Today, many organizations allow their employees to bring their own smartphones or tablets to work and to access the corporate\nnetwork, which is known as a bring your own device (BYOD). However, many such companies overlook potential security risks\nconcerning privacy and confidentiality. This paper provides a review of existing literature concerning the preservation of privacy\nand confidentiality, with a focus on recent trends in the use of BYOD. This review spans a large spectrum of information security\nresearch, ranging from management (risk and policy) to technical aspects of privacy and confidentiality in BYOD. Furthermore,\nthis study proposes a policy-based framework for preserving data confidentiality in BYOD. This framework considers a number of\naspects of information security and corresponding techniques, such as policy, location privacy, centralized control, cryptography,\nand operating system level security, which have been omitted in previous studies. The main contribution is to investigate recent\ntrends concerning the preservation of confidentiality in BYOD from the perspective of information security and to analyze the\ncritical and comprehensive factors needed to strengthen data privacy in BYOD. Finally, this paper provides a foundation for\ndeveloping the concept of preserving confidentiality in BYOD and describes the key technical and organizational challenges faced\nby BYOD-friendly organizations.
Loading....