Abstract

Transaction processing over mobile networks faces new challenges due to limitations in bandwidth and avail- able power, as well as due to intermittent connectivity that causes loss of data and transaction aborts. Besides, the possi- bility of security breach increases substantially due to the frequent motion of clients across cells, which gives rise to novel forms of covert channels. In this paper, we first investigate to what degree this breach may occur and we also assess the suitability of existing protocols for avoiding the appearance of covert channels in mobile database access. Based on the discovery of certain vulnerabilities in these protocols, we propose an optional multi-granularity locking protocol that en- sures secure access to shared data in mobile environments without compromising their consistency or the atomicity of transactions.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.