1. Introduction
Organizations widely deploy rapidly evolving technologies that provide significant benefits but expose them to cyber-attacks due to employees connecting their devices to the information system. A key concern for modern organizations is protecting their assets against such attacks, particularly when safeguarding corporate data that are critical to their functions. Over time, the insecure storage of such data can negatively affect confidentiality, leading to financial losses and reputational damage for the organizations [
1]. Organizations invest heavily in acquiring the latest hardware and software technologies with high-security standards to prevent such security breaches. Still, some underestimate the true nature of cybersecurity attacks, which limits the adoption of advanced security measures [
1]. Common devastating cyber-attacks involve employee negligence and limited information on the best cybersecurity practices [
2]. In particular, the traversal of organizational data to employees’ devices is the primary source of data breaches, compromising the entire system’s security. Therefore, securing organizational data by addressing this issue is very critical. Most organizations adopt Bring Your Own Device (BYOD) policies, and they should prioritize the security of devices connected to their systems.
BYOD is a widespread practice where employees use their personally owned devices, including laptops and smartphones, for work purposes [
3,
4]. It offers several benefits, such as increased mobility, flexibility, productivity and employee satisfaction. Most organizations have implemented information security policies to address the underlying security risks, but employee compliance can be an issue [
3]. According to a survey by Bitglass, 69% of companies permit their employees to work with their own devices to complete their business work [
5]. The security risks associated with BYOD are consistent with a BYOD policy compliance report by Palanisamy et al., which revealed that around 21% of organizations suffered a security breach due to mobile devices connecting to malicious Wi-Fi hotspots [
3]. In 2021, LinkedIn experienced a data leak affecting approximately 500 to 700 million user accounts [
6]. Although BYOD implies plenty of advantages, this also opens the door to various security risks, including data contamination and leakage, which can be costly financially and reputation-wise [
3]. One of the leading security risks is that BYOD does not consider the security of the downloaded data in employees’ devices [
7], making the policy vulnerable to attacks and data breaches. Given that the storage space of these devices has a mixture of personal information and sensitive data and documents stored during the employees’ work on the system, such stored data might be vulnerable to many threats that endanger the safety of user data storage, such as physical and malware attacks [
8]. Therefore, the need to secure the stored data on employees’ devices becomes a critical issue, which is the focus of this paper.
This study aims to enhance an organizational system’s security by implementing additional security measures on employees’ devices that are authorized to access and store sensitive corporate data. This security approach involves encrypting the download of company documents using the encryption algorithm in the organization’s digital certificate. This encryption process must be applied as a mandatory requirement to enforce BYOD policies. The proliferation of BYOD adoption in organizations has not adequately considered the associated security risks of downloaded data. The study focuses on reducing the risk of corporate data breaches by securing downloaded data on employees’ devices through encryption, thus protecting organizations’ privacy. It emphasizes the vulnerability of organizational data stored on employees’ devices, which can be exposed to attacks and data breaches. The proposed complementary encryption algorithms, such as Advanced Encryption System (AES), RSA, ElGamal and Blowfish, enhance BYOD security and protect corporate data on employee-connected devices. Additionally, this paper highlights the need for organizations to comply with the Essential Cybersecurity Controls established by the National Cybersecurity Authority to ensure the confidentiality, integrity and availability of an organization’s information and technology assets. The following objectives are instrumental in achieving the goal of this study:
Propose an encryption algorithm that runs on the user’s device upon downloading.
Build an encryption key generator that is centrally under the organization’s control and will manage the encryption keys for the devices connected to the system.
Evaluate the proposed model to ensure security according to predefined criteria (key length, file size).
The remainder of the present study is structured as follows:
Section 2 comprises a comprehensive review of the relevant literature about the topic under investigation.
Section 3 expounds on the research methodology adopted and the proposed approach for the complementary encryption algorithm.
Section 4 presents experimental results.
Section 5 elaborates on the discussion and findings, encompassing a comparative analysis.
Section 6 summarizes the paper, culminating in a conclusive statement that encapsulates its critical discoveries.
2. Related Work
The prevalence of technology adoption by enterprises in adherence to achieving optimal productivity, flexibility and end-user satisfaction has influenced the need to embrace BYOD, which allows employees to use their personal smart devices to access an organization’s data and applications. The BYOD model has positively impacted creativity, communication and cohesion, increasing productivity and performance.
