Open Access Open Access  Restricted Access Subscription or Fee Access

Mobile Waving – Girls Safety – IOT : Android Based Unlocking Mobile Waving Pattern with Waving Pattern for Emergency Support System

D. Suganya, B. Manimegalai, J. Soniya

Abstract


Existing approaches do not support smart phones well due to the deficiency of security, high cost, and poor usability. In the framework, Android Application is developed in which user’s Hand Waving Pattern is recorded & Stored as User’s Pattern. We are using SVM Algorithm for User Identification. Hand Waving is used for Phone unlock. MODIFICATION of the project is same waving pattern can be processed to for Emergency Communication. This Application can be used for Girls Safety. Android Application is deployed for Two Implementations. First one is Normal Phone Unlocking and second one for Girls safety. Once Girls safety pattern is matched GPS & Camera are initiated to fetch Location and Photos. Voice is Recorded and uploaded to the Server. Both GPS & Audio Link are sent as SMS Alert to both Police & Guardian. Photo is mailed to both of them.


Full Text:

PDF

References


P. Mell and T. Grance, “The NIST definition of cloud computing (draft),” NIST Special Publication, vol. 800, p. 145, 2011.

S. De Capitani di Vimercati, S. Foresti, and P. Samarati, “Managing and accessing data in the cloud: Privacy risks and approaches,” in Proc. 7th Int. Conf. Risk Security Internet Syst., 2012, pp. 1–9.1272 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 27, NO. 5, MAY 2015

P. Williams, R. Sion, and B. Carbunar, “Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage,” in Proc. 15th ACM Conf. Comput. Commun. Security, 2008, pp. 139–148.

P. Paillier, “Public key cryptosystems based on composite degree residuosity classes,” in Proc. 17th Int. Conf. Theory Appl. Cryptographic Techn., 1999, pp. 223–238.

B. K. Samanthula, Y. Elmehdwi, and W. Jiang, “k-nearest neighbor classification over semantically secure encrypted relational data,” eprint arXiv: 1403.5001, 2014.

C. Gentry, “Fully homomorphic encryption using ideal lattices,” in Proc. 41st Annu. ACM Sympos. Theory Comput., 2009, pp. 169–178.

C. Gentry and S. Halevi, “Implementing gentry’s fully-homomorphic encryption scheme,” in Proc. 30th Annu. Int. Conf. Theory Appl. Cryptographic Techn.: Adv. Cryptol., 2011, pp. 129–148.

A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, pp. 612–613, 1979.


Refbacks

  • There are currently no refbacks.