A Cloud Based Android System for Reporting Crimes Against Child Sexual Abuse

: A cloud based android system for reporting crimes against child sexual abuse is a real time cloud-based system to be used by people to report crimes concerning sexual abuse of children to relevant organizations. Usually, when crimes of this kind happen, the victims or witnesses go to the police, or call related organizations to report crimes. The crimes are then processed through a paper-based system where the cases are recorded and them handled accordingly. This approach is usually slow and in sometimes reads to dissatisfactions to the victims and relatives. With the wide spread of android phones, android system to report the crimes would make the crime management easier and faster as the crimes will be reported in real time using an android phone. Management of the cases will also be fast as the crimes will be directly reported to a cloud database which will make crime tracing and management faster. A global positioning system which is already implemented in all android phones will be used to track the location of the person reporting the crime. Firebase real time database will be used to store the data reported. All the users of the system will be authenticated to make sure they are not eligible to use the application and for privacy of user information. Thus, a cloud based android system will be beneficial to both the public and the acting organizations and there by improve measures to reduce sex crimes against children.


Introduction
In the recent years, there have been a rampant increase of abuse cases in terms of sex as far as minors are concerned. Child sexual abuse, mostly of concern, Child molestation, is a form of child abuse in which an adult or older adolescent uses a child for sexual stimulation [1].
Types of child sexual abuse include engaging in sexual activities with a child, indecent exposure (of the genitals, female nipples, etc.), child grooming, and child sexual exploitation, including using a child to produce child pornography [1,2]. The legal definition of child generally refers to a minor, otherwise known as a person younger than the age of majority [3] Different solutions have been brought forward by different concerned organisations and people in order to fight against these issues. This project aims to propose a better solution in trying to combat child sexual abuse issues using an android application. Here, a cloud based android system will be developed where the victims or even anyone surrounding the crime incedent place or who has knowledge of the developed situation will be able to report the case to the concerned organization which deals with issues of child sexual abuse cases directly through an android phone. Two applications will be developed, one for the reporting side while one will be for the concerned organization side for them to retrieve the reported data. The two applications will be connected through a cloud database and hence data will be reported and be retrieved in real time which will prompt the organization to act in time.

Related Work
In this survey systematic literature review process is issued. First of all, we tried to search for recent relevant papers, presentations, research report and policy documents that were broadly related to crime reporting and child sexual abuse as whole. For this project, 8 papers were taken into account, in additional to the base paper or the whole project.

No
Paper Name and Techniques. In this paper, they investigated the definition of privacy, privacy abuse behavior, and the privacy abuse in Android systems, which may be very useful for identifying the malicious apps from 'normal' apps. They also investigated the injection technology, service binding, and service proxy in Android system, which are widely used by normal apps to steal privacy information.
A real-time monitoring system (app) is developed on Android system to monitor potential privacy data abuse. The app is able to monitor permission requests for all installed apps as well as analyze the potential privacy abuse behaviors.

2.it encourages fast and formal communication Problem Statement
In as far as many applications have been developed to help in the process of fighting crimes as perceived in the literature review in the table, there is in no application that has been directly developed to deal with crimes concerning child sexual abuse. Child sexual abuse cases are increasing each and every day in the world and hence combating this through technology is now a necessity.

Objectives and Contribution
The main objective of this project is to develop a user-friendly system for reporting crimes specifically concerning child sexual abuse. The other objectives include: ➢ Make management of child sexual abuse crimes easy and fast ➢ Fast response to child sexual abuse crimes ➢ Fight child sexual abuse The system will be able to help in the fight against child sexual abuse which is on the rampant now in the world.

Methodology
In order to achieve the outlined objectives, the project will be deployed through the following detailed models will be used.
1. The application will contain two main modules, one for the Admin and one for the users to report the crimes. 2. Registration for users: every user whether admin or general user has to be registered in the system to allow him/ her to access the application. A security code will be used to allow the user to register as an admin and the codes will be uploaded in the admin database and stored by the organization. Using firebase authentication each user has to be registered. 3. Storage service: since the crimes will be uploaded and the user information will also be uploaded to a cloud database, Firebase/ Microsoft azure storage service will be employed to offer storage for the crimes and the whole database of users. 4. Location: A Global Positioning System (GPS) module will also be used in order to keep track of where a user is reporting the crime from.
The Objective is to develop a user-friendly crime reporting application the general public will be able to report crimes concerning sexual abuse against children. Here anyone can register and report crimes to concerned organizations in real time and the admins at the organizations will access the reported crime and act on them accordingly. A centralized real time cloud database will be used to serve the whole system {user application and Admin application} for data storage and processing. User's data can be maintained in a confidential way for validity and integrity.
The system design includes multiple diagrams such as the architecture diagram which emphasizes on the overall design of the system operations that describes the structure, behavior and more views and analysis of performance. In logical design the input and output of data in the system pertains an abstract representation of how data flows. It includes entity-relationship diagrams (E-R diagrams). While physical design dwells much on how input and output are explained relating to the data is feed to the system for verifications/authentication, and how it is processed and displayed. Divided into many parts systems design gives a glimpse of how the project will look like to the user's point of view. In this system, we use system architecture just to show how the system coordinates.

System Architecture
System architecture is the process of defining the components, modules, interfaces and data for a system to satisfy specified requirements. The following is the architecture for the system. Model-view-controller is a software design pattern commonly used for developing user interfaces that divides the related program logic into three interconnected elements. This is done to separate internal representations of information from the way's information is presented to and accepted from the user [4].
In taking user details, crime details, we have used the MVC technique in which a special java class {Helper class} implemented to act as the model to allow processing of details for many users. The XML files are used as the VIEW to display the details to the user interface. Firebase real time database is used for the backend processing and storing of data for the whole application [4][5][6][7][8].
The diagram below depicts an MVC model Multi Factor Authentication Two-factor authentication (2FA) is a way to add additional security to your account. The first "factor" is your usual password that is standard for any account. The second "factor" is a verification code retrieved from an app on a mobile device or computer. 2FA is conceptually similar to a security token device that banks in some countries require for online banking. Other names for 2FA systems include OTP (one-time password) and TOTP (Time-based One-time Password algorithm).

Results and Output
This section presents the findings and results regarding the study. The pictures below depict the output of the system images after it is successfully tested and implemented.   Conclusion Based on the results we have obtained from the testing of the application; we have managed to increase the speed of reporting and management of crimes against child sexual abuse. However, in the future we still need to implement the system so that it should not need internet connections whenever a person tries to report crimes as it is the only problem which is there so far.