Download - Android titles adrit solutions
Contact Us: #42/5, 1st Floor, 18
th Cross, 21
st Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
ADRIT SOLUTIONS Ph: 7676768124 ; 9886878569 Email: [email protected]
ANDROID APPLICATIONS IEEE TITLES - 2016-17
1. IEEE 2016: Dummy-Based User Location Anonymization Under Real-World
Constraints
Abstract: According to the growth of mobile devices equipped with a GPS receiver, a
variety of location-based services (LBSs) have been launched. Since location
information may reveal private information, preserving location privacy has become a
significant issue. Previous studies proposed methods to preserve a users' privacy;
however, most of them do not take physical constraints into consideration. In this
paper, we focus on such constraints and propose a location privacy preservation
method that can be applicable to a real environment. In particular, our method
anonymizes the user's location by generating dummies which we simulate to behave
like real human. It also considers traceability of the user's locations to quickly recover
from an accidental reveal of the user's location. We conduct an experiment using five
users' real GPS trajectories and compared our method with previous studies. The
results show that our method ensures to anonymize the user's location within a pre-
determined range. It also avoids fixing the relative positions of the user and dummies,
which may give a hint for an LBS provider to identify the real user. In addition, we
conducted a user experiment with 22 participants to evaluate the robustness of our
method against humans. We asked participants to observe movements of a user and
dummies and try to and the real user. As a result, we conformed that our method can
anonymize the users' locations even against human's observation.
2. IEEE 2016: SBVLC: Secure Barcode-Based Visible Light Communication for
Smartphones
Contact Us: #42/5, 1st Floor, 18
th Cross, 21
st Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: 2D barcodes have enjoyed a significant penetration rate in mobile
applications. This is largely due to the extremely low barrier to adoption—almost every
camera-enabled smartphone can scan 2D barcodes. As an alternative to NFC
technology, 2D barcodes have been increasingly used for security-sensitive mobile
applications including mobile payments and personal identification. However, the
security of barcode-based communication in mobile applications has not been
systematically studied. Due to the visual nature, 2D barcodes are subject to
eavesdropping when they are displayed on the smartphone screens. On the other hand,
the fundamental design principles of 2D barcodes make it difficult to add security
features. In this paper, we propose SBVLC—a secure system for barcode-based visible
light communication (VLC) between smartphones. We formally analyze the security of
SBVLC based on geometric models and propose physical security enhancement
mechanisms for barcode communication by manipulating screen view angles and
leveraging user-induced motions. We then develop three secure data exchange schemes
that encode information in barcode streams. These schemes are useful in many
security-sensitive mobile applications including private information sharing, secure
device pairing, and contactless payment. SBVLC is evaluated through extensive
experiments on both Android and iOS smartphones.
3. IEEE 2016: Mobile attendance using Near Field Communication and One-Time
Password
Contact Us: #42/5, 1st Floor, 18
th Cross, 21
st Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: This paper introduces a Near Field Communication (NFC) supported College
M-Attendance system for University Students. Near Field Communication (NFC)
is one of the latest technologies in radio communications and being a subset of RFID
technology, it is growing at an enormous pace. NFC technology provides the fastest way
to communicate between two devices and it happens within a fraction of a second. It
has several applications in Mobile Communications and transactions. An NFC-
supported College M-Attendance system for University Students is discussed
as one potential use of this technology. The proposed framework replaces manual roll
calls and hence, making it resilient to forgery. It gives parents and professors
information about the students' attendance. The marking of attendance is quick,
unsupervised, and makes use of a One Time Password (OTP) to enhance the security of
the system and takes away the possibility of proxy attendance. This paper discusses
NFC as a technology that is more secure and convenient than the prevalent technology
of Bluetooth, and also elaborates on the proposed framework of the M-
Attendance system that makes use of this advantage that NFC has over other
technologies.
4. IEEE 2016: Context-Aware Mobile Cloud Computing and Its Challenges
Abstract: Cloud computing is gaining popularity due to virtually unlimited resources,
low capital cost, ease of adoption, flexible resource provisioning, and high scalability.
Considering these benefits, researchers envision the usage
of cloud computing for mobile devices to overcome the ever-increasing computational
and energy demands of smartphone applications. However, this requires specialized
context-ware application development models that can facilitate the development
of cloud-enabled applications capable of making context-aware computation offloading
decisions. This article provides an overview of mobile cloud computing technology,
focusing on its context-awareness aspects and challenges.
