Document Details
Document Type |
: |
Thesis |
Document Title |
: |
SECURITY FRAMEWORK FOR THE CLOUD AND BYOD ENVIRONMENT إطار حماية لبيئة السحابة والأجهزة الخاصة |
Subject |
: |
Faculty of Computing and Information Technology |
Document Language |
: |
Arabic |
Abstract |
: |
Bring Your Own Device (BYOD) is growing in popularity. The benefits of BYOD are virtually limitless, and they include financial gain, greater employee satisfaction levels, elevated morale, increased job efficiency, and improved flexibility. However, this inevitable and unstoppable trend poses new security risks and challenges in controlling and managing corporate networks and data. BYOD may be infected by viruses, spyware, or malware that can gain access to sensitive data, leading to the disclosure of information, modified access policies, disruption of service, loss of productivity, financial issues, and legal implications. This research focuses on access control issues and attempts to address the following problems: lack of access control enforcement, untrusted BYOD devices, lack of data and policy protection, platform dependency, and lack of respect for users’ privacy.
Existing access control solutions in BYOD and cloud environments face several challenges, including restrictions on choosing BYOD devices, platform dependency, and modifying operating systems of servers. Therefore, understanding the BYOD environment and building new suitable access control mechanisms will be a key component to achieving a high level of authorization. Thus, new approaches are needed.
The research introduces a new security framework using new and integrated techniques to implement access control policies in the cloud and BYOD environment. This solution is derived from large volumes of research into information privacy and security to manage and control access to enterprise networks by BYODs. This research has been achieved via loosely coupled integration of Mandatory Access Control (MAC) and Discretionary Access Control (DAC) mechanisms in the BYOD environment. With the proposed techniques, software agents are used to enforce access control policies and to prevent untrusted devices from accessing sensitive corporate data. In order to enhance the access control mechanism, we secured access control policies during the transfer, process, and storage phases. The experiment part of this research shows positive results. It has reduced restrictions and enforced access control policies in the cloud and BYOD environment in a soft and secure manner with an independent platform. The research provides solutions and a framework for cloud providers and those who implement the BYOD trend in their enterprises. |
Supervisor |
: |
Prof. Kamal Mansor Jambi |
Thesis Type |
: |
Doctorate Thesis |
Publishing Year |
: |
1439 AH
2018 AD |
Co-Supervisor |
: |
Dr. Omar Abdullah Batarfi |
Added Date |
: |
Thursday, May 3, 2018 |
|
Researchers
خالد علي المرحبي | Almarhabi, Khalid Ali | Researcher | Doctorate | |
|
Back To Researches Page
|