[IEEE 2014 International Conference on Communication Systems and Network Technologies (CSNT) -...

4
Mobile Cloud Computing - Bring Your Own DeviceGurudatt Kulkarni, Rupali Shelke, Rajnikant Palwe Lecturer in Marathwada Mitra Mandal’s Polytechnic, Pune Vikas Solanke, Shrikant Belsare Lecturer in Marathwada Mitra Mandal’s Polytechnic, Pune Sangita Mohite Lecturer in Dr. D.Y. Patil Polytechnic, Kolhapur Abstract-Mobile is replacing the existing portable devices such as notebook, laptops for execution of digital applications such as internet cloud and grid processing. As the mobile device is also become smart and portable, they are also taking place of desktop and laptop for application software. As mobile device are smaller and lighter with low power operation, became more popular as they reduced cost of processing power and decrease the time of execution for getting quick result. As the mobile device are portable and small can be moved from one network to another network easily and not required to give them new setting operations. Due invention of more platform independent applications and android based device prize of the mobile device also reduced at low cost every high end application is available on mobile network. Due to this advantage a new concept is emerging in industry and education sector that means BYOD “Bring your own mobile”. This concept will help industry to accommodate more and more application on mobile which will reduce the desktop execution power and make employer more workable with easy deployment an where and any time with low cost. Keywords: - Mobile Cloud, BYOD, Storage, Privacy I. Introduction Mobile computing is broad term which describes computing over mobile on the road/ office/ home. It provides flexibility and portability to work user remotely. As the current market scenario showing increasing mobile users and development of smart apps for mobile devices. To reduce processing power, power consumption done by desktop computers, Mobile device is best alternative for existing desktop and laptops. As the user always carry mobile device, it is not necessary to reach always users position and status to allocate work. Mobile application is easily developed on mobile through network and ready to use. Mobile device does not require getting effect of new installation for booting. Today it is being common to have a mobile or smart phone. In today’s word there are 6 billion users of smart phone or portable network devices (As per US market survey in 2012) and 2.3 billon of internet users in world (As per US market survey in 2012). So this BYOD concept will effectively work on existing platform II. Characteristics of Mobile Computing Portability:- As the mobile devices are small and compact can be easy moved from one location to another location without any changes in functional and operational area. This gives more advantages to user for work easily any where any time. Connectivity:- As the mobile technology increases the bandwidth and the speed of operations increases. It is easy to set connectivity to send and receive data over network. So GPRS and GPS can be easily use on existing network. Low power:- As the mobile devices are battery operated devices does not required more power for operation as like desktop and laptops. So power consumption is reduced and on mobile there is no any limited criterion of power disconnection (In rural area). Platform independent:- As the technology involves, android and apple based application are available in market. As the open source platform also makes devised based application which are at low cost (In some cases free) are easily deployed and ready to use by single click (No booting required) Integrated environments:- As the devices become faster and easy to deploy any application it become easy to connect if other portable device such as printers scanner etc. Mobile and smart phone become more compatible with other devices and other communication technologies. III. BYOD – Bring Your Own Device As this concept is more unique this allows employee or user to bring his mobile in company or working environment to carry out company task. As the increase in mobile and internet users it becomes more common to have a smart phone with networking features. As the mobile device is design by the perspective view or mind of users. So, they easily adopt the user environment and culture. This concept is also useful in following points. Easy to use. Ability to connect from anywhere and anytime (Change in physical location) Reduce the computing power. Low cost devices( Design for specific task) One of the primary benefits of BYOD is the ability to reduce costs by having people and/or departments pay part or all of 2014 Fourth International Conference on Communication Systems and Network Technologies 978-1-4799-3070-8/14 $31.00 © 2014 IEEE DOI 10.1109/CSNT.2014.119 565 2014 Fourth International Conference on Communication Systems and Network Technologies 978-1-4799-3070-8/14 $31.00 © 2014 IEEE DOI 10.1109/CSNT.2014.119 565

Transcript of [IEEE 2014 International Conference on Communication Systems and Network Technologies (CSNT) -...