Despite its numerous benefits, the BYOD model has left enterprises susceptible to many cyber threats, which include data breaches, data manipulation and a lack of user authentication. As a result, multiple security concerns may emerge, such as malware, viruses, Trojans, data leaks and data manipulation [
9,
10]. All of these issues lead to the high cost of maintaining BYOD devices across respective network architectures [
11,
12]. Experienced and privileged user employees pose immense internal threats and risks [
3]. They possess the ability to maliciously sabotage digitized transactions, and in other instances, they become victims of phishing and related social engineering attacks. About 75% of respondents indicated a vacuum in organizational requirements and mandates requiring the need to conduct security protocols and measures [
3]. Although the BYOD model has multiple benefits, it remains sensitive to data privacy and confidentiality caused by cyber-attacks [
8]. Consequently, commercial institutions must protect their digital systems from threat actors and related consequences. Apart from implementing basic training and programs to eliminate ignorance among unsuspecting end-users, this paper emphasizes that corporations should focus on technical countermeasures to mitigate and avoid cyber-attacks.
Cryptography is the most viable tool for providing network security based on its ability to uphold privacy, authenticity and integrity. Encryption algorithms facilitate data transformation through mathematical formulas and prevent unauthorized users from accessing private and sensitive data [
13]. There are three types of cryptosystems: symmetric (private key), asymmetric (public key) and hash functions [
12,
14]. The commonly used symmetric algorithms are AES, DES, 3DES and chaos cryptology, whereas RSA is the most-used asymmetric algorithm [
15]. In symmetric algorithms, the sender and receiver share a common key, whereas asymmetric systems entail two keys. One key is publicly known (aka public key), and only the receiver knows the second one (aka private key). Given that symmetric algorithms use similar keys, they are less complex than asymmetric cryptography and are a hundred times faster [
16]. Symmetric keys are suitable for ensuring the safety of organizational devices and stored data [
17]. They have the primary objective of upholding the privacy and confidentiality of the communication channels. However, asymmetric keys are instrumental in implementing encrypted data transfers even when both parties cannot acquire a symmetric key in a private algorithm [
17]. The length of asymmetric keys corresponds directly to their security strength and performance; the higher the key length, the more difficult discovering the key becomes, and implicitly, the performance reduces [
18]. Thus, the level of security strength needed will be based on the sensitivity of the encrypted data [
19].
There are different types of symmetric and asymmetric cryptosystems, and they have unique contributions to securing digital systems through encryption. In the following subsections, we will explain some of the relevant cryptography algorithms, which are the focus of this study.
3. Materials and Methodology
This study aims to enhance the protection of organizational data by adding another protection layer to employee-connected devices according to the BYOD policy. The proposed methodology assumes the organization has high standard of security on the organizational side, with an effective BOYD policy that is acceptable to all the employees. However, the download of confidential business documents and data into the employees’ devices is one of the severe security issues that violate data confidentiality. Such confidentiality violations occur when the employees use the devices in a less secure environment.
Thus, there is an urgent need to add extra security to employees’ devices, which are authorized to store sensitive organizational data securely. This extra feature involves encrypting the download of organizational documents; the encryption process will be a part of BYOD policy enforcement requirements. This study will evaluate the effectiveness of various encryption algorithms along with digital signatures and a hash function (SHA-256) for securing organizational data that are accessible by employees through their personal devices for work purposes.
The evaluation involves symmetric encryption algorithms (AES and Blowfish) and asymmetric cryptography algorithms (RSA and ElGamal), both with RSA digital signatures. The proposed system, built using Java as a programming language and Swagger UI as GUI for the created API, focuses on fundamental security considerations, such as confidentiality, non-repudiation and data integrity. Encryption was used for confidentiality, while digital signatures were used to ensure the integrity of the data, with any disparity between the signatures implying that the data had been altered, providing a measure of data integrity.
The methodology involves assessing the performance of implemented algorithms in terms of speed and complexity and comparing results with other previous studies. The experiments include evaluating the encryption and decryption times of the algorithms with digital signatures and the impact of different key lengths and file sizes on the performance.
The system diagram is displayed in
Figure 5 and
Figure 6.
Figure 5 displays the flow of downloading organizational documents to employees’ devices.
The diagram in
Figure 6 shows the flow of opening encrypted documents.