Affiliation:
1. College of Computer and Information Sciences, Prince Sultan University, Riyadh 11586, Saudi Arabia
Abstract
To address a business need, most organizations allow employees to use their own devices to enhance productivity and job satisfaction. For this purpose, the Bring Your Own Device (BYOD) policy provides controllable access for employees to organize data through their personal devices. Although the BYOD practice implies plenty of advantages, this also opens the door to a variety of security risks. This study investigates these security risks and proposes a complementary encryption approach with a digital signature that uses symmetric and asymmetric algorithms, depending on the organization’s digital certificate, to secure sensitive information stored in employees’ devices within the framework of BYOD policies. The method uses Advanced Encryption System (AES), Blowfish, RSA and ElGamal with a digital signature to achieve strong encryption and address critical security considerations such as user authentication, confidentiality and data integrity. The proposed encryption approach offers a robust and effective cryptographic solution for securing sensitive information in organizational settings that involve BYOD policies. The study includes experimental results demonstrating the proposed approach’s efficiency and performance, with reasonable encryption and decryption times for different key and file sizes. The results of the study revealed that AES and Blowfish have the best execution time. AES has a good balance of security and performance. RSA performs better than ElGamal in encryption and signature verification, while RSA is slower than ElGamal in decryption. The study also provides a comparative analysis with previous studies of the four encryption algorithms, highlighting the strengths and weaknesses of each approach.
Reference35 articles.
1. Perera, S., Jin, X., Maurushat, A., and Opoku, D.-G.J. (2022). Factors affecting reputational damage to organisations due to cyberattacks. Informatics, 9.
2. Systematic review on social engineering: Hacking by manipulating humans;Bhusal;J. Inf. Secur.,2021
3. BYOD Policy Compliance: Risks and Strategies in Organizations;Palanisamy;J. Comput. Inf. Syst.,2022
4. Hertel, G., Stone, D.L., and Johnson, R.D. (2017). The Wiley Blackwell Handbook of the Psychology of the Internet at Work, John Wiley & Sons.
5. Business Wire (2023, March 09). Bitglass 2020 BYOD Report: Increased Remote Work Drives BYOD, But Security Is Not Keeping Pace. Available online: https://www.businesswire.com/news/home/20200708005267/en/Bitglass-2020-BYOD-Report-Increased-Remote-Work-Drives-BYOD-but-Security-is-Not-Keeping-Pace.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献