Title :
Secured Data Management Paradigm for Mobile Grid Environment Using Surrogate Objects
Author :
Begam, H. Parveen ; Mohamed, M.
Author_Institution :
Dept. of Comput. Sci. & Eng., Anna Univ., Tiruchirappalli, India
Abstract :
In mobile grid computing environment mobility, data management and security are some of the major issues. Data management in wireless communication has a double impact on the mobile device which increases the response time for accessing remote data from a mobile host and transmission of data. Security is a very important factor and it is also difficult to achieve owing to the open nature of wireless networks, heterogeneous and distributed environments. The surrogate object model maintains a cache of data stored in the mobile host and reduces wireless data transfers. This model consists of collection of surrogate objects which acts as place holder frame to solve location management problem to handle the mobility of mobile hosts. Mobility and portability pose new challenges to mobile database management and distributed computing like Transaction processing, Caching, Query processing and Replication. The proposed models should support and handle concurrency, recovery, disconnection and mutual consistency of the replicated data objects, as mobile hosts move from one cell to another. Hence adaptive data management technique along with adequate authentication mechanisms must be employed. This paper proposes the secured data management approach for mobile grid environment using surrogate objects. Authentication and secured communication are also discussed. Authentication protocol is built on top of surrogate objects to deals with the security issues in a mobile grid environment. Authentication protocol is built on communication services to provide cryptographically secure mechanisms for verifying the identity of users and resources. The predefined certificate standard X.509 is used for authentication. The secured communication between two mobile hosts is made possible through SSL/TLS. Data sanitation process, which means copying the data from MSS to SO is adopted to protect our information.
Keywords :
authorisation; cache storage; database management systems; grid computing; mobile computing; mobility management (mobile radio); protocols; query processing; MSS; SO; SSL-TLS; adaptive data management technique; authentication mechanisms; authentication protocol; caching; certificate standard X.509; data sanitation process; distributed computing; distributed environments; heterogeneous environments; location management problem; mobile database management; mobile grid computing environment mobility; mobile grid environment; mobile host; query processing; query replication; secured data management paradigm; surrogate objects; transaction processing; wireless communication; wireless data transfers; wireless networks; Authentication; Computational modeling; Data models; Mobile communication; Mobile handsets; Wireless communication; Location Management; Mobile Grid Environment; Secure Data management; Surrogate Object model;
Conference_Titel :
Mobile Data Management (MDM), 2012 IEEE 13th International Conference on
Conference_Location :
Bengaluru, Karnataka
Print_ISBN :
978-1-4673-1796-2
Electronic_ISBN :
978-0-7695-4713-8
DOI :
10.1109/MDM.2012.77