5. IEEE 2016: STAMP: Enabling Privacy-Preserving Location Proofs for Mobile
Users
Contact Us: #42/5, 1st Floor, 18
th Cross, 21
st Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: Location-based services are quickly becoming immensely popular. In
addition to services based on users' current location, many potential services rely
on users' location history, or their spatial-temporal provenance. Malicious users may lie
about their spatial-temporal provenance without a carefully designed security system
for users to prove their past locations. In this paper, we present the Spatial-Temporal
provenance Assurance with Mutual Proofs (STAMP) scheme. STAMP is designed for ad-
hoc mobile users generating location proofs for each other in a distributed setting.
However, it can easily accommodate trusted mobile users and wireless access
points. STAMP ensures the integrity and non-transferability of the location proofs and
protects users' privacy. A semi-trusted Certification Authority is used to distribute
cryptographic keys as well as guard users against collusion by a light-weight entropy-
based trust evaluation approach. Our prototype implementation on the Android
platform shows that STAMP is low-cost in terms of computational and storage
resources. Extensive simulation experiments show that our entropy-based trust model
is able to achieve high collusion detection accuracy.
6. IEEE 2016: PRISM: PRivacy-aware Interest Sharing and Matching in Mobile
Social Networks
Contact Us: #42/5, 1st Floor, 18
th Cross, 21
st Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: In a profile matchmaking application of mobile social networks, users need to
reveal their interests to each other in order to find the common interests. A malicious
user may harm a user by knowing his personal information. Therefore, mutual interests
need to be found in a privacy preserving manner. In this paper, we propose an efficient
privacy protection and interests sharing protocol referred to as PRivacy-aware Interest
Sharing and Matching (PRISM). PRISM enables users to discover mutual interests
without revealing their interests. Unlike existing approaches, PRISM does not require
revealing the interests to a trusted server. Moreover, the protocol considers attacking
scenarios that have not been addressed previously and provides an efficient solution.
The inherent mechanism reveals any cheating attempt by a malicious user. PRISM also
proposes the procedure to eliminate Sybil attacks. We analyze the security of PRISM
against both passive and active attacks. Through implementation, we also present a
detailed analysis of the performance of PRISM and compare it with existing approaches.
The results show the effectiveness of PRISM without any significant performance
degradation.
7. IEEE 2015: Just-in-Time Code Offloading for Wearable Computing
Contact Us: #42/5, 1st Floor, 18
th Cross, 21
st Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: Wearable computing becomes an emerging computing paradigm for various
recently developed wearable devices, such as Google Glass and the Samsung Galaxy
Smart watch, which have significantly changed our daily life with new functions. To
magnify the applications on wearable devices with limited computational capability,
storage, and battery capacity, in this paper, we propose a novel three-layer architecture
consisting of wearable devices, mobile devices, and a remote cloud for code offloading.
In particular, we offload a portion of computation tasks from wearable devices to local
mobile devices or remote cloud such that even applications with a heavy computation
load can still be upheld on wearable devices. Furthermore, considering the special
characteristics and the requirements of wearable devices, we investigate
a code offloading strategy with a novel just-in-time objective, i.e., maximizing the
number of tasks that should be executed on wearable devices with guaranteed delay
requirements. Because of the NP-hardness of this problem as we prove, we propose a
fast heuristic algorithm based on the genetic algorithm to solve it. Finally, extensive
simulations are conducted to show that our proposed algorithm significantly
outperforms the other three offloading strategies.
8. IEEE 2015: Energy Cost Models of Smartphones for Task Offloading to the
Cloud
Contact Us: #42/5, 1st Floor, 18
th Cross, 21
st Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: Task offloading from smartphones to the cloud is a promising
strategy to enhance the computing capability of smartphones and prolong their battery
life. However, task offloading introduces a communication cost for those devices.
Therefore, the consideration of the communication cost is crucial for the effectiveness
of task offloading. To make task offloading beneficial, one of the challenges
is to estimate the energy consumed in communication activities of task offloading.
Accurate energy estimation models will enable these devices to make the right
decisions as to whether or not to perform task offloading, based on the energy cost of
the communication activities. Simply put, if the offloading process consumes
less energy than processing the task on the device itself, then the task is offloaded
to the cloud. To design an energy-aware offloading strategy, we
develop energy models of the WLAN, third-generation, and fourth-generation interfaces
of smartphones. These models make smartphone scapable of accurately estimating
the energy cost of task offloading. We validate the models by conducting an extensive
set of experiments on five smartphones from different vendors. The experimental
results show that our estimation models accurately estimate
the energy required to offload tasks.
