can be processed correctly
The class of data whose value is functionally only under Pune’s finance rule.
independent of location. Thus, the value of Needs location binding or
the location does not determine the value of location mapping function.
the data. Location binding or location mapping
can be achieved through database
Example: Person name, account schema or through a location mapping
number, etc. The person name remains the table.
same irrespective of place the person is
residing at the time of enquiry.
Location Dependent Data (LDD)
Location Dependent Data (LDD) Distribution
Example: Hotel Taj has many MDS could be a federated or a multidatabase
branches in India. However, the room system. The database distribution
rent of this hotel will depend upon the (replication, partition, etc.) must take into
place it is located. Any change in the consideration LDD.
room rate of one branch would not One approach is to represent a city in
affect any other branch. terms of a number of mobile cells, which is
Schema: It remains the same referred to as ―Data region‖. Thus, Pune can
only multiple correct values exists in be represented in terms of N cells and the
the database. LDD of Pune can be replicated at these
individual cells.
City data
MU
MU
MU BS
BS
MU MU
Transaction fragments for distributed For any Ojk and Ojl where Ojk = R(x) and
execution Ojl = W(x) for data object x, then either
Ojk j Ojl or Ojl j Ojk.
Execution scenario: User issues transactions
from his/her MU and the final results comes
back to the same MU. The user transaction Mobile Transaction Models
may not be completely executed at the MU
Kangaroo Transaction:
so it is fragmented and distributed among
database servers for execution. This creates It is requested at a MU but processed
a Distributed mobile execution. at DBMS on the fixed network. The
management of the transaction moves
A mobile transaction (MT) can be defined as with MU. Each transaction is divided
Ti is a triple <F, L, FLM>; where into subtransactions. Two types of
F = {e1, e2, …, en} is a set of execution processing modes are allowed, one
fragments, ensuring overall atomicity by requiring
L = {l1, l2, …, ln} is a set of locations, and compensating transactions at the
FLM = {flm1, flm2, …, flmn} is a set of subtransaction level.
fragment location mapping where j, flmi (ei)
= li
Reporting and Co-Transactions: Semantics Based:
DBS1
DBS2
T2(e4, e5)
MU2
DBS3
DBS4
Reasons these methods may not work Protocol: TCOT-Transaction Commit
satisfactorily On Timeout
Location Management
2.5 Query Processing
In cellular systems a mobile unit is free to
MDS Query processing move around within the entire area of
coverage. Its movement is random and
Query types therefore its geographical location is
Location dependent query unpredictable. This situation makes it
Location aware query necessary to locate the mobile unit and
Location independent query ecord its location to HLR and VLR when a
call has to be delivered to it.
Location dependent query
A query whose result depends on the Thus, the entire process of the mobility
geographical location of the origin of the management component of the cellular
query. system is responsible for two tasks:
Fig. 3.11 Channel transfer between two BSs with one BSC.
handoff, and 0.05 inter-MSC handoff. The important for minimizing the call waiting
data also indicate that the failure rate of time. There are two ways to achieve link
inter-MSC handoff is about five times more transfer. One way is referred to as Hard
than inter-BS handoff. It is quite obvious that Handofland the other as Soft Handoff.
efficient processing of handoff is quite
Fig. 3.72 Channel transfer between two BSs connected to two BSCs.
Hard Handoff:
2. The MS sends a ―handoff request
In this handoff process the user experiences a message― to the network through the new
brief silence or discontinuity in BS. The new BS then sends a ―handoff
communication which occurs because at any acknowledgement― message and marks the
time the MU is attached to only one BS and slot busy. This message indicates the
when the link is transfer the connection is initiation of the handoff process.
broken temporarily resulting in a silence. The
steps of the handoff for MCHO link transfer 3. This acknowledgment message indicates
is described below. to MU that the handoff process has started,
and so MU returns to the old channel it was
1. MS sends a ―link suspend‖ message to the using and resumes voice communication
old BS which temporarily suspends the while network process the handoff.
conversation (occurrence of silence).
4. When the new BS receives the handoff In the later case, since it is between two
request message, then two cases arise: different BSCs, the BS must complete some
security check. It gets the cypher key from
(a) It is an intra-BS handoff or the old BS and associates it with the new
(b) it is an inter-BS handoff. In the former channel.
case the BS sends a handoff
acknowledgment message and proceeds with 6. The MSC bridges the conversation path
handoff. and the new BS.
