Javascript must be enabled to continue!
Enhanced Bring your Own Device (BYOD) Environment Security based on Blockchain Technology
View through CrossRef
BYOD is a practice by many organizations where employees can use their personal devices for work purpose. BYOD may bring a lot of advantages, but it also leads to security issues such as data leakages. Data can be leaked because of the weak authentication technique used to verify the user and the device. A secure authentication technique is what the organization needs that equip with high security features. Blockchain is the answer to this because blockchain used cryptographic technology that’s not easy for hacker to break. This research proposes a user trust model that includes multifactor authentication combining with public and private key generated by blockchain and an agentless device trust model that can scan for malware and detect the device location. In order to secure the record and sensitive data, the record keeping model is built using blockchain technology where every activity related to the record is recorded in the digital ledger. This ledger can be used as evidence collection for further investigation. It is hoped the proposed BYOD trust model solution can help organizations to minimize the number of cases in data leakage while allowing BYOD concept. Â
Science Publishing Corporation
Title: Enhanced Bring your Own Device (BYOD) Environment Security based on Blockchain Technology
Description:
BYOD is a practice by many organizations where employees can use their personal devices for work purpose.
BYOD may bring a lot of advantages, but it also leads to security issues such as data leakages.
Data can be leaked because of the weak authentication technique used to verify the user and the device.
A secure authentication technique is what the organization needs that equip with high security features.
Blockchain is the answer to this because blockchain used cryptographic technology that’s not easy for hacker to break.
This research proposes a user trust model that includes multifactor authentication combining with public and private key generated by blockchain and an agentless device trust model that can scan for malware and detect the device location.
In order to secure the record and sensitive data, the record keeping model is built using blockchain technology where every activity related to the record is recorded in the digital ledger.
This ledger can be used as evidence collection for further investigation.
It is hoped the proposed BYOD trust model solution can help organizations to minimize the number of cases in data leakage while allowing BYOD concept.
  .
Related Results
Implementation of BYOD Security Policy in Malaysia Institutions of Higher Learning (MIHL): An Overview
Implementation of BYOD Security Policy in Malaysia Institutions of Higher Learning (MIHL): An Overview
The BYOD Security Policy (BYOD-SP) constitutes formal documentation protecting sensitive data and information during BYOD implementation in an organization. The BYOD environment in...
Factors influencing the adoption of the BYOD policy in teaching hospitals: A cross-sectional study from Southeastern Iran
Factors influencing the adoption of the BYOD policy in teaching hospitals: A cross-sectional study from Southeastern Iran
Introduction
Clinicians are increasingly using their devices for work at hospitals, a practice known as Bring-your-own-device (BYOD), to enhance productivity and mobility. This stu...
Convergence and representation of blockchain and smart contracts using the semantic web
Convergence and representation of blockchain and smart contracts using the semantic web
The Internet and the World Wide Web were designed with the intention of being decentralised and interoperable, and therefore more democratic, where users have power over their data...
BYOD Systematic Literature review: A layered approach
BYOD Systematic Literature review: A layered approach
Introduction: Bring your own device (BYOD) is a paradigm where employees use personal devices for organizational related activities. Various benefits accrued by both employees and ...
La qualification de la blockchain
La qualification de la blockchain
La création de la blockchain a remis en question les notions traditionnelles de collaboration et d'échange. Cette thèse vise à démontrer que cette innovation n'est pas seulement te...
Anomaly Detection in Blockchain Using Machine Learning
Anomaly Detection in Blockchain Using Machine Learning
Blockchain technology has gained significant attention as a secure and decentralized platform for various applications. However, the immutable and distributed nature of blockchain ...
INTEGRATING AI WITH BLOCKCHAIN FOR ENHANCED FINANCIAL SERVICES SECURITY
INTEGRATING AI WITH BLOCKCHAIN FOR ENHANCED FINANCIAL SERVICES SECURITY
Integrating artificial intelligence (AI) with blockchain technology presents a transformative approach to enhancing security in financial services. This fusion leverages the streng...
New Model of Sustainable Supply Chain Finance Based on Blockchain Technology
New Model of Sustainable Supply Chain Finance Based on Blockchain Technology
Blockchain technology has received more and more attention from all walks of life and has also been sought after by the market and financial institutions. More and more financial i...

