SlideShare a Scribd company logo
1 of 5
Download to read offline
Mohamad Raad.et.al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 2, ( Part -5) February 2017, pp.38-42
www.ijera.com DOI: 10.9790/9622- 0702053842 38 | P a g e
A Modular Instant Messaging System
Mohamad Raad, Zouhair Bazzal, Majd Ghareeb, Hanan Farhat, Semar Bahmad
Department of Computer and Communications Engineering
Lebanese International University
Beirut, Lebanon
ABSTRACT:
Instant Messaging (IM) Android applications are a trend nowadays. These applications are categorized
according to their features: usability, flexibility, privacy and security. However, IM applications tend to be
inflexible in terms of functionality offered. The “Dble-U” system was developed as a solution to this
inflexibility, with a focus on privacy as an example use case. “Dble-U” is a configurable modular system
consisting of an Android chatting application, a privacy controller application, along with a tracking server
application. This modularity allows for groups of individuals to build custom features into their IM application.
Keywords: Instant messaging, modular, configurable.
I. INTRODUCTION
Instant Messaging (IM) applications have
been popular since America On Line Instant
Messenger (AIM) was first introduced in the mid
1990’s [1]. The popularity and social impact of IM
applications, especially Mobile IM (MIM)
applications has been very significant [2] [3]. For
example, MIM use has been associated with job
satisfaction and better job performance [3]. However,
it is also known that mobile application selection is
influenced by a person’s age group and social setting
[2]. IM applications tend to provide a fixed set of
features and capabilities per application. That is, each
application typically provides the base features
(communication) and some additional features that
encourage more users to adopt that application as
their application of choice for communicating with
others. Some applications, such as WhatsApp allow
for more focused communication, others like
Instagram allow for broader communication and so
on.
Adopters of each application have no control
over the technical features included in them. For
example, although many of today’s applications
include emoji ediograms, users cannot generally add
a unique set of such ediograms for use within a
specific group (e.g. an organization may elect to
design a unique set of such characters for internal
communication). Another example is the use of
privacy features. Current IM applications provide
privacy features (e.g. encryption) but do not provide
the ability for an organization or a group to install
their own privacy solutions (e.g. their own encryption
algorithms).
This paper introduces a modular MIM that
allows users the freedom to tailor it by modifying
core technical features. The use case focused on in
this paper is that of privacy. The data of instant
messaging applications are accessible and are
frequently mined, sorted and sold. With recent
exposures of how little privacy there is whilst
communicating over the Internet, the need for a truly
private chatting application is clear.
During the course of the development of the
system described in this paper, WhatsApp introduced
the end-to-end encryption feature to its clients on
April 5th of 2016. However, there is no direct
evidence that no third parties can decrypt the
encrypted data. The questions arise primarily because
the user does not have direct control over the
technical features in the application.
The usual Instant Messaging (IM) process’
logical model works as follows: a connection is
created, a session is opened, and two types of
messages handling exist: receiving and sending.
Those messages have destinations, and pass through
buffers and get saved in databases. This paper
describes an altered model, in which the end user has
much more control over the way that messages are
protected. The model is instantiated in an Android IM
application named “Dble-U”.
II. EXISTING SYSTEMS
A. Typical features
A list of the features in popular smartphone
messaging applications, is shown in Figure 1. The
security features of these applications are varied. For
example, encryption of data exchanged is feature
number one [8], whether encryption/decryption is on
client sides with or without the provider access to the
keys. Yet, some applications (e.g.: Telegram) add to
this feature the re-initiation of encryption keys after
each hundred messages [9], or after a week of usage.
Another security measure is timed-messaging
followed by self-destruction of the messages. This is
found in BlackBerry messenger [10], Telegram,
SnapChat, etc. Another feature is the Whisper (Bleep)
in which the message is destroyed just after being
RESEARCH ARTICLE OPEN ACCESS
Mohamad Raad.et.al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 2, ( Part -5) February 2017, pp.38-42
www.ijera.com DOI: 10.9790/9622- 0702053842 39 | P a g e
read by the recipient [11]. Other applications made it
more specific, by introducing a secret chat feature
beside the normal conversations. In those secret
chats, timestamps are hidden, nicknames are hidden,
and messages can’t be forwarded (e.g.: BBM).
Moreover, some application support the users by an
editing option where they can edit the sent message
after being sent and retract the sent one, and
sometimes delete the sent messages preventing the
recipient from reading them. Some application
disable the screen capturing feature too. Figure 2
summarizes the most important privacy features
available.
Figure 1 Main features of popular IM applications
Figure 2 Privacy featured of popular IM applications
B. Design of typical IM systems
a) Server
A sever is typically used for data exchange
and saving in backend databases. Examples of such
servers are: Microsoft Mobile Information Server (for
messenger.) and BlackBerry Enterprise Server (BES).
Application Servers [4] are mainly used in
3-tiers web-based applications, where the third tier is
the database end, the second tier is the Application
Server, and the first one is the GUI at the client end.
b) Client
There are various ways to implement an IM
client. Typically these are native applications with the
majority being native Android applications. However,
not all of them support the aim of developing a secure
chatting system. One popular way is to implement the
system with server-to-client push notification using
GCM (Google Cloud Messaging) [5], specifically its
CSS (Google Cloud Connection Server) via XMPP
(Extensible Messaging and Presence Protocol).
XMPP has a Java library specific for Instant
Messaging named Smack [6]. Yet, this means data
will pass through the server, and most likely get
stored on Google’s cloud, which contradicts the aims
of a privacy focused application.
The components of an instant messaging
system in general follows a broadly similar logic,
with the specific features concatenated later. The
main component of the common logic between
Android IM applications is the asynchronous
processing mechanism [7] that organizes the chatting
applications data transfer and communication. This
mechanism is also used in the system described in
what follows.
III. SYSTEM DESIGN
A. High level design
In “Dble-U”, the privacy/security
management of the Instant Messaging process takes
place on a separate application. This system (Figure
3) is a combination of three applications, a web-based
Privacy Controller, a tracking server and an instant
messaging Android application. The high level design
of the system can be classified as a 3-tier architecture,
divided into a Client tier, Logic/Server tier and Data
tier. However, this is used only for the establishment
of a connection between clients, then the
communication process becomes of 2-tier
architecture (client tier & data tier/ Peer to Peer).
Figure 3 High level design
The existing prototype of Dble-U has three
privacy options that an administrator of the Privacy
Controller can choose values for: self-destruct,
Hide/restore, and encryption level. The encryption
level in turn has three options: no encryption, AES-
256 with a fixed key, and RSA with a generated pair
of keys. In the existing prototype, users are divided
into groups and a user may belong to multiple groups.
