SlideShare a Scribd company logo
IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 958
Cloud based Anti-Theft Application for Android Devices: A Literature
Review
Sagar Choudhary1
Vishal Mundhe2
Ajit Rathod3
Prof. Mohit Dighe4
4
Assistant Professor
1,2,3,4
Department of Computer
1,2,3,4
SCSCOE, Rahuri factory
Abstract— In this system we have proposed to implement
the technique to improve antitheft for android based mobile
phones by using various services like MMS over the SMS.
Today’s most popular android operating system is contains
many scenarios that already been proposed that are related
to anti-theft also many applications are available onto play
store but these application are not so useful to find the thief
e.g. GPS tracking for the devices like smart phones, tablets
and phablets. We can use new technology likes Multimedia
Messaging Service (MMS), which enhances the present
scenario. This scenario is totally dependent on the hardware
of your smart phone device that is camera (front or rear) also
support for multimedia messages. First, we just need to
install this software then, it work’s in the background, stores
the current SIM number in a variable and keeps
continuously checking for SIM change, whenever SIM gets
changed from device, it will takes snapshots, record a video
in the background with the use of camera of device and also
records surrounding audio i.e., without taking user
permission and then it will send an MMS to an alternate
mobile number and an email id, which was provided during
installation for authorized user’s registration. The most
benefit of this application is very easy to configure and
keeps running in the background without interrupting the
user. To some extent it helps the authorized user to identify
and find the thief.
Key words: Android, GPS tracking, GPRS, MMS,
Snapshots, Video, email, cloud
I. INTRODUCTION
In today’s world, smart phones are acting like a computer, it
also provides facility to store information, documents etc.
This data can be shared with everywhere through internet.
These latest smart phones are very helpful and useful for
doing business smartly. Today every people has, started
using smart phone because they are available at low cost in
market. The smart phone provides multiple features that
attracting peoples. There are above millions of applications
and games available to download from Google play store.
An android system shows application which uses a
regular mobile phone provided with a GPS receptor and
connected to global system for mobile (GSM) network that
takes advantage of this technology in behalf of the user
safety [1].
In the previous system, text message is sent by
SMS (Short Messaging Service) to the alternative number
that is provided when application is installed. This text
message holds the information such as that the SIM has
been changed. It also contains the data such as the new SIM
number and the location of lost devices. It uses the GPS
facilities provided by Google Maps. The SMS contains
information that is given as plain text. Received message is
views only when, user will be open that message. And some
applications send the message as a mail to the mail id
provided when application is installed. It contains the same
information and some may contain snapshots (images) in it.
These snapshots can be viewed when user opens the mail
that is sent by this application.
In this proposed system, once Anti-theft application
is installed, it runs services in the background without
interrupting activities of user. It continuously checks for the
SIM change then detects the SIM change process. It takes
snapshots as well as records a video and surrounding audio
without the user’s permission after the SIM gets changed.
Then it sends an MMS to the alternate number and an e-mail
is sent to the mail id that is provided during installation of
application. The new SIM number and location of lost
device is also tracked and sent to the alternate number as an
SMS and the user can make him/her stop misusing any
confidential data into the device. Hence, visualization
provided helps to detect the lost device and recognize the
thief quickly [6] [7].
II. LITERATURE REVIEW
Sonia C.V. [1] applied AALTm - An Android Application to
Locate and Track Mobile phones to recognize two user
profiles, the client and the server for tracking. The server is
requires any android based Smart phone starting with
version Android 2.2 or above having AALTm installed in it
with GPS and GPRS enabled. In other side that is client side
requires any other different OS based mobile phones for
sending and receiving SMS. When there is any error in
sending the message from the operator side, then there not
any message sends to the operator by this application,
instead no operation will be perform at the server side.
This [1] technique only works when predefined
format SMS is received and read the SMS then it perform
the expected task that is Location tracking and GSM cell id.
It is totally based on SMS.
D. Abirami [2] applied intelligent theory that is
safe and alert mode. Latest android phone supports multiple
SIM cards and user is also use one or more SIM cards. The
problem in previous system, if user’s mobile has two
different SIMs when system identifies SIM get’s changed it
will continuously send notification that the SIM will be
changed to the alternate number that is provided during
installation. The unwanted notification is also send if the
owner will get’s changed SIM.
This [2] technique over comes the unwanted
notification problems with using safe and alert mode. The
user will required application password before changing the
mode (alert to safe and safe to alert). In safe mode, the
application only detects SIM change process but does not
send any notification to number, only user can change the
SIMs in safe mode. In alert mode, the application detect
Cloud based Anti-Theft Application for Android Devices: A Literature Review
(IJSRD/Vol. 3/Issue 10/2015/215)
All rights reserved by www.ijsrd.com 959
SIM change process and send the notification that is SIM
get’s changed to alternate number.
R. Archana [3] and A.U.S. Khan [4], they are apply
MMS based technique, this application run’s services in
background without interrupting user’s activity. It
continuously checking for SIM changed and detects SIM
change process. It takes snapshots as well as records a small
video clip with help of front or rear camera that are available
into device. And track the location of lost device with the
help of GPS tracking system and find the location of thief
that is provided by Google map.
Most of the above-mentioned systems, provide
dedicate solutions using tracking methods to monitor a
mobile device. But by just enabling the mobile phones with
GPS system and retrieving the information about the new
SIM would be insufficient to track the Smartphone. Hence,
there came the idea of developing an anti-theft application to
become more secure to our android device with help of
taking some images, and small video clip of theft with audio
recording (surrounding voice). It sends theft information to
alternate mobile number and email in encrypted format.
III. SYSTEM IMPLEMENTATION
The system architecture of cloud based Anti-Theft
application is given in fig.3.1. The architecture is divided
into three layers that are given: system requirements,
application layer and cloud server layer.
A. System Requirements
It contains the software and hardware requirements. It is
necessary to interact with android device to application.
B. Application layer
This layer contains two phases that is detector and
controller. Detector is present on user side, When SIM will
get’s changed the services will be activated in a background.
These services will be validated or not it will be checked.
Detector is detect valid service and converted data into
encrypted format using AES algorithm, and send this
command to controller to control the services [5].
Controller phase is accepted the services from
detector phase and it checks services that are valid or not. If
service is valid it receives command and starts camera in
background for taking some snapshots or capture small
video and sent MMS to user also decrypt the data into
device [5].
C. Cloud Server Layer
Cloud server provides services for control the device
through remote server. Data can be access and control by
using cloud server.
Fig. 1: Proposed system architecture
IV. CONCLUSION
The paper presents a literature review for cloud based Anti-
Theft Application it deploys an improved security solution
that meets users short term and long term goals by providing
the images, small videos and audios of the thief, which gets
easy for the user to detect the thief and get him or her
captured and arrested. This proposed MMS based anti theft
technique is used for tracking the stolen android devices
with GPS. This proposed application will be user friendly
and it can be installed without any technical knowledge.
REFERENCES
[1] Sonia C.V., Dr. A.R. Aswatha, "AALTm: An Android
Application to Locate and Track Mobile Phones ", In
mobile tracking system based on SMS, International
Journal of Engineering Trends and Technology (IJETT)
- Volume4Issue5- May 2013.
[2] D. Abirami, S. Anantha Surya, S. Annapoorani, Ms. M.
PadmaPriya, "An Intelligent Anti-Theft Android
Application", in location tracking, 2014 IJIRT | Volume
1 Issue 10 | ISSN: 2349-6002, 2014.
[3] R. Archana, E.G. Bhuvaneshwari, T. Hema Vathi,
"MULTIMEDIA MESSAGING SERVICE (MMS)
BASED ANTI-THEFT APPLICATION", In MMS
based GPS tracking mobile devices, ISSN
23499842(Online), Volume 1, Special Issue 2(ICITET
15), March 2015.
[4] Azeem Ush Shan Khan, Mohammad Naved Qureshi,
Mohammed Abdul Qadeer, "Anti-Theft Application for
Android Based Devices", In MMS based mobile tracking
with GPS, 2014 IEEE International Advance Computing
Conference (IACC), 2014.
[5] V. Nirosha, K. Suma Latha, "A Comprehensive
Approach to Ensure Secure Data Communication in
Cloud Environment", for data storage using encryption
technique for security, International Journal of Advanced
Research in Computer Science and Software
Engineering, Volume 3, Issue 7, July 2013

