IEEE 2018 / 19 - Android Projects with Web Hosting


IEEE 2017: A Classroom Scheduling Service for Smart Classes
Abstract: During past decades, the classroom scheduling problem has posed significant challenges to educational programmers and teaching secretaries. In order to alleviate the burden of the programmers, this paper presents Smart Class, which allows the programmers to solve this problem using web services. By introducing service-oriented architecture (SOA), Smart Class is able to provide classroom scheduling services with back-stage design space exploration and greedy algorithms. Furthermore, the Smart Class architecture can be dynamically coupled to different scheduling algorithms to fit in specific demands. A typical case study demonstrates that Smart Class provides a new efficient paradigm to the traditional classroom scheduling problem, which could achieve high flexibility by software services reuse and ease the burden of educational programmers. Evaluation results on efficiency, overheads and scheduling performance demonstrate the Smart Class has lower scheduling overheads with higher efficiency.Read More



IEEE 2017: GeoMoB – A Geo Location based browser for secured Mobile Banking
Abstract: With banks reaching its users via mobile banking, it is becoming one of the essential features that are demanded by almost every Smartphone user. Mobile banking via a mobile browser is similar to internet banking. Browsing-based threats for smart phones are just the same as those for personal computers, elevating the need to focus on mobile security. Among the several authentication schemes, geo location authentication is gaining importance as it is found most suitable for mobile devices. In this paper, GeoMoB, a dedicated secure mobile browser for mobile banking that makes use of multifactor authentication is designed and developed. GeoMoB features a geo location based authentication scheme which ensures security of mobile transactions based on the user location. In addition to the existing two factor authentication scheme using user ID, password and OTP, the mobile number and geo location is used to authenticate the user. The geo location intimates the banks location from where the transaction is going to be performed thus helping banks to ensure secure transactions. The geo location of the user is acquired through the network provider and hence the need for using GSM is eliminated. The multifactor authentication used in GeoMoB ensures security while performing mobile transaction and prevents users from various attacks.Read More



IEEE 2017:Child Safety Wearable Device
Abstract: This paper discusses the concept of a smart wearable device for little children. The major advantage of this wearable over other wearable is that it can be used in any cell phone and doesn't necessarily require an expensive smart phone and not a very tech savvy individual to operate. The purpose of this device is to help parents locate their children with ease. At the moment there are many wearable’s in the market which help track the daily activity of children and also help find the child using Wi-Fi and Bluetooth services present on the device. But Wi-Fi and Bluetooth appear to be an unreliable medium of communication between the parent and child. Therefore, the focus of this paper is to have an SMS text enabled communication medium between the child's wearable and the parent as the environment for GSM mobile communication is almost present everywhere. The parent can send a text with specific keywords such as "LOCATION" "TEMPERA TURE" "UV" "SOS" "BUZZ", etc., the wearable device will reply back with a text containing the real time accurate location of the child which upon tapping will provide directions to the child's location on Google maps app and will also provide the surrounding temperature, UV radiation index so that the parents can keep track if the temperature or UV radiation is not suitable for the child. The Prime motivation behind this project is that we know how important technology is in our lives but it can sometimes can't be trusted, and we always need to have a secondary measure at hand. The secondary measure used in this project is the people present in the surrounding of the child who could instantly react for the Child’s safety till the parents arrives or they could contact the parents and help locate them. The secondary measure implemented was using a bright SOS Light and distress alarm buzzer present on the wearable device which when activated by the parents via SMS text should display the SOS signal brightly and sound an alarm which a bystander can easily spot as a sign of distress.Read More


IEEE 2017: Privacy and Secure Medical Data Transmission and Analysis for Wireless Sensing Healthcare System
Abstract: The convergence of Internet of Things (IoT), cloud computing and wireless body-area networks (WBANs) has greatly promoted the industrialization of e-/m-healthcare (electronic-/mobile-healthcare). However, the further flourishing of e-/m-Healthcare still faces many challenges including information security and privacy preservation. To address these problems, a healthcare system (HES) framework is designed that collects medical data from WBANs, transmits them through an extensive wireless sensor network infrastructure and finally publishes them into wireless personal area networks (WPANs) via a gateway. Furthermore, HES involves the GSRM (Groups of Send-Receive Model) scheme to realize key distribution and secure data transmission, the HEBM (Homomorphic Encryption Based on Matrix) scheme to ensure privacy and an expert system able to analyze the scrambled medical data and feed back the results automatically.Read More


