2020
DOI: 10.1371/journal.pone.0234312
|View full text |Cite
|
Sign up to set email alerts
|

Privacy and data protection in mobile cloud computing: A systematic mapping study

Abstract: As a result of a shift in the world of technology, the combination of ubiquitous mobile networks and cloud computing produced the mobile cloud computing (MCC) domain. As a consequence of a major concern of cloud users, privacy and data protection are getting substantial attention in the field. Currently, a considerable number of papers have been published on MCC with a growing interest in privacy and data protection. Along with this advance in MCC, however, no specific investigation highlights the results of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 81 publications
0
9
0
Order By: Relevance
“…Besides, the nature of cloud computing has important implications for the privacy of personal information, including questions about how secure the location is and who has access to it [34,35], which affects the MCC user's decision to use cloud storage [35]. Moreover, questions have been raised about threats and attacks of personal data privacy; research reported that improper security policies and practices in some locations are one of the issues of privacy and personal data protection in MCC [2,34,36,37]. However, the issue of privacy and personal data protection in MCC may cause laws and regulations noncompliance and also threats and attacks, such as leakage of user privacy, data misuse, disclosing information or data, and identity theft [2], and may even jeopardize personal data privacy where the MCC users might be exposed to, for instance, a spy, steal the user information, spam messages, social trolling and shaming, and internet viruses [38,39].…”
Section: The Need For An Exploratory Studymentioning
confidence: 99%
See 3 more Smart Citations
“…Besides, the nature of cloud computing has important implications for the privacy of personal information, including questions about how secure the location is and who has access to it [34,35], which affects the MCC user's decision to use cloud storage [35]. Moreover, questions have been raised about threats and attacks of personal data privacy; research reported that improper security policies and practices in some locations are one of the issues of privacy and personal data protection in MCC [2,34,36,37]. However, the issue of privacy and personal data protection in MCC may cause laws and regulations noncompliance and also threats and attacks, such as leakage of user privacy, data misuse, disclosing information or data, and identity theft [2], and may even jeopardize personal data privacy where the MCC users might be exposed to, for instance, a spy, steal the user information, spam messages, social trolling and shaming, and internet viruses [38,39].…”
Section: The Need For An Exploratory Studymentioning
confidence: 99%
“…Although the debate continues about the best strategies for dealing with the various issues for privacy and personal data protection in MCC, the benefits of utilizing PbD for privacy and personal data protection in MCC are not explored. Specifically, no single study exists which explored the effects of applying PbD for privacy and personal data protection in MCC [2,40]. PbD is a general philosophy that demonstrates privacy should not be overviewed as an afterthought, but rather as a first-class requirement in the design of IT systems [41].…”
Section: The Need For An Exploratory Studymentioning
confidence: 99%
See 2 more Smart Citations
“…2 These extended functions escalate concerns about privacy and data protection as the information collected often is used by or sold to third parties. 3 Data protection legislation largely is designed to safeguard against the exploitation of personal information through governing data collection, processing, and sharing. This protection includes data collected and processed through mobile phone use.…”
Section: Introductionmentioning
confidence: 99%