Page 1: [IEEE 2014 International Conference on Communication Systems and Network Technologies (CSNT) - Bhopal, India (2014.04.7-2014.04.9)] 2014 Fourth International Conference on Communication

“Mobile Cloud Computing - Bring Your Own Device” Gurudatt Kulkarni, Rupali Shelke, Rajnikant Palwe Lecturer in Marathwada

Mitra Mandal’s Polytechnic, Pune

Vikas Solanke, Shrikant Belsare

Lecturer in Marathwada Mitra Mandal’s Polytechnic,

Pune

Sangita Mohite Lecturer in Dr. D.Y. Patil

Polytechnic, Kolhapur

Abstract-Mobile is replacing the existing portable devices such as notebook, laptops for execution of digital applications such as internet cloud and grid processing. As the mobile device is also become smart and portable, they are also taking place of desktop and laptop for application software. As mobile device are smaller and lighter with low power operation, became more popular as they reduced cost of processing power and decrease the time of execution for getting quick result. As the mobile device are portable and small can be moved from one network to another network easily and not required to give them new setting operations. Due invention of more platform independent applications and android based device prize of the mobile device also reduced at low cost every high end application is available on mobile network. Due to this advantage a new concept is emerging in industry and education sector that means BYOD “Bring your own mobile”. This concept will help industry to accommodate more and more application on mobile which will reduce the desktop execution power and make employer more workable with easy deployment an where and any time with low cost. Keywords: - Mobile Cloud, BYOD, Storage, Privacy

I. Introduction Mobile computing is broad term which describes computing over mobile on the road/ office/ home. It provides flexibility and portability to work user remotely. As the current market scenario showing increasing mobile users and development of smart apps for mobile devices. To reduce processing power, power consumption done by desktop computers, Mobile device is best alternative for existing desktop and laptops. As the user always carry mobile device, it is not necessary to reach always users position and status to allocate work. Mobile application is easily developed on mobile through network and ready to use. Mobile device does not require getting effect of new installation for booting. Today it is being common to have a mobile or smart phone. In today’s word there are 6 billion users of smart phone or portable network devices (As per US market survey in 2012) and 2.3 billon of internet users in world (As per US market survey in 2012). So this BYOD concept will effectively work on existing platform

II. Characteristics of Mobile Computing • Portability:-

As the mobile devices are small and compact can be easy moved from one location to another location

without any changes in functional and operational area. This gives more advantages to user for work easily any where any time.

• Connectivity:- As the mobile technology increases the bandwidth and the speed of operations increases. It is easy to set connectivity to send and receive data over network. So GPRS and GPS can be easily use on existing network.

• Low power:- As the mobile devices are battery operated devices does not required more power for operation as like desktop and laptops. So power consumption is reduced and on mobile there is no any limited criterion of power disconnection (In rural area).

• Platform independent:- As the technology involves, android and apple based application are available in market. As the open source platform also makes devised based application which are at low cost (In some cases free) are easily deployed and ready to use by single click (No booting required)

• Integrated environments:- As the devices become faster and easy to deploy any application it become easy to connect if other portable device such as printers scanner etc. Mobile and smart phone become more compatible with other devices and other communication technologies.

III. BYOD – Bring Your Own Device As this concept is more unique this allows employee or user to bring his mobile in company or working environment to carry out company task. As the increase in mobile and internet users it becomes more common to have a smart phone with networking features. As the mobile device is design by the perspective view or mind of users. So, they easily adopt the user environment and culture. This concept is also useful in following points.

