Top Banner
1 © NOKIA mobile-security.PPT/ 05/18/2022 / N.Asokan (NRC/COM) MOBILE DATABASE SECURITY Prepared by, BASANT KUMAR 0801216257 CSE
18

Mobile security

Dec 02, 2014

Download

Technology

Basant Kumar

Threats in mobile and it's security .
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Mobile security

1 © NOKIA mobile-security.PPT/ 04/09/2023 / N.Asokan (NRC/COM)

MOBILE DATABASE SECURITY

Prepared by,BASANT KUMAR0801216257CSE

Page 2: Mobile security

2 © NOKIA mobile-security.PPT/ 04/09/2023 / N.Asokan (NRC/COM)

Page 3: Mobile security

3 © NOKIA mobile-security.PPT/ 04/09/2023 / N.Asokan (NRC/COM)

Page 4: Mobile security

4 © NOKIA mobile-security.PPT/ 04/09/2023 / N.Asokan (NRC/COM)

Page 5: Mobile security

5 © NOKIA mobile-security.PPT/ 04/09/2023 / N.Asokan (NRC/COM)

• Mobile users must be able to work without a wireless connection due to poor or even non-existent connections.

• Applications must be able to access local device/vehicle hardware, such as printers, bar code scanners, or GPS units (for mapping or Automatic Vehicle Location systems).

• Bandwidth must be conserved (a common requirement on wireless networks that charge per megabyte or data transferred).

NEED FOR MOBILE DATABASE

Page 6: Mobile security

6 © NOKIA mobile-security.PPT/ 04/09/2023 / N.Asokan (NRC/COM)

MOBILE DATABASE SYSTEM ARCHITECTURE

Page 7: Mobile security

7 © NOKIA mobile-security.PPT/ 04/09/2023 / N.Asokan (NRC/COM)

SECURITY ISSUES

Page 8: Mobile security

8 © NOKIA mobile-security.PPT/ 04/09/2023 / N.Asokan (NRC/COM)

MOBILE DATABASE APPLICATION

Page 9: Mobile security

9 © NOKIA mobile-security.PPT/ 04/09/2023 / N.Asokan (NRC/COM)

ARCHITECTURE OF M.D.A

Page 10: Mobile security

10 © NOKIA mobile-security.PPT/ 04/09/2023 / N.Asokan (NRC/COM)

APPLICATIONS OF M.D.S

Page 11: Mobile security

11 © NOKIA mobile-security.PPT/ 04/09/2023 / N.Asokan (NRC/COM)

LIMITATIONS OF M.D.S

Page 12: Mobile security

12 © NOKIA mobile-security.PPT/ 04/09/2023 / N.Asokan (NRC/COM)

CAPABILITIES OF M. D. S

Page 13: Mobile security

13 © NOKIA mobile-security.PPT/ 04/09/2023 / N.Asokan (NRC/COM)

• Location Dependent Data (LDD):- The class of data whose value is functionally dependent on location. Thus the value of location determines the correct value of data. Ex- City tax, City area.

• Location Independent Data (LID):- The class of data whose value is functionally independent on location. Thus the value of location does not determines the correct value of data. Ex- Person name , account nuber.

HOW M. D. S LOOK AT DATABASE DATA

Page 14: Mobile security

14 © NOKIA mobile-security.PPT/ 04/09/2023 / N.Asokan (NRC/COM)

SECURITY ISSUES A

ND TECHNIQUES

Page 15: Mobile security

15 © NOKIA mobile-security.PPT/ 04/09/2023 / N.Asokan (NRC/COM)

• The mobile database and the central database have to be synchronized at specific times. We have selected the secure http protocol (https) to perform the necessary synchronization operations between the mobile and the central database. More precisely we use https with server and client authentication. This choice assures:

– Confidentiality of the data that is transferred.

– Authentication of the server computer.

– Authentication of the client computer.

1. SECURE NETWORK CONNECTION

Page 16: Mobile security

16 © NOKIA mobile-security.PPT/ 04/09/2023 / N.Asokan (NRC/COM)

The local database on the mobile device is encrypted

and each time the user opens the mobile database, he

has to enter his password. In case the mobile device is

stolen or violated by an intruder, the data that is stored

on the local database is not readable. The encryption

algorithm is part of SQL Server Mobile Edition and

unfortunately we were not able to find documentation for

the specific algorithm.

2. ENCRYPTED LOCAL DATABASE

Page 17: Mobile security

17 © NOKIA mobile-security.PPT/ 04/09/2023 / N.Asokan (NRC/COM)

For authoring operations, each user has access only to his own data. A set

of database triggers implemented in the database server, check that the

data manipulation operations of the user are valid. This check prevents all

users from accidental or malicious modifications of data for which they have

no authorization. More precisely, an author

– can create new announcements that are signed with his name,

– can delete or update announcements that are signed with his

name, and

– has no access to announcements created/signed by other users.

3. APPLICATION PROVIDED SECURITY

Page 18: Mobile security

18 © NOKIA mobile-security.PPT/ 04/09/2023 / N.Asokan (NRC/COM)

CONCLUSION