Solving BYOD Privacy Issues with Multi-Level Authenticated Encryption

##plugins.themes.academic_pro.article.main##

Surabhi Shukla
Neelam Joshi

Abstract

BYOD a term which is getting more attention now a day, this isn't new term. Many enterprises are using this technique from the last few decades, but now what's new in this and why is it getting so importance now? This question arises in mind of every IT tech user. Client now don't want itself to be bound anymore. Client needs its own freedom to work and the way by which it wants to work. Focusing this demand of client I have tried to propose a technique of BYOD with combination of cloud. Cloud; a storage space where we can store our data and can use anytime, anywhere according to our need. We aren't including any TPA here; all the responsibilities lay down on cloud server itself.

##plugins.themes.academic_pro.article.details##

How to Cite
Shukla, S., & Joshi, N. (2015). Solving BYOD Privacy Issues with Multi-Level Authenticated Encryption. The International Journal of Science & Technoledge, 3(8). Retrieved from http://internationaljournalcorner.com/index.php/theijst/article/view/124626