Remote Mobile Screen (RMS): an approach for secure BYOD environments

被引:0
|
作者
Ocano, Santiago Gimenez [1 ]
Ramamurthy, Byrav [1 ]
Wang, Yong [2 ]
机构
[1] Univ Nebraska, Dept Comp Sci & Engn, Lincoln, NE 68588 USA
[2] Dakota State Univ, Coll Business & Informat Syst, Madison, SD 57042 USA
关键词
Bring your own device (BYOD); data confidentiality; policy enforcement; security; space isolation; virtualization;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The introduction of bring your own device (BYOD) policy in the corporate world creates benefits for companies as well as job satisfaction for the employee. However, it also creates challenges in terms of security as new vulnerabilities arise. In particular, these challenges include space isolation, data confidentiality, and policy compliance as well as handling the resource constraints of mobile devices and the intrusiveness created by installed applications seeking to perform BYOD functions. We present Remote Mobile Screen (RMS), an approach for secure BYOD environments that addresses all these challenges. In order to achieve this, the enterprise provides the employee with a trusted virtual machine running a mobile operating system, which is located in the enterprise network and to which the employee connects using the mobile BYOD device. We describe our proposed solution and discuss our experimental results. Finally, we discuss advantages and disadvantages of RMS and possible future work.
引用
收藏
页码:52 / 56
页数:5
相关论文
共 50 条
  • [41] SMEmail - A New Protocol for the Secure E-mail in Mobile Environments
    Toorani, Mohsen
    ATNAC: 2008 AUSTRALASIAN TELECOMMUNICATION NETWOKS AND APPLICATIONS CONFERENCE, 2008, : 39 - 44
  • [42] A provably secure lightweight authentication protocol in mobile edge computing environments
    Tsu-Yang Wu
    Qian Meng
    Lei Yang
    Xinglan Guo
    Saru Kumari
    The Journal of Supercomputing, 2022, 78 : 13893 - 13914
  • [43] A provably secure lightweight authentication protocol in mobile edge computing environments
    Wu, Tsu-Yang
    Meng, Qian
    Yang, Lei
    Guo, Xinglan
    Kumari, Saru
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (12): : 13893 - 13914
  • [44] Secure Authentication System for Hybrid Cloud Service in Mobile Communication Environments
    Kim, Jin-Mook
    Moon, Jeong-Kyung
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [45] A secure mobile agent protocol for AMR systems in home network environments
    Seo, SH
    Cho, TN
    Lee, SH
    INFORMATION NETWORKING: CONVERGENCE IN BROADBAND AND MOBILE NETWORKING, 2005, 3391 : 814 - 823
  • [46] Energy-Optimized Secure Remote Fingerprint Authentication in a Mobile Environment
    Hong, Seungwoo
    Lee, Sungju
    Chung, Yongwha
    Kim, Hakil
    Pan, Sungbum
    2010 DIGEST OF TECHNICAL PAPERS INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS ICCE, 2010,
  • [47] Secure Mobile Phone Access to Remote Personal Computers: A Case Study
    Sabzevar, Alireza P.
    Sousa, Joao Pedro
    SOFTWARE AND DATA TECHNOLOGIES, 2009, 47 : 76 - 90
  • [48] A remote display environment: An integration of mobile and ubiquitous computing environments
    Uemukai, T
    Hara, T
    Tsukamoto, M
    Nishio, S
    WCNC 2002: IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE RECORD, VOLS 1 & 2, 2002, : 618 - 624
  • [49] A SET based approach to secure the payment in mobile commerce
    Fourati, A
    Ben Ayed, HK
    Kamoun, F
    Benzekri, A
    LCN 2002: 27TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2002, : 136 - 137
  • [50] A secure mobile communication approach based on information hiding
    Chen, Yun-Feng
    Li, Tao
    Gao, Dong-Ni
    Hu, Xiao-Qin
    Zhang, Xiao-Ping
    Liu, Jin
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2007, 2 (03) : 134 - 139