9. IEEE 2015: Context-Based Access Control Systems for Mobile Devices
Contact Us: #42/5, 1st Floor, 18
th Cross, 21
st Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: Mobile Android applications often have access to sensitive data and
resources on the user device. Misuse of this data by malicious applications may result in
privacy breaches and sensitive data leakage. An example would be a malicious
application surreptitiously recording a confidential business conversation. The problem
arises from the fact that Android users do not have control over the application
capabilities once the applications have been granted the requested privileges upon
installation. In many cases, however, whether an application may get a privilege
depends on the specific user context and thus we need a context-
based access control mechanism by which privileges can be dynamically granted or
revoked to applications based on the specific context of the user. In this paper we
propose such an access control mechanism. Our implementation
of context differentiates between closely located sub-areas within the same location.
We have modified the Android operating system so that context-
based access control restrictions can be specified and enforced. We have performed
several experiments to assess the efficiency of our access control mechanism and the
accuracy of context detection.
10. IEEE 2015: Avatar: Mobile Distributed Computing in the Cloud
Contact Us: #42/5, 1st Floor, 18
th Cross, 21
st Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: Avatar is a system that leverages cloud resources to support fast, scalable,
reliable, and energy efficient distributed computing over mobile devices. An avatar is a
per-user software entity in the cloud that runs apps on behalf of the
user's mobile devices. The avatars are instantiated as virtual machines in the cloud that
run the same operating system with the mobile devices. In this way, avatars provide
resource isolation and execute unmodified app components, which simplifies
technology adoption. Avatar apps execute over distributed and synchronized
(mobile device, avatar) pairs to achieve a global goal. The three main challenges that
must be overcome by the Avatar system are: creating a high-level programming model
and a middleware that enable effective execution of distributed applications on a
combination of mobile devices and avatars, re-designing the cloud architecture and
protocols to support billions of mobile users and mobile apps with very different
characteristics from the current cloud work loads, and explore new approaches that
balance privacy guarantees with app efficiency/usability. We have built a
basic Avatar prototype on Android devices and Android x86 virtual machines. An
application that searches for a lost child by analyzing the photos taken by people at a
crowded public event runs on top of this prototype.
11. IEEE 2015: Developing an efficient digital image watermarking for
smartphones
Contact Us: #42/5, 1st Floor, 18
th Cross, 21
st Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: In recent years, Smartphone usage has been increasing rapidly to the point
where it surpassed all other electronic devices. Multimedia sharing and Image/Video
capturing are amongst the most utilized functionalities of smartphones. Smartphones
and Internet availability made the capture, transmission and storage of digital data very
easy and convenient. The simplicity, connectivity, and strong capabilities of such
devices make it very hard to protect the privacy and Intellectual Property (IP) of digital
multimedia. While all types of digital multimedia are at risk, digital images are severely
affected. Editing and converting digital images can be done quite easily, and hence
protecting them becomes even harder. Digital image watermarking is a technique used
to authenticate and protect the IP of digital images. In this paper we propose
an efficient and flexible digital watermarking system that runs on Android devices. The
system uses RAW images (a feature of the most recent Android software, called
Lollipop) to embed a watermark at an early stage before any modification and
conversion of the image. The system incorporates public-key cryptography for
increased protection. A simple and robust water marking technique is utilized for
efficiency. Other watermarking techniques are offered for flexibility. Finally, the system
uses the inherent features of the Android operating system to run in parallel and be
available to other applications.
12. IEEE 2015: Sesame: a secure and convenient mobile solution for passwords
Contact Us: #42/5, 1st Floor, 18
th Cross, 21
st Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: Passwords are the main and most common method of remote authentication.
However, they have their own frustrating challenges. Users tend to
forget passwords that are chosen to be hard to guess .Password managers are an
approach to keeping our passwords safe. However, they mainly rely on one
master password to secure all of our passwords. If this master password is
compromised then all other passwords can be recovered. In this work, we
introduce Sesame: a secure yet convenient mobile-based, voice-
activated password manager. It combines all different methods of user authentication
to create a more robust digital vault for personal data. Each password is encrypted with
a new fresh key on the user's mobile device for maximum security. The keys are stored
in our servers in a protected format. The user has the option of backing up the
encrypted passwords in any cloud service. To view a password, the user only needs to
utter the name of a web service, and speaker and speech recognition are applied for
authentication. Only the key for that service is sent to the mobile application and the
password is decrypted and displayed. The biggest advantage of Sesame is that the user
need not assume any trust to neither our servers nor any cloud storage. Also, there is no
need to enter a master password every time since speaker recognition is used.
