Designing a Mobile Chat Application Based on Android Platform

Designing a Mobile Chat Application Based on Android Platform

Sorinel Căpuşneanu, Melinda Timea Fülöp, Dan Ioan Topor, Nicoleta Magdalena Iacob, Alina Georgiana Solomon, Ana Maria Ifrim
Copyright: © 2021 |Pages: 21
DOI: 10.4018/IJIDE.2021100104
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Securing confidential information on mobile platforms has been, is, and will be a topical issue for specialists. In order to eliminate these vulnerabilities, specialized companies have made some patches, but these do not constitute a real guarantee that the same or any other applications will not be attacked and exploited without the users' will. Mitigating these attacks on smartphones can be achieved by securing mobile phones from both users and mobile providers. This article proposes the development of a chat application on the Android platform as a solution to ensure the security of digital data that is transferred through the available communication platforms. When designing this mobile application, the sudden increase in the number of users was taken into account so that the application is stable and creates a pleasant experience for them.
Article Preview
Top

Introduction

Nowadays the development of mobile devices is inevitable, so the chat technology migrates from the PC platform to this new technology (Simmonds, 2017; Weber, 2010; Jin & Chung, 2019). Information is used in all spheres of its existence with significant economic and social impacts (Fernández, 2019). After rapid growth of the Internet and Mobile networks, today we see the development of smaller, faster, high-performance mobile devices that can support a wide range of features that, not long ago, were the attributes of personal computers (Bucerzan & Raţiu, 2015).

In recent years, the development of mobile communications and mobile terminals, notably the launch of the Android smartphone platform, has injected new vitality into the mobile space (Bucerzan, Rațiu & Manolescu, 2013; Purkayastha & Singhla, 2013; Biørn-Hansen, Grønli & Ghinea, 2019). Android’s real history began when Google purchased Android Inc. in 2005 (Google, 2018). However, development did not start immediately. The real progress on the Android platform began in 2007 when Open Handsets Alliance announced the Android platform as the Open Source platform and later produced Android SDK 1.0.

In the same year, G1 was produced by HTC and was sold to the T-Mobile operator. In the next two years, four versions of Android came out. In 2010, there were at least 60 devices running Android, and it became the second best-distributed mobile platform after Blackberry (Mahajan, Verma, Erale, Bondea & Arya, 2014; Frigerio et al.,2018; Oide, Abe & Suganuma, 2018). Smartphones contain the right features and rely on cloud services. In addition to managing mobility, this creates another dimension of cloud threats (Oide, Abe & Suganuma, 2018; Archana, Mythili & Nithya, 2015; Elmezayen & El-Rabbany, 2019; Friedman & Hoffman, 2008). Runtime Android is the authoring engine. It includes the Dalvik virtual machine and android base libraries (Purkayastha & Singhla, 2013). Even worse, developers are developing apps in a hurry in order to meet preset deadlines (Fernández, 2019). Some authors (Fernández, 2019; Friedman & Hoffman, 2008; Pauget &Dammak, 2018) observed that this leaves vulnerability in the algorithm that can be exploited by the attacker.

From the data of the specialists it appears that there is a malware developed for smartphones that has the ability to steal the personal data of the users, causing significant damage in terms of user privacy and security (Jin & Chung, 2019; Elmezayen & El-Rabbany, 2019; Friedman & Hoffman, 2008; Pauget &Dammak, 2018). Installing applications from sources that are unreliable or unreliable is the main cause of data leakage, providing sensitive information to its generator (Ashraf, Hur & Park, 2019). The vulnerabilities created by the user give the opponents certain exploitation opportunities and target attacks (Everett, 2016; Ray, 2018; Sicari, Rizzardi, Grieco & Coen-Porisini, 2015). The required security features that Smartphones have for securing applications are not quite effective, as evidenced by XSS (cross script side) attacks and targeting the Android Platform at 44% (Ray, 2018). It has been observed that in most cases these applications are provided by reputable companies. According to specialist studies, this system can be expanded by sending alerts to parents' devices (Fernández, 2019; Ray, 2018; Pratim Ray, 2016).

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 14: 1 Issue (2023)
Volume 13: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing