IEEE 2016 / 17 - Android Projects with Web Hosting

IEEE 2016: Dummy-Based User Location Anonymization Under Real-World Constraints
IEEE 2016  Android Application 
Abstract According to the growth of mobile devices equipped with a GPS receiver, a variety of location-based services (LBSs) have been launched. Since location information may reveal private information, preserving location privacy has become a significant issue. Previous studies proposed methods to preserve a users' privacy; however, most of them do not take physical constraints into consideration. In this paper, we focus on such constraints and propose a location privacy preservation method that can be applicable to a real environment. In particular, our method anonymizes the user's location by generating dummies which we simulate to behave like real human. It also considers traceability of the user's locations to quickly recover from an accidental reveal of the user's location. We conduct an experiment using five users' real GPS trajectories and compared our method with previous studies. The results show that our method ensures to anonymize the user's location within a pre-determined range. It also avoids fixing the relative positions of the user and dummies, which may give a hint for an LBS provider to identify the real user. In addition, we conducted a user experiment with 22 participants to evaluate the robustness of our method against humans. We asked participants to observe movements of a user and dummies and try to and the real user. As a result, we conformed that our method can anonymize the users' locations even against human's observation.

IEEE 2016: STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
IEEE 2016  Android Application 
Abstract— Location-based services are quickly becoming immensely popular. In addition to services based on users' current location, many potential services rely on users' location history, or their spatial-temporal provenance. Malicious users may lie about their spatial-temporal provenance without a carefully designed security system for users to prove their past locations. In this paper, we present the Spatial-Temporal provenance Assurance with Mutual Proofs (STAMP) scheme. STAMP is designed for ad-hoc mobile users generating location proofs for each other in a distributed setting. However, it can easily accommodate trusted mobile users and wireless access points. STAMP ensures the integrity and non-transferability of the location proofs and protects users' privacy. A semi-trusted Certification Authority is used to distribute cryptographic keys as well as guard users against collusion by a light-weight entropy-based trust evaluation approach. Our prototype implementation on the Android platform shows thatSTAMP is low-cost in terms of computational and storage resources. Extensive simulation experiments show that our entropy-based trust model is able to achieve high collusion detection accuracy.

IEEE 2016: PRISM: Privacy-aware Interest Sharing and Matching in Mobile Social Networks
IEEE 2016  Android Application
     Abstract—In a profile matchmaking application of mobile social networks, users need to reveal their interests to each other in order to find the common interests. A malicious user may harm a user by knowing his personal information. Therefore, mutual interests need to be found in a privacy preserving manner. In this paper, we propose an efficient privacy protection and interests sharing protocol referred to as PRivacy-aware Interest Sharing and Matching (PRISM). PRISM enables users to discover mutual interests without revealing their interests. Unlike existing approaches, PRISM does not require revealing the interests to a trusted server. Moreover, the protocol considers attacking scenarios that have not been addressed previously and provides an efficient solution. The inherent mechanism reveals any cheating attempt by a malicious user. PRISM also proposes the procedure to eliminate Sybil attacks. We analyze the security of PRISM against both passive and active attacks. Through implementation, we also present a detailed analysis of the performance of PRISM and compare it with existing approaches. The results show the effectiveness of PRISM without any significant performance degradation. 
IEEE 2016:  SBVLC: Secure Barcode-Based Visible Light Communication for Smartphone
IEEE 2016  Android Application

     Abstract— 2D barcodes have enjoyed a significant penetration rate in mobile applications. This is largely due to the extremely low barrier to adoption—almost every camera-enabled smartphone can scan 2D barcodes. As an alternative to NFC technology, 2D barcodes have been increasingly used for security-sensitive mobile applications including mobile payments and personal identification. However, the security of barcode-based communication in mobile applications has not been systematically studied. Due to the visual nature, 2D barcodes are subject to eavesdropping when they are displayed on the smartphone screens. On the other hand, the fundamental design principles of 2D barcodes make it difficult to add security features. In this paper, we propose SBVLC—a secure system for barcode-based visible light communication (VLC) between smartphones. We formally analyze the security of SBVLC based on geometric models and propose physical security enhancement mechanisms for barcode communication by manipulating screen view angles and leveraging user-induced motions. We then develop three secure data exchange schemes that encode information in barcode streams. These schemes are useful in many security-sensitive mobile applications including private information sharing, secure device pairing, and contact less payment. SBVLC is evaluated through extensive experiments on both Android and iOS smartphones.  

IEEE 2015:  Context-Aware Mobile Cloud Computing and Its Challenges
IEEE 2015  Android Application
Abstract: Cloud computing is gaining popularity due to virtually unlimited resources, low capital cost, ease of adoption, flexible resource provisioning, and high scalability. Considering these benefits, researchers envision the usage of cloud computing for mobile devices to overcome the ever-increasing computational and energy demands of smartphone applications. However, this requires specialized context-ware application development models that can facilitate the development of cloud-enabled applications capable of making context-aware computation offloading decisions. This article provides an overview of mobile cloud computing technology, focusing on its context-awareness aspects and challenges.

IEEE 2015: Mobile attendance using Near Field     Communication and One-Time     Password
IEEE 2015  Android Application
Abstract: This paper introduces a Near Field Communication (NFC) supported College M-Attendance system for University Students. Near Field Communication (NFC) is one of the latest technologies in radiocommunications and being a subset of RFID technology, it is growing at an enormous pace. NFC technology provides the fastest way to communicate between two devices and it happens within a fraction of a second. It has several applications in Mobile Communications and transactions. An NFC-supported College M-Attendance system for University Students is discussed as one potential use of this technology. The proposed framework replaces manual roll calls and hence, making it resilient to forgery. It gives parents and professors information about the students' attendance. The marking ofattendance is quick, unsupervised, and makes use of a One Time Password (OTP) to enhance the security of the system and takes away the possibility of proxy attendance. This paper discusses NFC as a technology that is more secure and convenient than the prevalent technology of Bluetooth, and also elaborates on the proposed framework of the M-Attendance system that makes use of this advantage that NFC has over other technologies.

IEEE 2014:  NFC based applications for visually impaired people - A review
IEEE 2014  Android Application

Abstract: Recent technological developments provide technical assistance that enables supporting people with visual disabilities in their everyday tasks and improve their quality of life. Considering that about 90% of the world visually impaired people live in developing countries, particularly in the local context, in Saudi Arabia, there is a lack of assistive tools and adapted environment supporting people with visual disabilities. To overcome this problem, a wide variety of relatively inexpensive applications adapt Near Field Communications (NFC) tagging technology in the development of assistive tools for people with visual disabilities. In this article, we will systematically review the current adaptation of NFC technology for visually disabled people and introduce NFC practical applications to help them overcome challenging tasks that they may encounter every day.


  1. Nice blog it is very useful for me. I have to share my website link.
    Each and every year we are providing Cheap and best students Final year projects at Madurai.

  2. Very good Article.. Since Java is a platform independent language can be used anywhere like windows,Linux etc.
    Java Course Online
    Java Training Institutes in Chennai
    J2EE training

  3. I need context based access control system for mobile devices project..plz call me on 9585639991
    Or mail me at

  4. Nice blog, Great content. I really enjoyed while reading this content with useful information, keep sharing. Final Year Android Projects | IEEE Android IOT