BYOD with Multi-Factor Authentication

Authors

  • Shukla S Computer Science (MPCT), RGPV, India
  • Joshi N Computer Science (MPCT), RGPV, India

Keywords:

SLA. QoS, RBAC, IDM, OTP

Abstract

Data is currency in today’s world. Security teams are now tasked with protecting the brand and intellectual property through the protection of the second-most important asset of a company: data (the first one being people). There are two approaches here. The first is to label – or classify – information so users know if they can place it in the cloud or not. The second is to look at how IT provision can be changed to make security less burdensome. As tablets and smartphones become the primary work computing device, offering easy access to the cloud, users will be less tolerant of VPN, multiple logins etc. Smaller organizations typically rely on services such as iCloud. For these businesses, it would make sense to implement additional security measures provided such as two-factor authentication. In this paper I have highlighted the options which can be useful in the two-factor authentication.

References

www.wikipedia.com

www.techgig.com

www.webopedia.com

“Security and Privacy Challenges in Cloud Computing Environments”; IEEE security & privacy nov/dec 2010.

“Information Assurance Framework”;2010

Lee and Sill ;“A Design Space for dynamic service level agreements in Openstack”; Journal of Cloud Computing: Advances, Systems and Applications 2014, 3:17

Kuyoro S. O., Ibikunle F., Awodele O.;“Cloud Computing Security Issues and Challenges”;International Journal of Computer Networks (IJCN), Volume (3) : Issue (5) : 2011.

Surabhi Shukla and Dharamjeet Singh;”Cloud’s Software-Security as a Service(S-SaaS) via Biometrics”; IJCSE, Volume (2): Issue (3):2014.

Surabhi Shukla;”Public Cloud Security Challenges and Solutions”; IJSER, Volume (3): Issue (4): April 2015.

Clarke, N. L., and Furnell S. M. 2007. Advanced userauthentication for mobile devices. Computers & security 26, no. 2: 109-119.

Pursani, M. P. J., and Ramteke, P. L. 2013. Mobile Cloud Computing. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) 2, no. 4: pp-1512.

D. Zissis, D. Lekkas / Future Generation Computer Systems 28 (2012) 583–592

Downloads

Published

2025-11-10

How to Cite

[1]
S. Shukla and N. Joshi, “BYOD with Multi-Factor Authentication”, Int. J. Comp. Sci. Eng., vol. 3, no. 6, pp. 104–107, Nov. 2025.

Issue

Section

Review Article