IEEE 2017: A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
Abstract: With the popularity of cloud computing, mobile devices can store/retrieve personal data from anywhere at any time. Consequently, the data security problem in mobile cloud becomes more and more severe and prevents further development of mobile cloud. There are substantial studies that have been conducted to improve the cloud security. However, most of them are not applicable for mobile cloud since mobile devices only have limited computing resources and power. Solutions with low computational overhead are in great need for mobile cloud applications. In this paper, we propose a lightweight data sharing scheme (LDSS) for mobile cloud computing. It adopts CP-ABE, an access control technology used in normal cloud environment, but changes the structure of access control tree to make it suitable for mobile cloud environments. LDSS moves a large portion of the computational intensive access control tree transformation in CP-ABE from mobile devices to external proxy servers. Furthermore, to reduce the user revocation cost, it introduces attribute description fields to implement lazy-revocation, which is a thorny issue in program based CP-ABE systems. The experimental results show that LDSS can effectively reduce the overhead on the mobile device side when users are sharing data in mobile cloud environments.Read More


IEEE 2017:Privacy-Preserving Location-Proximity for Mobile Apps
Abstract: Location Based Services (LBS) have seen alarming privacy breaches in recent years. While there has been much recent progress by the research community on developing privacy-enhancing mechanisms for LBS, their evaluation has been often focused on the privacy guarantees, while the question of whether these mechanisms can be adopted by practical LBS applications has received limited attention. This paper studies the applicability of Privacy-Preserving Location Proximity (PPLP) protocols in the setting of mobile apps. We categorize popular location social apps and analyze the tradeoffs of privacy and functionality with respect to PPLP enhancements. To investigate the practical performance trade-offs, we present an in-depth case study of an Android application that implements Inner Circle, a state-of-the-art protocol for privacy preserving location proximity. This study indicates that the performance of the privacy-preserving application for coarsegrained precision is comparable to real applications with the same feature set.Read More

IEEE 2017:Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications
Abstract: Authenticated key exchange (AKE) is one of the most important applications in applied cryptography, where a user interacts with a server to set up a session key where pre-registered information (aka. authentication factor), such as a password or biometrics, of the user is stored. While single-factor AKE is widely used in practice, higher security concerns call for multi-factor AKE (MFAKE) schemes, e.g. combining both passwords and biometrics simultaneously. However, in some casually designed schemes, security is even weakened in the sense that leakage of one authentication factor will defeat the whole MFAKE protocol. Furthermore, an inevitable by-product arise that the usability of the protocol often drop greatly. To summarize, the existing multi-factor protocols did not provide enough security and efficiency simultaneously. In this paper, we make one step ahead by proposing a very efficient MFAKE protocol. We define the security model and give the according security analysis. We also implement our protocol on a smart phone and a cloud server. The theoretic comparisons and the experimental results show that our scheme achieves both security and usability.Read More


IEEE 2017:My Privacy My Decision: Control of Photo Sharing on Online Social Networks
Abstract: Photo sharing is an attractive feature which popularizes Online Social Networks (OSNs). Unfortunately, it may leak users’ privacy if they are allowed to post, comment, and tag a photo freely. In this paper, we attempt to address this issue and study the scenario when a user shares a photo containing individuals other than himself/herself (termed co-photo for short). To prevent possible privacy leakage of a photo, we design a mechanism to enable each individual in a photo be aware of the posting activity and participate in the decision making on the photo posting. For this purpose, we need an efficient facial recognition (FR) system that can recognize everyone in the photo. However, more demanding privacy setting may limit the number of the photos publicly available to train the FR system. To deal with this dilemma, our mechanism attempts to utilize users’ private photos to design a personalized FR system specifically trained to differentiate possible photo co-owners without leaking their privacy. We also develop a distributed consensus based method to reduce the computational complexity and protect the private training set. We show that our system is superior to other possible approaches in terms of recognition ratio and efficiency. Our mechanism is implemented as a proof of concept Android application on Facebook’s platform.Read More


IEEE 2017: IoT based Home Security through Digital Image Processing Algorithms
Abstract- This paper gives an outline for automatic system to control and secure the home, based on digital image processing with the help of Internet of Things (IoT). The system consists of a sensor, digital camera, database in the fog and the mobile phone. Sensors are placed in the frame of the door which alerts camera, to capture an image who intends to enter the house, then sends the image to the database or dataset that is stored in the fog. Image analysis is performed to detect and recognize and match the image with the stored dataset of the authenticated people or pets. If the image captured does not match with the dataset then an alert message is send to the owner of the house. The image processing algorithms are considered for the processing spatial and time complexity of the image captured to cross check with the dataset stored in the fog.Read More

