Security made easy. IBM Worklight JSONStore
Christian Karasiewicz 270005XS4E Visits (8041)
This blog post is contributed by Virginijus Kaminas, a software engineer for a newly formed Mobile Center of Competency team for Industry Solutions. He has been a part of the Extreme Blue program and helped to develop Android/iOS applications which optimize Portal/WCM content consumption on tablet devices.
The world has embraced mobile technology with open arms, but we are still wary of the challenges that are hidden inside. Security is one of the most talked about topics in software development, and developers are now responsible for ensuring our mobile phone and tablet virtual safety.
With bring your own device (BYOD) becoming a worldwide accepted policy, security is even more important. Companies want assurance that personal devices are safe, that sensitive data is protected and that losing your phone will warrant minimal losses.
One of the important factors closely related to security and mobile device protection is on-device storage. Data is everywhere, and how it is stored is an important concept that I will cover in this blog post.
The JSONStore feature will save time and effort as it negates the need to develop, implement and test new on-device storage mechanisms. It provides:
It is important to note that JSONStore is not supported in the IBM Worklight-supplied mobile browser simulator.
JSONStore data cannot be accessed from the native code. It is only accessible in hybrid environments.
In order to check the size of the JSONStore, Cordova APIs can be used.
Unless the application is removed or JSONStore APIs are explicitly used, the data is persistent.
It is possible to enforce data encryption locally without the need to connect to the server.
In order to improve performance, it is encouraged to avoid using a fuzzy search as it is capable of returning partial results and therefore is more computationally difficult to execute.
IBM Worklight simplifies the business requirements by providing features that are wanted and needed by everyone.
For more information associated with IBM Worklight security, consult the Securing Your Mobile Business with IBM Worklight Redpaper.