• Easy to use. • Ability to connect from anywhere and anytime

(Change in physical location) • Reduce the computing power. • Low cost devices( Design for specific task)

One of the primary benefits of BYOD is the ability to reduce costs by having people and/or departments pay part or all of

2014 Fourth International Conference on Communication Systems and Network Technologies

978-1-4799-3070-8/14 $31.00 © 2014 IEEE

DOI 10.1109/CSNT.2014.119

565

2014 Fourth International Conference on Communication Systems and Network Technologies

978-1-4799-3070-8/14 $31.00 © 2014 IEEE

DOI 10.1109/CSNT.2014.119

565

Page 2: [IEEE 2014 International Conference on Communication Systems and Network Technologies (CSNT) - Bhopal, India (2014.04.7-2014.04.9)] 2014 Fourth International Conference on Communication

the cost of various devices used for work, and getting IT out of the business of procuring and supporting an expanding array of hardware throughout the enterprise. This is especially true in cases where a corporate-owned laptop will no longer be provided.

Figure 1: Delivery of IT service through BYOD

All the employers have ability to provide mobile device to employee to use it for work related activity. It also improves the employer’s productivity talent retention. This program needs some policy to remove its challenges and risk behind it (BYOD). As employers going to transfer whole platform over mobile network it is necessary to work on these parameters.

• Employee privacy • Financial Liability • Compliance and legal concerns. • Appropriate device usage. • Mobile Device Management (MDM) • Local Storage

A. Employee privacy As employee are working for company on their device there is risk of leakage or directly access to personal data may be available so employee rise certain points regarding their device as it may be lost or when they leave company. Also remote monitoring and data access may lead to read user or employees personal data. So privacy and data protection lows must be applicable without losing personal rights.

Figure 2: Security considerations in BYOD

As the device is provided by company or owner it should have only monitor certain parameters of user as it will be used them for development. User can save personal data over it. So privacy of the user can be discarded while, leaving the organization, user may be need to return or surrender device so it is necessary to get or return personal information which can be continued with user.

B. Financial Liability As the devices are provided by the employers the cost should be bare by employers. Cost liability should be closed considered and handled by organization. Also employee should have advantage of getting devices replace due to damage or crash. Device life cycle should be decided by organization. In case of device specification it should as user requirement and application specific. Also how much will be paid by company other usage of mobile. Company should be defining the policy for cost, process or procedure for handling of damaged or stolen device. Cost of technical support responsibilities.

C. Compliance and legal concern The use of personally owned device in the workplace has challenges for regularity compliance. Organization policies may different as per organization work and portfolio. So, it must clearly defined user wise how much time and which application are accessed by user (Time of day)while doing audit or deciding policy consideration of device access limitations, functions perform by devices and restriction policy must be defined. Role of every device, eligibility should be defined by maintaining local laws and their impact on work.

566566

Page 3: [IEEE 2014 International Conference on Communication Systems and Network Technologies (CSNT) - Bhopal, India (2014.04.7-2014.04.9)] 2014 Fourth International Conference on Communication

Figure 3: Risk v/s Control map of various mobility strategies

D. Device Authority and usage Under the BYOD concept user from organization must know the usable area of device. They should avoid violating the policy. Also there should be provision for what after violations of law. It would be very beneficial for company, it they allow user to use the device for personal work up to certain extent. Employee may be in thought that whether device can be used by family member or not, up gradation of device specification or define limitations of device access?...In case of organization, it should be define acceptable use policy for devices with cloud backup solutions. A treatment should be clearly defines for policy violations. As the device gets damage or employee left the organization appropriate steps must be defined how to dispose device etc…?.Selecting the right authentication method is critical because employee-owned devices should access only the appropriate corporate applications – it’s up to you to decide which applications you want employees to access. The method you choose should be easy to deploy and work across a wide range of devices. Allows secure wireless communication, but the shared key needs to be securely distributed to all end devices. Since these keys are stored permanently, lost or stolen devices can open the door for unauthorized access.

