a c2dm based framework for detection and notification of ... · index terms—android devices,...

5
Lecture Notes on Software Engineering, Vol. 3, No. 4, November 2015 325 DOI: 10.7763/LNSE.2015.V3.213 Abstract—The mobile phones have become undeletable part of human’s daily life, it has created a huge wireless network across the world. Android has carried a wide attention in mobile operating system era due to its features like Open Source, free of cost, customizable and large number of applications. Android’s Cloud to Device Messaging (C2DM) is a project for androids; it provides a service that helps in sending data from servers to their android devices and vice-versa. This paper presents a framework that uses C2DM server to identify suspicious persons or object and terrorist activities. Whenever any suspicious activity is recorded by any registered device it sends the data or the alert to the crime branch through C2DM server and an alert can be generated to the Police and persons present at nearby area. This framework can also be used in sending alert messages on the event of natural disasters like earthquake, Tsunami, Heavy rain etc. Index Terms—Android devices, cloud to device messaging service (C2DM), platform-as-a-service (PaaS), polling/push services, terrorist activity detection. I. INTRODUCTION In recent times terrorist groups, terrorist activities and terrorist attacks have taken place in every corner of the world [1], [2]. Detection of suspected person or suspicious activity may save no. of catastrophic events [3]. In a country with large population, monitoring for suspicious activities becomes a very difficult task for the police or the crime branch authorities. With the advancing technology responsible citizens may also be involved for detecting such threats and for a widespread message communication. In this paper, we are designing a push notification system between an intelligence bureau server and android Smartphone (popular and commonly in use today) using Google's cloud to device messaging service (C2DM) [4]. To use it for a real life problem of terrorism, push alerts can be generated on the registered android devices in the terrorist prone region. The citizen on receiving the alert can send the image of possible suspect if found in vicinity. The image can be further scrutinized and appropriate action can be taken by the Crime Branch. The application also provides a messaging option and IMEI tracing which helps the bureau experts to keep track of the situation near the concerned informer. Thus, this system will be helpful in controlling the terrorist activities and reducing life threat in critical scenarios. Manuscript received August 10, 2014; revised October15, 2014. Rajesh Doriya and K. Suraj are with the National Institute of Technology, Raipur, India (e-mail: [email protected], [email protected]). Pavan Chakraborty is with the Indian Institute of Information Technology, Allahabad, India (e-mail: [email protected]). A. Importance of Using Push Service C2DM Push Notifications [5] is a web service that will enable bureau authorities to send a notification to an application on a citizen's device, even when the application isn't running. They can send a notification to a single citizen, multiple citizens, or you can broadcast it to a predefined group of citizens. Depending on the device platform, a notification can include a badge, text alert, or sound, or a combination of these. Push Service offers several other advantages over polling mechanism [6]. The traditional method of keeping the data fresh on the end-user side is to run a long process that updates after a predefined interval via polling. The factors like cost of tuning up, performing requests and ripping down a connection is less than the cost of upholding a connection on the server. But as a result, it introduces several problems [7]. The first observable problem is, the total number of bytes desirable to accomplish the requests on the server typically ends up being a greater than the total bytes required to produce replies to direct that no new data is obtainable since last poll. And the other noticeable problem is that, limiting number of requests as per the server capacity is much harder. As the population is big and client processes are also large and so the number of simultaneous polls that contact the server at the same time grow at the same rate. Using push, we can provide updates to citizens at a rate that the server system can handle since the server is accountable for communicating the end users device. Some of the practical usage that can be implemented using proposed approach are listed below: 1) Many terrorist activities takes place in all over the world, with the android devices they can be notified and send useful data like GPS location, images etc. to the main server of the intelligence so that the precautionary measures can be taken [8]. 2) Event like burglary or any emergency can be handled quite effectively. Suppose we have the application server which keeps track of the CCTV camera at a certain high alert place that can be used to generate the messages to the concerned users. 3) As android is widely popular we can’t ignore its importance in medical filed. Patients suffering with some serious can be monitored using the messaging service. The rest of the paper is organized as follows: Section II describes the details of android platform and Google’s C2DM system for notification. Section III states the life cycle and working of notification system. Section IV describes the framework for terrorist activities detection. Section V concludes our work and introduces the possible application areas. A C2DM Based Framework for Detection and Notification of Terrorist Activities on Android Platform Rajesh Doriya, K. Suraj, and Pavan Chakraborty

