Full Paper View Go Back

GSM devices Property proof and Tracking

Hussam Elbehiery1

  1. Department of Computer Networks, Ahram Canadian University (ACU), Giza, Egypt.

Correspondence should be addressed to: hussam.elbehiery@gmail.com.


Section:Research Paper, Product Type: Isroset-Journal
Vol.6 , Issue.1 , pp.44-49, Feb-2018


CrossRef-DOI:   https://doi.org/10.26438/ijsrcse/v6i1.4449


Online published on Feb 28, 2018


Copyright © Hussam Elbehiery . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Hussam Elbehiery, “GSM devices Property proof and Tracking,” International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.1, pp.44-49, 2018.

MLA Style Citation: Hussam Elbehiery "GSM devices Property proof and Tracking." International Journal of Scientific Research in Computer Science and Engineering 6.1 (2018): 44-49.

APA Style Citation: Hussam Elbehiery, (2018). GSM devices Property proof and Tracking. International Journal of Scientific Research in Computer Science and Engineering, 6(1), 44-49.

BibTex Style Citation:
@article{Elbehiery_2018,
author = {Hussam Elbehiery},
title = {GSM devices Property proof and Tracking},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {2 2018},
volume = {6},
Issue = {1},
month = {2},
year = {2018},
issn = {2347-2693},
pages = {44-49},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=538},
doi = {https://doi.org/10.26438/ijcse/v6i1.4449}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i1.4449}
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=538
TI - GSM devices Property proof and Tracking
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Hussam Elbehiery
PY - 2018
DA - 2018/02/28
PB - IJCSE, Indore, INDIA
SP - 44-49
IS - 1
VL - 6
SN - 2347-2693
ER -

776 Views    391 Downloads    222 Downloads
  
  

Abstract :
All GSM network devices such as smart phones become a target of choice for thieves because they are small, valuable, and there is a market for them. A thief can sell a stolen electronic device to an unsuspecting used computer store or pawnshop, and easily receive up to half its value in cash. The penalties for a property crime are less severe than those of a crime against a person is another reason of wide spreading of this crimes. Cost of this crimes is not just its replacement cost, but also the cost of configuring and loading replacement software, and the cost of lost time for the owner while the device is being replaced. An even greater cost is the potential exposure and liability that results from lost confidential corporate and client information. Designed web page will be used to access these devices to take always a copy of the important data and will be saved on the cloud area related to the web site which make it easier to retrieve the stored information in theft or lost case. The introduced research explains how you can keep strangers from accessing your personal information, safely back up and retrieve the stored data in the device. The introduced design will help in trying of minimization of the theft cases also minimizing extortion by thieves or some of exploiters depending on that all GSM device especially cellular phones could be tracked using IMEI (International Mobile Station Equipment Identity) or MEID (Mobile Equipment Identifier).

Key-Words / Index Term :
Cellphone tracking, Property Proof, and Data Retrieval

References :
[1] Josh Lockhart, "Modern PHP: New Features and Good Practices Paperback, " laxmi publications, USA, 2015.
[2] W. Stallings, “Data and Computer Communications,” ©2007 Pearson Education, Inc. Pearson Prentice Hall Pearson Education, Inc. Upper Saddle River, NJ 07458, 8th Edition, ISBN: 0-13-243310-9, USA, 2007.
[3] Michael Hogan, Fang Liu, Annie Sokol, and Jin Tong, “NIST-SP 500-291, NIST Cloud Computing Standards Roadmap,” National Institute of Standards and Technology Special Publication 500-291 V2, Spec. Publ. 500-291, 108 pages, NIST Cloud Computing Program Information Technology Laboratory, USA, 2013.
[4] Sikha Bagui and Richard Earp, "Database Design Using Entity Relationship Diagrams,"
AUERBACH PUBLICATIONS, A CRC Press Company Library of Congress Cataloging-in-Publication Data ISBN:0849315484, UK, 2011.
[5] U. S. Pandey and Rahul Srivastava, “E- Commerce and Mobile Commerce Technologies,” S. Chand Publisher, Vedams eBooks (P) Ltd., ISBN 10: 8121928419 / ISBN 13: 9788121928410, New- Delhi, India, 2007.

