SlideShare a Scribd company logo
1 of 2
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 958
Cloud based Anti-Theft Application for Android Devices: A Literature
Review
Sagar Choudhary1
Vishal Mundhe2
Ajit Rathod3
Prof. Mohit Dighe4
4
Assistant Professor
1,2,3,4
Department of Computer
1,2,3,4
SCSCOE, Rahuri factory
Abstract— In this system we have proposed to implement
the technique to improve antitheft for android based mobile
phones by using various services like MMS over the SMS.
Today’s most popular android operating system is contains
many scenarios that already been proposed that are related
to anti-theft also many applications are available onto play
store but these application are not so useful to find the thief
e.g. GPS tracking for the devices like smart phones, tablets
and phablets. We can use new technology likes Multimedia
Messaging Service (MMS), which enhances the present
scenario. This scenario is totally dependent on the hardware
of your smart phone device that is camera (front or rear) also
support for multimedia messages. First, we just need to
install this software then, it work’s in the background, stores
the current SIM number in a variable and keeps
continuously checking for SIM change, whenever SIM gets
changed from device, it will takes snapshots, record a video
in the background with the use of camera of device and also
records surrounding audio i.e., without taking user
permission and then it will send an MMS to an alternate
mobile number and an email id, which was provided during
installation for authorized user’s registration. The most
benefit of this application is very easy to configure and
keeps running in the background without interrupting the
user. To some extent it helps the authorized user to identify
and find the thief.
Key words: Android, GPS tracking, GPRS, MMS,
Snapshots, Video, email, cloud
I. INTRODUCTION
In today’s world, smart phones are acting like a computer, it
also provides facility to store information, documents etc.
This data can be shared with everywhere through internet.
These latest smart phones are very helpful and useful for
doing business smartly. Today every people has, started
using smart phone because they are available at low cost in
market. The smart phone provides multiple features that
attracting peoples. There are above millions of applications
and games available to download from Google play store.
An android system shows application which uses a
regular mobile phone provided with a GPS receptor and
connected to global system for mobile (GSM) network that
takes advantage of this technology in behalf of the user
safety [1].
In the previous system, text message is sent by
SMS (Short Messaging Service) to the alternative number
that is provided when application is installed. This text
message holds the information such as that the SIM has
been changed. It also contains the data such as the new SIM
number and the location of lost devices. It uses the GPS
facilities provided by Google Maps. The SMS contains
information that is given as plain text. Received message is
views only when, user will be open that message. And some
applications send the message as a mail to the mail id
provided when application is installed. It contains the same
information and some may contain snapshots (images) in it.
These snapshots can be viewed when user opens the mail
that is sent by this application.
In this proposed system, once Anti-theft application
is installed, it runs services in the background without
interrupting activities of user. It continuously checks for the
SIM change then detects the SIM change process. It takes
snapshots as well as records a video and surrounding audio
without the user’s permission after the SIM gets changed.
Then it sends an MMS to the alternate number and an e-mail
is sent to the mail id that is provided during installation of
application. The new SIM number and location of lost
device is also tracked and sent to the alternate number as an
SMS and the user can make him/her stop misusing any
confidential data into the device. Hence, visualization
provided helps to detect the lost device and recognize the
thief quickly [6] [7].
II. LITERATURE REVIEW
Sonia C.V. [1] applied AALTm - An Android Application to
Locate and Track Mobile phones to recognize two user
profiles, the client and the server for tracking. The server is
requires any android based Smart phone starting with
version Android 2.2 or above having AALTm installed in it
with GPS and GPRS enabled. In other side that is client side
requires any other different OS based mobile phones for
sending and receiving SMS. When there is any error in
sending the message from the operator side, then there not
any message sends to the operator by this application,
instead no operation will be perform at the server side.
This [1] technique only works when predefined
format SMS is received and read the SMS then it perform
the expected task that is Location tracking and GSM cell id.
It is totally based on SMS.
D. Abirami [2] applied intelligent theory that is