Each group then has a common security level set
through the privacy controller.
As for encryption, each type has its own
class and methods that are run when switched. If self-
destruct option is turned on, the chat will disappear
Mohamad Raad.et.al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 2, ( Part -5) February 2017, pp.38-42
www.ijera.com DOI: 10.9790/9622- 0702053842 40 | P a g e
just as the user leaves the chat. Similarly, if hide is
turned on, the chat history will not show when the
chatting panel is left, but will show when the restore
option is chosen instead.
B. Design concepts
The Privacy Controller was designed as a
separate application to guarantee the authenticity of
its users. That is, the main concept being applied in
this design is that of isolation. An Administrator can
log in to the Privacy Controller using his/her
credentials only, and can’t configure the privacy
settings of any Android application user unless the
Android application user is added to the
Administrator’s list of Android application users. To
add to the autonomy of the Android application user,
an Administrator of the Privacy Controller can’t
configure any group’s privacy settings unless all its
members, who are Android application users, are
connected locally to the Privacy Controller. This is
applied as well to updating the privacy settings of an
already existing group of Android application users.
Communication between the clients and the
servers relies on HTTP rather than on directly using
transport protocols. The reason is simple, wherever
the World Wide Web is accessible, HTTP is
accessible. There is a cost in terms of efficiency
because of this choice, but the increased reliability
was judged to be worth the cost.
Finally, the tracking server is only used as a
directory to identify the network location of clients
that wish to communicate with one another and is not
involved in the communication chain between clients.
This approach was chosen to enable easy connectivity
between the clients, although it does create a
weakness in the system in that if the tracker is
somehow rendered inaccessible then the clients may
not be able to communicate.
a. State diagrams
The following state diagrams illustrate the operation
of the components of the Dble-U system and the
transitions that take place between them.
Figure 4 State diagram of the privacy controller component
Figure 5 State diagram of the tracker component
Mohamad Raad.et.al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 2, ( Part -5) February 2017, pp.38-42
www.ijera.com DOI: 10.9790/9622- 0702053842 41 | P a g e
Figure 6 State diagram of the Android application
IV. IMPLEMENTATION AND TESTING
All three components of the chatting system
described above have been implemented and tested.
The testing process took place through a local
network as a first step. Also, during the initial testing,
the IP addresses had to be fixed to make the testing
simpler, rather than changing it every time the
Tracker and the Privacy Controller were disconnected
from the local network.
The testing of the developed system focused
on exercising all 3 components. All the states of the
user Android application were tested. That is, users
could communicate as part of multiple groups with
ease, as expected, when they belonged to that group.
The privacy controller allowed each group to have
different privacy settings and these were observed to
perform as expected during testing. That is, members
of the groups would communicate with one another in
an encrypted manner or in the clear. The messages
were captured and analysed to substantiate whether or
not the required level of encryption was taking place.
The tracker was observed to be able to keep the
clients aware of the IP addresses of the other
members of the groups to which they belong. The
speed with which the tracker updated its database
depended on the frequency of the updates received
from the clients. The clients send an update address
message to the tracker every time a change in the IP
address is detected. Other clients are in turn informed
by the tracker of the change in address. The
communication between the clients and the tracker
are all HTTP based messages – allowing for access
on almost all networks since this is the protocol on
which the WWW is built.
V. CONCLUSION
As can be seen from the steps taken by
WhatsApp, to introduce end-to-end encryption to its
clients, privacy is a real user concern in IM. This
concern will continue to grow over time as these
applications continue to play a significant role in the
way that people around the world interact with one
another.
The solution described in this paper
introduces a mechanism by which the user is given
control over how the user messages are protected.
This mechanism requires that the users know each
other or are at least connected through a common
point of contact. Although this means that users have
a lower level of freedom when it comes to creating
connections with other users, it is a necessary
constraint for the increased level of privacy that it
allows. Anonymity is valuable in Cyberspace, but in
designing this system it has been assumed that the
anonymity that users typically want is from prying
third parties rather than from the people they intend
to communicate with. By giving users the ability to
apply multiple levels of security for different groups
within which they communicate, the user is being
forced to make a conscious decision regarding the
cost of increased privacy and whether such a cost is
worthwhile. That is valuable since it allows users to
optimize their usage of their device’s resources.
The described system is an instantiation of
the modular design concept described in this paper, in
which adopters of a system can have complete control
over the mail technical features of the system. This
may introduce some inconvenience to the adopter of a
system (given that some knowhow will have to be
developed regarding how to take advantage of this
additional flexibility), but it may also be used in the
production of different “flavors” of the same
application.
REFERENCES
[1] G. E. Jacobs, "Instant Messaging and Texting,"
in Handbook of Research on the Societal
Impact of Digital Media, IGI Global, 2016, pp.
493-527.
Mohamad Raad.et.al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 2, ( Part -5) February 2017, pp.38-42
www.ijera.com DOI: 10.9790/9622- 0702053842 42 | P a g e
[2] R. M. Frey, R. Xu and A. Ilic, "Mobile app
adoption in different life stages: An empirical
analysis," Pervasive and Mobile Computing,
pp. 1574-1192, 2017.
[3] V. C. Sheer and R. E. Rice, "Mobile instant
messaging use and social capital: Direct and
indirect associations with employee
outcomes," Information & Management, vol.
54, no. 1, pp. 90-102, 2017.
[4] A. Srivastava and A. Bhargava,
"Understanding application servers," January
2003. [Online]. Available:
http://hosteddocs.ittoolbox.com/AS030504.pdf
. [Accessed 24 February 2017].
[5] "Cloud messaging | Google developers,"
Google, [Online]. Available:
https://developers.google.com/cloud-
messaging/. [Accessed 24 February 2017].
[6] "Ignite Realtime: Smack API," [Online].
Available:
https://www.igniterealtime.org/projects/smack/
. [Accessed 24 February 2017].
[7] "AsyncTask | Android developers," [Online].
Available:
https://developer.android.com/reference/androi
d/os/AsyncTask.html. [Accessed 24 February
2017].
[8] J. Z. Florez, C. R. Logreira, M. Munoz and
F. J. Vargas, "Architecture of instant
messaging systems for secure data
transmision," in Security Technology (ICCST),
2016 IEEE International Carnahan
Conference on, 2016.
[9] "Secret chats, end-to-end encryption,"
Telegram, [Online]. Available:
https://core.telegram.org/api/end-to-end.
[Accessed 24 February 2017].
[10] "Get the New BBM for Privacy, Control and
Much, Much More | Inside BlackBerry," 31
October 2014. [Online]. Available: Get the
New BBM for Privacy, Control and Much,
Much More | Inside BlackBerry. [Accessed 24
February 2017].
[11] "Twitch Introduces Whisper Feature," 11 June
2015. [Online]. Available:
http://www.techtimes.com/articles/59663/2015
0611/twitch-introduces-whisper-feature-heres-
how-to-use-the-private-messaging-system.htm.
[Accessed 24 February 2017].

