Research Article |
An Evaluation of the Proposed Security Access Control for BYOD Devices with Mobile Device Management (MDM)
Author(s): Jimshith V.T and Mary Amala Bai V
Published In : International Journal of Electrical and Electronics Research (IJEER) Volume 12, Issue 1
Publisher : FOREX Publication
Published : 28 march 2024
e-ISSN : 2347-470X
Page(s) : 276-284
Abstract
Bring Your Own Device (BYOD) at Work is a growing practice that has significantly increased network security vulnerabilities. This development has tremendous implications for both businesses and individuals in every organization. As a result of the extensive spreading of viruses, spyware, and other problematic downloads onto personal devices, the government has been forced to examine its data protection legislation. Dangerous apps are downloaded into personal devices without the user's awareness. As a result, both people and governments may suffer disastrous repercussions. In this research, proposed BYODs are troublesome since they can change policies without consent and expose private information. This type of privacy violation has a domino effect, resulting in substantial legal and financial consequences as well as decreased productivity for enterprises and governments. Governments have a daunting problem since they must protect networks from these threats while simultaneously considering user rights and privacy legislation. The framework of this paper that decreases the number of system limits and access control methods that are established for BYODs and cloud environments has been presented by the researchers of the study. They also attempted to protect user privacy by implementing Mobile Device Management (MDM) technology. The study's preliminary findings were optimistic, implying that the framework might reduce access control difficulties.
Keywords: BYOD
, Cloud environment
, Data security
, Malicious programs
, Network security
.
Jimshith V.T*, Research Scholar, Department of Computer Information Technology, Noorul Islam University, Thackalay, Tamil Nadu, India; Email: jimshith1980@gmail.com
Mary Amala Bai V, Associate Professor, Department of Computer Information Technology, Noorul Islam University, Thackalay, Tamil Nadu, India; Email: mamalas@gmail.com
-
[1] García-Teodoro, P.; Camacho, J.; Maciá-Fernández, G.; Gómez-Hernández, J. A.; López-Marín, V. J. A novel zero-trust network access control scheme based on the security profile of devices and users. Computer Networks 2022, Volume 212, pp. 109068. [CrossRef]
-
[2] Palanisamy, R.; Norman, A. A.; Mat Kiah, M. L. BYOD policy compliance: Risks and strategies in organizations. Journal of Computer Information Systems 2022, Volume 62, No 1, pp. 61-72. [CrossRef]
-
[3] Wani, T. A.; Mendoza, A.; Gray, K.; Smolenaers, F. Status of bring-your-own-device (BYOD) security practices in Australian hospitals–a national survey. Health Policy and Technology 2022, Volume 11, No 3, pp. 100627. [CrossRef]
-
[4] White, B. The Influence of BYOD Security Risk on SME Information Security Effectiveness (Doctoral dissertation, Capella University), 2022.
-
[5] Alothman, R. B.; Saada, I. I.; Al-Brge, B. S. B. A Performance-Based Comparative Encryption and Decryption Technique for Image and Video for Mobile Computing. Journal of Cases on Information Technology (JCIT) 2022, Volume 24, No 2, pp. 1-18. [CrossRef]
-
[6] Ratchford, M.; El-Gayar, O.; Noteboom, C.; Wang, Y. BYOD security issues: A systematic literature review. Information Security Journal: A Global Perspective 2022, Volume 31, No 3, pp. 253-273. [CrossRef]
-
[7] Ratchford, M.; El-Gayar, O.; Noteboom, C.; Wang, Y. BYOD security issues: A systematic literature review. Information Security Journal: A Global Perspective 2022, Volume 31, No 3, pp. 253-273. [CrossRef]
-
[8] Abisheka, P. C.; Azra, M. F.; Poobalan, A. V.; Wijekoon, J.; Yapa, K.; Murthaja, M. An Automated Solution for Securing Confidential Documents in a BYOD Environment. In 2021 3rd International Conference on Advancements in Computing (ICAC). IEEE, 2021, pp. 61-66. [CrossRef]
-
[9] AL-HARTHY, I. M.; ALI, N. A. DETERMINANTS OF BYOD PROTECTION BEHAVIOR: AN EMPLOYEE’S PERSPECTIVE. Journal of Theoretical and Applied Information Technology 2022, Volume 100, No 13.