Upload: others

Post on 25-May-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: A C2DM Based Framework for Detection and Notification of ... · Index Terms—Android devices, cloud to device messaging service (C2DM), platform-as-a-service (PaaS), polling/push

Lecture Notes on Software Engineering, Vol. 3, No. 4, November 2015

325DOI: 10.7763/LNSE.2015.V3.213

Abstract—The mobile phones have become undeletable part

of human’s daily life, it has created a huge wireless network across the world. Android has carried a wide attention in mobile operating system era due to its features like Open Source, free of cost, customizable and large number of applications. Android’s Cloud to Device Messaging (C2DM) is a project for androids; it provides a service that helps in sending data from servers to their android devices and vice-versa. This paper presents a framework that uses C2DM server to identify suspicious persons or object and terrorist activities. Whenever any suspicious activity is recorded by any registered device it sends the data or the alert to the crime branch through C2DM server and an alert can be generated to the Police and persons present at nearby area. This framework can also be used in sending alert messages on the event of natural disasters like earthquake, Tsunami, Heavy rain etc.

Index Terms—Android devices, cloud to device messaging service (C2DM), platform-as-a-service (PaaS), polling/push services, terrorist activity detection.

I. INTRODUCTION In recent times terrorist groups, terrorist activities and

terrorist attacks have taken place in every corner of the world [1], [2]. Detection of suspected person or suspicious activity may save no. of catastrophic events [3]. In a country with large population, monitoring for suspicious activities becomes a very difficult task for the police or the crime branch authorities. With the advancing technology responsible citizens may also be involved for detecting such threats and for a widespread message communication. In this paper, we are designing a push notification system between an intelligence bureau server and android Smartphone (popular and commonly in use today) using Google's cloud to device messaging service (C2DM) [4]. To use it for a real life problem of terrorism, push alerts can be generated on the registered android devices in the terrorist prone region. The citizen on receiving the alert can send the image of possible suspect if found in vicinity. The image can be further scrutinized and appropriate action can be taken by the Crime Branch. The application also provides a messaging option and IMEI tracing which helps the bureau experts to keep track of the situation near the concerned informer. Thus, this system will be helpful in controlling the terrorist activities and reducing life threat in critical scenarios.

Manuscript received August 10, 2014; revised October15, 2014. Rajesh Doriya and K. Suraj are with the National Institute of Technology,

Raipur, India (e-mail: [email protected], [email protected]). Pavan Chakraborty is with the Indian Institute of Information Technology,

Allahabad, India (e-mail: [email protected]).

A. Importance of Using Push Service C2DM Push Notifications [5] is a web service that will

enable bureau authorities to send a notification to an application on a citizen's device, even when the application isn't running. They can send a notification to a single citizen, multiple citizens, or you can broadcast it to a predefined group of citizens. Depending on the device platform, a notification can include a badge, text alert, or sound, or a combination of these.

Push Service offers several other advantages over polling mechanism [6]. The traditional method of keeping the data fresh on the end-user side is to run a long process that updates after a predefined interval via polling. The factors like cost of tuning up, performing requests and ripping down a connection is less than the cost of upholding a connection on the server. But as a result, it introduces several problems [7]. The first observable problem is, the total number of bytes desirable to accomplish the requests on the server typically ends up being a greater than the total bytes required to produce replies to direct that no new data is obtainable since last poll. And the other noticeable problem is that, limiting number of requests as per the server capacity is much harder. As the population is big and client processes are also large and so the number of simultaneous polls that contact the server at the same time grow at the same rate. Using push, we can provide updates to citizens at a rate that the server system can handle since the server is accountable for communicating the end users device.