More Related Content

What's hot

Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal systemSmart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal systemIRJET Journal
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationIJNSA Journal
 
Secure instant messanger service
Secure instant messanger serviceSecure instant messanger service
Secure instant messanger serviceAditya Gupta
 
4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01ijmnct
 
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...
IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...IRJET Journal
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Messaging Gateway
Messaging GatewayMessaging Gateway
Messaging Gatewayijsrd.com
 
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobileTwo aspect authentication system using secure mobile
Two aspect authentication system using secure mobileUvaraj Shan
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET Journal
 
Instant messaging tech scet
Instant messaging tech scetInstant messaging tech scet
Instant messaging tech scetpankaj gamit
 
Websites using touchless interaction having graphical
Websites using touchless interaction having graphicalWebsites using touchless interaction having graphical
Websites using touchless interaction having graphicaleSAT Publishing House
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secureUvaraj Shan
 
ILTA Mobile Security Gap
ILTA Mobile Security GapILTA Mobile Security Gap
ILTA Mobile Security GapGes Ray
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...eSAT Publishing House
 

What's hot (17)

Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal systemSmart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal system
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authentication
 
Secure instant messanger service
Secure instant messanger serviceSecure instant messanger service
Secure instant messanger service
 
4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01
 
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...
IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Messaging Gateway
Messaging GatewayMessaging Gateway
Messaging Gateway
 
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobileTwo aspect authentication system using secure mobile
Two aspect authentication system using secure mobile
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
 
Instant messaging tech scet
Instant messaging tech scetInstant messaging tech scet
Instant messaging tech scet
 
Websites using touchless interaction having graphical
Websites using touchless interaction having graphicalWebsites using touchless interaction having graphical
Websites using touchless interaction having graphical
 
ASDF WSS 2014 Paper 003
ASDF WSS 2014 Paper 003ASDF WSS 2014 Paper 003
ASDF WSS 2014 Paper 003
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secure
 
Web vulnerabilities
Web vulnerabilitiesWeb vulnerabilities
Web vulnerabilities
 
Iciea08
Iciea08Iciea08
Iciea08
 
ILTA Mobile Security Gap
ILTA Mobile Security GapILTA Mobile Security Gap
ILTA Mobile Security Gap
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
 

Viewers also liked

Sustainability of Solid Waste Management System in Urban Areas of Pakistan: S...
Sustainability of Solid Waste Management System in Urban Areas of Pakistan: S...Sustainability of Solid Waste Management System in Urban Areas of Pakistan: S...
Sustainability of Solid Waste Management System in Urban Areas of Pakistan: S...IJERA Editor
 
Abhijeetsinh v Makwana1 , Dhruv patel2 , Darshan patel3 ,Henil patel4 , Akhil...
Abhijeetsinh v Makwana1 , Dhruv patel2 , Darshan patel3 ,Henil patel4 , Akhil...Abhijeetsinh v Makwana1 , Dhruv patel2 , Darshan patel3 ,Henil patel4 , Akhil...
Abhijeetsinh v Makwana1 , Dhruv patel2 , Darshan patel3 ,Henil patel4 , Akhil...IJERA Editor
 
Employee on Boarding Process Automation
Employee on Boarding Process Automation Employee on Boarding Process Automation
Employee on Boarding Process Automation IJERA Editor
 
