ISSN 2277-2685 IJESR/June. 2024/ Vol-14/Issue-2s/ 544-555 Himabindu Chetlapalli, et. al., / International Journal of Engineering & Science Research 544 Comprehensive Strategies For Mobile Data Security In Cloud Computing Using Advanced Cryptographic Techniques Himabindu Chetlapalli, 9455868 Canada Inc, Ontario, Canada chetlapallibindu@gmail.com Durga Praveen Deevi, O2 Technologies Inc, California, USA durgapraveendeevi1@gmail.com Naga Sushma Allur, Astute Solutions LLC, California, USA Nagasushmaallur@gmail.com Koteswararao Dondapati, Everest Technologies, Ohio, USA dkotesheb@gmail.com Sharadha Kodadi, Infosys, Texas, USA kodadisharadha1985@gmail.com Thinagaran Perumal Associate Professor Department of Computer Science, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, 43400 UPM Serdang, Selangor, Malaysia thinagaran@upm.edu.my ABSTRACT One of the major challenges in cloud computing environments is data security, especially for mobile data applications where efficiency and throughput are critical. To evaluate the effectiveness of advanced cryptographic algorithms in mobile data security, this paper discusses symmetric encryption (AES), asymmetric encryption (RSA), elliptic curve cryptography (ECC), homomorphic encryption, and blockchain. While RSA guarantees secure key exchange, AES is considered the fastest and most energy-efficient encryption. ECC is also suitable for low-resource devices due to its provision of strong encryption with smaller keys. Blockchain is ensured to offer decentralized security that is immutable in nature, and homomorphic encryption ensures safe computation without revealing plaintext. A hybrid cryptographic security algorithm is proposed with the benefits of both approaches so that encryption can be maximally efficient, secured, and at high speed. The performance metrics state that the combined technique is perfect for transmitting and storing data safely in cloud environments since this balances computational overhead, efficiency of storage usage, and security level. Findings indicate that it is essential to make use of multiple encryption techniques to improve security without making efficiency compromise.