IEEE 2017: ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes

Abstract- Smartphones have been widely used with a vast array of sensitive and private information stored on these devices. To secure such information from being leaked, user authentication schemes are necessary. Current password/pattern-based user authentication schemes are vulnerable to shoulder surfing attacks and smudge attacks. In contrast, stroke/gait-based schemes are secure but inconvenient for users to input. In this paper, we propose ShakeIn, a handy user authentication scheme for secure unlocking of a smartphone by simply shaking the phone. With embedded motion sensors, ShakeIn can effectively capture the unique and reliable biometrical features of users about how they shake. In this way, even if an attacker sees a user shaking his/her phone, the attacker can hardly reproduce the same behaviour. Furthermore, by allowing users to customize the way how they shake the phone, ShakeIn endows users with the maximum operation flexibility. We implement ShakeIn and conduct both intensive trace-driven simulations and real experiments on 20 volunteers with about 530; 555 shaking samples collected over multiple months. The results show that ShakeIn achieves an average equal error rate of 1:2% with a small number of shakes using only 35 training samples even in the presence of shoulder-surfing attack.Read More


IEEE 2016: Dummy-Based User Location Anonymization Under Real-World Constraints
IEEE 2016  Android Application 
Abstract According to the growth of mobile devices equipped with a GPS receiver, a variety of location-based services (LBSs) have been launched. Since location information may reveal private information, preserving location privacy has become a significant issue. Previous studies proposed methods to preserve a users' privacy; however, most of them do not take physical constraints into consideration. In this paper, we focus on such constraints and propose a location privacy preservation method that can be applicable to a real environment. In particular, our method anonymizes the user's location by generating dummies which we simulate to behave like real human. It also considers traceability of the user's locations to quickly recover from an accidental reveal of the user's location. We conduct an experiment using five users' real GPS trajectories and compared our method with previous studies. The results show that our method ensures to anonymize the user's location within a pre-determined range. It also avoids fixing the relative positions of the user and dummies, which may give a hint for an LBS provider to identify the real user. In addition, we conducted a user experiment with 22 participants to evaluate the robustness of our method against humans. We asked participants to observe movements of a user and dummies and try to and the real user. As a result, we conformed that our method can anonymize the users' locations even against human's observation.

IEEE 2016: STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
IEEE 2016  Android Application 
Abstract— Location-based services are quickly becoming immensely popular. In addition to services based on users' current location, many potential services rely on users' location history, or their spatial-temporal provenance. Malicious users may lie about their spatial-temporal provenance without a carefully designed security system for users to prove their past locations. In this paper, we present the Spatial-Temporal provenance Assurance with Mutual Proofs (STAMP) scheme. STAMP is designed for ad-hoc mobile users generating location proofs for each other in a distributed setting. However, it can easily accommodate trusted mobile users and wireless access points. STAMP ensures the integrity and non-transferability of the location proofs and protects users' privacy. A semi-trusted Certification Authority is used to distribute cryptographic keys as well as guard users against collusion by a light-weight entropy-based trust evaluation approach. Our prototype implementation on the Android platform shows thatSTAMP is low-cost in terms of computational and storage resources. Extensive simulation experiments show that our entropy-based trust model is able to achieve high collusion detection accuracy.


IEEE 2016: PRISM: Privacy-aware Interest Sharing and Matching in Mobile Social Networks
IEEE 2016  Android Application
     Abstract—In a profile matchmaking application of mobile social networks, users need to reveal their interests to each other in order to find the common interests. A malicious user may harm a user by knowing his personal information. Therefore, mutual interests need to be found in a privacy preserving manner. In this paper, we propose an efficient privacy protection and interests sharing protocol referred to as PRivacy-aware Interest Sharing and Matching (PRISM). PRISM enables users to discover mutual interests without revealing their interests. Unlike existing approaches, PRISM does not require revealing the interests to a trusted server. Moreover, the protocol considers attacking scenarios that have not been addressed previously and provides an efficient solution. The inherent mechanism reveals any cheating attempt by a malicious user. PRISM also proposes the procedure to eliminate Sybil attacks. We analyze the security of PRISM against both passive and active attacks. Through implementation, we also present a detailed analysis of the performance of PRISM and compare it with existing approaches. The results show the effectiveness of PRISM without any significant performance degradation. 
                            
     
IEEE 2016:  SBVLC: Secure Barcode-Based Visible Light Communication for Smartphone
IEEE 2016  Android Application

     Abstract— 2D barcodes have enjoyed a significant penetration rate in mobile applications. This is largely due to the extremely low barrier to adoption—almost every camera-enabled smartphone can scan 2D barcodes. As an alternative to NFC technology, 2D barcodes have been increasingly used for security-sensitive mobile applications including mobile payments and personal identification. However, the security of barcode-based communication in mobile applications has not been systematically studied. Due to the visual nature, 2D barcodes are subject to eavesdropping when they are displayed on the smartphone screens. On the other hand, the fundamental design principles of 2D barcodes make it difficult to add security features. In this paper, we propose SBVLC—a secure system for barcode-based visible light communication (VLC) between smartphones. We formally analyze the security of SBVLC based on geometric models and propose physical security enhancement mechanisms for barcode communication by manipulating screen view angles and leveraging user-induced motions. We then develop three secure data exchange schemes that encode information in barcode streams. These schemes are useful in many security-sensitive mobile applications including private information sharing, secure device pairing, and contact less payment. SBVLC is evaluated through extensive experiments on both Android and iOS smartphones.  