Preparation and characterization of Al doped nano crystalline Ni ferrites
Preparation and characterization of Al doped nano crystalline Ni ferritesPreparation and characterization of Al doped nano crystalline Ni ferrites
Preparation and characterization of Al doped nano crystalline Ni ferritesIJERA Editor
 
Improvement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random ForestImprovement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random ForestIJERA Editor
 
Technology and Key Strategy of IE4 Permanent Magnet Brushless DC Motor Drive ...
Technology and Key Strategy of IE4 Permanent Magnet Brushless DC Motor Drive ...Technology and Key Strategy of IE4 Permanent Magnet Brushless DC Motor Drive ...
Technology and Key Strategy of IE4 Permanent Magnet Brushless DC Motor Drive ...IJERA Editor
 
A Study on the Analysis of the Child Personal Information Processing Status i...
A Study on the Analysis of the Child Personal Information Processing Status i...A Study on the Analysis of the Child Personal Information Processing Status i...
A Study on the Analysis of the Child Personal Information Processing Status i...IJERA Editor
 
Synthesis and Characterization of Cadmium Substituted Copper Nano – Ferrites
Synthesis and Characterization of Cadmium Substituted Copper Nano – FerritesSynthesis and Characterization of Cadmium Substituted Copper Nano – Ferrites
Synthesis and Characterization of Cadmium Substituted Copper Nano – FerritesIJERA Editor
 
Post Earthquack Slope Stability Analysis of Rubble Mound Breakwater
Post Earthquack Slope Stability Analysis of Rubble Mound BreakwaterPost Earthquack Slope Stability Analysis of Rubble Mound Breakwater
Post Earthquack Slope Stability Analysis of Rubble Mound BreakwaterIJERA Editor
 
Secured Authorized Data Using Hybrid Encryption in Cloud Computing
Secured Authorized Data Using Hybrid Encryption in Cloud ComputingSecured Authorized Data Using Hybrid Encryption in Cloud Computing
Secured Authorized Data Using Hybrid Encryption in Cloud ComputingIJERA Editor
 
Experimental Evaluation of Metal Composite Multi Bolt Radial Joint on Laminat...
Experimental Evaluation of Metal Composite Multi Bolt Radial Joint on Laminat...Experimental Evaluation of Metal Composite Multi Bolt Radial Joint on Laminat...
Experimental Evaluation of Metal Composite Multi Bolt Radial Joint on Laminat...IJERA Editor
 
On Simple Ternary 횪-Semiring
On Simple Ternary 횪-SemiringOn Simple Ternary 횪-Semiring
On Simple Ternary 횪-SemiringIJERA Editor
 
A 0.6-V 2-nA CMOS Current Reference Circuit
A 0.6-V 2-nA CMOS Current Reference CircuitA 0.6-V 2-nA CMOS Current Reference Circuit
A 0.6-V 2-nA CMOS Current Reference CircuitIJERA Editor
 
MATLAB Implementation of 128-key length SAFER+ Cipher System
MATLAB Implementation of 128-key length SAFER+ Cipher SystemMATLAB Implementation of 128-key length SAFER+ Cipher System
MATLAB Implementation of 128-key length SAFER+ Cipher SystemIJERA Editor
 
Role of Additives in Mortars: Historic Precedents
Role of Additives in Mortars: Historic PrecedentsRole of Additives in Mortars: Historic Precedents
Role of Additives in Mortars: Historic PrecedentsIJERA Editor
 
Numerical Modelling of Waterlogging Problem in New Urbanized Communities in A...
Numerical Modelling of Waterlogging Problem in New Urbanized Communities in A...Numerical Modelling of Waterlogging Problem in New Urbanized Communities in A...
Numerical Modelling of Waterlogging Problem in New Urbanized Communities in A...IJERA Editor
 
Electrical properties of Ni0.4Mg0.6Fe2O4 ferrites
Electrical properties of Ni0.4Mg0.6Fe2O4 ferritesElectrical properties of Ni0.4Mg0.6Fe2O4 ferrites
Electrical properties of Ni0.4Mg0.6Fe2O4 ferritesIJERA Editor
 
Solvability of a Four Point Nonlinear Boundary Value Problem
Solvability of a Four Point Nonlinear Boundary Value ProblemSolvability of a Four Point Nonlinear Boundary Value Problem
Solvability of a Four Point Nonlinear Boundary Value ProblemIJERA Editor
 
Multi Response Optimization of Friction Stir Lap Welding Process Parameters U...
Multi Response Optimization of Friction Stir Lap Welding Process Parameters U...Multi Response Optimization of Friction Stir Lap Welding Process Parameters U...
Multi Response Optimization of Friction Stir Lap Welding Process Parameters U...IJERA Editor
 
Numerical Investigation of Turbulent Flow over a Rotating Circular Cylinder u...
Numerical Investigation of Turbulent Flow over a Rotating Circular Cylinder u...Numerical Investigation of Turbulent Flow over a Rotating Circular Cylinder u...
Numerical Investigation of Turbulent Flow over a Rotating Circular Cylinder u...IJERA Editor
 

Viewers also liked (20)

Sustainability of Solid Waste Management System in Urban Areas of Pakistan: S...
Sustainability of Solid Waste Management System in Urban Areas of Pakistan: S...Sustainability of Solid Waste Management System in Urban Areas of Pakistan: S...
Sustainability of Solid Waste Management System in Urban Areas of Pakistan: S...
 
Abhijeetsinh v Makwana1 , Dhruv patel2 , Darshan patel3 ,Henil patel4 , Akhil...
Abhijeetsinh v Makwana1 , Dhruv patel2 , Darshan patel3 ,Henil patel4 , Akhil...Abhijeetsinh v Makwana1 , Dhruv patel2 , Darshan patel3 ,Henil patel4 , Akhil...
Abhijeetsinh v Makwana1 , Dhruv patel2 , Darshan patel3 ,Henil patel4 , Akhil...
 