safe and alert mode. Latest android phone supports multiple
SIM cards and user is also use one or more SIM cards. The
problem in previous system, if user’s mobile has two
different SIMs when system identifies SIM get’s changed it
will continuously send notification that the SIM will be
changed to the alternate number that is provided during
installation. The unwanted notification is also send if the
owner will get’s changed SIM.
This [2] technique over comes the unwanted
notification problems with using safe and alert mode. The
user will required application password before changing the
mode (alert to safe and safe to alert). In safe mode, the
application only detects SIM change process but does not
send any notification to number, only user can change the
SIMs in safe mode. In alert mode, the application detect
Cloud based Anti-Theft Application for Android Devices: A Literature Review
(IJSRD/Vol. 3/Issue 10/2015/215)
All rights reserved by www.ijsrd.com 959
SIM change process and send the notification that is SIM
get’s changed to alternate number.
R. Archana [3] and A.U.S. Khan [4], they are apply
MMS based technique, this application run’s services in
background without interrupting user’s activity. It
continuously checking for SIM changed and detects SIM
change process. It takes snapshots as well as records a small
video clip with help of front or rear camera that are available
into device. And track the location of lost device with the
help of GPS tracking system and find the location of thief
that is provided by Google map.
Most of the above-mentioned systems, provide
dedicate solutions using tracking methods to monitor a
mobile device. But by just enabling the mobile phones with
GPS system and retrieving the information about the new
SIM would be insufficient to track the Smartphone. Hence,
there came the idea of developing an anti-theft application to
become more secure to our android device with help of
taking some images, and small video clip of theft with audio
recording (surrounding voice). It sends theft information to
alternate mobile number and email in encrypted format.
III. SYSTEM IMPLEMENTATION
The system architecture of cloud based Anti-Theft
application is given in fig.3.1. The architecture is divided
into three layers that are given: system requirements,
application layer and cloud server layer.
A. System Requirements
It contains the software and hardware requirements. It is
necessary to interact with android device to application.
B. Application layer
This layer contains two phases that is detector and
controller. Detector is present on user side, When SIM will
get’s changed the services will be activated in a background.
These services will be validated or not it will be checked.
Detector is detect valid service and converted data into
encrypted format using AES algorithm, and send this
command to controller to control the services [5].
Controller phase is accepted the services from
detector phase and it checks services that are valid or not. If
service is valid it receives command and starts camera in
background for taking some snapshots or capture small
video and sent MMS to user also decrypt the data into
device [5].
C. Cloud Server Layer
Cloud server provides services for control the device
through remote server. Data can be access and control by
using cloud server.
Fig. 1: Proposed system architecture
IV. CONCLUSION
The paper presents a literature review for cloud based Anti-
Theft Application it deploys an improved security solution
that meets users short term and long term goals by providing
the images, small videos and audios of the thief, which gets
easy for the user to detect the thief and get him or her
captured and arrested. This proposed MMS based anti theft
technique is used for tracking the stolen android devices
with GPS. This proposed application will be user friendly
and it can be installed without any technical knowledge.
REFERENCES
[1] Sonia C.V., Dr. A.R. Aswatha, "AALTm: An Android
Application to Locate and Track Mobile Phones ", In
mobile tracking system based on SMS, International
Journal of Engineering Trends and Technology (IJETT)
- Volume4Issue5- May 2013.
[2] D. Abirami, S. Anantha Surya, S. Annapoorani, Ms. M.
PadmaPriya, "An Intelligent Anti-Theft Android
Application", in location tracking, 2014 IJIRT | Volume
1 Issue 10 | ISSN: 2349-6002, 2014.
[3] R. Archana, E.G. Bhuvaneshwari, T. Hema Vathi,
"MULTIMEDIA MESSAGING SERVICE (MMS)
BASED ANTI-THEFT APPLICATION", In MMS
based GPS tracking mobile devices, ISSN
23499842(Online), Volume 1, Special Issue 2(ICITET
15), March 2015.
[4] Azeem Ush Shan Khan, Mohammad Naved Qureshi,
Mohammed Abdul Qadeer, "Anti-Theft Application for
Android Based Devices", In MMS based mobile tracking
with GPS, 2014 IEEE International Advance Computing
Conference (IACC), 2014.
[5] V. Nirosha, K. Suma Latha, "A Comprehensive
Approach to Ensure Secure Data Communication in
Cloud Environment", for data storage using encryption
technique for security, International Journal of Advanced
Research in Computer Science and Software
Engineering, Volume 3, Issue 7, July 2013