Some of the practical usage that can be implemented using proposed approach are listed below: 1) Many terrorist activities takes place in all over the world,

with the android devices they can be notified and send useful data like GPS location, images etc. to the main server of the intelligence so that the precautionary measures can be taken [8].

2) Event like burglary or any emergency can be handled quite effectively. Suppose we have the application server which keeps track of the CCTV camera at a certain high alert place that can be used to generate the messages to the concerned users.

3) As android is widely popular we can’t ignore its importance in medical filed. Patients suffering with some serious can be monitored using the messaging service.

The rest of the paper is organized as follows: Section II describes the details of android platform and Google’s C2DM system for notification. Section III states the life cycle and working of notification system. Section IV describes the framework for terrorist activities detection. Section V concludes our work and introduces the possible application areas.

A C2DM Based Framework for Detection and Notification of Terrorist Activities on Android Platform

Rajesh Doriya, K. Suraj, and Pavan Chakraborty

Page 2: A C2DM Based Framework for Detection and Notification of ... · Index Terms—Android devices, cloud to device messaging service (C2DM), platform-as-a-service (PaaS), polling/push

A

deprmefmpestFivadrSuanthfrpain

heapprcaseda

mtabiachachw

Plfranse1)

Fig. 1. Softwar

II. ANDROID

A. Android PAndroid is

esigned for mrogrammed in

mechanisms anfficient sha

multitasking, ermissions wack of androidig. 1. First layarious driversriver etc. Secourface Managndroid runtimhat contains pramework it cackage managnterface option

B. Google’s Android Clo

elps developpplications onrovides a lighan practice toerver directly ata.

The C2DM messages and darget device. Iig challenge ctivities are darm human hallenges whic

warnings are isThe C2DM

latform-as-a-Samework conndroid supporervers. ) Android s

re stack’s layered

D PLATFORM &

Platform an open sour

mobile devicesn Java. It hnd other featuared memorUNIX user ith Java's typd is a four layyer is consists like keypadond layer consger, Media fra

me core librarirocesses. Thicontains activger etc. The ns such as hom

C2DM Servicoud to Devicers to send n Android d

htweight and o communicatand that can f

service handdelivery to the In recent timeto detect, it

detected or sobeings. Nat

ch can be ovesued within ti

M service Service (Pansists of thrrted device, c

supported dev

d architecture of a

& GOOGLE’S

rce operatings and tablets

has its own ures of an opery utilizati

identifiers pe safe mech

yered architectts of Linux kd driver, Wi-sists of commoamework SQLies and Dalvikird layer cons

vity manager, top layer is

me, browser, p

ce ce Messaging

data from devices (Fig.modest mechte mobile appfetch updated

dles all aspectarget applica

e terrorist activwould be v

ome suspicioutural disasterercome or can ime.

of Google aaS) deliverree main cocrime branch

vice — the

android devices [9

C2DM SERVI

g system specwith Linux kenhanced secerating systemon, pre-em(UIDs) and

hanisms. Softture as describernel that con-Fi driver, dion libraries su

Lite etc. alongk Virtual Masists on applic

window mans consists of phone, contact

g (C2DM) seservers to

2). The sehanism that seplications witapplication or

cts of queuination running ovities is one overy useful ius object thars are the reduce the ha

is based ry model. mponents naserver and C

device carrie

9].

CE

cially kernel curity

m like mptive

file ftware bed in ntains isplay uch as g with achine cation nager

f user ts etc.

ervice their

ervice ervers th the r user

ng of on the of the if the at can

other arm if

on The

amely C2DM

ed by

2)

3)

Thcloud

EnregisbrancitizecitizeThes

A.Th

Andrregis

StserviRegiintencertiID o

StREGgenestorerefresuchseve

Ststore

citizen and incorporates android 2.2 orCrime Branchup as a part oThe crime braC2DM serverC2DM serverframework aslocating the dused in dissimlisted device information is

