Securing Corporate Data on Personal Devices Using Containerisation and Other Security Techniques

Clementine Mamogale, Noluntu Mpekoa

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The increasing adoption of personal mobile devices for professional tasks, commonly referred to as Bring Your Own Device (BYOD), has revolutionised workplace dynamics by offering flexibility, reduced operational costs, and enhanced productivity. However, BYOD also introduces significant security challenges, primarily due to the merging of personal and corporate data on a single device. These challenges include unauthorised access to sensitive corporate information, potential data leakage, and difficulties in ensuring compliance with regulatory standards, all of which are exacerbated by the varied security postures of personal devices. This paper proposes a comprehensive security framework that addresses these concerns by separating corporate data from personal data using containerisation, combined with Mobile Device Management (MDM) and Multi-Factor Authentication (MFA) technologies. The proposed framework ensures that corporate data remains isolated from personal use, mitigating risks related to data breaches, privacy violations, and unauthorised access while simultaneously maintaining user privacy and device performance. Furthermore, this framework integrates encryption and remote wipe capabilities to safeguard data in cases of device loss or theft, ensuring compliance with corporate policies and regulatory requirements. The framework integrates technological solutions that enforce strict boundaries between corporate and personal environments on employee-owned devices, thereby fostering a secure BYOD environment. This framework aims to provide a scalable, robust solution to data protection challenges in modern workplaces through a detailed analysis of current strategies and technologies. By addressing both organisational and employee concerns, this approach enables organisations to harness the advantages of BYOD without compromising security or user privacy.

Original languageEnglish
Title of host publicationHuman-Centered Design, Operation and Evaluation of Mobile Communications - 6th International Conference, MOBILE 2025, Held as Part of the 27th HCI International Conference, HCII 2025, Proceedings
EditorsJune Wei, George Margetis
PublisherSpringer Science and Business Media Deutschland GmbH
Pages87-102
Number of pages16
ISBN (Print)9783031930638
DOIs
Publication statusPublished - 2025
Event6th International Conference on Design, Operation and Evaluation of Mobile Communications, MOBILE 2025, held as part of the 27th HCI International Conference, HCII 2025 - Gothenburg, Sweden
Duration: 22 Jun 202527 Jun 2025

Publication series

NameLecture Notes in Computer Science
Volume15824 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference6th International Conference on Design, Operation and Evaluation of Mobile Communications, MOBILE 2025, held as part of the 27th HCI International Conference, HCII 2025
Country/TerritorySweden
CityGothenburg
Period22/06/2527/06/25

Keywords

  • Bring Your Own Device (BYOD)
  • Containerisation
  • Malti-Factor Authentication (MFA)
  • Mobile Device Management (MDM)
  • Mobile Security

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Securing Corporate Data on Personal Devices Using Containerisation and Other Security Techniques'. Together they form a unique fingerprint.

Cite this