Mobile Databases: a Selection of Open Issues and Research Directions Authors: Rachid Guerraoui et al. Sources: SIGMOD Record, 33(2), pp.78-83, 2004 Adviser:

Slides:



Advertisements
Similar presentations
Database Systems: Design, Implementation, and Management
Advertisements

Database Architectures and the Web
Copyright 1998 Chengzheng Sun1 Operational Transformation in Real-Time Group Editors: Issues, Algorithms, and Achievements Chengzheng Sun Charence (Skip)
Reliability on Web Services Presented by Pat Chan 17/10/2005.
Networks and Distributed Systems: Project Ideas
1 Chapter 2 Database Environment Transparencies © Pearson Education Limited 1995, 2005.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 222 C HAPTER 7 Information Systems Controls for Systems.
Remote Desktop Connection Techniques Wireless Communication Networks.
Chapter 6 Database Design
Distributed Database Management Systems
Chapter 13 Physical Architecture Layer Design
Figure 1.1 Interaction between applications and the operating system.
Chapter 2 Database Environment Pearson Education © 2014.
6 Chapter 6 Database Design Hachim Haddouti. 6 2 Hachim Haddouti and Rob & Coronel, Ch6 In this chapter, you will learn: That successful database design.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
Client/Server Architecture
Chapter 1 Introduction to Databases
Client-Server Computing in Mobile Environments
Mobile Agents for Integrating Cloud-Based Business Processes with On-Premises Systems and Devices Janis Grundspenkis Antons Mislēvičs Department of Systems.
Distributed DBMSPage © 1998 M. Tamer Özsu & Patrick Valduriez Outline Introduction Background Distributed DBMS Architecture Distributed Database.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
A Risk Analysis Approach for Biometric Authentication Technology Author: Arslan Brömme Submission: International Journal of Network Security Speaker: Chun-Ta.
The University of Akron Dept of Business Technology Computer Information Systems DBMS Functions 2440: 180 Database Concepts Instructor: Enoch E. Damson.
Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy Authors: C. Lambrinoudakis,
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Chapter 2 CIS Sungchul Hong
Database Architecture Introduction to Databases. The Nature of Data Un-structured Semi-structured Structured.
CSC271 Database Systems Lecture # 4.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
September, 2005What IHE Delivers 1 G. Claeys, Agfa Healthcare Audit Trail and Node Authentication.
Distributed Systems Principles and Paradigms
IST 210 Database Design Process IST 210 Todd S. Bacastow January 2005.
Week 4 Lecture Part 3 of 3 Database Design Samuel ConnSamuel Conn, Faculty Suggestions for using the Lecture Slides.
UbiStore: Ubiquitous and Opportunistic Backup Architecture. Feiselia Tan, Sebastien Ardon, Max Ott Presented by: Zainab Aljazzaf.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Week 5 Lecture Distributed Database Management Systems Samuel ConnSamuel Conn, Asst Professor Suggestions for using the Lecture Slides.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Distributed Computing Systems CSCI 4780/6780. Distributed System A distributed system is: A collection of independent computers that appears to its users.
1- Distributed Systems Principles and Paradigms Operating Systems: Concurrent and Distributed Software Design Jean Bacon, Tim Harris 2003.
Distributed Computing Environment (DCE) Presenter: Zaobo He Instructor: Professor Zhang Advanced Operating System Advanced Operating System.
Distributed Computing Systems CSCI 4780/6780. Geographical Scalability Challenges Synchronous communication –Waiting for a reply does not scale well!!
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Bayu Adhi Tama, M.T.I 1 © Pearson Education Limited 1995, 2005.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Feb 5, ECET 581/CPET/ECET 499 Mobile Computing Technologies & Apps Data Dissemination and Management 2 of 3 Lecture 7 Paul I-Hai Lin, Professor Electrical.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Features Of SQL Server 2000: 1. Internet Integration: SQL Server 2000 works with other products to form a stable and secure data store for internet and.
Introduction to Databases Dr. Osama AL Rababah. Objectives In this capture you will learn: Some common uses of database systems. The characteristics of.
Chapter 2 Database Environment.
Dsitributed File Systems
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Overview Issues in Mobile Databases – Data management – Transaction management Mobile Databases and Information Retrieval.
Presented by Edith Ngai MPhil Term 3 Presentation
Data and Applications Security Developments and Directions
Chapter 2 Database Environment Pearson Education © 2009.
Introduction to Databases Transparencies
Database Environment Transparencies
CSE 4340/5349 Mobile Systems Engineering
Outline Introduction Background Distributed DBMS Architecture
Data and Applications Security Developments and Directions
Presentation transcript:

