FOREX Press I. J. of Electrical & Electronics Research
Support Open Access

Research Article |

An Evaluation of the Proposed Security Access Control for BYOD Devices with Mobile Device Management (MDM)

Author(s): Jimshith V.T and Mary Amala Bai V

Publisher : FOREX Publication

Published : 28 march 2024

e-ISSN : 2347-470X

Page(s) : 276-284




Jimshith V.T*, Research Scholar, Department of Computer Information Technology, Noorul Islam University, Thackalay, Tamil Nadu, India; Email: jimshith1980@gmail.com

Mary Amala Bai V, Associate Professor, Department of Computer Information Technology, Noorul Islam University, Thackalay, Tamil Nadu, India; Email: mamalas@gmail.com

    [1] García-Teodoro, P.; Camacho, J.; Maciá-Fernández, G.; Gómez-Hernández, J. A.; López-Marín, V. J. A novel zero-trust network access control scheme based on the security profile of devices and users. Computer Networks 2022, Volume 212, pp. 109068. [CrossRef]
    [2] Palanisamy, R.; Norman, A. A.; Mat Kiah, M. L. BYOD policy compliance: Risks and strategies in organizations. Journal of Computer Information Systems 2022, Volume 62, No 1, pp. 61-72. [CrossRef]
    [3] Wani, T. A.; Mendoza, A.; Gray, K.; Smolenaers, F. Status of bring-your-own-device (BYOD) security practices in Australian hospitals–a national survey. Health Policy and Technology 2022, Volume 11, No 3, pp. 100627. [CrossRef]
    [4] White, B. The Influence of BYOD Security Risk on SME Information Security Effectiveness (Doctoral dissertation, Capella University), 2022.
    [5] Alothman, R. B.; Saada, I. I.; Al-Brge, B. S. B. A Performance-Based Comparative Encryption and Decryption Technique for Image and Video for Mobile Computing. Journal of Cases on Information Technology (JCIT) 2022, Volume 24, No 2, pp. 1-18. [CrossRef]
    [6] Ratchford, M.; El-Gayar, O.; Noteboom, C.; Wang, Y. BYOD security issues: A systematic literature review. Information Security Journal: A Global Perspective 2022, Volume 31, No 3, pp. 253-273. [CrossRef]
    [7] Ratchford, M.; El-Gayar, O.; Noteboom, C.; Wang, Y. BYOD security issues: A systematic literature review. Information Security Journal: A Global Perspective 2022, Volume 31, No 3, pp. 253-273. [CrossRef]
    [8] Abisheka, P. C.; Azra, M. F.; Poobalan, A. V.; Wijekoon, J.; Yapa, K.; Murthaja, M. An Automated Solution for Securing Confidential Documents in a BYOD Environment. In 2021 3rd International Conference on Advancements in Computing (ICAC). IEEE, 2021, pp. 61-66. [CrossRef]
    [9] AL-HARTHY, I. M.; ALI, N. A. DETERMINANTS OF BYOD PROTECTION BEHAVIOR: AN EMPLOYEE’S PERSPECTIVE. Journal of Theoretical and Applied Information Technology 2022, Volume 100, No 13.
    [10] Ali, M. I.; Kaur, S. BYOD secured solution framework. Int. J. Eng. Adv. Technol. 2019, Volume 8, No 6, pp. 1602-1606.
    [11] Ali, M. I.; Kaur, S. BYOD cyber threat detection and protection model. In 2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS) 2021, pp. 211-218. IEEE. [CrossRef]
    [12] Jamal, F.; Abdullah, M. T.; Abdullah, A.; Hanapi, Z. M. Enhanced bring your own device (BYOD) environment security based on blockchain technology. International Journal of Engineering & Technology 2018, Volume 7, No 4.31, pp. 74-79. [CrossRef]
    [13] Ganiyu, S. O.; Jimoh, R. G. Comparative analysis of risk evaluation models for risk-aware access control in bring your own device environment, 2018. [CrossRef]
    [14] Ratchford, M. M. BYOD: a security policy evaluation model. In Information Technology-New Generations: 14th International Conference on Information Technology 2018, pp. 215-220. Springer International Publishing. [CrossRef]
    [15] Zhang, D.; Han, X.; Deng, C. Review on the research and practice of deep learning and reinforcement learning in smart grids. CSEE Journal of Power and Energy Systems 2018, Volume 4, No 3, pp. 362-370. [CrossRef]
    [16] Akeju, O.; Butakov, S.; Aghili, S. Main factors and good practices for managing BYOD and IoT risks in a K-12 environment. International Journal of Internet of Things and Cyber-Assurance 2018, Volume 1, No 1, pp. 22-39. [CrossRef]
    [17] Almarhabi, K.; Jambi, K.; Eassa, F.; Batarfi, O. A Proposed Framework for Access Control in the Cloud and BYOD Environment. IJCSNS Int. J. Comput. Sci. Netw. Secur 2018, Volume 18, No 2, pp. 144-152. [CrossRef]
    [18] Kebande, V. R.; Karie, N. M.; Venter, H. S. A generic Digital Forensic Readiness model for BYOD using honeypot technology. In 2016 IST-Africa Week Conference 2016, pp. 1-12. IEEE. [CrossRef]
    [19] Raj, U. Certificate based hybrid authentication for bring your own device (BYOD) in Wi-Fi enabled environment. International Journal of Computer Science and Information Security (IJCSIS) 2015, Volume 13, No 12.
    [20] Singh, M. M.; Siang, S. S.; San, O. Y.; Hashimah, N.; Malim, A. H.; Shariff, A. R. M. Security attacks taxonomy on bring your own devices (BYOD) model. International Journal of Mobile Network Communications & Telematics (IJMNCT) 2014, Volume 4, pp. 1-17. [CrossRef]
    [21] AlHarthy, K.; Shawkat, W. Implement network security control solutions in BYOD environment. In 2013 IEEE International Conference on Control System, Computing and Engineering 2013, pp. 7-11. IEEE. [CrossRef]
    [22] Ghosh, A.; Gajar, P. K.; Rai, S. Bring your own device (BYOD): Security risks and mitigating strategies. Journal of Global Research in Computer Science 2013, Volume 4, No 4, pp. 62-70.
    [23] Ali, M. I.; Kaur, S.; Khamparia, A.; Gupta, D.; Kumar, S.; Khanna, A.; Al-Turjman, F. Security challenges and cyber forensic ecosystem in IOT driven BYOD environment. IEEE Access 2020, Volume 8, pp. 172770-172782. [CrossRef]
    [24] Singh, M. M.; Siang, S. S.; San, O. Y.; Hashimah, N.; Malim, A. H.; Shariff, A. R. M. Security attacks taxonomy on bring your own devices (BYOD) model. International Journal of Mobile Network Communications & Telematics (IJMNCT) 2014, Volume 4, pp. 1-17. [CrossRef]
    [25] Raj, U. Certificate based hybrid authentication for bring your own device (BYOD) in Wi-Fi enabled environment. International Journal of Computer Science and Information Security (IJCSIS) 2015, Volume 13, No 12.

Jimshith V.T and Mary Amala Bai V (2024), An Evaluation of the Proposed Security Access Control for BYOD Devices with Mobile Device Management (MDM). IJEER 12(1), 276-284. DOI: 10.37391/IJEER.120138.