More Related Content

PDF
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
PDF
Security Application for Smart Phones and other Mobile Devices
PDF
Mobile Theft Tracking Application
PPTX
Securing Mobile Cloud Using Fingerprint Authentication
PPTX
Use biometrics for identity management of cloud users to enhanced the securit...
PDF
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
PPTX
Final year project proposal
DOC
137.gsm, fprs ,keypad_based_atm_security_(doc)
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
Security Application for Smart Phones and other Mobile Devices
Mobile Theft Tracking Application
Securing Mobile Cloud Using Fingerprint Authentication
Use biometrics for identity management of cloud users to enhanced the securit...
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
Final year project proposal
137.gsm, fprs ,keypad_based_atm_security_(doc)

What's hot (20)

PDF
PROMINENT NAVIGATION FOR VISUALLY IMPAIRED PEOPLE
PDF
Application for Women Safety
PDF
Cloud based Anti-Theft Application for Android Devices: A Literature Review
PDF
Two Step Design for Personal Authentication Using Finger Vein Recognition and...
PDF
Swarma – A Women Safety Device
PDF
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
PDF
IRJET- ATM Security using GSM and MEMS Sensor
PDF
Smartphone Remote Detection and Wipe System using SMS
PDF
new Algorithm1
PDF
IRJET- High Security System for Money Carrying VAN to ATM’S
PPTX
An Intelligence Security System for Women
PDF
Tracking And Security System for Women’s using GPS & GSM
PPT
Safety app for woman
PDF
Remote surveillance system for mobile application
PDF
IRJET- TOUCH ME NOT-A Women Safety Device
PPTX
VSP: A Virtual Smartphone Platform to Enhance the Capability of Physical Smar...
PPT
Instant messaging tech scet
PDF
IRJET- IoT based Smart Foot Device for Women Safety
PDF
A Mobile Based Women Safety Application (I Safe Apps)
PDF
1. 10077 12326-1-pb
PROMINENT NAVIGATION FOR VISUALLY IMPAIRED PEOPLE
Application for Women Safety
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Two Step Design for Personal Authentication Using Finger Vein Recognition and...
Swarma – A Women Safety Device
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
IRJET- ATM Security using GSM and MEMS Sensor
Smartphone Remote Detection and Wipe System using SMS
new Algorithm1
IRJET- High Security System for Money Carrying VAN to ATM’S
An Intelligence Security System for Women
Tracking And Security System for Women’s using GPS & GSM
Safety app for woman
Remote surveillance system for mobile application
IRJET- TOUCH ME NOT-A Women Safety Device
VSP: A Virtual Smartphone Platform to Enhance the Capability of Physical Smar...
Instant messaging tech scet
IRJET- IoT based Smart Foot Device for Women Safety
A Mobile Based Women Safety Application (I Safe Apps)
1. 10077 12326-1-pb
Ad

Viewers also liked (9)

PPTX
Security on android
PDF
Implants into fresh extraction site: A literature review, case immediate plac...
PPTX
CSE Final Year Project Presentation on Android Application
PPTX
Simple Android Project (SAP)... A Test Application
PDF
Final Year Project Report on Self Tacit Zone (Location Based Android App)
PPT
Restaurant Finder Android Application project Presentation
PPT
android controlled robot
DOC
My Project Report Documentation with Abstract & Snapshots
PPT
Security on android
Implants into fresh extraction site: A literature review, case immediate plac...
CSE Final Year Project Presentation on Android Application
Simple Android Project (SAP)... A Test Application
Final Year Project Report on Self Tacit Zone (Location Based Android App)
Restaurant Finder Android Application project Presentation
android controlled robot
My Project Report Documentation with Abstract & Snapshots
Ad

Similar to Cloud based Anti-Theft Application for Android Devices: A Literature Review (20)