More Related Content

What's hot

Micro Technologies India ltd
Micro Technologies India ltdMicro Technologies India ltd
Micro Technologies India ltdNehul Gupta
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkIBM Security
 
MARS User LoginLogout MIS
MARS User LoginLogout MISMARS User LoginLogout MIS
MARS User LoginLogout MISAjoy Dasgupta
 
Make Mobilization Work - Properly Implementing Mobile Security
Make Mobilization Work - Properly Implementing Mobile SecurityMake Mobilization Work - Properly Implementing Mobile Security
Make Mobilization Work - Properly Implementing Mobile SecurityMichael Davis
 
Securing Wireless Cellular Systems
Securing Wireless Cellular SystemsSecuring Wireless Cellular Systems
Securing Wireless Cellular SystemsACMBangalore
 
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET Journal
 
Personal Assistant Application Using Android
Personal Assistant Application Using AndroidPersonal Assistant Application Using Android
Personal Assistant Application Using AndroidAhmar Ansari
 
Soundscape for Visually Impaired
Soundscape for Visually ImpairedSoundscape for Visually Impaired
Soundscape for Visually ImpairedIRJET Journal
 
Smart Voice Assistant:A universal voice control solution for non-visual acces...
Smart Voice Assistant:A universal voice control solution for non-visual acces...Smart Voice Assistant:A universal voice control solution for non-visual acces...
Smart Voice Assistant:A universal voice control solution for non-visual acces...IRJET Journal
 
Detection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phonesDetection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phonesIAEME Publication
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecuritySubho Halder
 
How to Hack a Cryptographic Key
How to Hack a Cryptographic KeyHow to Hack a Cryptographic Key
How to Hack a Cryptographic KeyIBM Security
 
Screen sharing between android devices
Screen sharing between  android devicesScreen sharing between  android devices
Screen sharing between android devicesvikas mishra
 
Follow the Money, Follow the Crime
Follow the Money, Follow the CrimeFollow the Money, Follow the Crime
Follow the Money, Follow the CrimeIBM Security
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Securitycclark_isec
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to SolusSolus
 
BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSPurna Bhat
 
Fingerprint based physical access control vehicle immobilizer
Fingerprint based physical access control vehicle immobilizer Fingerprint based physical access control vehicle immobilizer
Fingerprint based physical access control vehicle immobilizer VIKAS SINGH BHADOURIA
 

What's hot (20)

Micro Technologies India ltd
Micro Technologies India ltdMicro Technologies India ltd
Micro Technologies India ltd
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
 
MARS User LoginLogout MIS
MARS User LoginLogout MISMARS User LoginLogout MIS
MARS User LoginLogout MIS
 
Synopsis
SynopsisSynopsis
Synopsis
 
Vehicle security system final report
Vehicle security system final reportVehicle security system final report
Vehicle security system final report
 
Make Mobilization Work - Properly Implementing Mobile Security
Make Mobilization Work - Properly Implementing Mobile SecurityMake Mobilization Work - Properly Implementing Mobile Security
Make Mobilization Work - Properly Implementing Mobile Security
 
Securing Wireless Cellular Systems
Securing Wireless Cellular SystemsSecuring Wireless Cellular Systems
Securing Wireless Cellular Systems
 
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital Assistants
 
Personal Assistant Application Using Android
Personal Assistant Application Using AndroidPersonal Assistant Application Using Android
Personal Assistant Application Using Android
 
Soundscape for Visually Impaired
Soundscape for Visually ImpairedSoundscape for Visually Impaired
Soundscape for Visually Impaired
 
Smart Voice Assistant:A universal voice control solution for non-visual acces...
Smart Voice Assistant:A universal voice control solution for non-visual acces...Smart Voice Assistant:A universal voice control solution for non-visual acces...
Smart Voice Assistant:A universal voice control solution for non-visual acces...
 
Detection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phonesDetection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phones
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
 
How to Hack a Cryptographic Key
How to Hack a Cryptographic KeyHow to Hack a Cryptographic Key
How to Hack a Cryptographic Key
 
Screen sharing between android devices
Screen sharing between  android devicesScreen sharing between  android devices
Screen sharing between android devices
 
Follow the Money, Follow the Crime
Follow the Money, Follow the CrimeFollow the Money, Follow the Crime
Follow the Money, Follow the Crime
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
 
BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoS
 
Fingerprint based physical access control vehicle immobilizer
Fingerprint based physical access control vehicle immobilizer Fingerprint based physical access control vehicle immobilizer
Fingerprint based physical access control vehicle immobilizer
 

Viewers also liked

Design and Implementation of Vehicle Gaseous Fuel Leakage Detection System us...
Design and Implementation of Vehicle Gaseous Fuel Leakage Detection System us...Design and Implementation of Vehicle Gaseous Fuel Leakage Detection System us...
Design and Implementation of Vehicle Gaseous Fuel Leakage Detection System us...ijsrd.com
 
Android based message encryption decryption using matrix
Android based message encryption  decryption using matrixAndroid based message encryption  decryption using matrix
Android based message encryption decryption using matrixeSAT Journals
 
Encrypting SMS with PGP
Encrypting SMS with PGPEncrypting SMS with PGP
Encrypting SMS with PGPAngel Parrales
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And DecryptionNA
 
Pneumatic conveying system an introduction
Pneumatic conveying system an introductionPneumatic conveying system an introduction
Pneumatic conveying system an introductionMonil Doshi
 
8K RESOLUTION CAMERA SYSTEM
8K RESOLUTION CAMERA SYSTEM8K RESOLUTION CAMERA SYSTEM
8K RESOLUTION CAMERA SYSTEMArun Raj
 
What is Android OS in ppt ?
What is Android OS in ppt ? What is Android OS in ppt ?
What is Android OS in ppt ? SoonTips.com
 
Android seminar-presentation
Android seminar-presentationAndroid seminar-presentation
Android seminar-presentationconnectshilpa
 
8K Extremely High Resolution Camera System
8K Extremely High Resolution Camera System8K Extremely High Resolution Camera System
8K Extremely High Resolution Camera SystemPrejith Pavanan
 

Viewers also liked (13)

Design and Implementation of Vehicle Gaseous Fuel Leakage Detection System us...
Design and Implementation of Vehicle Gaseous Fuel Leakage Detection System us...Design and Implementation of Vehicle Gaseous Fuel Leakage Detection System us...
Design and Implementation of Vehicle Gaseous Fuel Leakage Detection System us...
 
Android based message encryption decryption using matrix
Android based message encryption  decryption using matrixAndroid based message encryption  decryption using matrix
Android based message encryption decryption using matrix
 
Encrypting SMS with PGP
Encrypting SMS with PGPEncrypting SMS with PGP
Encrypting SMS with PGP
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
 
ANTI THEFT PPT
ANTI THEFT PPTANTI THEFT PPT
ANTI THEFT PPT
 
Pneumatic conveying system an introduction
Pneumatic conveying system an introductionPneumatic conveying system an introduction
Pneumatic conveying system an introduction
 
Android presentation slide
Android presentation slideAndroid presentation slide
Android presentation slide
 
8K RESOLUTION CAMERA SYSTEM
8K RESOLUTION CAMERA SYSTEM8K RESOLUTION CAMERA SYSTEM
8K RESOLUTION CAMERA SYSTEM
 
What is Android OS in ppt ?
What is Android OS in ppt ? What is Android OS in ppt ?
What is Android OS in ppt ?
 
