JURNAL TECH-E - VOL. 1 NO. Versi Online tersedia di :nhttp://jurnal. id/index. php/te JURNAL TECH-E | 2581-1916 (Onlin. | 2598-7585 (Ceta. | Artikel Monitoring Computer Activities with Cloud to Device Messaging (C2DM) Suwitno1. Rino2. Universitas Buddhi Dharma. Manajemen Informatika. Banten. Indonesia Universitas Buddhi Dharma. Sistem Informasi. Banten. Indonesia SUBMISSION TRACK Received : February 1, 2018 Final Revision: February 6, 2018 Available Online: February 27, 2018 KEY WORD Push Notification. Device Monitoring. Cloud to Device Messaging (C2DM) CORRESPONDENCE Telepon: 081311190089 E-mail: suwitno@ubd. A B S T R A C T In a particular division, a supervisor needs to perform monitoring of the activities carried out at his employers to improve the performance of the work of his subordinates. Leaders are often not in place to monitor the activities of his subordinates in carrying out their responsibilities. One solution to overcome these problems is to supervise the use of their computer by means of push notification. By utilizing the technology of Cloud to Device Messaging (C2DM), supervisor can monitor computer activities of his employers Given this research, is expected to help the supervisor in monitoring his employers despite not being in This may indirectly improve performance in a division. For further research can be developed monitoring in a real INTRODUCTION In a division both in education and offices, activity on each employee's computer needs to be considered by the division leaders, because if one of the employees do not carry out their responsibilities properly, then it will slow down the process of responsibilities assigned by the leadership so that it can degrade the performance of the good work of the employee or related divisions. The basic task of a leader is to monitor the performance of the employers held with the aim of knowing the development of the division With human mobility is increasing fast, the leader must be able to monitor the situation regularly, wherever and whenever he wants. Unfortunately, a leader is not always in place to carry out their duties. ItAos difficult for the leaders to monitor their A solution that can be done to overcome these problems is need an application that can be monitoring the activities of their employers through their Several studies have been done related to monitoring activities. From these studies, application monitoring can be a solution to overcome the existing problems. This study monitor activities conducted via computer by push notification. So that the leaders can view the activity that is done, then it will use the cloud to device messaging. Android Cloud to Device Messaging (C2DM) is a service that helps developers sends data from servers to their applications on android The service provides a simple, lightweight mechanism that servers can use SUWITNO / JURNAL TECH-E - VOL. NO. to tell mobile applications to contact the server directly, to fetch updated application or user data. Given this research is expected to facilitate the leaders for monitoring computer activities on each employee anywhere and METHOD Cloud to Device Messaging (C2DM) Cloud to Device Messaging (C2DM) was made available from Android 3. 0, where the goal was to make it easier for mobile applications to sync data with servers. The technology is used in several standard Google applications including Gmail. Contacts and Calendar. When messages are received on the Android client, the system will wake up the application via an Intent broad-cast, and pass the message data . The message limit is set to 1024 bytes and developers are encouraged to send short messages, essentially notifying the mobile application that updated information can be retrieved from the server. C2DM is a free service, and the maximum number of messages that can be sent is approximately 200,000 per day, however this can be in-creased if there is a need for more Before you can use C2DM application must be registered in advance on Google's servers using the name of the application package includes and Google email is still active to be verified by the Google. While the mechanism of sending messages through C2DM, first android app connect to C2DM Fontend using the existing email verified to get registration id, each device will get the registration id that is different, but the registration id impermanent therefore the system will renew the registration id Furthermore android application must send the registration id stored on a web server for the purpose is as assumptions during transmission of data to avoid errors at the receiver. Sending a message from the web server to server C2DM starting from a web server login to a Google server through Client Login Service and if successful will get the auth token while unique, auth token and registration id saved is included at the time of sending a message from the web server to C2DM Frontend. Demand is already authenticated will then be incorporated into C2DM Message Queue that will be forwarded to mobile applications using TCP / IP The concept is to build three applications that support the server side and client side. Applications that run on the server side in the form of a web server and a web service that hold the data log or history and liaison between the client-side applications. While the application consists of a client-side application that is installed keylogger on the computer that will be in reconnaissance activities and mobile applications used for android smartphone as a media receiver log The following figure 1 illustrates the push notification system architecture Cloud to Device Messaging (C2DM) Figure 1: Architecture of Cloud to Device Messaging (C2DM) SUWITNO / JURNAL TECH-E - VOL. NO. The components are: C Limited message size C Device model and APIs to manage devices with applications and users. Keylogger Keylogger is a program designed specifically to record all keyboard activity and save the results into a log or a text note. Keylogger type used in this system is a software keylogger application form that will be installed on a computer that is capable of recording all the input from the keyboard. To be able to record all keyboard activity, keylogger should be run after the operating system is running and get in on the desktop Because keylogger is software that is watching, the keylogger will run in the background process and is not known by the user who uses the computer. C Application model to provide push settings for device types such as iOS and Android. C Notification model to capture notification C Optional job to take scheduled notification C Push connector that interacts with device registration records and push providers APNS for iOS apps and GCM for Android Push model to provide high-level APIs for device-independent push notifications. Advantages and Disadvantages of C2DM Advantages: C Using C2DM developers can develop more productive applications C C2DM is connected to cloud so developers can get benefits of cloud computing in their II. RESULT In order to perform the features of this system all devices must be connected to the internet especially keylogger application, as based on a predetermined interval keylogger will automatically send a log or history to the web server to be stored. Disadvantages: C Internet connectivity is required Figure 2: System Overview SUWITNO / JURNAL TECH-E - VOL. NO. Keylogger Implementation Figure 3. Keylogger Diagram This process occurs done when the user press any button on keyboard, this incident arrested using HookKeyboard function() which is a Windows API from windows operating system, therefore, this process requires a library user32. dll already provided 'create the hook Public Sub HookKeyboard() callback = New KeyboardHookDelegate(AddressOf KeyboardCallbac. KeyboardHandle = SetWindowsHookEx. ,callback. GetCurrentProcess. MainModule. Bas eAddress, . End Sub Further functions HookKeyboard () will call each address on the keyboard previously shaped character ASCII Hex to convert into ASCII characters, because ASCII Hex number and difficult to read. Furthermore, the HookKeyboard () will be classified based on the user account name, date, time, title applications, namely titles contained in each application running and logs of input keyboard that has been shaped the character The process of recording keyboard activity can be stopped by calling a function Unhookkeyboard (). Public Sub UnhookKeyboard() If (Hooked()) Then UnhookWindowsHookEx(Keyboard Handl. <> 0 Then KeyboardHandle = 0 End If End If End Sub Cloud to Device Messaging (C2DM) Implementation SUWITNO / JURNAL TECH-E - VOL. NO. Figure 4. C2DM Diagram i. DISCUSSION The process of recording activity keyboard starts when there is an interaction of users who use a computer or referred to as user activity, user activity can include the activities of the occurs when the computer keyboard is pressed and form a screen capture of the screen the currently active application result in the form of log data, the process is carried out automatically by the application. Furthermore, the application will add user information, data taken from the user account each computer. Next the data will be temporarily stored log data the local database before being sent to web server. The next process if local database is found, the data log will be stored temporarily on the table keystroke, but if the local database is not found then the log data is not will Figure 5. Record Activities Keyboard Activity Diagram SUWITNO / JURNAL TECH-E - VOL. NO. The process starts from the log displays from a web server that has receive a new log of keylogger application will tell C2DM server that there is a new log must be notified on the android phone, android phone that receives the message will display the new log notifications on parents, the new log information is not overall log but only log header form dated and computer users. Leaders who wish to see more detailed log information can select the preview log on mobile applications, further requests will be sent to the web server throught the internet, the web server will process demand and generate log information detail and send it back to the phone. For more details can seen in Figure 6. Figure 6. Activity Diagram In addition to information such as message, the system uses the protocol http: // notification, the system also has the function via the Internet to the requesting and receive search so that users can log data from the web server in XML and JSON search the log by date, name user and time. Here are the results log that appears but the process The log search is no longer use as the sender on the phone. C2DM Figure 7. The results of the log on phone SUWITNO / JURNAL TECH-E - VOL. NO. IV. CONCLUSION Based on the implementation and evaluation, can concluded: With the push service message Android C2DM regulatory process activities of computer use can be done. With this system, the role of monitoring activity of computer not to be missed. Integration process of keylogger, web server and mobile android successfully through internet communications network. The conclusion that can be made after seeing a picture and description in previous chapters is to enable leaders in an organization such as a company to monitor the computer activity of his men anywhere and anytime. Suggestion for further research namely that this monitoring activity can be performed in real SUWITNO / JURNAL TECH-E - VOL. NO. REFERENCES