An Overview of Privacy-Preserving Data Encryption Techniques in Mobile Cloud Computing for Big Data

Year : 2025 | Volume : 12 | Issue : 01 | Page : 1 7
    By

    Aakash Dongre,

  • Shaheen Ayyub,

  1. M Tech Scholar, Department of Electronics & Communication Engineering, Technocrats Institute of Technology, Bhopal, Madhya Pradesh, India
  2. Associate professor, Department of Electronics & Communication Engineering, Technocrats Institute of Technology, Bhopal, Madhya Pradesh, India

Abstract

With the introduction of mobile cloud computing (MCC), data processing, storage, and sharing have undergone a radical transformation that has greatly improved organizational effectiveness and quality of life. But there are also serious worries about data security and privacy due to the increasing usage of mobile devices and cloud computing, particularly when managing large amounts of data from many sources like sensors and cellphones. The privacy issues surrounding MCC are examined in this study, with a focus on large data applications. It covers several privacy-preserving strategies to protect sensitive data during transmission and storage, such as attribute-based encryption, data sanitization, and cryptographic algorithms. The examination addresses the special limitations of mobile devices and the requirement for safe, effective data handling techniques, emphasizing the trade-off between security and performance. It also examines the condition of MCC design now, stressing how crucial it is to strike a balance between transmission efficiency and privacy protection. The study’s conclusion makes a case for more investigation into scalable, lightweight security solutions to address the changing needs of big data and MCC.

Keywords: Mobile Cloud Computing, Big Data, Data Privacy, Cryptography, Attribute-Based Encryption

[This article belongs to Recent Trends in Electronics Communication Systems ]

How to cite this article:
Aakash Dongre, Shaheen Ayyub. An Overview of Privacy-Preserving Data Encryption Techniques in Mobile Cloud Computing for Big Data. Recent Trends in Electronics Communication Systems. 2024; 12(01):1-7.
How to cite this URL:
Aakash Dongre, Shaheen Ayyub. An Overview of Privacy-Preserving Data Encryption Techniques in Mobile Cloud Computing for Big Data. Recent Trends in Electronics Communication Systems. 2024; 12(01):1-7. Available from: https://journals.stmjournals.com/rtecs/article=2024/view=190735


References

1. Tawalbeh LA, Saldamli G. Reconsidering big data security and privacy in cloud and mobile cloud systems. J King Saud Univ Comput Inf Sci. 2021;33:810–9. DOI: 10.1016/j.jksuci.2019.05.007.
2. Zhu X, Chen C, Yang LT, Xiang Y. Angel: Agent-based scheduling for real-time tasks in virtualized clouds. IEEE Trans Comput. 2015;64:3389–403. DOI: 10.1109/TC.2015.2409864.
3. Zhang Q, Yang LT, Chen Z. Privacy-preserving deep computation model on cloud for big data feature learning. IEEE Trans Comput. 2015;65:1351–63.
4. Gai K, Qiu M, Zhao H. Privacy-preserving data encryption strategy for big data in mobile cloud computing. IEEE Trans Big Data. 2017;7:1–1. DOI: 10.1109/TBDATA.2017.2705807.
5. Weng L, Amsaleg L, Morton A, Marchand-Maillet S. A privacy-preserving framework for large scale content-based information retrieval. IEEE Trans Inf Forensics Secur. 2014;10:152–67.
6. Gupta BB, Yamaguchi S, Agrawal DP. Advances in security and privacy of multimedia big data in mobile and cloud computing. Multimed Tools Appl. 2018;77:9203–8.
7. Mollah MB, Azad MAK, Vasilakos A. Security and privacy challenges in mobile cloud computing: Survey and way ahead. J Netw Comput Appl. 2017;84:38–54. DOI: 10.1016/j.jnca.2017.02.001.
8. Yang K, Zhang K, Ren J, Shen X. Security and privacy in mobile crowdsourcing networks: challenges and opportunities. IEEE Commun Mag. 2015;53:75–81. doi: 10.1109/MCOM.2015. 7180511.
9. Wang H, He D, Shen J, Zheng Z, Zhao C, Zhao M. Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing. Soft Comput. 2017;21:7325–35.
10. Shen J, Liu D, Shen J, Liu Q, Sun X. A secure cloud-assisted urban data sharing framework for ubiquitous-cities. Pervasive Mob Comput. 2017;41:219–30.
11. Ahmad W, Wang S, Ullah A, Mahmood Z. Reputation-aware trust and privacy-preservation for mobile cloud computing. IEEE Access. 2018;6:46363–81.
12. Shivanna K, Deva SP, Santoshkumar M. Privacy preservation in cloud computing with double encryption method. In: Computer Communication, Networking and Internet Security: Proceedings of IC, Vol. 3t 2016. Springer; 2017. p. 125–33.
13. Shekhawat H, Sharma S, Koli R. Privacy-preserving techniques for big data analysis in cloud. In:2019 second international conference on advanced computational and communication paradigms (ICACCP). IEEE; 2019. p. 1–6.

14. Domingo-Ferrer J, Farràs O, Ribes-González J, Sánchez D. Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges. Comput Commun. 2019;140 141:38–60. DOI: 10.1016/j.comcom.2019.04.011.
15. Li Q, Tian Y, Zhang Y, Shen L, Guo J. Efficient privacy-preserving access control of mobile multimedia data in cloud computing. IEEE Access. 2019;7:131534–42. DOI: 10.1109/ACCESS. 2019.2939299.
16. Lu R, Zhu H, Liu X, Liu JK, Shao J. Toward efficient and privacy-preserving computing in big data era. IEEE Netw. 2014;28:46–50.
17. Bahrami M, Singhal M. A light-weight permutation based method for data privacy in mobile cloud computing. In: 3rd IEEE international conference on mobile cloud computing, services, and engineering. IEEE; 2015. p. 189–98. DOI: 10.1109/MobileCloud.2015.36.
18. Dong X, Yu J, Luo Y, Chen Y, Xue G, Li M. Achieving an effective, scalable and privacy preserving data sharing service in cloud computing. Comput Secur. 2014;42:151–64. DOI: 10.1016/j.cose.2013.12.002.


Regular Issue Subscription Review Article
Volume 12
Issue 01
Received 02/12/2024
Accepted 09/12/2024
Published 16/12/2024
Publication Time 14 Days


Login


My IP

PlumX Metrics