An Evaluation of the Proposed Framework for Access Control in the Cloud and BYOD Environment

Abstract

As the bring your own device (BYOD) to work trend grows, so do the network security risks. This fast-growing trend has huge benefits for both employees and employers. With malware, spyware and other malicious downloads, tricking their way onto personal devices, organizations need to consider their information security policies. Malicious programs can download onto a personal device without a user even knowing. This can have disastrous results for both an organization and the personal device. When this happens, it risks BYODs making unauthorized changes to policies and leaking sensitive information into the public domain. A privacy breach can cause a domino effect with huge financial and legal implications, and loss of productivity for organizations. This is a difficult challenge. Organizations need to consider user privacy and rights together with protecting networks from attacks. This paper evaluates a new architectural framework to control the risks that challenge organizations and the use of BYODs. After analysis of large volumes of research, the previous studies addressed single issues. We integrated parts of these single solutions into a new framework to develop a complete solution for access control. With too many organizations failing to implement and enforce adequate security policies, the process needs to be simpler. This framework reduces system restrictions while enforcing access control policies for BYOD and cloud environments using an independent platform. Primary results of the study are positive with the framework reducing access control issues.

Authors and Affiliations

Khalid Almarhabi, Kamal Jambi, Fathy Eassa, Omar Batarfi

Keywords

Related Articles

Lifetime Maximization on Scalable Stable Election Protocol for Large Scale Traffic Engineering

Recently, Wireless Sensor Networks (WSNs) are getting more fame because of low cost and easy to manage and maintain. WSNs consists of sensor nodes and a Base Station (BS). Sensor nodes are responsible to sense, transmit...

Natural Language Processing and its Use in Education

Natural Language Processing (NLP) is an effective approach for bringing improvement in educational setting. Implementing NLP involves initiating the process of learning through the natural acquisition in the educational...

Face Retrieval Based On Local Binary Pattern and Its Variants: A Comprehensive Study

Face retrieval (FR) is one of the specific fields in content-based image retrieval (CBIR). Its aim is to search relevant faces in large database based on the contents of the images rather than the metadata. It has many a...

A Format-Compliant Selective Encryption Scheme for Real-Time Video Streaming of the H.264/AVC

H.264 video coding standard is one of the most promising techniques for the future video communications. In fact, it supports a broad range of applications. Accordingly, with the continuous promotion of multimedia servic...

Efficient Load Balancing Routing Technique for Mobile Ad Hoc Networks

The mobile ad hoc network (MANET) is nothing but the wireless connection of mobile nodes which provides the communication and mobility among wireless nodes without the need of any physical infrastructure or centralized d...

Download PDF file
  • EP ID EP407500
  • DOI 10.14569/IJACSA.2018.091026
  • Views 66
  • Downloads 0

How To Cite

Khalid Almarhabi, Kamal Jambi, Fathy Eassa, Omar Batarfi (2018). An Evaluation of the Proposed Framework for Access Control in the Cloud and BYOD Environment. International Journal of Advanced Computer Science & Applications, 9(10), 213-221. https://europub.co.uk/articles/-A-407500