Enhancing Organizational Data Security on Employee-Connected Devices Using BYOD Policy

Author:

AlShalaan Manal Rajeh1,Fati Suliman Mohamed1ORCID

Affiliation:

1. College of Computer and Information Sciences, Prince Sultan University, Riyadh 11586, Saudi Arabia

Abstract

To address a business need, most organizations allow employees to use their own devices to enhance productivity and job satisfaction. For this purpose, the Bring Your Own Device (BYOD) policy provides controllable access for employees to organize data through their personal devices. Although the BYOD practice implies plenty of advantages, this also opens the door to a variety of security risks. This study investigates these security risks and proposes a complementary encryption approach with a digital signature that uses symmetric and asymmetric algorithms, depending on the organization’s digital certificate, to secure sensitive information stored in employees’ devices within the framework of BYOD policies. The method uses Advanced Encryption System (AES), Blowfish, RSA and ElGamal with a digital signature to achieve strong encryption and address critical security considerations such as user authentication, confidentiality and data integrity. The proposed encryption approach offers a robust and effective cryptographic solution for securing sensitive information in organizational settings that involve BYOD policies. The study includes experimental results demonstrating the proposed approach’s efficiency and performance, with reasonable encryption and decryption times for different key and file sizes. The results of the study revealed that AES and Blowfish have the best execution time. AES has a good balance of security and performance. RSA performs better than ElGamal in encryption and signature verification, while RSA is slower than ElGamal in decryption. The study also provides a comparative analysis with previous studies of the four encryption algorithms, highlighting the strengths and weaknesses of each approach.

Funder

Prince Sultan University

Publisher

MDPI AG

Subject

Information Systems

Reference35 articles.

1. Perera, S., Jin, X., Maurushat, A., and Opoku, D.-G.J. (2022). Factors affecting reputational damage to organisations due to cyberattacks. Informatics, 9.

2. Systematic review on social engineering: Hacking by manipulating humans;Bhusal;J. Inf. Secur.,2021

3. BYOD Policy Compliance: Risks and Strategies in Organizations;Palanisamy;J. Comput. Inf. Syst.,2022

4. Hertel, G., Stone, D.L., and Johnson, R.D. (2017). The Wiley Blackwell Handbook of the Psychology of the Internet at Work, John Wiley & Sons.

5. Business Wire (2023, March 09). Bitglass 2020 BYOD Report: Increased Remote Work Drives BYOD, But Security Is Not Keeping Pace. Available online: https://www.businesswire.com/news/home/20200708005267/en/Bitglass-2020-BYOD-Report-Increased-Remote-Work-Drives-BYOD-but-Security-is-Not-Keeping-Pace.

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Secure data encryption key scenario for protecting private data security and privacy;Journal of Discrete Mathematical Sciences and Cryptography;2024

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3