Employee on Boarding Process Automation
Employee on Boarding Process Automation Employee on Boarding Process Automation
Employee on Boarding Process Automation
 
Preparation and characterization of Al doped nano crystalline Ni ferrites
Preparation and characterization of Al doped nano crystalline Ni ferritesPreparation and characterization of Al doped nano crystalline Ni ferrites
Preparation and characterization of Al doped nano crystalline Ni ferrites
 
Improvement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random ForestImprovement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random Forest
 
Technology and Key Strategy of IE4 Permanent Magnet Brushless DC Motor Drive ...
Technology and Key Strategy of IE4 Permanent Magnet Brushless DC Motor Drive ...Technology and Key Strategy of IE4 Permanent Magnet Brushless DC Motor Drive ...
Technology and Key Strategy of IE4 Permanent Magnet Brushless DC Motor Drive ...
 
A Study on the Analysis of the Child Personal Information Processing Status i...
A Study on the Analysis of the Child Personal Information Processing Status i...A Study on the Analysis of the Child Personal Information Processing Status i...
A Study on the Analysis of the Child Personal Information Processing Status i...
 
Synthesis and Characterization of Cadmium Substituted Copper Nano – Ferrites
Synthesis and Characterization of Cadmium Substituted Copper Nano – FerritesSynthesis and Characterization of Cadmium Substituted Copper Nano – Ferrites
Synthesis and Characterization of Cadmium Substituted Copper Nano – Ferrites
 
Post Earthquack Slope Stability Analysis of Rubble Mound Breakwater
Post Earthquack Slope Stability Analysis of Rubble Mound BreakwaterPost Earthquack Slope Stability Analysis of Rubble Mound Breakwater
Post Earthquack Slope Stability Analysis of Rubble Mound Breakwater
 
Secured Authorized Data Using Hybrid Encryption in Cloud Computing
Secured Authorized Data Using Hybrid Encryption in Cloud ComputingSecured Authorized Data Using Hybrid Encryption in Cloud Computing
Secured Authorized Data Using Hybrid Encryption in Cloud Computing
 
Experimental Evaluation of Metal Composite Multi Bolt Radial Joint on Laminat...
Experimental Evaluation of Metal Composite Multi Bolt Radial Joint on Laminat...Experimental Evaluation of Metal Composite Multi Bolt Radial Joint on Laminat...
Experimental Evaluation of Metal Composite Multi Bolt Radial Joint on Laminat...
 
On Simple Ternary 횪-Semiring
On Simple Ternary 횪-SemiringOn Simple Ternary 횪-Semiring
On Simple Ternary 횪-Semiring
 
A 0.6-V 2-nA CMOS Current Reference Circuit
A 0.6-V 2-nA CMOS Current Reference CircuitA 0.6-V 2-nA CMOS Current Reference Circuit
A 0.6-V 2-nA CMOS Current Reference Circuit
 
MATLAB Implementation of 128-key length SAFER+ Cipher System
MATLAB Implementation of 128-key length SAFER+ Cipher SystemMATLAB Implementation of 128-key length SAFER+ Cipher System
MATLAB Implementation of 128-key length SAFER+ Cipher System
 
Role of Additives in Mortars: Historic Precedents
Role of Additives in Mortars: Historic PrecedentsRole of Additives in Mortars: Historic Precedents
Role of Additives in Mortars: Historic Precedents
 
Numerical Modelling of Waterlogging Problem in New Urbanized Communities in A...
Numerical Modelling of Waterlogging Problem in New Urbanized Communities in A...Numerical Modelling of Waterlogging Problem in New Urbanized Communities in A...
Numerical Modelling of Waterlogging Problem in New Urbanized Communities in A...
 
Electrical properties of Ni0.4Mg0.6Fe2O4 ferrites
Electrical properties of Ni0.4Mg0.6Fe2O4 ferritesElectrical properties of Ni0.4Mg0.6Fe2O4 ferrites
Electrical properties of Ni0.4Mg0.6Fe2O4 ferrites
 
Solvability of a Four Point Nonlinear Boundary Value Problem
Solvability of a Four Point Nonlinear Boundary Value ProblemSolvability of a Four Point Nonlinear Boundary Value Problem
Solvability of a Four Point Nonlinear Boundary Value Problem
 
Multi Response Optimization of Friction Stir Lap Welding Process Parameters U...
Multi Response Optimization of Friction Stir Lap Welding Process Parameters U...Multi Response Optimization of Friction Stir Lap Welding Process Parameters U...
Multi Response Optimization of Friction Stir Lap Welding Process Parameters U...
 
Numerical Investigation of Turbulent Flow over a Rotating Circular Cylinder u...
Numerical Investigation of Turbulent Flow over a Rotating Circular Cylinder u...Numerical Investigation of Turbulent Flow over a Rotating Circular Cylinder u...
Numerical Investigation of Turbulent Flow over a Rotating Circular Cylinder u...
 

