Addressing security and privacy requirements for Mobile and Cloud platforms is always made in isolation. This lack of coherence has impacts when data are permanently travelling between such platforms. In this paper we propose a symmetric architecture that takes into account the privacy and security requirements of the two platforms and offers a straightforward instantiation pattern for realizing
... [Show full abstract] an end-to-end privacy solution where data is safely exchanged and consumed on Mobile or Cloud platforms.