PDF
An Android Based Intelligent Anti-theft and Tracking System for Automobiles
PPTX
PHONE GUARD MOBILE ANTI THEFT SYSTEM JAVA
PDF
safe journey
DOC
Gsm anti theft system
PDF
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...
PPTX
Vehicle anti theft tracking system based on internet of things
DOCX
Location Tracking of Android Device Based on SMS.
PDF
Ijisa v5-n9-10
DOCX
BEST PROJECT CENTER IN TAMBARAM/TAMBARAM IEEEPROJECTS
PDF
ADVANCED ANDROID APPLICATION TO LOCATE AND TRACK MOBILE PHONES
PDF
Mobile Security Using Android: Locate Your Droid
PDF
GPS GSM Based Vehicle Tracking & Locking System
PDF
Advancement in Android Authentication System Using Direct Significance Service
PDF
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
PDF
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
PDF
Progress Report Mob Securer (Android App)
PDF
Vehicle Tracking System Using GPS
PDF
Application of Micro Controller in Vehicle Monitoring and Security System
DOC
Anti theftsystemforvechicles1 final
PDF
Garbage Management using Android Smartphone
An Android Based Intelligent Anti-theft and Tracking System for Automobiles
PHONE GUARD MOBILE ANTI THEFT SYSTEM JAVA
safe journey
Gsm anti theft system
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...
Vehicle anti theft tracking system based on internet of things
Location Tracking of Android Device Based on SMS.
Ijisa v5-n9-10
BEST PROJECT CENTER IN TAMBARAM/TAMBARAM IEEEPROJECTS
ADVANCED ANDROID APPLICATION TO LOCATE AND TRACK MOBILE PHONES
Mobile Security Using Android: Locate Your Droid
GPS GSM Based Vehicle Tracking & Locking System
Advancement in Android Authentication System Using Direct Significance Service
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
Progress Report Mob Securer (Android App)
Vehicle Tracking System Using GPS
Application of Micro Controller in Vehicle Monitoring and Security System
Anti theftsystemforvechicles1 final
Garbage Management using Android Smartphone

More from IJSRD (20)

PPTX
#IJSRD #Research Paper Publication
PDF
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
PDF
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
PDF
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
PDF
Prevention and Detection of Man in the Middle Attack on AODV Protocol
PDF
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
PDF
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
PDF
Filter unwanted messages from walls and blocking nonlegitimate user in osn
PDF
Keystroke Dynamics Authentication with Project Management System
PDF
Diagnosing lungs cancer Using Neural Networks
PDF
A Survey on Sentiment Analysis and Opinion Mining
PDF
A Defect Prediction Model for Software Product based on ANFIS
PDF
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
PDF
Product Quality Analysis based on online Reviews
PDF
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
PDF
Study of Clustering of Data Base in Education Sector Using Data Mining
PDF
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
PDF
Investigation of Effect of Process Parameters on Maximum Temperature during F...
PDF
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
PDF
A Survey on Data Mining Techniques for Crime Hotspots Prediction
#IJSRD #Research Paper Publication
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
Prevention and Detection of Man in the Middle Attack on AODV Protocol
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Keystroke Dynamics Authentication with Project Management System
Diagnosing lungs cancer Using Neural Networks
A Survey on Sentiment Analysis and Opinion Mining
A Defect Prediction Model for Software Product based on ANFIS
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Product Quality Analysis based on online Reviews
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Study of Clustering of Data Base in Education Sector Using Data Mining
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Investigation of Effect of Process Parameters on Maximum Temperature during F...
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
A Survey on Data Mining Techniques for Crime Hotspots Prediction

Recently uploaded (20)

PPTX
Lesson notes of climatology university.
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Cell Types and Its function , kingdom of life
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Insiders guide to clinical Medicine.pdf
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Institutional Correction lecture only . . .
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
GDM (1) (1).pptx small presentation for students
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Computing-Curriculum for Schools in Ghana
Lesson notes of climatology university.
O7-L3 Supply Chain Operations - ICLT Program
Cell Types and Its function , kingdom of life
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPH.pptx obstetrics and gynecology in nursing
Insiders guide to clinical Medicine.pdf
Complications of Minimal Access Surgery at WLH
Institutional Correction lecture only . . .
FourierSeries-QuestionsWithAnswers(Part-A).pdf
GDM (1) (1).pptx small presentation for students
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
STATICS OF THE RIGID BODIES Hibbelers.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
01-Introduction-to-Information-Management.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Abdominal Access Techniques with Prof. Dr. R K Mishra
102 student loan defaulters named and shamed – Is someone you know on the list?
Computing-Curriculum for Schools in Ghana

