BYOD Secured Solution Framework
Md Iman Ali1, Sukhkirandeep Kaur2

1Md Iman Ali, Computer Application, LPU, Punjab, India.
2Dr Sukhkiran Deep Kaur, CSE, LPU, Punjab, India.
Manuscript received on July 20, 2019. | Revised Manuscript received on August 10, 2019. | Manuscript published on August 30, 2019. | PP: 1602-1606 | Volume-8 Issue-6, August 2019. | Retrieval Number: F8202088619/2019©BEIESP | DOI: 10.35940/ijeat.F8202.088619
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: This research focuses on Secured design architecture of BYOD solution. Bring your Own Device is a project driven in most of the enterprises to provide internet access to employee personal devices and Guest users. It has Resulted in a trend to give Access to Employees Smart phones , tablets and personal to Improve employee productivity and address changing working preferences in todays digital age , The Enterprises are Benefiting by providing lesser Devices to their Employees , this is one of the major reasons for the Enterprise to invest in BYOD Infrastructure. Slowly BYOD becomes a rule rather exception. The BYOD Infrastructure provides their Employees an access to the Internet while being a trusted user accessing the Enterprise infrastructure , which is intended to be Secure . The BYOD Infrastructure also provides Employees to grant Guest User Internet Access to their Visiting Partners as well. Connecting external devices in Corporate network increases the cyber security risk and data leakage incident. Using BYOD services users can do malicious activities, try to gain unauthorized access to internal network which can lead into major security breach. Providing Internet access to the external devices using internal corporate network has resulted in a challenge in addressing significant Security risk , data theft and Shadow IT because of unsecured design architecture that compromise the security policy. Installing malware in BYOD and connecting to Internet network can also lead into serious damage and major security risk. A major concern is also to revoke internet access while employee is no more in the system. Incase if employee left and access does not get revoked on time also can be a risk. Poor BYOD design significantly lead into organization Cyber security risk. The Research Paper has Demonstrated the Use Case for Trusted User access and Untrusted Guest User access and Monitoring of the BYOD-User activity and Audit compliance .In this research paper, a secured Design Architecture, Implementation and analysis is conducted. A practical analysis is conducted regarding the design and a Secure BYOD model is demonstrated. This study also highlights the Secured model of BYOD implementation maintaining organization laid down security policy so that enterprise CEO, CIO, CISO can address concerns for securing the Enterprises BYOD Infrastructure.
Keywords: BYOD, Security. BYOD framework.