Fig. 2. Bas

III. LIF

here are thd-to-device mnabling C2Dsters to receiv

nch applicatioens. Receivinen’s device rse processes a

Enabling C2his is the seroid applicatisters to receivtep 1: At the ices, it sendsistration nt.REGISTERfied to send m

of the applicatitep 2: On GISTRATIONerates the apped for later useeshed by Googh a way so thatral times.

tep3: At the laed in the datab

is running aC2DM servi

r advance verh server — anof employing anch server ser with androidr — Authentis it identifies thdevice. The comilar phases ocarriers have

s being passed

sic working archit

FE CYCLE FLOW

hree main messaging [10]DM-Citizen uve messages.

on server senng a messagereceives a meare described i

2DM equence of evion running oe messages: first step app

a registratioIntent

R) comprises omessages to theion's develope

account oN Intent is broaplication a ree. Here, the reggle, therefore at the REGISTR

ast step, registbase of the app

an android aice. The devsion.

n application sC2DM in th

ends and receivd devices. icity plays a vhe android devoncept of Ids of C2DM to

e been authend to the authen

tecture of C2DM

W OF NOTIFIC

processes ]: sing the andr Sending a nds message

e-The Androidessage from ain more detail

vents that ocon a citizen’s

plication useson Intent to a

(com.googleof the sender e application, ner), and the apof successfuadcasted by C2egistration ID gistration ID mapplication haRATION Inten

tration ID of thplication serve

application thvice must ha

server that is eir applicationves data throu

vital role in tvice and helpsand Tokens aconfirm that

nticated, and tnticated user.

M service.

CATION convoluted

roid applicatimessage-Crims to registerd application a C2DM servbelow:

ccurs when ts mobile devi

s the messagia C2DM serve.andr-oid.c2dm

ID (the accounamely an em

pplication ID.ul registratio2DM server thand this ID

may periodicaas to be designnt may be call

he applicationer.

hat ave

set ns.

ugh

the s in are all the

in

ion me red on

ver.

the ice

ing ver. m- unt

mail

on, hat

is ally ned led

n is

Lecture Notes on Software Engineering, Vol. 3, No. 4, November 2015

326

Page 3: A C2DM Based Framework for Detection and Notification of ... · Index Terms—Android devices, cloud to device messaging service (C2DM), platform-as-a-service (PaaS), polling/push

This registration ID persists until the application unregisters itself, or Google restores the new registration ID for application.

B. Sending a Message For this crime branch will use an application server to send

a message, which requires the following prerequisites: 1) The application contains registration ID of citizen’s

device that permits it to receive messages for a particular citizen.

2) The registration ID has been stored by the crime branch application server.

To send messages a ClientLogin authorization token is also required for the application server and it is the mandatory requirement at the application server. This enables sending messages to the device. The ClientLogin token ID approves the application server to direct messages to a particular Android application. An application server contains only one ClientLogin token ID for the third party application, and multiple registration IDs. Each registration ID characterizes a specific device that has been listed to use the messaging service for a specific third party application.

The following events occur when the application server directs a message: 1) The crime branch authorities use the application server

to send a message to C2DM servers. 2) Google put in queues and stores the message in case the

citizen's device is inactive. 3) When the device is online, Google sends the message to

the device via Intent broadcast this enables the application to wake up.

4) At the device, the message is broadcasted by the system to specified application through Intent broadcast with adequate authentication, so that only intended application acquires the message. This stirs the application up. It is not necessary to run the application to get the message.

5) The message is processed by the application.

C. Receiving a Message Some events occur in specified order when a message is

received at the user’s device: 1) The C2DM system receives the message from crime

branch and extracts the raw key/value sets from message payload.

2) The system permits the key/value sets to the Android application on citizen’s device in a com.google.android.c2dm.intent.RECEIVE Intent as a set of extras.

3) The application excerpts the raw data from RECEIVE Intent by key and processes the data so that citizen can view the message.

Fig. 3. Framework for suspicious terrorist activity detection using Google’s C2DM service.