-
[10] Ali, M. I.; Kaur, S. BYOD secured solution framework. Int. J. Eng. Adv. Technol. 2019, Volume 8, No 6, pp. 1602-1606.
-
[11] Ali, M. I.; Kaur, S. BYOD cyber threat detection and protection model. In 2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS) 2021, pp. 211-218. IEEE. [CrossRef]
-
[12] Jamal, F.; Abdullah, M. T.; Abdullah, A.; Hanapi, Z. M. Enhanced bring your own device (BYOD) environment security based on blockchain technology. International Journal of Engineering & Technology 2018, Volume 7, No 4.31, pp. 74-79. [CrossRef]
-
[13] Ganiyu, S. O.; Jimoh, R. G. Comparative analysis of risk evaluation models for risk-aware access control in bring your own device environment, 2018. [CrossRef]
-
[14] Ratchford, M. M. BYOD: a security policy evaluation model. In Information Technology-New Generations: 14th International Conference on Information Technology 2018, pp. 215-220. Springer International Publishing. [CrossRef]
-
[15] Zhang, D.; Han, X.; Deng, C. Review on the research and practice of deep learning and reinforcement learning in smart grids. CSEE Journal of Power and Energy Systems 2018, Volume 4, No 3, pp. 362-370. [CrossRef]
-
[16] Akeju, O.; Butakov, S.; Aghili, S. Main factors and good practices for managing BYOD and IoT risks in a K-12 environment. International Journal of Internet of Things and Cyber-Assurance 2018, Volume 1, No 1, pp. 22-39. [CrossRef]
-
[17] Almarhabi, K.; Jambi, K.; Eassa, F.; Batarfi, O. A Proposed Framework for Access Control in the Cloud and BYOD Environment. IJCSNS Int. J. Comput. Sci. Netw. Secur 2018, Volume 18, No 2, pp. 144-152. [CrossRef]
-
[18] Kebande, V. R.; Karie, N. M.; Venter, H. S. A generic Digital Forensic Readiness model for BYOD using honeypot technology. In 2016 IST-Africa Week Conference 2016, pp. 1-12. IEEE. [CrossRef]
-
[19] Raj, U. Certificate based hybrid authentication for bring your own device (BYOD) in Wi-Fi enabled environment. International Journal of Computer Science and Information Security (IJCSIS) 2015, Volume 13, No 12.
-
[20] Singh, M. M.; Siang, S. S.; San, O. Y.; Hashimah, N.; Malim, A. H.; Shariff, A. R. M. Security attacks taxonomy on bring your own devices (BYOD) model. International Journal of Mobile Network Communications & Telematics (IJMNCT) 2014, Volume 4, pp. 1-17. [CrossRef]
-
[21] AlHarthy, K.; Shawkat, W. Implement network security control solutions in BYOD environment. In 2013 IEEE International Conference on Control System, Computing and Engineering 2013, pp. 7-11. IEEE. [CrossRef]
-
[22] Ghosh, A.; Gajar, P. K.; Rai, S. Bring your own device (BYOD): Security risks and mitigating strategies. Journal of Global Research in Computer Science 2013, Volume 4, No 4, pp. 62-70.
-
[23] Ali, M. I.; Kaur, S.; Khamparia, A.; Gupta, D.; Kumar, S.; Khanna, A.; Al-Turjman, F. Security challenges and cyber forensic ecosystem in IOT driven BYOD environment. IEEE Access 2020, Volume 8, pp. 172770-172782. [CrossRef]
-
[24] Singh, M. M.; Siang, S. S.; San, O. Y.; Hashimah, N.; Malim, A. H.; Shariff, A. R. M. Security attacks taxonomy on bring your own devices (BYOD) model. International Journal of Mobile Network Communications & Telematics (IJMNCT) 2014, Volume 4, pp. 1-17. [CrossRef]
-
[25] Raj, U. Certificate based hybrid authentication for bring your own device (BYOD) in Wi-Fi enabled environment. International Journal of Computer Science and Information Security (IJCSIS) 2015, Volume 13, No 12.