Android seminar-presentation
Android seminar-presentationAndroid seminar-presentation
Android seminar-presentation
 
Android ppt
Android pptAndroid ppt
Android ppt
 
8K Extremely High Resolution Camera System
8K Extremely High Resolution Camera System8K Extremely High Resolution Camera System
8K Extremely High Resolution Camera System
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar to Cloud based Anti-Theft Application for Android Devices: A Literature Review

ADVANCED BIKE SECURITY SYSTEM USING GSM AND GPS
ADVANCED BIKE SECURITY SYSTEM USING GSM AND GPSADVANCED BIKE SECURITY SYSTEM USING GSM AND GPS
ADVANCED BIKE SECURITY SYSTEM USING GSM AND GPSEG TECHNOLOGIES
 
Smartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMSSmartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMSEditor IJCATR
 
IRJET- TOUCH ME NOT-A Women Safety Device
IRJET- TOUCH ME NOT-A Women Safety DeviceIRJET- TOUCH ME NOT-A Women Safety Device
IRJET- TOUCH ME NOT-A Women Safety DeviceIRJET Journal
 
Raspberry pi project smart motion detection system using raspberry pi 3
Raspberry pi project smart motion detection system using raspberry pi 3Raspberry pi project smart motion detection system using raspberry pi 3
Raspberry pi project smart motion detection system using raspberry pi 3Bhaskar Nemala
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
 
11.design and implementation of vehicle tracking system using gps
11.design and implementation of vehicle tracking system using gps11.design and implementation of vehicle tracking system using gps
11.design and implementation of vehicle tracking system using gpsAlexander Decker
 
Design and implementation of vehicle tracking system using gps
Design and implementation of vehicle tracking system using gpsDesign and implementation of vehicle tracking system using gps
Design and implementation of vehicle tracking system using gpsAlexander Decker
 
Camera based attack detection and prevention tech niques on android mobile ph...
Camera based attack detection and prevention tech niques on android mobile ph...Camera based attack detection and prevention tech niques on android mobile ph...
Camera based attack detection and prevention tech niques on android mobile ph...eSAT Journals
 
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET Journal
 
INNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULES
INNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULESINNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULES
INNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULESEditor IJMTER
 
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...IJCSEIT Journal
 
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint Verification
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint VerificationAnti-Theft Protection of Vehicle by GSM & GPS with Fingerprint Verification
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint VerificationIJAEMSJORNAL
 
IRJET- SMS based Mobile Technology
IRJET- SMS based Mobile TechnologyIRJET- SMS based Mobile Technology
IRJET- SMS based Mobile TechnologyIRJET Journal
 
IRJET- Vehicle Security System using IoT Application
IRJET-  	  Vehicle Security System using IoT ApplicationIRJET-  	  Vehicle Security System using IoT Application
IRJET- Vehicle Security System using IoT ApplicationIRJET Journal
 
Application for Women Safety
Application for Women SafetyApplication for Women Safety
Application for Women Safetyiosrjce
 
Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...Vineet Garg
 

Similar to Cloud based Anti-Theft Application for Android Devices: A Literature Review (20)

ADVANCED BIKE SECURITY SYSTEM USING GSM AND GPS
ADVANCED BIKE SECURITY SYSTEM USING GSM AND GPSADVANCED BIKE SECURITY SYSTEM USING GSM AND GPS
ADVANCED BIKE SECURITY SYSTEM USING GSM AND GPS
 
Smartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMSSmartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMS
 
