By Topic

Secured Data Management Paradigm for Mobile Grid Environment Using Surrogate Objects

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
H. Parveen Begam ; Dept. of Comput. Sci. & Eng., Anna Univ., Tiruchirappalli, India ; Maluk Mohamed

In mobile grid computing environment mobility, data management and security are some of the major issues. Data management in wireless communication has a double impact on the mobile device which increases the response time for accessing remote data from a mobile host and transmission of data. Security is a very important factor and it is also difficult to achieve owing to the open nature of wireless networks, heterogeneous and distributed environments. The surrogate object model maintains a cache of data stored in the mobile host and reduces wireless data transfers. This model consists of collection of surrogate objects which acts as place holder frame to solve location management problem to handle the mobility of mobile hosts. Mobility and portability pose new challenges to mobile database management and distributed computing like Transaction processing, Caching, Query processing and Replication. The proposed models should support and handle concurrency, recovery, disconnection and mutual consistency of the replicated data objects, as mobile hosts move from one cell to another. Hence adaptive data management technique along with adequate authentication mechanisms must be employed. This paper proposes the secured data management approach for mobile grid environment using surrogate objects. Authentication and secured communication are also discussed. Authentication protocol is built on top of surrogate objects to deals with the security issues in a mobile grid environment. Authentication protocol is built on communication services to provide cryptographically secure mechanisms for verifying the identity of users and resources. The predefined certificate standard X.509 is used for authentication. The secured communication between two mobile hosts is made possible through SSL/TLS. Data sanitation process, which means copying the data from MSS to SO is adopted to protect our information.

Published in:

2012 IEEE 13th International Conference on Mobile Data Management

Date of Conference:

23-26 July 2012