Open Access
This is an unedited manuscript accepted for publication and provided as an Article in Press for early access at the author’s request. The article will undergo copyediting, typesetting, and galley proof review before final publication. Please be aware that errors may be identified during production that could affect the content. All legal disclaimers of the journal apply.

Aakash Dongre,

Shaheen Ayyub,
- M Tech Scholar, Department of Electronics & Communication Engineering, Technocrats Institute of Technology, Bhopal, Madhya Pradesh, India
- Associate professor, Department of Electronics & Communication Engineering, Technocrats Institute of Technology, Bhopal, Madhya Pradesh, India
Abstract document.addEventListener(‘DOMContentLoaded’,function(){frmFrontForm.scrollToID(‘frm_container_abs_128819’);});Edit Abstract & Keyword
With the introduction of mobile cloud computing (MCC), data processing, storage, and sharing have undergone a radical transformation that has greatly improved organizational effectiveness and quality of life. But there are also serious worries about data security and privacy due to the increasing usage of mobile devices and cloud computing, particularly when managing large amounts of data from many sources like sensors and cellphones. The privacy issues surrounding MCC are examined in this study, with a focus on large data applications. It covers several privacy-preserving strategies to protect sensitive data during transmission and storage, such as attribute-based encryption, data sanitization, and cryptographic algorithms. The examination addresses the special limitations of mobile devices and the requirement for safe, effective data handling techniques, emphasizing the trade-off between security and performance. It also examines the condition of MCC design now, stressing how crucial it is to strike a balance between transmission efficiency and privacy protection. The study’s conclusion makes a case for more investigation into scalable, lightweight security solutions to address the changing needs of big data and MCC.
Keywords: Mobile Cloud Computing, Big Data, Data Privacy, Cryptography, Attribute-Based Encryption
[This article belongs to Recent Trends in Electronics Communication Systems (rtecs)]
Aakash Dongre, Shaheen Ayyub. An Overview of Privacy-Preserving Data Encryption Techniques in Mobile Cloud Computing for Big Data. Recent Trends in Electronics Communication Systems. 2024; 12(01):21-30.
Aakash Dongre, Shaheen Ayyub. An Overview of Privacy-Preserving Data Encryption Techniques in Mobile Cloud Computing for Big Data. Recent Trends in Electronics Communication Systems. 2024; 12(01):21-30. Available from: https://journals.stmjournals.com/rtecs/article=2024/view=0
References
document.addEventListener(‘DOMContentLoaded’,function(){frmFrontForm.scrollToID(‘frm_container_ref_128819’);});Edit
- Lo’ai, A. T., & Saldamli, G. (2021). Reconsidering big data security and privacy in cloud and mobile cloud systems. Journal of King Saud University-Computer and Information Sciences, 33(7), 810-819.
- Zhu, X., Chen, C., Yang, L. T., & Xiang, Y. (2015). ANGEL: Agent-based scheduling for real-time tasks in virtualized clouds. IEEE Transactions on Computers, 64(12), 3389-3403.
- Zhang, Q., Yang, L. T., & Chen, Z. (2015). Privacy preserving deep computation model on cloud for big data feature learning. IEEE Transactions on Computers, 65(5), 1351-1362.
- Gai, K., Qiu, M., & Zhao, H. (2017). Privacy-preserving data encryption strategy for big data in mobile cloud computing. IEEE Transactions on Big Data, 7(4), 678-688.
- Weng, L., Amsaleg, L., Morton, A., & Marchand-Maillet, S. (2014). A privacy-preserving framework for large-scale content-based information retrieval. IEEE Transactions on Information Forensics and Security, 10(1), 152-167.
- Gupta, B. B., Yamaguchi, S., & Agrawal, D. P. (2018). Advances in security and privacy of multimedia big data in mobile and cloud computing. Multimedia Tools and Applications, 77, 9203-9208.
- Mollah, M. B., Azad, M. A. K., & Vasilakos, A. (2017). Security and privacy challenges in mobile cloud computing: Survey and way ahead. Journal of Network and Computer Applications, 84, 38-54.
- Mollah, M. B., Azad, M. A. K., & Vasilakos, A. (2017). Security and privacy challenges in mobile cloud computing: Survey and way ahead. Journal of Network and Computer Applications, 84, 38-54.
- Wang, H., He, D., Shen, J., Zheng, Z., Zhao, C., & Zhao, M. (2017). Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing. Soft Computing, 21, 7325-7335.
- Shen, J., Liu, D., Shen, J., Liu, Q., & Sun, X. (2017). A secure cloud-assisted urban data sharing framework for ubiquitous-cities. Pervasive and mobile Computing, 41, 219-230.
- Ahmad, W., Wang, S., Ullah, A., & Mahmood, Z. (2018). Reputation-aware trust and privacy-preservation for mobile cloud computing. IEEE Access, 6, 46363-46381.
- Shivanna, K., Deva, S. P., & Santoshkumar, M. (2017). Privacy preservation in cloud computing with double encryption method. In Computer Communication, Networking and Internet Security: Proceedings of IC3T 2016(pp. 125-133). Springer Singapore.
- Shekhawat, H., Sharma, S., & Koli, R. (2019, February). Privacy-preserving techniques for big data analysis in cloud. In 2019 second international conference on advanced computational and communication paradigms (ICACCP) (pp. 1-6). IEEE.
- Domingo-Ferrer, J., Farras, O., Ribes-González, J., & Sánchez, D. (2019). Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges. Computer Communications, 140, 38-60.
- Li, Q., Tian, Y., Zhang, Y., Shen, L., & Guo, J. (2019). Efficient privacy-preserving access control of mobile multimedia data in cloud computing. IEEE Access, 7, 131534-131542.
- Lu, R., Zhu, H., Liu, X., Liu, J. K., & Shao, J. (2014). Toward efficient and privacy-preserving computing in big data era. IEEE Network, 28(4), 46-50.
- Bahrami, M., & Singhal, M. (2015, March). A light-weight permutation based method for data privacy in mobile cloud computing. In 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering(pp. 189-198). IEEE.
- Dong, X., Yu, J., Luo, Y., Chen, Y., Xue, G., & Li, M. (2014). Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing. Computers & security, 42, 151-164.

Recent Trends in Electronics Communication Systems
| Volume | 12 |
| Issue | 01 |
| Received | 02/12/2024 |
| Accepted | 09/12/2024 |
| Published | 24/12/2024 |