IRJET- TOUCH ME NOT-A Women Safety Device
IRJET- TOUCH ME NOT-A Women Safety DeviceIRJET- TOUCH ME NOT-A Women Safety Device
IRJET- TOUCH ME NOT-A Women Safety Device
 
Smart IoT Device for Vehicle Theft
Smart IoT Device for Vehicle TheftSmart IoT Device for Vehicle Theft
Smart IoT Device for Vehicle Theft
 
Raspberry pi project smart motion detection system using raspberry pi 3
Raspberry pi project smart motion detection system using raspberry pi 3Raspberry pi project smart motion detection system using raspberry pi 3
Raspberry pi project smart motion detection system using raspberry pi 3
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
 
A017360104
A017360104A017360104
A017360104
 
11.design and implementation of vehicle tracking system using gps
11.design and implementation of vehicle tracking system using gps11.design and implementation of vehicle tracking system using gps
11.design and implementation of vehicle tracking system using gps
 
Design and implementation of vehicle tracking system using gps
Design and implementation of vehicle tracking system using gpsDesign and implementation of vehicle tracking system using gps
Design and implementation of vehicle tracking system using gps
 
Camera based attack detection and prevention tech niques on android mobile ph...
Camera based attack detection and prevention tech niques on android mobile ph...Camera based attack detection and prevention tech niques on android mobile ph...
Camera based attack detection and prevention tech niques on android mobile ph...
 
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’S
 
INNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULES
INNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULESINNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULES
INNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULES
 
GSM Security
GSM SecurityGSM Security
GSM Security
 
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
 
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint Verification
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint VerificationAnti-Theft Protection of Vehicle by GSM & GPS with Fingerprint Verification
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint Verification
 
IRJET- SMS based Mobile Technology
IRJET- SMS based Mobile TechnologyIRJET- SMS based Mobile Technology
IRJET- SMS based Mobile Technology
 
IRJET- Vehicle Security System using IoT Application
IRJET-  	  Vehicle Security System using IoT ApplicationIRJET-  	  Vehicle Security System using IoT Application
IRJET- Vehicle Security System using IoT Application
 
Application for Women Safety
Application for Women SafetyApplication for Women Safety
Application for Women Safety
 
A017340104
A017340104A017340104
A017340104
 
Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...
 

More from IJSRD

#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication#IJSRD #Research Paper Publication
#IJSRD #Research Paper PublicationIJSRD
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...IJSRD
 
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...IJSRD
 
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEWPreclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEWIJSRD
 
Prevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolPrevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolIJSRD
 
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...IJSRD
 
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild SteelEvaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild SteelIJSRD
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnIJSRD
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemIJSRD
 
Diagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural NetworksDiagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural NetworksIJSRD
 
A Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion MiningA Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion MiningIJSRD
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISIJSRD
 
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...IJSRD
 
Product Quality Analysis based on online Reviews
Product Quality Analysis based on online ReviewsProduct Quality Analysis based on online Reviews
Product Quality Analysis based on online ReviewsIJSRD
 
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersSolving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersIJSRD
 
Study of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningStudy of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningIJSRD
 
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...IJSRD
 
Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...IJSRD
 
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorReview Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorIJSRD
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionIJSRD
 

More from IJSRD (20)

#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
 
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
 
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEWPreclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
 
Prevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolPrevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV Protocol
 
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
 
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild SteelEvaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osn
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
Diagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural NetworksDiagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural Networks
 
A Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion MiningA Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion Mining
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFIS
 
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
 
Product Quality Analysis based on online Reviews
Product Quality Analysis based on online ReviewsProduct Quality Analysis based on online Reviews
Product Quality Analysis based on online Reviews
 
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersSolving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
 
Study of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningStudy of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data Mining
 
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
 
Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...
 