Fig. 3.13 Channel transfer between two BSs with two BSCs connected to two MSCs.
6. On the command of the network, the MS message through the new channel and
processes the handoff where it releases the resumes the voice communication. A
old channel by sending an ―access release‖ detailed discussion on hard handoff for other
message to the old BS. In this rocess the kinds of link transfer.
voice communication is briefly interrupted
again. The MU sends a ―handoff complete‖
2.6 Wireless Information Broadcast
The data dissemination discipline gives an mobility in information management, and the
illusion that the space is an infinite size wireless data dissemination took mobile
persistent data storage from where a user can systems one step further and allowed the user
download desired information. For example, to tune and access and process desired
information about airline schedule, weather, information from anywhere in the world.
stock quotes, etc., can be downloaded from Accessing data from wireless channel is a
the broadcast. Initially, data dissemination very useful facility because it allows users
system appeared as an information to get desired data through many
dissemination tool similar to radio broadcast, computationally enabled devices such as
but with advances in wireless and satellite cellular phones, PDAs, other new devices.
communication, it is becoming an Manufacturers continue to develop
information management system as well. increasingly powerful mobile devices while
This chapter discusses data dissemination decreasing their size and cost. If it is
technology and development of schemes assumed that there is an abundance of
such as indexing, push and pull, data staging, wireless channels, then servers can continue
surrogates, and so on, for incorporating to push all data users can ever need on these
transactional facility. The discussion in this channels and users can pull whatever they
chapter is based mostly on research reports require. This is an ideal scenario. In reality,
because a truly data broadcast system has not wireless channels are always less than the
been developed and deployed for commercial number required to satisfy users’ demands.
use. It also discusses in detail the architecture Thus, the task of data dissemination
and working of a reference data technology is to develop ways for satisfying
dissemination and processing system called users’ data demand with limited wireless
DAYS (DAta in your Space). resources.
Push applications are complex, and the Push system software may suffer with
development cost (time and resource) are incompatibility problem. Many vendors-
generally high compared to creating static Air Media, Alpha Microsystems,
pages. Static pages can be viewed by any Berkeley Systems, IntraExpress,
browser on any operating system, but the Marimba, Pointcast, to name a few,
push system requires specific tools and develop application software with
applications. minimum portability and scalability.
Competition to dominate the information
It requires more powerful hardware and space in this technology is growing fast
specialized software to provide push and vendors are unable to develop
service. software compatible to all systems. The
push technology is not good for the in a consistent wrapper and push it to
typical knowledge worker who mines users’ workstations.
information from a variety of sources and
then draws conclusions by digesting that Platform provider: The products of this
information [ 141. category-for example, BackWeb-are
similar to content aggregators, except
Creating and maintaining user profiles is they are actually infrastructure to deploy
time-consuming. This becomes more content delivery systems.
expensive with number of users. One of
the main reasons is that users’ Real-time data transfer: The products of
information needs are constant to some this category-for example, TIBCO and
degree only. Wayfarer (1NCISA)-offer the advantage
of multicasting. It is expensive to
There is no reliable solution to achieve implement, but they guarantee timely
secured broadcast. Security safeguards are delivery of information possible.
highly needed.
Push information delivery models can be
Standards are currently lacking in this categorized at least into three main
area (competing de facto industry categories :
standards are pushed by companies) .
Push Server Model: It is the most
Market for Push Technology common Push Server Model which
provides a client, a server, and
Microsoft Corp. and Netscape development tools. A proprietary client is
Communications Corp. are the two leading supplied, and the applications may use a
competitors proprietary protocol. Both users and
in the push technology. Microsoft is pushing content providers have control over the
the Extensible Markup Language (XML)- content. Some examples of this model are
based Channel Definition Format (CDF) for BackWeb and Marimba’s Castanet.
defining push updates. Netscape is using the
Meta-Content Format (MCF), which was Web Server Extension Model: In this
invented by Apple Computer. For example, model, the push vendor directs feedback
Marimba Inc. has begun cooperation with and demographic information to an
Netscape. Microsoft and Netscape each have external server, so that information can be
created their own push clients for use in retained by the push vendor. No
conjunction with their latest browsers. The proprietary client is required. These run
push market can be divided into four basic within the user’s installed browser, such
categories : as Pointcast or the server delivers content
using e-mail, such as ChannelManager
Application Distributor: The products and InfoBeat.
of this category such as Marimba’s
Castanet provide automatic delivery of Client Agent Model: This model uses a
application software to end users. ―client agent‖ to retrieve the information
from the web. Each agent is designed to
Content aggregator: The products of this provide different search results and allows
category-for example, PointCast Business us to establish an anonymous relationship
Network-gather and format the contents between the vendor and the subscriber.