However, as an alternative to voice, users can view their passwords using a
master password in case voice is not available. We provide a brief analysis of the
security of our solution that has been implemented on Android platform and freely
available on Google Play. Sesame is an ideal and
practical solution for mobile password managers.
13. IEEE 2014: NFC based applications for visually impaired people - A review
Contact Us: #42/5, 1st Floor, 18
th Cross, 21
st Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: Recent technological developments provide technical assistance that enables
supporting people with visual disabilities in their everyday tasks and improve their
quality of life. Considering that about 90% of the world visually impaired people live in
developing countries, particularly in the local context, in Saudi Arabia, there is a lack of
assistive tools and adapted environment supporting people with visual disabilities. To
overcome this problem, a wide variety of relatively inexpensive applications adapt Near
Field Communications (NFC) tagging technology in the development of assistive tools
for people with visual disabilities. In this article, we will systematically review the
current adaptation of NFC technology for visually disabled people and
introduce NFC practical applications to help them overcome challenging tasks that they
may encounter every day.
14. IEEE 2014: NFC based secure mobile healthcare system
Contact Us: #42/5, 1st Floor, 18
th Cross, 21
st Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: With the recent increase in usage of mobile devices especially in developing
countries, they can be used for an efficient healthcare management. In this work, we
have proposed a novel architecture for improving healthcare system with the help of
Android based mobile devices with NFC [1] and Bluetooth interfaces, smartcard
technology on tamper resistant secure element (SE) for storing credentials and
secure data, and a Health Secure service on a hybrid cloud for security and health
record management. The main contribution of this paper is proposal of applications for
i) Secure Medical Tags for reducing medical errors and ii) Secure Health card for storing
Electronic Health Record (EHR) based on Secure NFC Tags, mobile device
using NFC P2P Mode or Card Emulation Mode. We have also briefly mentioned a basic
security framework requirement for the applications. Since NFC NDEF format is prone
to security attacks [2], we have utilized low level APIs on Android based mobile devices,
to securely access NFC tags such as MIFARE Classic tags with NFC-A (ISO 1443-3A)
properties. Simple touch of NFC enabled mobile devices can benefit both the patient as
well as the medical doctors by providing a robust and secure health flow. It can also
provide portability of devices and usability for health management in emergency
situation, overpopulated hospitals and remote locations.
15. IEEE 2014: Anti-theft application for android based devices
Contact Us: #42/5, 1st Floor, 18
th Cross, 21
st Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: This paper presents a technique to improve anti-
theft for android based mobile phones by using different services like MMS instead of
SMS. As the use of smartphones, tablets, phablets based on android operating system is
increasing, many scenarios related with anti-theft have already been proposed and
many software based on anti-theft have also been developed, but most of these
software are not freely available and it's difficult to identify the thief by using these
software's e.g. GPS Tracking. We put forward a new scheme, which enhances the
present scenario, based on new technologies like Multimedia Messages. The scenario
proposed in this work is totally dependent on the hardware of your smartphone like
camera (front & back) and support for multimedia messages. Once this software is
installed, it will work in the background, stores the current SIM number in a variable
and keeps checking continuously for SIM change, whenever SIM gets changed from
mobile, it will take snapshots and record a video in the background i.e., without taking
user permission and then it will send an MMS, and number of snap shots, to an alternate
mobile number and an email id, which was provided during installation. The enviable
advantage of this software is that it is very easy to configure and it keeps running in the
background without interrupting the user. To some extent it helps the owner to identify
the thief.
16. IEEE 2014: Privacy-Preserving Optimal Meeting Location Determination on
Mobile Devices
Contact Us: #42/5, 1st Floor, 18
th Cross, 21
st Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: Equipped with state-of-the-art smartphones and mobile devices, today's
highly interconnected urban population is increasingly dependent on these gadgets to
organize and plan their daily lives. These applications often rely on current (or
preferred) locations of individual users or a group of users to provide the desired
service, which jeopardizes their privacy; users do not necessarily want to reveal their
current (or preferred) locations to the service provider or to other, possibly untrusted,
users. In this paper, we propose privacy-preserving algorithms for determining
an optimal meeting location for a group of users. We perform a
thorough privacy evaluation by formally quantifying privacy-loss of the proposed
approaches. In order to study the performance of our algorithms in a real deployment,
we implement and test their execution efficiency on Nokia smartphones. By means of a
targeted user-study, we attempt to get an insight into the privacy-awareness of users
in location-based services and the usability of the proposed solutions.