Similar to A Modular Instant Messaging System

An Investigation of Using Privilege Level System to Restrict Employers for Us...
An Investigation of Using Privilege Level System to Restrict Employers for Us...An Investigation of Using Privilege Level System to Restrict Employers for Us...
An Investigation of Using Privilege Level System to Restrict Employers for Us...CSCJournals
 
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...
IRJET- Implementation of Handling Android Application using SMS(Short Mes...IRJET Journal
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
 
IP Messenger And File Transfer over Ethernet LAN
IP Messenger And File Transfer over Ethernet LANIP Messenger And File Transfer over Ethernet LAN
IP Messenger And File Transfer over Ethernet LANdbpublications
 
Optimization Of Storage Management In Android - S3CA
Optimization Of Storage Management In Android - S3CAOptimization Of Storage Management In Android - S3CA
Optimization Of Storage Management In Android - S3CAVivek Raj Agarwal
 
Java project titles
Java project titlesJava project titles
Java project titlesAshly Liza
 
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy TechniqueIRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy TechniqueIRJET Journal
 
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMIJNSA Journal
 
Android Based Instant Messaging Application Using Firebase
Android Based Instant Messaging Application Using FirebaseAndroid Based Instant Messaging Application Using Firebase
Android Based Instant Messaging Application Using FirebaseIRJET Journal
 
MESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTION
MESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTIONMESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTION
MESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTIONIRJET Journal
 
Smart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingSmart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingMangaiK4
 
Smart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingSmart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingMangaiK4
 
demystifying_the_architectures_of_a_mobile_app_development.pdf
demystifying_the_architectures_of_a_mobile_app_development.pdfdemystifying_the_architectures_of_a_mobile_app_development.pdf
demystifying_the_architectures_of_a_mobile_app_development.pdfsarah david
 
Android Application For Decentralized Family Locator
Android Application For Decentralized Family LocatorAndroid Application For Decentralized Family Locator
Android Application For Decentralized Family LocatorIRJET Journal
 
An Android PGP Manager: Towards Bridging End-User Cryptography to Smart Phones
An Android PGP Manager: Towards Bridging End-User Cryptography to Smart PhonesAn Android PGP Manager: Towards Bridging End-User Cryptography to Smart Phones
An Android PGP Manager: Towards Bridging End-User Cryptography to Smart PhonesCSCJournals
 
5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit sat5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit satIAESIJEECS
 
Protecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsProtecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsIRJET Journal
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerPutra Wanda
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...ijccsa
 

Similar to A Modular Instant Messaging System (20)

An Investigation of Using Privilege Level System to Restrict Employers for Us...
An Investigation of Using Privilege Level System to Restrict Employers for Us...An Investigation of Using Privilege Level System to Restrict Employers for Us...
An Investigation of Using Privilege Level System to Restrict Employers for Us...
 
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
 
A017360104
A017360104A017360104
A017360104
 
IP Messenger And File Transfer over Ethernet LAN
IP Messenger And File Transfer over Ethernet LANIP Messenger And File Transfer over Ethernet LAN
IP Messenger And File Transfer over Ethernet LAN
 
Optimization Of Storage Management In Android - S3CA
Optimization Of Storage Management In Android - S3CAOptimization Of Storage Management In Android - S3CA
Optimization Of Storage Management In Android - S3CA
 
Java project titles
Java project titlesJava project titles
Java project titles
 
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy TechniqueIRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
 
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
 
Android Based Instant Messaging Application Using Firebase
Android Based Instant Messaging Application Using FirebaseAndroid Based Instant Messaging Application Using Firebase
Android Based Instant Messaging Application Using Firebase
 
MESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTION
MESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTIONMESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTION
MESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTION
 
Smart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingSmart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud Computing
 
Smart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingSmart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud Computing
 
demystifying_the_architectures_of_a_mobile_app_development.pdf
demystifying_the_architectures_of_a_mobile_app_development.pdfdemystifying_the_architectures_of_a_mobile_app_development.pdf
demystifying_the_architectures_of_a_mobile_app_development.pdf
 
Android Application For Decentralized Family Locator
Android Application For Decentralized Family LocatorAndroid Application For Decentralized Family Locator
Android Application For Decentralized Family Locator
 
An Android PGP Manager: Towards Bridging End-User Cryptography to Smart Phones
An Android PGP Manager: Towards Bridging End-User Cryptography to Smart PhonesAn Android PGP Manager: Towards Bridging End-User Cryptography to Smart Phones
An Android PGP Manager: Towards Bridging End-User Cryptography to Smart Phones
 
5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit sat5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit sat
 
Protecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsProtecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking Applications
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
 

Recently uploaded

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 

Recently uploaded (20)

