International Journal of Computer Technology and Science
Vol. 1 No. 1 (2024): International Journal of Computer Technology and Science

Designing Privacy Preserving Intelligent Computing Models for Cross Platform Mobile and Cloud Based Applications

Aji Priyambodo (Unknown)
Prihati Prihati (Unknown)



Article Info

Publish Date
31 Jan 2024

Abstract

The rapid growth of cross-platform applications has significantly increased the volume and diversity of sensitive user data processed across heterogeneous and distributed environments. Personally identifiable information, device identifiers, behavioral data, and financial information are routinely collected to support personalization, analytics, and service optimization. While these practices enhance application functionality and user experience, they also introduce substantial privacy risks, including unauthorized data access, device fingerprint–based re-identification, cross-user data leakage, and large-scale data breaches. These risks are further amplified by distributed processing architectures and extensive third-party library integrations commonly used in modern cross-platform systems. This study aims to systematically analyze privacy issues in cross-platform applications by examining the types of sensitive data involved, identifying dominant privacy threats, and reviewing state-of-the-art privacy-preserving mitigation strategies. A systematic literature-based methodology was employed, focusing on recent Scopus-indexed journal articles, conference papers, and book chapters. The analysis synthesizes findings using thematic categorization and a conceptual research framework that maps sensitive data sources to privacy threats and corresponding mitigation mechanisms. The results indicate that privacy risks in cross-platform applications originate not only from external attacks but also from internal architectural weaknesses, such as flawed authorization logic and excessive data sharing across system components. Privacy-preserving techniques including differential privacy, federated learning, blockchain-based data governance, secure multi-party computation, and fine-grained access control mechanisms are shown to provide stronger privacy guarantees compared to conventional centralized approaches. However, these techniques also present trade-offs related to system complexity and performance. Overall, the study highlights the importance of adopting a multi-layered, privacy-by-design approach to ensure sustainable, trustworthy, and regulation-compliant cross-platform application development.

Copyrights © 2024






Journal Info

Abbrev

IJCTS

Publisher

Subject

Computer Science & IT

Description

This Journal accepts manuscripts based on empirical research, both quantitative and qualitative. The scope of the this Journal covers the fields of Computer Technology and Science. This journal is a means of publication and a place to share research and development work in the field of ...