The user is responsible for deployment majority of users. This approach created the
and the search type extensibility. notion of multiple disks spinning at different
speeds on a single broadcast channel to
create an effect of a fine grained storage
BROADCAST DISK hierarchy. The broadcast data on a faster disk
are pushed (repeated) more frequently than
In this section a novel broadcast scheme the dataon slower disks channel). Users tune
called broadcast disk is discussed. The main to these disks (channels) and download their
idea of this scheme is to efficiently use the desired data .
available bandwidth to push data to a
Figure 9.4 illustrates access and tuning depends on broadcast size, and the tuning
time. A client submits a request at To and time depends on the identification of exact
receives the desired response at time T7. If data location in the broadcast which is
the client listens continuously from the time achieved through selective tuning.
the query was submitted and until the Unfortunately, selective tuning requires extra
response is received, then the access and information to be appended to the broadcast
tuning times can be expressed as AT = TT = data which increases the size of the
(T7 ~ To). If, on the other hand, the client broadcast. This increase in size affects access
slips into doze mode intermittently, that is, time. An efficient broadcast scheme,
tunes selectively (selective tuning), then the therefore, must balance this trade-off.
actual tuning time will be 7T = (T7 - Ts)+ (Ts The broadcast program can be
- T4) + (Ts - TL)+ (TI- 2'0). Tn selective addressed in terms of bandwidth allocation.
tuning the mobile unit will be in doze mode An efficient bandwidth allocation scheme is
(DM) for (TL- TI ) + (T4 ~ Tj) + (TG - T5). If directly linked with data popularity among
DM > 7T then the tuning time saves energy the client population. Client information
and the saving will be highest only if the requirement is highly random. Different
client has accurate information about the samples of client populations may have
tuning time for accessing data. The task, orthogonal data requirements. In some client
therefore, is to find optimal points in the 2D population, geographical information may be
space of access and tuning times. This is highly important and accessed most
quite difficult because there is a trade-off frequently while some population may
between these two times. The access time frequently access stock quotes, and so on.
Thus, the relationship among data with the help of popularity computation,
popularity, client samples, and geographical broadcast indexing, and broadcast
domain becomes very complex, which makes composition an efficient schedule can be
it very hard, if not impossible, to develop an created.
optimal schedule for all situations. However,
Figure 9.27 shows the data staging Let time required for a broadcast = n
architecture. It consists of a surrogate, which minutes. Thus, total number of broadcasts in
is connected to the mobile user by wireless a day is 24 x 601n. Let size of the data pages
technologies such as 802.1 1 and to the file = M kbytes. The channel bandwidth for
server with a high speed wired network. The broadcast is B kbps. So, the number of pages
client proxy present in the mobile user has a broadcast per second = B / M pages.
periodic routine which contain information Let approximate number of pages in a
about the data the user is most likely to broadcast be N ( N may vary, but it is fixed
access at any point of time. Based on the for
amount of storage available, the surrogate this calculation). Total time taken for a
allows the user to use a certain amount of broadcast is N/(B/M) = ( ( N x M ) / B ) .
space for staging data. The user sends the Thus, the average wait for any page in the
periodic routine to the surrogate. The time of broadcast is ((N x M)l(2 x B)). Let the size of
dispatch of the periodic routine is arbitrary. It an index page be I kbytes where I << M .
may send it periodically or at the time the There is a time bound for accessing the index
user requests a data. Since the public data is which is interleaved in the broadcast so that
staged in the machine, we believe that proper the user does not have to wait for the entire
handling of data storage in a surrogate can broadcast to access the index. Let the time
significantly increase the efficiency of data bound for getting the index be Ttndcz = 5,
access, and thus the overall latency time can where n: << ( N x M)IB is total time for each
be reduced. Figure 9.28 shows accesses of broadcast. Thus, on an average, the user has
data from the surrogates by a mobile user. to wait for Tindez/2 units of time to receive
The overall aim of data staging is to allow the index. So, the index should be
the user to access data at a minimum latency. broadcasted after every (B/M) x:l; number of
For this, we calculate a time bound, Tbound, pages by the base station.
for the user to access a data.