17. IEEE 2014: How Long to Wait? Predicting Bus Arrival Time With Mobile Phone
Based Participatory Sensing
Contact Us: #42/5, 1st Floor, 18
th Cross, 21
st Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: The bus arrival time is primary information to most city transport travelers.
Excessively long waiting time at bus stops often discourages the travelers and makes
them reluctant to take buses. In this paper, we present a bus arrival time prediction
system based on bus passengers' participatory sensing. With
commodity mobile phones, the bus passengers' surrounding environmental context is
effectively collected and utilized to estimate the bus traveling routes
and predict bus arrival time at various bus stops. The proposed system solely relies on
the collaborative effort of the participating users and is independent from
the bus operating companies, so it can be easily adopted to support universal bus
service systems without requesting support from particular bus operating companies.
Instead of referring to GPS-enabled location information, we resort to more generally
available and energy efficient sensing resources, including cell tower signals, movement
statuses, audio recordings, etc., which bring less burden to the participatory party and
encourage their participation. We develop a prototype system with different types of
Android-based mobile phones and comprehensively experiment with the NTU campus
shuttle buses as well as Singapore public buses over a 7-week period. The evaluation
results suggest that the proposed system achieves outstanding prediction accuracy
compared with those bus operator initiated and GPS supported solutions. We further
adopt our system and conduct quick trial experiments with London bus system for 4
days, which suggests the easy deployment of our system and promising system
performance across cities. At the same time, the proposed solution is more generally
available and energy friendly.
18. IEEE 2013: SPOC: A Secure and Privacy-Preserving Opportunistic Computing
Framework for Mobile-Healthcare Emergency
Contact Us: #42/5, 1st Floor, 18
th Cross, 21
st Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: With the pervasiveness of smart phones and the advance of wireless body
sensor networks (BSNs),mobile Healthcare (m-Healthcare), which extends the
operation of Healthcare provider into a pervasive environment for better health
monitoring, has attracted considerable interest recently. However, the flourish of m-
Healthcare still faces many challenges including information security and privacy
preservation. In this paper, we propose a secure and privacy-
preserving opportunistic computingframework, called SPOC, for m-
Healthcare emergency. With SPOC, smart phone resources including computing power
and energy can be opportunistically gathered to process the computing-intensive
personal health information (PHI) during m-Healthcare emergency with
minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the
high reliability of PHI process and transmission in m-Healthcare emergency, we
introduce an efficient user-centric privacy access control in SPOC framework, which is
based on an attribute-based access control and a new privacy-preserving scalar product
computation (PPSPC) technique, and allows a medical user to decide who can
participate in the opportunistic computing to assist in processing his overwhelming PHI
data. Detailed security analysis shows that the proposed SPOC framework can
efficiently achieve user-centric privacy access control in m-Healthcare emergency. In
addition, performance evaluations via extensive simulations demonstrate the SPOC's
effectiveness in term of providing high-reliable-PHI process and transmission while
minimizing the privacy disclosure during m-Healthcare emergency.
19. IEEE 2013: Wireless sensor networks using Android Virtual Devices and Near
Field Communication peer-to-peer emulation
Contact Us: #42/5, 1st Floor, 18
th Cross, 21
st Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: Several new Android smartphones support Near Field Communication (NFC).
The Android SDK provides an NFC API that can be used to develop NFC applications
that conduct peer-to-peer (P2P) data exchange. The Android emulator does not support
P2P communication between instances of the Android Virtual Device (AVD). In
addition to this constraint, P2P experimentation on actual smartphones is difficult
due to limited NFC support. To fill the gap created by this minimal support, we propose
the Java Mail NFC API (JNFC). JNFC uses the Java Mail API to emulate the functionality of
the Android NFC P2P API. To evaluate the performance of JNFC, we created the
DroidWSN Wireless Sensor Network (WSN) model and implemented it as
an Android application. We design and conduct an experiment for our DroidWSN
model to measure the execution time of our Android application WSN on AVDs. We
compare our simulation results against those from a similar experiment that measured
the execution time of a WSN composed of Sun SPOT wireless devices. While the
execution time of our DroidWSN model is slower, we assert that our design is more
simple and flexible than that of our comparison study. We conclude that this benefit and
the factors of JNFC cost (it is open source), the quality and quantity
of Android smartphone sensors, and imminent Android smartphone support for NFC
P2P, combine to make JNFC and the Android AVD a platform for NFC and WSN research.
Our study also emphasizes the need for Google to create Android NFC P2P
and sensor emulation APIs.