The following C2DM credentials are used to ensure the

working: 1) Sender ID — the sender ID is used during registration

process to validate the android application that can send messages to the android device.

2) Application ID — this ID facilitates the application in registration to receive messages; the application is identified via manifest which provide the package name. This ensures proper routing of messages to the right application. An application ID is issued by the C2DM server to android application. Once the application has the registration ID, it sends to the crime branch application server that in turn identifies each android device with registration ID.

3) Google user account — C2DM needs a Google user account, therefore an android device must include

logged in Google account. 4) Server Authorization Token — a token of client login

authorization is stored on the third party server that enables authorized access to Google’s services.

IV. WORKING OF OVERALL SYSTEM In this paper, we are proposing a framework which can be

used by an intelligence department or natural disaster management department. In our work we have made the assumption that all the users are carrying android devices and later on it can be incorporated on other platforms. In the proposed work, an intelligence bureau acts as an application or third party server while the member of the squad recruited at different terror prone regions carries android devices. This way the system has all the details of the member along with

Lecture Notes on Software Engineering, Vol. 3, No. 4, November 2015

327

Page 4: A C2DM Based Framework for Detection and Notification of ... · Index Terms—Android devices, cloud to device messaging service (C2DM), platform-as-a-service (PaaS), polling/push

th

seSeSeC2wdebrthtodacrteconotepeis

geseC2thbeno

ondi

T

obimreac

he IMEI numbFig. 3 descri

ervice. In thender_Auth_Tender_Auth_T2DM server. T

which providesevice registraranch is suspichrough the C2Do send data to ata from citizerime branch sechniques and orrect, they caotification anderrorist in someople may alsorequired. The citizens

ets some suspierver. The da2DM server f

hird party intee checked to dotification to t

Furthermore,n other situatiisasters and al

F

TABLE I: THE INFOR GETTIN

S. No. Index

1 Re

[em[packa

2 [re

3 Reg[re

4 HTTP[de

5 s

When a perbject/person/ammediately seesponse the ccordingly. Th

ber of the deviibes the overahis a requesToken thenToken and a rThe registratios the sender

ation id and acious they wilDM server whthe authoritieen’s device wserver where t

validate the dan alert all the d responsible me particularo seek help fro

will send the icious persons

ata may be imforwards the dlligence bureadraw the concthe user. , In future thisions like in plerting accordi

ig. 4. Flow diagra

NDEX LISTING OF WNG PUSH MESSAG

x Table 1 Inegister mail id] age name]

[

eg. id] [a

gistered eg. id] P [reg. id] ev. id]

store

rson capturesactivity througend it to the notifications

his helps in g

ice and his resall working ost to C2DMn sender

registration id on id is sent thauthenticationapp data. Whll send a messhich will thens is he/she fin

will directly bethey can examdata. If the inpeople in thaenough to he

r threat pronom them if ex

data after regs/objects/activmage, video odata in form oau server, wheclusion. C2DM

s framework credicting natuingly.

am of overall wo

WHITE LISTED ANGES ON THEIR AN

Index Table ndex Table 2 [white listed

email id] [password] authorization

token]

[store]

---

---

s an image ogh an andro

intelligence are fired t

getting alert fo

siding addressof google’s C

M is sent toreplies

is provided bhe third party sn token contahenever the csage to the cit

n enable any cinds somethinge transferred tmine it using formation is f

at region by firelp in trackinne region. Buxhaustive searc

gistration, if hvities, to the Cor any sound of messages tere the recordM also sends

an be implemural calamitie

rking.

