Call of Papers for Current Volume **************** OnLine Submission of Paper

Volume & Issue no: Volume 3, Issue 12, December 2014


A Review on the role of Encryption in Mobile Database Security
Author Name:
D. Roselin Selvarani and Dr. T. N. Ravi
ABSTRACT Data-driven applications are realized due to the powerful lightweight computing devices such as Smart phones, Laptops, Tablets and low cost mobile connectivity. Today more and more businesses move toward employees’ mobility. While the employee moves, along with him the mobile device as well as the database stored in the mobile device also moves. Therefore security of the mobile database is an important issue to be considered. It is highly critical because of the sensitivity and significance of data stored in the device. The main objective of the database security is the protection of data against accidental or intentional loss. Security approaches based on encryption play a vital role in securing mobile database. The need for encryption is strongly recommended to mitigate the risk of intentional or accidental disclosure of sensitive data in portable devices. Among the symmetric and asymmetric encryption algorithms, asymmetric encryption is highly computationally intensive compared to symmetric encryption. Therefore, for resource constraint mobile devices, symmetric key algorithms are more suitable. The main objective of this paper is to review the various Encryption algorithms used in mobile database security. Keywords:- Mobile database Security, Encryption, Symmetric key, Asymmetric key, Secured Architecture for Mobile database
Cite this article:
D. Roselin Selvarani and Dr. T. N. Ravi , " A Review on the role of Encryption in Mobile Database Security" , International Journal of Application or Innovation in Engineering & Management (IJAIEM) , Volume 3, Issue 12, December 2014 , pp. 076-083 , ISSN 2319 - 4847.
Full Text [PDF]                           Back to Current Issue