Enhanced Bring your Own Device (BYOD) Environment Security based on Blockchain Technology

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    BYOD is a practice by many organizations where employees can use their personal devices for work purpose. BYOD may bring a lot of advantages, but it also leads to security issues such as data leakages. Data can be leaked because of the weak authentication technique used to verify the user and the device. A secure authentication technique is what the organization needs that equip with high security features. Blockchain is the answer to this because blockchain used cryptographic technology that’s not easy for hacker to break. This research proposes a user trust model that includes multifactor authentication combining with public and private key generated by blockchain and an agentless device trust model that can scan for malware and detect the device location. In order to secure the record and sensitive data, the record keeping model is built using blockchain technology where every activity related to the record is recorded in the digital ledger. This ledger can be used as evidence collection for further investigation. It is hoped the proposed BYOD trust model solution can help organizations to minimize the number of cases in data leakage while allowing BYOD concept.



  • Keywords

    Authentication; Blockchain; BYOD; Data Leakage.

  • References

      [1] N. Leavitt, “Security Requires a New Approach,” pp. 16–19, 2017.

      [2] J. Ni, X. Lin, K. Zhang, Y. Yu, and X. S. Shen, “Device-invisible two-factor authenticated key agreement protocol for BYOD,” 2016 IEEE/CIC Int. Conf. Commun. China, ICCC 2016, 2016.

      [3] A. Mishra and K. Jani, “Comparative study on bring your own technology [BYOT]: Applications & security,” Int. Conf. Electr. Electron. Signals, Commun. Optim. EESCO 2015, 2015.

      [4] G. Thomson, “BYOD: Enabling the chaos,” Network Security, vol. 2012, no. 2, Elsevier Ltd, pp. 5–8, 2012.

      [5] V. Gupta, D. Sangroha, and L. Dhiman, “An Approach to Implement Bring Your Own Device ( BYOD ) Securely,” Int. J. Eng. Innov. Res., vol. 2, no. 2, pp. 154–156, 2013.

      [6] P. Mamoshina et al., “Converging blockchain and next-generation artificial intelligence technologies to decentralize and accelerate biomedical research and healthcare,” Oncotarget, vol. 9, no. 5, pp. 5665–5690, 2015.

      [7] W. Ying, S. Jia, and W. Du, “Digital enablement of blockchain: Evidence from HNA group,” Int. J. Inf. Manage., vol. 39, no. October 2017, pp. 1–4, 2018.

      [8] M. Swan, Blockchain BLUEPRINT FOR A NEW ECONOMY, First Edit. O’Reilly Media, Inc, 2015.

      [9] M. Olalere, M. T. Abdullah, R. Mahmod, and A. Abdullah, “Bring Your Own Device: Security Challenges and A theoretical Framework for Two-Factor Authentication,” Int. J. Comput. Networks Commun. Secur., vol. 4, no. 1, pp. 21–32, 2016.

      [10] M. M. Singh et al., “SECURITY ATTACKS TAXONOMY ON BRING YOUR OWN DEVICES ( BYOD ),” vol. 4, no. 5, pp. 1–17, 2014.

      [11] C. Bhatt and P. D. Kapgate, “Data Leakage Detection Using GSM,” vol. 3, no. 6, pp. 873–877, 2014.

      [12] Y. Wang, J. Wei, and K. Vangury, “Bring Your Own Device Security Issues and Challenges,” in The 11th Annual IEEE CCNC- Mobile Device, Platform and Communication Bring, 2014, pp. 80–85.

      [13] T. Vmware and M. Secure, “Mobile Secure Workplace – White Paper: VMware, Inc.,” 2013.

      [14] J. Bradley, J. Loucks, J. Macaulay, R. Medcalf, and L. Buckalew, “BYOD: A Global Perspective Harnessing Employee-Led Innovation Executive Summary Horizons Cisco IBSG Introduction: BYOD Has Gone Global,” 2012.

      [15] M. Networks, “BYOD Best Practices,” 2012.

      [16] C.-C. Chang, W. Cheng-Chieh, and S.-C. Chen, “The Influence of Bring Your Own Device on the Psychological Climate at Workplace,” in Proceedings of the Sixteenth International Conference on Electronic Commerce - ICEC ’14, 2014, pp. 9–16.

      [17] W. Peng, F. Li, K. J. Han, X. Zou, and J. Wu, “T-dominance: Prioritized defense deployment for BYOD security,” in 2013 IEEE Conference on Communications and Network Security, CNS 2013, 2013.

      [18] H. M. Gazali, R. Hassan, R. M. Nor, and H. M. M. Rahman, “Re-inventing PTPTN Study Loan With Blockchain and Smart Contracts,” 2017.

      [19] Archa, B. Alangot, and K. Achuthan, “Trace and track: Enhanced pharma supply chain infrastructure to prevent fraud,” in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 2018.

      [20] I. Zikratov, A. Kuzmin, V. Akimenko, V. Niculichev, and L. Yalansky, “Ensuring data integrity using blockchain technology,” Conf. Open Innov. Assoc. Fruct, vol. 2017–April, pp. 534–539, 2017.

      [21] N. Kshetri, “Blockchain ’ s roles in meeting key supply chain management objectives,” Int. J. Inf. Manage., vol. 39, no. December 2017, pp. 80–89, 2018.

      [22] Q. Xu, K. Mi, M. Aung, Y. Zhu, and K. L. Yong, “A Blockchain-Based Storage System for Data Analytics in the Internet of Things,” Springer Int. Publ. AG 2018, pp. 119–138, 2018.

      [23] R. Wattenhofer, The Science Of the Blockchain. Inverted Forest Publishing, 2016.

      [24] F. Kosmatos, “IBM Institute of Business Value: Rethinking Enterprises, Ecosystems and Economies with Blockchains.,” IBM Institute for Business Value, no. March, 2017.

      [25] Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, “An Overview of Blockchain Technology : Architecture , Consensus , and Future Trends,” 2017.

      [26] J. D. Bruce, “The Mini-Blockchain Scheme,” 2014.

      [27] M. Csail, M. F. Kaashoek, and N. Zeldovich, “VerSum: Verifiable Computations over Large Public Logs Jelle van den Hooff,” 2014.

      [28] I. Eyal, A. E. Gencer, E. G. Sirer, and R. van Renesse, “Bitcoin-NG: A Scalable Blockchain Protocol,” 2015.

      [29] J. H. Ziegeldorf, R. Matzutt, M. Henze, F. Grossmann, and K. Wehrle, “Secure and anonymous decentralized Bitcoin mixing,” Futur. Gener. Comput. Syst., vol. 80, pp. 448–466, 2018.

      [30] A. Azaria, A. Ekblaw, T. Vieira, and A. Lippman, “MedRec: Using blockchain for medical data access and permission management,” Proc. - 2016 2nd Int. Conf. Open Big Data, OBD 2016, pp. 25–30, 2016.




Article ID: 23345
DOI: 10.14419/ijet.v7i4.31.23345

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.