IEEE 2015:  Context-Aware Mobile Cloud Computing and Its Challenges
IEEE 2015  Android Application
Abstract: Cloud computing is gaining popularity due to virtually unlimited resources, low capital cost, ease of adoption, flexible resource provisioning, and high scalability. Considering these benefits, researchers envision the usage of cloud computing for mobile devices to overcome the ever-increasing computational and energy demands of smartphone applications. However, this requires specialized context-ware application development models that can facilitate the development of cloud-enabled applications capable of making context-aware computation offloading decisions. This article provides an overview of mobile cloud computing technology, focusing on its context-awareness aspects and challenges.


IEEE 2015: Mobile attendance using Near Field     Communication and One-Time     Password
IEEE 2015  Android Application
Abstract: This paper introduces a Near Field Communication (NFC) supported College M-Attendance system for University Students. Near Field Communication (NFC) is one of the latest technologies in radiocommunications and being a subset of RFID technology, it is growing at an enormous pace. NFC technology provides the fastest way to communicate between two devices and it happens within a fraction of a second. It has several applications in Mobile Communications and transactions. An NFC-supported College M-Attendance system for University Students is discussed as one potential use of this technology. The proposed framework replaces manual roll calls and hence, making it resilient to forgery. It gives parents and professors information about the students' attendance. The marking ofattendance is quick, unsupervised, and makes use of a One Time Password (OTP) to enhance the security of the system and takes away the possibility of proxy attendance. This paper discusses NFC as a technology that is more secure and convenient than the prevalent technology of Bluetooth, and also elaborates on the proposed framework of the M-Attendance system that makes use of this advantage that NFC has over other technologies.

IEEE 2014:  NFC based applications for visually impaired people - A review
IEEE 2014  Android Application

Abstract: Recent technological developments provide technical assistance that enables supporting people with visual disabilities in their everyday tasks and improve their quality of life. Considering that about 90% of the world visually impaired people live in developing countries, particularly in the local context, in Saudi Arabia, there is a lack of assistive tools and adapted environment supporting people with visual disabilities. To overcome this problem, a wide variety of relatively inexpensive applications adapt Near Field Communications (NFC) tagging technology in the development of assistive tools for people with visual disabilities. In this article, we will systematically review the current adaptation of NFC technology for visually disabled people and introduce NFC practical applications to help them overcome challenging tasks that they may encounter every day.









7 comments:

  1. Nice blog it is very useful for me. I have to share my website link.
    Each and every year we are providing Cheap and best students Final year projects at Madurai.

    ReplyDelete
  2. Very good Article.. Since Java is a platform independent language can be used anywhere like windows,Linux etc.
    Java Course Online
    Java Training Institutes in Chennai
    J2EE training

    ReplyDelete
  3. I need context based access control system for mobile devices project..plz call me on 9585639991
    Or mail me at koti0514@gmail.com

    ReplyDelete
  4. Nice blog, Great content. I really enjoyed while reading this content with useful information, keep sharing. Final Year Android Projects | IEEE Android IOT

    ReplyDelete

  5. final year project is a fast growing IT Education company has maintained it is leadership in imparting quality services. We provide the best 2018 Projects in Chennai, 2018 Matlab Projects in Chennai, 2018 Vlsi Projects in Chennai, 2018 Arduino Projects in Chennai for Bsc,BCA,MSC,MCA students. As per their own interest and own requirements we deliver all the projects at right time.And also we are excellent at offering 2018 Embedded Projects in Chennai, 2018 IOT Projects in Chennai, 2018 Raspberry pi Projects in Chennai, 2018 Robotics Projects in Chennai for EEE,ECE college students.

    ReplyDelete
  6. Thanks for such important information.keep up the good work.Ethical Hacking training is based on current industry standards that helps attendees to secure placements in their dream jobs at MNCs. Indian Cyber Army Provides Best Ethical Hacking Training in India.Indian Cyber Army credibility in Ethical hacking training & Cybercrime investigation training is acknowledged across nation as we offer hands on practical knowledge and full assistance with basic as well as advanced level ethical hacking & cybercrime investigation courses

    ReplyDelete