E. Mobile Device Management (MDM) This solution enables the remote administration and enrolment of managed mobile devices. Typical security policies might include setting password strength, configuring VPN settings, specifying screen lock duration and disabling specific app functions (such as access to App stores) to prohibit potentially risky behavior. In addition,

administrators can perform security operations such as locating or wiping lost or stolen devices. Mobile device management solutions don’t specifically protect against any risk category. However, the ability to remotely configure the device, for example to block all new apps, can help eliminate the introduction of malware and also limit resource abuse, integrity threats and intentional (or unintentional) data loss. Separation of personal and corporate data can also be achieved with an agent based mobile device management solution as the removal of the agent itself will only affect corporate data and applications. Mobile device management is typically considered by organizations in need of a comprehensive mobile solution that incorporates a corporate app store and shared document libraries. It allows for a broader approach to productivity than merely providing access to email and calendar, which is the most common level of mobile access today.

�Figure 4:Challenges in implementing BYOD

F. Local Storage Handheld devices are capable of retaining intellectual property, downloading and storing e-mail attachments or internal documents. Today’s mobile devices have a large amount of onboard storage space to keep such data and transport it elsewhere — or to just retain the data for extended periods of time (the lifetime of the device). If there is not enough storage locally for downloading the data to the mobile device or attached memory cards, the user may alternatively download data from one source (such as an enterprise server) to their private cache in another provider’s cloud.

IV. Conclusion

567567

Page 4: [IEEE 2014 International Conference on Communication Systems and Network Technologies (CSNT) - Bhopal, India (2014.04.7-2014.04.9)] 2014 Fourth International Conference on Communication

As the BYOD works very efficiently with reduction in cost and power consumption, but should be have defined policy of every mobile device user. Policy should be considering user profile, limitations of organizations users. Bring your own device can be implemented with consideration of policy for data monitoring and user privacy. For effective working of organization this is low cost and easy acceptable solution.�BYOD has also highlighted the potential savings a business could make by paying an employee an allowance and letting them sort out their own computing platform of choice. In the same way as we have seen the company car become extinct, the company owned PC could be the next dinosaur. Your organization will accrue the maximum benefits of BYOD when you provide a strong and effective program for managing and supporting employee devices for work. In today’s workplace, workers are increasingly expecting employers to be more flexible in their practices. As such, BYOD seems more like an inevitable solution than an up-and-coming trend of the moment. BYOD can offer a company numerous benefits, but these benefits may not necessarily be what the company expects.

V. References 1. http://www.edtechmagazine.com/higher/sites/edtechmagazine.co

m.higher/files/108532-wp-hied-byod-df.pdf 2. http://www.gartner.com/technology/topics/ 3. http://www.techradar.com/news/world-of-tech/management/how-

to-optimise-a-byod-environment-1164854 4. “Bring-Your-Own-Device Requires New Network Strategies”,

September 2012, Zeus Kerravala 5. Good Technology (2012) Bring Your Own Devices Best

Practices Guide. Retrieved from http://www1.good.com/resources/whitepapersform?lsrc=Website&ltyp=Whitepaper&cid=7010000000060O2

6. NIST (2012) Guidelines for Managing and Securing Mobile Devices in the Enterprise (Draft). Natl. Inst. Stand. Technol. Spec. Publ. 800-124 rev. 1. Retrieved from http://csrc.nist.gov/publications/drafts/800-124r1/draft_sp800-124-rev1.pdf

7. Gordan Thomson (February 2012), ScienceDirect.com-Network Security-BYOD: enabling the chaos, Volume 2012, Issue 2, Pages 5–8.

8. Gerhard Eschelbeck, David Schwartzberg (June 2012), BYOD Risks and Rewards, How to keep employee smartphones, laptops and tablets secure.

9. Keith W. Miller, Jeffrey Voas, George F. Hurlburt (Oct 3, 2012), IEEE Xplore: Journals & Magazines - BYOD: Security and Privacy Considerations.

568568