ND REGISTERED UNDROID DEVICE

Index Table

Message trigg

[reg. id] [toke[message]

[message]

[message]

Wake-up notification

of any suspiid device, pbureau serve

to take decifor registered

. C2DM o get

with by the server aining crime tizens itizen

g. The to the their

found ring a

ng the ureau ching

he/she C2DM

clip. to the d may

push

mented s and

USER

e 3

ger

en]

n

icious erson er. In isions users

and rI desfor g

Thservestep:

A.1)

2)

3)

4)

5)

6)

B.1)

2)

3)

C.Th

wakiseeincaptucontr1)2)

3)4)5)

WFig. a largthe pchunpackdecoapplicitizerecogdatabMulttransdata,that transthe f

responsible enscribes the indgetting push mhe stepwise floer and device :

RegistrationFiring the r[package namThe device seC2DM serverThe C2DM sapplication ([Once the devC2DM applicuse (RegistereTo register withe intelligen(HTTP [reg IdThe server remor sending no

Setting up SeSending the([whitelisted The C2DM Token]). The server stauthorized ac

Sending the he notificationing up the dedng any suspeure the imagrol room. The squad meThe message for notificatioThe C2DM seThe message The C2DM Application wpost the data a

Working of the 5. When an imge image in sipackets of sm

nks through mkets are colleoding. Where ied for taking en encountersgnition algoribase etc. Andrtipurpose Intsfer encoding , when they nethe data rem

sport. Androidfollowing wor

nough in trackdex listing of wmessages on thow of data amis shown in F

n Process (Enaegistration re

me]). ends the [Emar. server broadcareg Id]).

vice gets a succation on the ded [reg Id]). ith our terrorice bureau it md][dev Id] ). members the

otification.

erver Authorize credentialsemail id] [pas

server repli

tores the Cliencess to Googl

Alert and Wan fired by the bdicated applicaected activitiee immediatel

ember triggerswith the regis

on is passed toerver sends thwakes up the

application which with thand image to uploading an

mage in sent frize so the imagmall sizes an

multipart HTTPected and sto

various imagdecision. Lik

s a suspiciouthms for checroid device usternet Mail E

scheme commeed to transfer

mains intact wd device sendsrkflow describ

king threat prowhite listed andheir android de

mong C2DM seFig. 4 is given

abling C2DM)equest (Regis

ail id] [packa

asts the regist

ccessful registdevice stores

st detection semust send the

[reg Id] [dev I

zation Token s required fssword]). ies with a

ntLogin Authle services.

aking up the Ubureau will haation for the v

es or person ly and send

s a message attration ID, tok

o C2DM servehe message to

C2DM applicwill start

he help of HTserver.

n image in andfrom the androge if encoded

nd then conveP request. At thored into thege processingke object recogus briefcase ocking against eses base64 whExtensions (Mmonly used tor. This base64without modifs an image to bed in Fig. 3:

ne region. Tabd registered usevice. erver, third parin the followi

M) ster [Email i

age name] to t

tration ID to t

tration reply, t[reg Id] for la

erver handled e registration

Id] for receivi

for the tok

([Authorizati

h token and g

Upload App ave the abilityvery purpose. Othe citizen wit to the serv

t the server.ken and messaer. devices. cation.

the uploadiTTP request w

droid is shownoid user it mayinto strings th

erted into smhe receiver ha

e database afg algorithms agnition for if t

or package, faexisting terrorhich is a speciMIME) conteo encode bina scheme ensurfications durithe server usi

ble ser

rty ing

id]

the

the

the ater

by ID

ing

ken

ion

ets

y of On

will ver

age

ing will

n in ybe hen

mall and fter are the ace rist ific ent ary res ing ing

Lecture Notes on Software Engineering, Vol. 3, No. 4, November 2015

328

Page 5: A C2DM Based Framework for Detection and Notification of ... · Index Terms—Android devices, cloud to device messaging service (C2DM), platform-as-a-service (PaaS), polling/push

Step 1: Capture the image using device camera. Step 2: Convert image into a bitmap, which then converted

into ByteArrayOutputStream using base64. Step 3: Pass the stream array to the server side using

multipart HTTP request. Step 4: Decode thebase64 array and reform the image Step 5: Process the image to take decisions.

Fig. 5. Flow of Image capturing from android device.

