Topic > Information Security in Mobile Databases - 2032

SUMMARY Mobile devices have begun to dominate the world of information technology. Today, almost half of the people on this planet use mobile devices. The popularity of mobile devices has attracted the IT industry towards mobile database management which helps users to connect to the database from anywhere at any time which is impossible with the traditional database system. It is still difficult to understand what a mobile database actually is. this article tries to explain what mobile database is. The article begins by explaining why the mobile database has gained popularity and what are its features that have attracted so much attention from the business sector. The document also explains the requirements for a database to be considered a mobile database. The document also discusses some of the mobile databases currently in use on the market. also looks at some of the problems that arise with mobile databases. Contents CONTENTS III INTRODUCTION 1 MOBILE DATABASE REQUIREMENTS 1 SMALL MEMORY FOOTPRINT 2 FLASH-OPTIMIZED STORAGE SYSTEM 2 DATA SYNCHRONIZATION 2 SECURITY 2 LOW ENERGY CONSUMPTION 3 SELF-MANAGEMENT 3 INTEGRATED INTO APPLICATIONS 3 CURRENT MOBILE DATABASE ASE SQL EVERYWHERE 4ORACLE LITE 4MICROSOFT SQL SERVER 4COMPACT SQLITE 4IBM DB2 EVERYPLACE (DB2E) 5MOBILE DATABASE ISSUES 5CONNECTIVITY AND DISCONNECTIONS 5STORAGE CAPACITY 5SECURITY 6CONCLUSION 6REFERENCES 8INTRODUCTIONThe number of mobile devices in use around the world has increased exponentially in recent years. The number of smartphone users surpassed one billion in 2012 and is expected to increase by the next billion in less than three years. This growing trend of using mobile devices is at the heart of paper, a station for mobile databases. Flinders University of South Australia, School of Computer Science and Engineering.Corporation, c. (n.d.). wisegeek. Retrieved from www.wiesegeek.com: http://www.wisegeek.com/what-is-a-mobile-database.htmlGruenwald, L., & Olken, F. Mobile Database Search: What Should You Do?Hardjono, T., & Seberry, J. Information security in mobile databases. University of Wollongong.Lubinski, A. Security issues in mobile database access. University of Rostock, Department of Computer Science. Niloofar and Banivaheb, N. (n.d.). Retrieved from www.css.yorku.ca: http://www.cse.yorku.ca/~jarek/courses/6421/F12/presentations/Mobile-Databases_%20Presentation.pdfNori, A. Mobile and Embedded Databases. In the Proc. SIGMOD 2007,ACM Press (2007),Sen, R. DBMS techniques for lightweight computing devices. InProc. MobiDE 2011, ACM Press (2011)