Proposed architecture

From the literature review, Cloud and Bring Your Own Device (BYOD) trends pose new security risks and challenges to control and manage corporate networks and data [1]. Most of enterprise’s cloud and BYOD environment are not based on a trusted system. Traditionally, MAC was used in the security systems to provide access controls.

Scroll to Top