Cloud based Anti-Theft Application for Android Devices: A Literature Review

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 958 Cloud based Anti-Theft Application for Android Devices: A Literature Review Sagar Choudhary1 Vishal Mundhe2 Ajit Rathod3 Prof. Mohit Dighe4 4 Assistant Professor 1,2,3,4 Department of Computer 1,2,3,4 SCSCOE, Rahuri factory Abstract— In this system we have proposed to implement the technique to improve antitheft for android based mobile phones by using various services like MMS over the SMS. Today’s most popular android operating system is contains many scenarios that already been proposed that are related to anti-theft also many applications are available onto play store but these application are not so useful to find the thief e.g. GPS tracking for the devices like smart phones, tablets and phablets. We can use new technology likes Multimedia Messaging Service (MMS), which enhances the present scenario. This scenario is totally dependent on the hardware of your smart phone device that is camera (front or rear) also support for multimedia messages. First, we just need to install this software then, it work’s in the background, stores the current SIM number in a variable and keeps continuously checking for SIM change, whenever SIM gets changed from device, it will takes snapshots, record a video in the background with the use of camera of device and also records surrounding audio i.e., without taking user permission and then it will send an MMS to an alternate mobile number and an email id, which was provided during installation for authorized user’s registration. The most benefit of this application is very easy to configure and keeps running in the background without interrupting the user. To some extent it helps the authorized user to identify and find the thief. Key words: Android, GPS tracking, GPRS, MMS, Snapshots, Video, email, cloud I. INTRODUCTION In today’s world, smart phones are acting like a computer, it also provides facility to store information, documents etc. This data can be shared with everywhere through internet. These latest smart phones are very helpful and useful for doing business smartly. Today every people has, started using smart phone because they are available at low cost in market. The smart phone provides multiple features that attracting peoples. There are above millions of applications and games available to download from Google play store. An android system shows application which uses a regular mobile phone provided with a GPS receptor and connected to global system for mobile (GSM) network that takes advantage of this technology in behalf of the user safety [1]. In the previous system, text message is sent by SMS (Short Messaging Service) to the alternative number that is provided when application is installed. This text message holds the information such as that the SIM has been changed. It also contains the data such as the new SIM number and the location of lost devices. It uses the GPS facilities provided by Google Maps. The SMS contains information that is given as plain text. Received message is views only when, user will be open that message. And some applications send the message as a mail to the mail id provided when application is installed. It contains the same information and some may contain snapshots (images) in it. These snapshots can be viewed when user opens the mail that is sent by this application. In this proposed system, once Anti-theft application is installed, it runs services in the background without interrupting activities of user. It continuously checks for the SIM change then detects the SIM change process. It takes snapshots as well as records a video and surrounding audio without the user’s permission after the SIM gets changed. Then it sends an MMS to the alternate number and an e-mail is sent to the mail id that is provided during installation of application. The new SIM number and location of lost device is also tracked and sent to the alternate number as an SMS and the user can make him/her stop misusing any confidential data into the device. Hence, visualization provided helps to detect the lost device and recognize the thief quickly [6] [7]. II. LITERATURE REVIEW Sonia C.V. [1] applied AALTm - An Android Application to Locate and Track Mobile phones to recognize two user profiles, the client and the server for tracking. The server is requires any android based Smart phone starting with version Android 2.2 or above having AALTm installed in it with GPS and GPRS enabled. In other side that is client side requires any other different OS based mobile phones for sending and receiving SMS. When there is any error in sending the message from the operator side, then there not any message sends to the operator by this application, instead no operation will be perform at the server side. This [1] technique only works when predefined format SMS is received and read the SMS then it perform the expected task that is Location tracking and GSM cell id. It is totally based on SMS. D. Abirami [2] applied intelligent theory that is safe and alert mode. Latest android phone supports multiple SIM cards and user is also use one or more SIM cards. The problem in previous system, if user’s mobile has two different SIMs when system identifies SIM get’s changed it will continuously send notification that the SIM will be changed to the alternate number that is provided during installation. The unwanted notification is also send if the owner will get’s changed SIM. This [2] technique over comes the unwanted notification problems with using safe and alert mode. The user will required application password before changing the mode (alert to safe and safe to alert). In safe mode, the application only detects SIM change process but does not send any notification to number, only user can change the SIMs in safe mode. In alert mode, the application detect
  • 2. Cloud based Anti-Theft Application for Android Devices: A Literature Review (IJSRD/Vol. 3/Issue 10/2015/215) All rights reserved by www.ijsrd.com 959 SIM change process and send the notification that is SIM get’s changed to alternate number. R. Archana [3] and A.U.S. Khan [4], they are apply MMS based technique, this application run’s services in background without interrupting user’s activity. It continuously checking for SIM changed and detects SIM change process. It takes snapshots as well as records a small video clip with help of front or rear camera that are available into device. And track the location of lost device with the help of GPS tracking system and find the location of thief that is provided by Google map. Most of the above-mentioned systems, provide dedicate solutions using tracking methods to monitor a mobile device. But by just enabling the mobile phones with GPS system and retrieving the information about the new SIM would be insufficient to track the Smartphone. Hence, there came the idea of developing an anti-theft application to become more secure to our android device with help of taking some images, and small video clip of theft with audio recording (surrounding voice). It sends theft information to alternate mobile number and email in encrypted format. III. SYSTEM IMPLEMENTATION The system architecture of cloud based Anti-Theft application is given in fig.3.1. The architecture is divided into three layers that are given: system requirements, application layer and cloud server layer. A. System Requirements It contains the software and hardware requirements. It is necessary to interact with android device to application. B. Application layer This layer contains two phases that is detector and controller. Detector is present on user side, When SIM will get’s changed the services will be activated in a background. These services will be validated or not it will be checked. Detector is detect valid service and converted data into encrypted format using AES algorithm, and send this command to controller to control the services [5]. Controller phase is accepted the services from detector phase and it checks services that are valid or not. If service is valid it receives command and starts camera in background for taking some snapshots or capture small video and sent MMS to user also decrypt the data into device [5]. C. Cloud Server Layer Cloud server provides services for control the device through remote server. Data can be access and control by using cloud server. Fig. 1: Proposed system architecture IV. CONCLUSION The paper presents a literature review for cloud based Anti- Theft Application it deploys an improved security solution that meets users short term and long term goals by providing the images, small videos and audios of the thief, which gets easy for the user to detect the thief and get him or her captured and arrested. This proposed MMS based anti theft technique is used for tracking the stolen android devices with GPS. This proposed application will be user friendly and it can be installed without any technical knowledge. REFERENCES [1] Sonia C.V., Dr. A.R. Aswatha, "AALTm: An Android Application to Locate and Track Mobile Phones ", In mobile tracking system based on SMS, International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013. [2] D. Abirami, S. Anantha Surya, S. Annapoorani, Ms. M. PadmaPriya, "An Intelligent Anti-Theft Android Application", in location tracking, 2014 IJIRT | Volume 1 Issue 10 | ISSN: 2349-6002, 2014. [3] R. Archana, E.G. Bhuvaneshwari, T. Hema Vathi, "MULTIMEDIA MESSAGING SERVICE (MMS) BASED ANTI-THEFT APPLICATION", In MMS based GPS tracking mobile devices, ISSN 23499842(Online), Volume 1, Special Issue 2(ICITET 15), March 2015. [4] Azeem Ush Shan Khan, Mohammad Naved Qureshi, Mohammed Abdul Qadeer, "Anti-Theft Application for Android Based Devices", In MMS based mobile tracking with GPS, 2014 IEEE International Advance Computing Conference (IACC), 2014. [5] V. Nirosha, K. Suma Latha, "A Comprehensive Approach to Ensure Secure Data Communication in Cloud Environment", for data storage using encryption technique for security, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 7, July 2013