[6] Mathew Johnson, “A New Approach to Internet banking,” Technical Report, UCAM-CL-TR-731, University of Cambridge Computer Laboratory, ISSN 1476-2986, UK, 2008.
[7] N. H. MohdAlwi and I.S. Fan, “Information security threats analysis fore-learning,” Proc. 1st Inter. Conf. of TECH-EDUCATION, CCIS, vol. 73, pp. 285-291, Athens, Greece, 2010.
[8] A. Kapil and A. Garg, “Secure web access model for sensitive data, ”International Journal of Computer Science & Communication (IJCSC),vol. 1, no. 1, pp. 13-16, India, 2010.
[9] Michael E. Whitman, and Herbert J. Mattord, “Principles of Information Security,” 4th Edition, CENAGE Learning, ISBN-13: 978-1-111-13821-9, ISBN-10: 1-111-13821-4, Nelson Education Ltd., USA, 2012.
[10] Melchor, C.A., and Gaborit, “A fast private information retrieval protocol,” In ISIT 2008. pp. 1848 – 1852. IEEE, 2008.
[11] Ostrovsky, R., Skeith, and W.E., “A Survey of Single-Database Private Information Retrieval: Techniques and Applications,” In Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp.393–411. Springer, 2007.
[12] Drew Springall, Travis Finkenauer, Zakir Durumeric, Jason Kitcat,
Harri Hursti, Margaret MacAlpine, and J. Alex Halderman, "Security Analysis of the Estonian Internet Voting System,” CCS `14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security Pages 703-715, ISBN: 978-1-4503-2957-6, Scottsdale, Arizona, USA, 2014.
[13] V. Ciriani, S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, “Combining fragmentation and encryption to protect privacy in data storage,” ACM Transactions on Information and System Security(TISSEC), vol. 13, no. 3, New York, USA, 2010.
[14] Baek, J., Susilo, W., and Zhou, J., “New constructions of fuzzy identity-based encryption,” In ASIACCS 2007, pp. 368–370. ACM, Singapore, 2007.
[15] Zhou, Jianying, Young, Moti, Bao, and Feng (Eds.), “Applied Cryptography and Network Security,” 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings, ISBN 978-3-540-34704-0, Springer Publishing, USA, 2006.
[16] Vitaly Dubravin, "Is Data Masking better than Encryption,” Droid Cafe; Life in Technology, 2011.

[17] Jeffrey Hoffstein, Jill Pipher and Joseph H. Silverman, "An Introduction to Mathematical Cryptography," Springer Science and Business Media, LLC, ISBN 978-1-4939-1711-2, 2nd edition, XVII, 538 p. 32 illus., USA, 2014.
[18] Siddharth Agarwal, AbhinavRungta, R.Padmavathy, Mayank Shankar and NipunRajan, "An Improved Fast and Secure Hash Algorithm," Journal of Information Processing Systems, Volume 8, No.1, ISSN: 2092-805X, Korea, 2012.
[19] Nabil H. Shaker, Hanady H. Issa, Khaled A. Shehata and Somaia N. Hashem, "Design of F8 Encryption Algorithm Based on Customized Kasumi Block Cipher," International Journal of Computer and Communication Engineering, Volume 2, No. 4, ISSN: 2010-3743, International Academy Publishing (IAP), USA, 2013.
[20] Jon Duckett, “HTML and CSS: Design and Build Websites,” John Wiley & Sons, Inc., Indianapolis, 1st Edition, ISBN: 978-1-118-00818-8, Indiana, USA, 2011.
[21] Chen, T.H., Hsiang, H.C. and Shih, W.K., “Security improvement on a remote user authentication scheme using smart cards,” 4thInternational Conference of Information Security and Assurance, Communications in Computer and Information Science, Vol. 76,pp.9–16, Japan, 2010.
[22] Debiao, H., Jianhua, C. and Jin, H.,“Weaknesses of a dynamic ID-based remote user authentication scheme,” International Journal of Electronic Security and Digital Forensics, Vol. 3, No. 4, pp.355–362, USA, 2010.
[23] Khan, M.K., Kim, S.K. and Alghathbar, K., “Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’,” Journal Computer Communications, Vol. 34, No. 3, pp.305–309, ISSN: 0140-3664, Elsevier Science Publishers B. V. Amsterdam, The Netherlands, 2011.
[24] Wang, Y.Y., Kiu, J.Y., Xiao, F.X. and Dan, J.,“A more efficient and secure dynamic ID-based remote user authentication scheme,” Computer Communications, Vol. 32, No. 4, pp.583–585, ISSN:0140-3664, Elsevier Science Publishers B. V. Amsterdam, The Netherlands, 2009.
[25] B.G. Nagaraja, Ravi Rayappa, M. Mahesh, Chandrasekhar M. Patil, and Dr. T.C. Manjunath, “Design & Development of a GSM Based Vehicle Theft Control System,” 978-0-76953516-6/08©2008IEEE, DOI10.1109 / International Conference on Advanced Computer Control ICACC 2009, pp.148-152., Singapore, 2009.
[26] CCMTA, “Best Practice Models for Combating Auto Theft,” Version 6.1, Anti Auto-Theft Project Group, Canada, 2006.
[27] EdigaLingappa, Geetavani.B, and JambulaHareesha, “Online Signature Verification using Dynamic Properties,” International Journal of Scientific Research in Computer Science and Engineering (IJSRCSE), Vol.5, Issue.6, pp.33-38, India, 2017.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation