Secure Access Schemes in Mobile Database Systems

Mobile computing is a newly emerging computing pa radigm. Whether using the term mobile database system or some other form, the database concept is essential to the mobile computing environment. This work employs a more thorough yet general means of defining the mob ile database system, along with several application scenarios. Possible secure access schemes are also presented for databases in a mobile computing environment. The tr adeoffs of these schemes are also analyzed. Moreover, the feasibilit y of applying some possible secure access methods i s explored, along with the potential difficulties and unresolved issu e . Finally, concluding remarks and recommendations f r future works are made.

[1]  Ehud Gudes The Design of a Cryptography Based Secure File System , 1980, IEEE Transactions on Software Engineering.

[2]  Arie Shoshani,et al.  A Compression Technique for Large Statistical Data-Bases , 1981, VLDB.

[3]  John B. Kam,et al.  A database encryption system with subkeys , 1981, TODS.

[4]  Dennis G. Severance,et al.  A practitioner's guide to data base compression - Tutorial , 1983, Inf. Syst..

[5]  Gordon V. Cormack,et al.  Data compression on a database system , 1985, CACM.

[6]  Mostafa A. Bassiouni,et al.  Data Compression in Scientific and Statistical Databases , 1985, IEEE Transactions on Software Engineering.

[7]  Mark A. Roth,et al.  Database compression , 1993, SGMD.

[8]  Yacov Yacobi,et al.  Privacy and Authentication on a Portable Communications System , 1993, IEEE J. Sel. Areas Commun..

[9]  Shojiro Nishio,et al.  Strategies for Query Processing in Mobile Computing , 1994, Mobidata.

[10]  A. Prasad Sistla,et al.  Data replication for mobile computers , 1994, SIGMOD '94.

[11]  Tomasz Imielinski,et al.  Sleepers and workaholics: caching strategies in mobile environments , 1994, SIGMOD '94.

[12]  Tomasz Imielinski,et al.  Mobile wireless computing: challenges in data management , 1994, CACM.

[13]  Min-Shiang Hwang,et al.  Conference key distribution protocols for digital mobile communication systems , 1995 .

[14]  Ahmed K. Elmagarmid,et al.  Wireless client/server computing for personal information services and applications , 1995, SGMD.

[15]  Li Gong,et al.  Multicast security and its extension to a mobile environment , 1995, Wirel. Networks.

[16]  Wei-Pang Yang,et al.  A two-phase encryption scheme for enhancing database security , 1995, J. Syst. Softw..

[17]  Abdelsalam Helal,et al.  Mobile computing and databases: anything new? , 1995, SGMD.

[18]  Joseph E. Wilkes,et al.  Privacy and authentication needs of PCS , 1995, IEEE Wirel. Commun..

[19]  Bharat Bhargava,et al.  A framework for providing consistent and recoverable agent-based access to heterogeneous mobile databases , 1995, SGMD.

[20]  Lin Lin,et al.  Security in enterprise networking: A quick tour , 1996 .

[21]  Arkady Zaslavsky,et al.  Database replica management strategies in multidatabase systems with mobile hosts , 1996 .

[22]  Min-Shiang Hwang,et al.  Authenticated key-exchange in a mobile radio network , 1997, Eur. Trans. Telecommun..

[23]  Chinya V. Ravishankar,et al.  Block-Oriented Compression Techniques for Large Statistical Databases , 1997, IEEE Trans. Knowl. Data Eng..

[24]  Wei-Pang Yang,et al.  Enhanced privacy and authentication for the global system for mobile communications , 1999, Wirel. Networks.

[25]  Min-Shiang Hwang Dynamic participation in a secure conference scheme for mobile communications , 1999 .