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorReview Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots Prediction
 

Recently uploaded

BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 

Recently uploaded (20)

BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 

Cloud based Anti-Theft Application for Android Devices: A Literature Review

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 958 Cloud based Anti-Theft Application for Android Devices: A Literature Review Sagar Choudhary1 Vishal Mundhe2 Ajit Rathod3 Prof. Mohit Dighe4 4 Assistant Professor 1,2,3,4 Department of Computer 1,2,3,4 SCSCOE, Rahuri factory Abstract— In this system we have proposed to implement the technique to improve antitheft for android based mobile phones by using various services like MMS over the SMS. Today’s most popular android operating system is contains many scenarios that already been proposed that are related to anti-theft also many applications are available onto play store but these application are not so useful to find the thief e.g. GPS tracking for the devices like smart phones, tablets and phablets. We can use new technology likes Multimedia Messaging Service (MMS), which enhances the present scenario. This scenario is totally dependent on the hardware of your smart phone device that is camera (front or rear) also support for multimedia messages. First, we just need to install this software then, it work’s in the background, stores the current SIM number in a variable and keeps continuously checking for SIM change, whenever SIM gets changed from device, it will takes snapshots, record a video in the background with the use of camera of device and also records surrounding audio i.e., without taking user permission and then it will send an MMS to an alternate mobile number and an email id, which was provided during installation for authorized user’s registration. The most benefit of this application is very easy to configure and keeps running in the background without interrupting the user. To some extent it helps the authorized user to identify and find the thief. Key words: Android, GPS tracking, GPRS, MMS, Snapshots, Video, email, cloud I. INTRODUCTION In today’s world, smart phones are acting like a computer, it also provides facility to store information, documents etc. This data can be shared with everywhere through internet. These latest smart phones are very helpful and useful for doing business smartly. Today every people has, started using smart phone because they are available at low cost in market. The smart phone provides multiple features that attracting peoples. There are above millions of applications and games available to download from Google play store. An android system shows application which uses a regular mobile phone provided with a GPS receptor and connected to global system for mobile (GSM) network that takes advantage of this technology in behalf of the user safety [1]. In the previous system, text message is sent by SMS (Short Messaging Service) to the alternative number that is provided when application is installed. This text message holds the information such as that the SIM has been changed. It also contains the data such as the new SIM number and the location of lost devices. It uses the GPS facilities provided by Google Maps. The SMS contains information that is given as plain text. Received message is views only when, user will be open that message. And some applications send the message as a mail to the mail id provided when application is installed. It contains the same information and some may contain snapshots (images) in it. These snapshots can be viewed when user opens the mail that is sent by this application. In this proposed system, once Anti-theft application is installed, it runs services in the background without interrupting activities of user. It continuously checks for the SIM change then detects the SIM change process. It takes snapshots as well as records a video and surrounding audio without the user’s permission after the SIM gets changed. Then it sends an MMS to the alternate number and an e-mail is sent to the mail id that is provided during installation of application. The new SIM number and location of lost device is also tracked and sent to the alternate number as an SMS and the user can make him/her stop misusing any confidential data into the device. Hence, visualization provided helps to detect the lost device and recognize the thief quickly [6] [7]. II. LITERATURE REVIEW Sonia C.V. [1] applied AALTm - An Android Application to Locate and Track Mobile phones to recognize two user profiles, the client and the server for tracking. The server is requires any android based Smart phone starting with version Android 2.2 or above having AALTm installed in it with GPS and GPRS enabled. In other side that is client side requires any other different OS based mobile phones for sending and receiving SMS. When there is any error in sending the message from the operator side, then there not any message sends to the operator by this application, instead no operation will be perform at the server side. This [1] technique only works when predefined format SMS is received and read the SMS then it perform the expected task that is Location tracking and GSM cell id. It is totally based on SMS. D. Abirami [2] applied intelligent theory that is safe and alert mode. Latest android phone supports multiple SIM cards and user is also use one or more SIM cards. The problem in previous system, if user’s mobile has two different SIMs when system identifies SIM get’s changed it will continuously send notification that the SIM will be changed to the alternate number that is provided during installation. The unwanted notification is also send if the owner will get’s changed SIM. This [2] technique over comes the unwanted notification problems with using safe and alert mode. The user will required application password before changing the mode (alert to safe and safe to alert). In safe mode, the application only detects SIM change process but does not send any notification to number, only user can change the SIMs in safe mode. In alert mode, the application detect
  • 2. Cloud based Anti-Theft Application for Android Devices: A Literature Review (IJSRD/Vol. 3/Issue 10/2015/215) All rights reserved by www.ijsrd.com 959 SIM change process and send the notification that is SIM get’s changed to alternate number. R. Archana [3] and A.U.S. Khan [4], they are apply MMS based technique, this application run’s services in background without interrupting user’s activity. It continuously checking for SIM changed and detects SIM change process. It takes snapshots as well as records a small video clip with help of front or rear camera that are available into device. And track the location of lost device with the help of GPS tracking system and find the location of thief that is provided by Google map. Most of the above-mentioned systems, provide dedicate solutions using tracking methods to monitor a mobile device. But by just enabling the mobile phones with GPS system and retrieving the information about the new SIM would be insufficient to track the Smartphone. Hence, there came the idea of developing an anti-theft application to become more secure to our android device with help of taking some images, and small video clip of theft with audio recording (surrounding voice). It sends theft information to alternate mobile number and email in encrypted format. III. SYSTEM IMPLEMENTATION The system architecture of cloud based Anti-Theft application is given in fig.3.1. The architecture is divided into three layers that are given: system requirements, application layer and cloud server layer. A. System Requirements It contains the software and hardware requirements. It is necessary to interact with android device to application. B. Application layer This layer contains two phases that is detector and controller. Detector is present on user side, When SIM will get’s changed the services will be activated in a background. These services will be validated or not it will be checked. Detector is detect valid service and converted data into encrypted format using AES algorithm, and send this command to controller to control the services [5]. Controller phase is accepted the services from detector phase and it checks services that are valid or not. If service is valid it receives command and starts camera in background for taking some snapshots or capture small video and sent MMS to user also decrypt the data into device [5]. C. Cloud Server Layer Cloud server provides services for control the device through remote server. Data can be access and control by using cloud server. Fig. 1: Proposed system architecture IV. CONCLUSION The paper presents a literature review for cloud based Anti- Theft Application it deploys an improved security solution that meets users short term and long term goals by providing the images, small videos and audios of the thief, which gets easy for the user to detect the thief and get him or her captured and arrested. This proposed MMS based anti theft technique is used for tracking the stolen android devices with GPS. This proposed application will be user friendly and it can be installed without any technical knowledge. REFERENCES [1] Sonia C.V., Dr. A.R. Aswatha, "AALTm: An Android Application to Locate and Track Mobile Phones ", In mobile tracking system based on SMS, International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013. [2] D. Abirami, S. Anantha Surya, S. Annapoorani, Ms. M. PadmaPriya, "An Intelligent Anti-Theft Android Application", in location tracking, 2014 IJIRT | Volume 1 Issue 10 | ISSN: 2349-6002, 2014. [3] R. Archana, E.G. Bhuvaneshwari, T. Hema Vathi, "MULTIMEDIA MESSAGING SERVICE (MMS) BASED ANTI-THEFT APPLICATION", In MMS based GPS tracking mobile devices, ISSN 23499842(Online), Volume 1, Special Issue 2(ICITET 15), March 2015. [4] Azeem Ush Shan Khan, Mohammad Naved Qureshi, Mohammed Abdul Qadeer, "Anti-Theft Application for Android Based Devices", In MMS based mobile tracking with GPS, 2014 IEEE International Advance Computing Conference (IACC), 2014. [5] V. Nirosha, K. Suma Latha, "A Comprehensive Approach to Ensure Secure Data Communication in Cloud Environment", for data storage using encryption technique for security, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 7, July 2013