BYOD with Multi-Factor Authentication
Keywords:
SLA. QoS, RBAC, IDM, OTPAbstract
Data is currency in today’s world. Security teams are now tasked with protecting the brand and intellectual property through the protection of the second-most important asset of a company: data (the first one being people). There are two approaches here. The first is to label – or classify – information so users know if they can place it in the cloud or not. The second is to look at how IT provision can be changed to make security less burdensome. As tablets and smartphones become the primary work computing device, offering easy access to the cloud, users will be less tolerant of VPN, multiple logins etc. Smaller organizations typically rely on services such as iCloud. For these businesses, it would make sense to implement additional security measures provided such as two-factor authentication. In this paper I have highlighted the options which can be useful in the two-factor authentication.
References
www.wikipedia.com
www.techgig.com
www.webopedia.com
“Security and Privacy Challenges in Cloud Computing Environments”; IEEE security & privacy nov/dec 2010.
“Information Assurance Framework”;2010
Lee and Sill ;“A Design Space for dynamic service level agreements in Openstack”; Journal of Cloud Computing: Advances, Systems and Applications 2014, 3:17
Kuyoro S. O., Ibikunle F., Awodele O.;“Cloud Computing Security Issues and Challenges”;International Journal of Computer Networks (IJCN), Volume (3) : Issue (5) : 2011.
Surabhi Shukla and Dharamjeet Singh;”Cloud’s Software-Security as a Service(S-SaaS) via Biometrics”; IJCSE, Volume (2): Issue (3):2014.
Surabhi Shukla;”Public Cloud Security Challenges and Solutions”; IJSER, Volume (3): Issue (4): April 2015.
Clarke, N. L., and Furnell S. M. 2007. Advanced userauthentication for mobile devices. Computers & security 26, no. 2: 109-119.
Pursani, M. P. J., and Ramteke, P. L. 2013. Mobile Cloud Computing. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) 2, no. 4: pp-1512.
D. Zissis, D. Lekkas / Future Generation Computer Systems 28 (2012) 583–592
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
