Remote Mobile Screen (RMS): an approach for secure BYOD environments

被引:0
|
作者
Ocano, Santiago Gimenez [1 ]
Ramamurthy, Byrav [1 ]
Wang, Yong [2 ]
机构
[1] Univ Nebraska, Dept Comp Sci & Engn, Lincoln, NE 68588 USA
[2] Dakota State Univ, Coll Business & Informat Syst, Madison, SD 57042 USA
关键词
Bring your own device (BYOD); data confidentiality; policy enforcement; security; space isolation; virtualization;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The introduction of bring your own device (BYOD) policy in the corporate world creates benefits for companies as well as job satisfaction for the employee. However, it also creates challenges in terms of security as new vulnerabilities arise. In particular, these challenges include space isolation, data confidentiality, and policy compliance as well as handling the resource constraints of mobile devices and the intrusiveness created by installed applications seeking to perform BYOD functions. We present Remote Mobile Screen (RMS), an approach for secure BYOD environments that addresses all these challenges. In order to achieve this, the enterprise provides the employee with a trusted virtual machine running a mobile operating system, which is located in the enterprise network and to which the employee connects using the mobile BYOD device. We describe our proposed solution and discuss our experimental results. Finally, we discuss advantages and disadvantages of RMS and possible future work.
引用
收藏
页码:52 / 56
页数:5
相关论文
共 50 条
  • [21] Portable and Secure Multimedia Data Transfer in Mobile Phones Using Record Management Store (RMS)
    Shahiduzzaman, M.
    Naznin, Mahmuda
    Rahman, Akond Ashfaque Ur
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 5, 2010, : 364 - 367
  • [22] An approach for secure usability for ambient intelligence environments
    Hoehn, Sebastian
    Accorsi, Rafael
    Maier, Mathias
    LONG-TERM AND DYNAMICAL ASPECTS OF INFORMATION SECURITY: EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, 2007, : 1 - 17
  • [23] Secure and Efficient Mobile DNN Using Trusted Execution Environments
    Hu, Bin
    Wang, Yan
    Cheng, Jerry
    Zhao, Tianming
    Xie, Yucheng
    Guo, Xiaonan
    Chen, Yingying
    PROCEEDINGS OF THE 2023 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ASIA CCS 2023, 2023, : 274 - 285
  • [24] Secure and Anonymous Authentication Scheme for Mobile Edge Computing Environments
    Lee, Hakjun
    Ryu, Jihyeon
    Won, Dongho
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (04): : 5798 - 5815
  • [25] A secure flash card solution for remote access for mobile workforce
    Kato, T
    Tsunehiro, T
    Tsunoda, M
    Miyake, J
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2003, 49 (03) : 561 - 566
  • [26] Remote Protection for Mobile Apps in Cloud Computing Environments
    Feng, Sha
    Zhao, Shuang
    Feng, Shiduo
    Zhang, Yanchao
    PROCEEDINGS OF 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA 2015), 2015, : 681 - 684
  • [27] REMOTE MOBILE VEHICLES FOR WORK APPLICATIONS IN HAZARDOUS ENVIRONMENTS
    LEFKOWITZ, S
    SCHWARTZTRAUBER, KE
    TRANSACTIONS OF THE AMERICAN NUCLEAR SOCIETY, 1985, 49 (JUN): : 309 - 310
  • [28] A Secure Communication Approach for Mobile Intelligent Terminal
    Zhang, Fan
    Zhang, Cong
    Xu, Mingdi
    Yang, Minghui
    2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 14 - 17
  • [29] A secure approach for mobile agent migration control
    Guan, SU
    Wang, TH
    Ong, SH
    ISCC 2002: SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2002, : 741 - 746
  • [30] Hybrid approach for secure mobile agent computations
    McDonald, J. Todd
    SECURE MOBILE AD-HOC NETWORKS AND SENSORS, 2006, 4074 : 38 - 53