Mobile Databases: a Selection of Open Issues and Research Directions Authors: Rachid Guerraoui et al. Sources: SIGMOD Record, 33(2), pp.78-83, 2004 Adviser: Min-Shiang Hwang Speaker: Chun-Ta Li

Outline Introduction Data Synchronization Mobile Transactions Embedded Databases Data Privacy and Confidentiality P2P Dissemination Models Middleware Adaptability Conclusion Comments

Introduction Mobile Client – Fixed Host –Data Service Provider (banking data, agenda) –Servers broadcasting information (traffic, weather) Requirements –Data consistency (disconnected computing) –Data confidentiality –Data availability (new data access model)

Introduction (cont.) Mobile Client – Mobile Host –Portable folders (medical folder on a smart card, phonebook on a SIM card) Requirements –Database embedded in ultra-light devices –Data durability (replica – fixed network – crash resiliency) –Copy synchronization – collaborative applications –Query execution

Introduction (cont.) Fixed Client – Fixed Host –Moving objects –Authors do not cover this issue Hardware/Software constraints –Low bandwidth of wireless communication –Frequent disconnection –Scarce computing

Data Synchronization Disconnected work (merging divergent data) Three properties for synchronizing data –Causality preservation –Intention preservation –Convergence Every operation is processed in four steps –Generated at one site –Broadcasted to the other sites –Received by them –Executed remotely on them

Data Synchronization (cont.) Operational Transformation Model –Integration algorithm Receiving, broadcasting and executing operations –Transformation function Merging two concurrent operations defined on the same state Two research directions –Transformation model – short/longer disconnection –Minimize the size of the log (compression)

Mobile Transactions Transaction – mobile unit (MU) Disconnection – global commit –Unilateral commit –Time-out based Transactions at MU are grouped into long- duration transactions (LDT) –Local environment is initialized at the MU in connected mode –LDT are performed at the MU, possibly in disconnected mode and are locally committed –LDT are globally committed when the MU gets a stable connection with the fixed server

Mobile Transactions (cont.) To associate each LDT with a contract Main issue to the notion of contract –How to specify them –How to derive operational rules to maintain them at execution time –How to use them to facilitate the reintegration of locally modified copies with the server copies in order to increase the global commit rate

Embedded Databases Database techniques embedded in lightweight computing device – hardware constrained New important research efforts have to be undertaken –Capture the impact of each device hardware constraint on databases techniques –Propose new storage, indexing and query techniques –Set up co-design rules to help calibrating the hardware resources of future device

Data Privacy and Confidentiality Traditional data bases security principles –User authentication, communication encryption, server enforced access control et al. –Inoperative against insider attacks Server-based security approaches Client-based security approaches

Data Privacy and Confidentiality (cont.) C-SDA (Chip-Secured Data Access) –Client-based security component –Between client and an encrypted data –Embedded into a smart card to prevent any tampering to occur on the client side Requirements –More complex data (semi-structured data) –Push-based model (selective information broadcasting) –Sophisticated access right models (rules, permission, prohibition, obligation)

P2P Dissemination Models Traditional central database server –Failure and a performance bottleneck –Scalability Decentralize the database maintenance Questions –How do processes get to know each other, and how many do they need to know (membership maintenance) –How to make the connection between processes reflect the actual network topology –Which information to drop at a process when its storage buffer is full (buffer management) –Message filtering

Middleware Adaptability The adaptation at various levels –Applications, Middleware, System resources –From any place and any terminal type Research directions –Compatibility with standards (framework) –The middleware layer (reflection or self-adaptability properties) –The concept of fidelity (multi-dimensional) Temporal consistency, semantic consistency, security level, or data precision

Conclusion Strong hardware/software constrain Defined a number of research directions Performance, scale-up, quality, adaptability

Comments User aspects –Human friendly –Costs/Practicability Technical aspects –Performance (time/space) –Standard Applications