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 

A Modular Instant Messaging System

  • 1. Mohamad Raad.et.al. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 7, Issue 2, ( Part -5) February 2017, pp.38-42 www.ijera.com DOI: 10.9790/9622- 0702053842 38 | P a g e A Modular Instant Messaging System Mohamad Raad, Zouhair Bazzal, Majd Ghareeb, Hanan Farhat, Semar Bahmad Department of Computer and Communications Engineering Lebanese International University Beirut, Lebanon ABSTRACT: Instant Messaging (IM) Android applications are a trend nowadays. These applications are categorized according to their features: usability, flexibility, privacy and security. However, IM applications tend to be inflexible in terms of functionality offered. The “Dble-U” system was developed as a solution to this inflexibility, with a focus on privacy as an example use case. “Dble-U” is a configurable modular system consisting of an Android chatting application, a privacy controller application, along with a tracking server application. This modularity allows for groups of individuals to build custom features into their IM application. Keywords: Instant messaging, modular, configurable. I. INTRODUCTION Instant Messaging (IM) applications have been popular since America On Line Instant Messenger (AIM) was first introduced in the mid 1990’s [1]. The popularity and social impact of IM applications, especially Mobile IM (MIM) applications has been very significant [2] [3]. For example, MIM use has been associated with job satisfaction and better job performance [3]. However, it is also known that mobile application selection is influenced by a person’s age group and social setting [2]. IM applications tend to provide a fixed set of features and capabilities per application. That is, each application typically provides the base features (communication) and some additional features that encourage more users to adopt that application as their application of choice for communicating with others. Some applications, such as WhatsApp allow for more focused communication, others like Instagram allow for broader communication and so on. Adopters of each application have no control over the technical features included in them. For example, although many of today’s applications include emoji ediograms, users cannot generally add a unique set of such ediograms for use within a specific group (e.g. an organization may elect to design a unique set of such characters for internal communication). Another example is the use of privacy features. Current IM applications provide privacy features (e.g. encryption) but do not provide the ability for an organization or a group to install their own privacy solutions (e.g. their own encryption algorithms). This paper introduces a modular MIM that allows users the freedom to tailor it by modifying core technical features. The use case focused on in this paper is that of privacy. The data of instant messaging applications are accessible and are frequently mined, sorted and sold. With recent exposures of how little privacy there is whilst communicating over the Internet, the need for a truly private chatting application is clear. During the course of the development of the system described in this paper, WhatsApp introduced the end-to-end encryption feature to its clients on April 5th of 2016. However, there is no direct evidence that no third parties can decrypt the encrypted data. The questions arise primarily because the user does not have direct control over the technical features in the application. The usual Instant Messaging (IM) process’ logical model works as follows: a connection is created, a session is opened, and two types of messages handling exist: receiving and sending. Those messages have destinations, and pass through buffers and get saved in databases. This paper describes an altered model, in which the end user has much more control over the way that messages are protected. The model is instantiated in an Android IM application named “Dble-U”. II. EXISTING SYSTEMS A. Typical features A list of the features in popular smartphone messaging applications, is shown in Figure 1. The security features of these applications are varied. For example, encryption of data exchanged is feature number one [8], whether encryption/decryption is on client sides with or without the provider access to the keys. Yet, some applications (e.g.: Telegram) add to this feature the re-initiation of encryption keys after each hundred messages [9], or after a week of usage. Another security measure is timed-messaging followed by self-destruction of the messages. This is found in BlackBerry messenger [10], Telegram, SnapChat, etc. Another feature is the Whisper (Bleep) in which the message is destroyed just after being RESEARCH ARTICLE OPEN ACCESS
  • 2. Mohamad Raad.et.al. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 7, Issue 2, ( Part -5) February 2017, pp.38-42 www.ijera.com DOI: 10.9790/9622- 0702053842 39 | P a g e read by the recipient [11]. Other applications made it more specific, by introducing a secret chat feature beside the normal conversations. In those secret chats, timestamps are hidden, nicknames are hidden, and messages can’t be forwarded (e.g.: BBM). Moreover, some application support the users by an editing option where they can edit the sent message after being sent and retract the sent one, and sometimes delete the sent messages preventing the recipient from reading them. Some application disable the screen capturing feature too. Figure 2 summarizes the most important privacy features available. Figure 1 Main features of popular IM applications Figure 2 Privacy featured of popular IM applications B. Design of typical IM systems a) Server A sever is typically used for data exchange and saving in backend databases. Examples of such servers are: Microsoft Mobile Information Server (for messenger.) and BlackBerry Enterprise Server (BES). Application Servers [4] are mainly used in 3-tiers web-based applications, where the third tier is the database end, the second tier is the Application Server, and the first one is the GUI at the client end. b) Client There are various ways to implement an IM client. Typically these are native applications with the majority being native Android applications. However, not all of them support the aim of developing a secure chatting system. One popular way is to implement the system with server-to-client push notification using GCM (Google Cloud Messaging) [5], specifically its CSS (Google Cloud Connection Server) via XMPP (Extensible Messaging and Presence Protocol). XMPP has a Java library specific for Instant Messaging named Smack [6]. Yet, this means data will pass through the server, and most likely get stored on Google’s cloud, which contradicts the aims of a privacy focused application. The components of an instant messaging system in general follows a broadly similar logic, with the specific features concatenated later. The main component of the common logic between Android IM applications is the asynchronous processing mechanism [7] that organizes the chatting applications data transfer and communication. This mechanism is also used in the system described in what follows. III. SYSTEM DESIGN A. High level design In “Dble-U”, the privacy/security management of the Instant Messaging process takes place on a separate application. This system (Figure 3) is a combination of three applications, a web-based Privacy Controller, a tracking server and an instant messaging Android application. The high level design of the system can be classified as a 3-tier architecture, divided into a Client tier, Logic/Server tier and Data tier. However, this is used only for the establishment of a connection between clients, then the communication process becomes of 2-tier architecture (client tier & data tier/ Peer to Peer). Figure 3 High level design The existing prototype of Dble-U has three privacy options that an administrator of the Privacy Controller can choose values for: self-destruct, Hide/restore, and encryption level. The encryption level in turn has three options: no encryption, AES- 256 with a fixed key, and RSA with a generated pair of keys. In the existing prototype, users are divided into groups and a user may belong to multiple groups. Each group then has a common security level set through the privacy controller. As for encryption, each type has its own class and methods that are run when switched. If self- destruct option is turned on, the chat will disappear
