Abstract
Transaction processing over mobile networks faces new challenges due to limitations in bandwidth and avail- able power, as well as due to intermittent connectivity that causes loss of data and transaction aborts. Besides, the possi- bility of security breach increases substantially due to the frequent motion of clients across cells, which gives rise to novel forms of covert channels. In this paper, we first investigate to what degree this breach may occur and we also assess the suitability of existing protocols for avoiding the appearance of covert channels in mobile database access. Based on the discovery of certain vulnerabilities in these protocols, we propose an optional multi-granularity locking protocol that en- sures secure access to shared data in mobile environments without compromising their consistency or the atomicity of transactions.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.