3. MOBILE DATABASE which people and objects in the environment
SECURITY stay.
Mobile work using mobile devices and Supporting mobile work involves
wireless links comprehends a row of providing access to interesting data at the
problems concerning security issues like appropriate location, time and device, i.e.
availability, con dentiality, integrity and where and when the data are used based on
accountability. These requirements occur for user aims, preferences, knowledge and
network components as well as database skills.For this purpose we require di erent
systems. Mobile work including mobile information regarding the current
database access makes ubiquitous computing, infrastructure,available mobile resources,
anywhere and anytime possible. The connectivity, costs and duration of
mobility requires suitable hardware and connections, and bandwidths. Mobile work is
software. Mobile devices like handhelds characterized by infrequent and temporary
connected via wireless networks support short connections to the fixed network (low
mobile users, especially in connection with connectivity) and by a variety of access types
position searching tools. New risks and (register and query data). The mobile user
challenges for security and privacy occur in accesses data that are also accessed by other
this environment. The goal is the protection users or itself on different locations and
of mobile users and their data. devices, respectively.
Security measures must take into The mobile context includes mobile
account the distribution of data and their work and communication attending metadata
heterogeneous handling regarding to security to support users. This meta-information is
models. Scarce mobile resources make covered in four parts of the mobile context:
insecure communication necessary to
replicate used data and increase the risk of human factors, their tasks, roles, other
restricting or dismissing security measures. persons
location (and changing location in
3.1 MOBILE CONDITIONS time), hard- and software (mobile site
and network characteristics, equipment
Mobile work is context-sensitive work and tools)
with contexts describing environmental information, application characteristics
characteristics and the relationships between (like type, size)
them. In Lubinski, 1998], the special
problems of database systems in such a These mobile circumstances, and
mobile environment are described more especially their dynamics, and restrictions
detailed. In this section, we summarize the like frequent disconnections make a mobile
main mobile circumstances causing various work with database systems di cult. This is
threats. Applications and required data are the reason for various di culties in securing
location dependent, but their access must be mobile work and for requiring a new
location transparent. Determined tasks are viewpoint to well known security measures,
applicable on special whereabouts. The or demand new ones.
mobile infrastructure restricts the available
volume and type of data and the data transfer.
Context information comprehends further
3.2 PROTECTION OBJECTS AND E.g., the distribution and heterogeneity leads
ACTIONS to typical distributed security problems
including data exchange between systems
Assuming distributed and/or replicated with differing models and aims. Moreover,
databases, we must take into account mobile systems are characterized by very
protection of the main action types mobile hardware.
management, accesses and transfer to
protection objects data and metadata. The thread of lost confidence by loss
of devices is often underrated. Wireless links
Metadata are used on di erent levels. are predestinated to be eavesdropped on.
Database systems manage object types, Profiles of communicating users are simply
keys,and integrity rules. Transfer creatable. Attacks and security for mobile
components need at least receiver and sender communication are described in[ Federrath,
addresses of messages. Metadata include 1999].
necessarily mobile context data and security
relevant information like security policies. We focus in this paper database related
Data and metadata are the items which must mobile security issues and ignore
be protected,whereas metadata are communication security. Our approach
additionally used for their protection. consists in three main tasks to keep mobile
work secure (see also[ Lubinski, 1998]), the
Combining possible actions with restriction of database transparencies, a
protection items gets the following table. The horizontal and vertical separation of
first row and column shows the possible metadata and an adaptation of security.
items and actions to be protected and
characterize them in a short manner. The
body of the table illustrates the special
problems, threats or desired security
characteristics, respectively, for the
particular combinations of actions and items
appearing in the special mobile environments.
Vertical separation supports
Restrict transparencies: confidentiality requirements by protecting
users from tracing their movement. It allows
Database transparencies like distribution only a view to a (role dependent) section or a
and replication transparency is soften to facet of mobility patterns and behaviour.
allow user's participation. This requirement Additionally, audit data should be
concerns transparent security management anonymized or pseudonymized.
and control, too. However, every
transparency must be remain controlled by Horizontal separation represents a
the system to avoid insecure system states. layered view and constitutes a prevention of
undesired information flow between different
Separate metadata: system layers outside the controlled area.