JIS  Vol.10 No.4 , October 2019
Improved Smartphone Application for Remote Access by Network Administrators
Abstract: This research attempts the implementation of an improved smartphone application for remote system administration. The work was motivated by the inability of network administrators to access their virtual servers from a remote location without worrying about the security implications, inaccurate and unreliable reports from a third party whenever he is out of town. The cloud server can be monitored and administered because various task such as creating users, manage users (grant access, block or delete users), restart server and shutdown server can be handled by the remote system administrator. This will involve of securing the system with a one-way hashing of encrypted password and a device ID for only whitelisted devices to be granted access. It will be observed that remote access for system administration can be implemented using a smartphone app based on a Point-to-Point Protocol and also reveal the advantages of PPP protocol, therefore making the enormous responsibilities of a remote system administrator much easier to accomplish.
Cite this paper: Nwabueze, E. and Okon, E. (2019) Improved Smartphone Application for Remote Access by Network Administrators. Journal of Information Security, 10, 250-262. doi: 10.4236/jis.2019.104014.

[1]   Ernest, G.D., Timothy, A.A. and Kpangkpari, G. (2016) The Use of Remote Access Tools by System Administrators Today and Their Effectiveness: Case Study of Remote Desktop, Virtual Network Computing and Secure Android App. International Journal of Computer Applications, 136, 35-38.

[2]   Karan, S.B., Vishnu, B.M., Akash, D.M. and Sachin, B.T. (2015) Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser. International Journal of Computer Science and Information Technology Research, 3, 26-30.

[3]   Mitchell, B. (2018) Servers Are the Heart of the Internet. Lifewire.

[4]   Sullivan, M.P. (2004) Secure Remote Network Administration and Power Management. Naval Postgraduate School, Monterey, CA.

[5]   TISN (2011) Remove Access: A Tool to Support Business Continuity Planning.

[6]   Mustafa, N. and Peltier, T. (1998) Fundamentals of Remote Access. Data Security Management. Auerbach Publications, Boca Raton, FL.

[7]   Chatule, A.K. and Pattalwar, S.V. (2016) Android Based Network Monitoring and Administration Using Wi-Fi, GPRS. International Journal of Advances in Electronics and Computer Science, 3, 273-275.

[8]   Mule, O., Shaikh, N., Shinde, P., Wagaskar, A. and Ramteke, S. (2016) Remote Access of Android Smart Phone. International Journal of Computer Science and Information Technologies, 7, 711-714.

[9]   Boxall, D. (2013) The Security Risks of Remote Working. Guardian News & Media Limited.

[10]   Tyson, J. and Crawford, S. (2019) How VPN Works. Remote-Access VPN.

[11]   Bakardjieva, T. (2013) Introduction to Computer Networking. Varna Free University “Chernorizec Hrabar”. Institute of Technology.

[12]   Linfo (2005) The Linux Information Project.

[13]   Margaret, R. (2018) Cloud Server. Cloud Computing. Techtarget.

[14]   Huth, A. and Cebula, J. (2011) The Basics of Cloud Computing Carnegie Mellon University. Produced for US-CERT.