V. CONCLUSION AND FUTURE WORK We have proposed a Google’s C2DM based framework for

notification of any suspicious activity/person/object for the social welfare of human beings. In the framework user makes the use of android 2.2 or latest version device to capture the image, video or any audio clip and forward it the third party intelligence bureau server via C2DM service with base64 encoding. Third party server takes the decisions accordingly and sends the notifications to the registered recruiters. This framework can be easily extended to other applications like predicting natural calamities and disasters and alerting accordingly etc.

REFERENCES [1] T. Maksim and K. M. Carley, “Structural knowledge and success of

anti-terrorist activity: The downside of structural equivalence,” Institute for Software Research, vol. 43, 2005.

[2] J. Yin, Q. Yang, and J. J. Pan, “Sensor-based abnormal human-activity detection,” IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 8, pp. 1082-1090, Aug. 2008.

[3] S. Singh, J. Allanach, T. Haiying, K. Pattipati, and P. Willett, “Stochastic modeling of a terrorist event via the ASAM system,” in Proc. 2004 IEEE International Conference on Systems, Man and Cybernetic, vol. 6, pp. 5673-5678, Oct. 2004.

[4] A. C. Davies, Y. J. Hong, and S. A. Velastin, “Crowd monitoring using image processing,” Electronics & Communication Engineering Journal, vol. 7, no. 1, pp. 37-47, Feb. 1995.

[5] Z. Hai, Q. Li, and H. Qiu, “Research and implementation of cloud pushing based on Android C2DM service,” Computer Technology and Development, vol.7, 2012.

[6] P. Bahl, R. Y. Han, L. E. Li, and M. Satyanarayanan, “Advancing the state of mobile cloud computing,” in Proc. the Third ACM Workshop on Mobile Cloud Computing and Services (MCS '12), ACM, pp. 21-28, New York, USA, 2012.

[7] M. Ongtang, K. Butler, and P. McDaniel, “Porscha: Policy oriented secure content handling in Android,” in Proc. the 26th Annual Computer Security Applications Conference (ACSAC '10), ACM, pp. 221-230, New York, USA, 2010.

[8] M. L. Wein and M. Baveja, “Using fingerprint image quality to improve the identification performance of the US visitor and immigrant status indicator technology program,” in Proc. the National Academy of Sciences of the United States of America, pp. 7772-7775, vol. 102.21, 2005.

[9] B. Patrick, “Anatomy & physiology of an android,” presented at Google I/O Developer Conference, 2008.

[10] Developers. (October 2014). [Online]. Available: https://developers.google.com/android/c2dm

Rajesh Doriya received his BE in information technology in 2006 from Madhav Institute of Technology and Science, Gwalior, India and his MTech in information technology (with specialization in robotics) in 2009 from Indian Institute of Information Technology, Allahabad, India. Presently, he is pursuing his PhD in the area of cloud enabled robots from IIIT Allahabad. His research interests include distributed and

cloud computing, AI & robotics, machine learning, data mining, and soft computing techniques. He has got teaching experience of around 4 years and presently he is working as an assistant professor in the Department of Information Technology, National Institute of Technology, Raipur, India. He is the member of IEEE and ACM. He has also done some research at DRDO-India and BARC-India.

K. Suraj is pursuing his B. Tech. degree in information technology from National Institute of Technology, Raipur, India. He secured 1st prize in National Science Exhibition at Aavartan-Annual Tech Fest of National Institute of Technology, Raipur, India. His research interests include computer networks, machine learning, soft computing algorithms and AI. He is the member of IEEE and IEEE student branch of the institute. He is

also one part of problem setter team for CodeAthon: a weekly coding contest.

Pavan Chakraborty obtained his MSc degree from Indian Institute of Technology, Kanpur, India in the year 1993 and PhD degree from Institute of Astrophysics (IIA), Banglore India in the year 2001. Currently, he is serving as an associate professor in the Department of Information Technology, at Indian Institute of Information Technology, Allahabad, India. His research interests include artificial intelligence,

robotics and instrumentation.

Lecture Notes on Software Engineering, Vol. 3, No. 4, November 2015

329