CONTENTS
| Page No. | i. Abstract | 3 | 1. Introduction | 3 | 2. Background | 4 | 3. Mobile Database Architecture | 5 | 4. Technique to Secure database 4.1 Data Synchronization 4.2 Mobile transaction 4.3 Embedded database 4.4 Authentication from the Web Server 4.5 Data Privacy 4.6 Adaptability to Middleware 4.7 Communication 4.8 Data Encryption at client side | 67788991010 | 5. Resisting the attack | 10 | 6. Conclusion | 11 | ii. Reference | 12 |
Abstract This report is on the results of mobile database. As there was decrease in normal computing devices with consummations of the power, which lead to the concept of wireless i.e. mobile computing. This objective of this report is to check the status of mobile database and to identify research of it. In early 90’s, the work for the mobile database started. Secure data transfer was the main reason introducing wireless PDA, mobile phones, etc. which is connected to nearest mobile station and from there how the data gets transfer from remote access area in the secure manner. This report gives you the complete outline of the participation of the mobile users in synchronization, mobile transaction, data confidentiality, and middleware adaptability.
1. Introduction
There was a field in technology, were computing was the only option for some period of time. As the technologies got developed, the birth of new era with highly dynamic referred as mobile computing. This concept got developed as now a day is decrease in size of machinery and increase in computing users, which are in demand for these machinery to become part of their everyday life. (Thomas Hardjono 1995)
As these mobile computing technologies are evolving day by day, there are different classes of mobile applications, which can be distinguished, from the data management requirement. The common example today is the Mobile Client