An Evaluation of the Proposed Framework for Access Control in the Cloud and BYOD Environment
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 10
Abstract
As the bring your own device (BYOD) to work trend grows, so do the network security risks. This fast-growing trend has huge benefits for both employees and employers. With malware, spyware and other malicious downloads, tricking their way onto personal devices, organizations need to consider their information security policies. Malicious programs can download onto a personal device without a user even knowing. This can have disastrous results for both an organization and the personal device. When this happens, it risks BYODs making unauthorized changes to policies and leaking sensitive information into the public domain. A privacy breach can cause a domino effect with huge financial and legal implications, and loss of productivity for organizations. This is a difficult challenge. Organizations need to consider user privacy and rights together with protecting networks from attacks. This paper evaluates a new architectural framework to control the risks that challenge organizations and the use of BYODs. After analysis of large volumes of research, the previous studies addressed single issues. We integrated parts of these single solutions into a new framework to develop a complete solution for access control. With too many organizations failing to implement and enforce adequate security policies, the process needs to be simpler. This framework reduces system restrictions while enforcing access control policies for BYOD and cloud environments using an independent platform. Primary results of the study are positive with the framework reducing access control issues.
Authors and Affiliations
Khalid Almarhabi, Kamal Jambi, Fathy Eassa, Omar Batarfi
A Survey on the Cryptographic Encryption Algorithms
Security is the major concern when the sensitive information is stored and transferred across the internet where the information is no longer protected by physical boundaries. Cryptography is an essential, effective and...
An autonomous intelligent gateway for wireless sensor network based on mobile node
One of the recent tendencies for Wireless Sensor Networks (WSNs) that significantly increases their performance and functionality is the utilization of mobile nodes. This paper describes the software architecture of an i...
Effectiveness of Existing CAD-Based Research Work towards Screening Breast Cancer
Accurate detection as well as classification of the breast cancer is still an unsolved question in the medical image processing techniques. We reviewed the existing Computer Aided Diagnosis (CAD)-based techniques to find...
Geographic Routing Using Logical Levels in Wireless Sensor Networks for Sensor Mobility
In this paper we propose an improvement to the GRPW algorithm for wireless sensor networks called GRPW-M , which collects data in a wireless sensor network (WSN) using a mobile nodes. Performance of GRPW algorithm algori...
Dynamic Access Control Policy based on Blockchain and Machine Learning for the Internet of Things
The Internet of Things (IoT) is now destroying the barriers between the real and digital worlds. However, one of the huge problems that can slow down the development of this global wave, or even stop it, concerns securit...