  • 3. Mohamad Raad.et.al. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 7, Issue 2, ( Part -5) February 2017, pp.38-42 www.ijera.com DOI: 10.9790/9622- 0702053842 40 | P a g e just as the user leaves the chat. Similarly, if hide is turned on, the chat history will not show when the chatting panel is left, but will show when the restore option is chosen instead. B. Design concepts The Privacy Controller was designed as a separate application to guarantee the authenticity of its users. That is, the main concept being applied in this design is that of isolation. An Administrator can log in to the Privacy Controller using his/her credentials only, and can’t configure the privacy settings of any Android application user unless the Android application user is added to the Administrator’s list of Android application users. To add to the autonomy of the Android application user, an Administrator of the Privacy Controller can’t configure any group’s privacy settings unless all its members, who are Android application users, are connected locally to the Privacy Controller. This is applied as well to updating the privacy settings of an already existing group of Android application users. Communication between the clients and the servers relies on HTTP rather than on directly using transport protocols. The reason is simple, wherever the World Wide Web is accessible, HTTP is accessible. There is a cost in terms of efficiency because of this choice, but the increased reliability was judged to be worth the cost. Finally, the tracking server is only used as a directory to identify the network location of clients that wish to communicate with one another and is not involved in the communication chain between clients. This approach was chosen to enable easy connectivity between the clients, although it does create a weakness in the system in that if the tracker is somehow rendered inaccessible then the clients may not be able to communicate. a. State diagrams The following state diagrams illustrate the operation of the components of the Dble-U system and the transitions that take place between them. Figure 4 State diagram of the privacy controller component Figure 5 State diagram of the tracker component
  • 4. Mohamad Raad.et.al. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 7, Issue 2, ( Part -5) February 2017, pp.38-42 www.ijera.com DOI: 10.9790/9622- 0702053842 41 | P a g e Figure 6 State diagram of the Android application IV. IMPLEMENTATION AND TESTING All three components of the chatting system described above have been implemented and tested. The testing process took place through a local network as a first step. Also, during the initial testing, the IP addresses had to be fixed to make the testing simpler, rather than changing it every time the Tracker and the Privacy Controller were disconnected from the local network. The testing of the developed system focused on exercising all 3 components. All the states of the user Android application were tested. That is, users could communicate as part of multiple groups with ease, as expected, when they belonged to that group. The privacy controller allowed each group to have different privacy settings and these were observed to perform as expected during testing. That is, members of the groups would communicate with one another in an encrypted manner or in the clear. The messages were captured and analysed to substantiate whether or not the required level of encryption was taking place. The tracker was observed to be able to keep the clients aware of the IP addresses of the other members of the groups to which they belong. The speed with which the tracker updated its database depended on the frequency of the updates received from the clients. The clients send an update address message to the tracker every time a change in the IP address is detected. Other clients are in turn informed by the tracker of the change in address. The communication between the clients and the tracker are all HTTP based messages – allowing for access on almost all networks since this is the protocol on which the WWW is built. V. CONCLUSION As can be seen from the steps taken by WhatsApp, to introduce end-to-end encryption to its clients, privacy is a real user concern in IM. This concern will continue to grow over time as these applications continue to play a significant role in the way that people around the world interact with one another. The solution described in this paper introduces a mechanism by which the user is given control over how the user messages are protected. This mechanism requires that the users know each other or are at least connected through a common point of contact. Although this means that users have a lower level of freedom when it comes to creating connections with other users, it is a necessary constraint for the increased level of privacy that it allows. Anonymity is valuable in Cyberspace, but in designing this system it has been assumed that the anonymity that users typically want is from prying third parties rather than from the people they intend to communicate with. By giving users the ability to apply multiple levels of security for different groups within which they communicate, the user is being forced to make a conscious decision regarding the cost of increased privacy and whether such a cost is worthwhile. That is valuable since it allows users to optimize their usage of their device’s resources. The described system is an instantiation of the modular design concept described in this paper, in which adopters of a system can have complete control over the mail technical features of the system. This may introduce some inconvenience to the adopter of a system (given that some knowhow will have to be developed regarding how to take advantage of this additional flexibility), but it may also be used in the production of different “flavors” of the same application. REFERENCES [1] G. E. Jacobs, "Instant Messaging and Texting," in Handbook of Research on the Societal Impact of Digital Media, IGI Global, 2016, pp. 493-527.
  • 5. Mohamad Raad.et.al. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 7, Issue 2, ( Part -5) February 2017, pp.38-42 www.ijera.com DOI: 10.9790/9622- 0702053842 42 | P a g e [2] R. M. Frey, R. Xu and A. Ilic, "Mobile app adoption in different life stages: An empirical analysis," Pervasive and Mobile Computing, pp. 1574-1192, 2017. [3] V. C. Sheer and R. E. Rice, "Mobile instant messaging use and social capital: Direct and indirect associations with employee outcomes," Information & Management, vol. 54, no. 1, pp. 90-102, 2017. [4] A. Srivastava and A. Bhargava, "Understanding application servers," January 2003. [Online]. Available: http://hosteddocs.ittoolbox.com/AS030504.pdf . [Accessed 24 February 2017]. [5] "Cloud messaging | Google developers," Google, [Online]. Available: https://developers.google.com/cloud- messaging/. [Accessed 24 February 2017]. [6] "Ignite Realtime: Smack API," [Online]. Available: https://www.igniterealtime.org/projects/smack/ . [Accessed 24 February 2017]. [7] "AsyncTask | Android developers," [Online]. Available: https://developer.android.com/reference/androi d/os/AsyncTask.html. [Accessed 24 February 2017]. [8] J. Z. Florez, C. R. Logreira, M. Munoz and F. J. Vargas, "Architecture of instant messaging systems for secure data transmision," in Security Technology (ICCST), 2016 IEEE International Carnahan Conference on, 2016. [9] "Secret chats, end-to-end encryption," Telegram, [Online]. Available: https://core.telegram.org/api/end-to-end. [Accessed 24 February 2017]. [10] "Get the New BBM for Privacy, Control and Much, Much More | Inside BlackBerry," 31 October 2014. [Online]. Available: Get the New BBM for Privacy, Control and Much, Much More | Inside BlackBerry. [Accessed 24 February 2017]. [11] "Twitch Introduces Whisper Feature," 11 June 2015. [Online]. Available: http://www.techtimes.com/articles/59663/2015 0611/twitch-introduces-whisper-feature-heres- how-to-use-the-private-messaging-system.htm. [Accessed 24 February 2017].