Abstract
Self-service technologies (SSTs) are increasingly becoming popular with the advancement of mobile technologies, cheaper Internet prices and the growing popularity of mobile devices in daily life. Popular hotels/resorts tend to adopt SSTs to enhance their service quality standards, consumer experience, loyalty and most importantly overall customer satisfaction. The long queue in hotels and resorts has been the major problem for causing dissatisfaction for customers, especially for minors and senior citizen. Customer satisfaction has been the main criteria for the business to grow. With this goal, we propose a cloud-based secure access control for hotel and resort rooms using the QR code technique. To gain access to the hotel room, the customer needs just to scan the QR code sent from the secure cloud. The user details are encrypted using MD5 algorithm and stored as checksum in database to avoid various attacks such as phishing, malware, code injections and others possible in Web services. When the user scans the QR and decodes, it compares the checksum stored in database. In case of any discrepancies, further process is stopped and hence makes our approach more secure from other techniques. Also, cloud provides additional security for the Web services.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kaushik AK, Agrawal AK, Rahman Z (2015) Tourist behaviour towards self-service hotel technology adoption: trust and subjective norm as key antecedents. Tour Manag Perspect 16:278–289. ISSN 2211-9736
Oh H, Jeong M, Baloglu S (2013) Tourists adoption of self-service technologies at resort hotels. J Bus Res 66(6):692–699
Iqbal MS, UI Hassan M, Habibah U (2018) Impact of self-service technology (SST) service quality on customer loyalty and behavioral intention: the mediating role of customer satisfaction. Cogent Bus Manage 5
Alshattnawi S (2012) Effective use of QR codes in religious tourism. Int Conf Adv Comput Sci Appl Technol (ACSAT), pp 497–451
Bechini A, Marcelloni F, Segatori (2013) A mobile application leveraging QR-codes to support efficient urban parking. In: 2013 sustainable internet and ICT for sustainability (SustainIT), Palermo, pp 1–3
Charoensiriwath C, Surasvadi N, Pongnumkul S, Pholprasit T (2015) Applying QR code and mobile application to improve service process in Thai hospital. In: 2015 12th international joint conference on computer science and software engineering (JCSSE), Songkhla, pp 114–119
Ishak I, Sidi F, Affendey LS, Sani NFM, Hamzah AS, Bawon P (2013) Mobile plant tagging system for urban forest eco-tourism using QR code. In: 2013 international conference on advanced computer science applications and technologies, Kuching, pp 37–41
Mohamed K, Sidi F, Jabar MA, Ishak I (2013) A novel watermarking technique in data transmission between QR codes and database. In: 2013 IEEE conference on open systems (ICOS), Kuching, pp 95–99
Vidas T, Owusu E, Wang S, Zeng C, Cranor LF, Christin N (2013) QRishing: the susceptibility of smartphone users to QR code phishing attacks. In: Adams AA, Brenner M, Smith M (eds) Financial cryptography and data security. FC 2013. Lecture Notes in Computer Science, vol 7862. Springer, Berlin, Heidelberg
Kieseberg P Schrittwieser S, Leithner M, Mulazzani M, Weippl E, Munroe L, Sinha M (2012) Malicious pixels using QR codes as attack vector. In: Trustworthy ubiquitous computing. Atlantis Press, pp 21–38
Chow Y, Susilo W, Yang G, Phillips JG, Pranata I, Barmawi AM (2016) Exploiting the error correction mechanism in QR codes for secret sharing. In: Liu JK, Steinfeld R (eds) ACISP 2016. Lecture Notes in Computer Science, vol 9722. Springer, pp 1–17
Khandal D, Somwanshi D (2015) A novel cost effective access control and auto filling form system using QR code. In: 2015 international conference on advances in computing, communications and informatics (ICACCI), Kochi, pp 1–5
Fu X, Feng K, Wang C. Zhang J (2015) Improving fingerprint based access control system using quick response code. In: 2015 IEEE international conference on computational intelligence and virtual environments for measurement systems and applications (CIVEMSA), Shenzhen, pp 1–5
Haron NZ, Mohter MB, Yunus SAMJ, Isa MSM, Rahim YA (2013) SAFe: a secure and fast auto filling form system. In: IEEE symposium on industrial electronics and applications (ISiEA), pp 206–209, 22–25 Sept 2013
Shafin MK et al (2015) Development of an RFID based access control system in the context of Bangladesh. In: 2015 international conference on innovations in information, embedded and communication systems (ICIIECS), Coimbatore, pp 1–5
Mathew M, Divya RS (2017) Super secure door lock system for critical zones. In: 2017 international conference on networks & advances in computational technologies (NetACT), Thiruvanthapuram, pp 242–245
Cho JS, Yeo S-S, Kim SK (2011) Securing against brute-force attack: a hash-based RFID mutual authentication protocol using a secret value. Comput Commun 34(3):391–397
Song B, Mitchell CJ (2008) RFID authentication protocol for low-cost tags. In: Proceedings of the first ACM conference on Wireless network security. ACM, pp 140–147
Yong-Xia Z, Ge Z (2010) MD5 research. In: 2010 second international conference on multimedia and information technology, Kaifeng, pp 271–273. https://doi.org/10.1109/mmit.2010.186
Wang Z, Cao L (2013) Implementation and comparison of two hash algorithms. In: 2013 international conference on computational and information sciences, Shiyang, pp 721–725
Ning LW, Siah YK, Khalid M, Yusof R (2000) Design of an automated data entry system for hand-filled fonns. In: Proceedings of TENCON 2000, vol l, pp 162–166
Tsudik G (2006) YA-TRAP: yet another trivial RFID authentication protocol. In: Fourth annual IEEE international conference on pervasive computing and communications workshops (PERCOMW’06), Pisa, pp 4, 643
Kassem A, Murr SE, Jamous G, Saad E, Geagea M (2016) A smart lock system using Wi-Fi security. In: 2016 3rd international conference on advances in computational tools for engineering applications (ACTEA), Beirut, pp 222–225
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Anitha, M., Babel, A., Kumar, A., Rauniyar, A., Zahid, K. (2019). Cloud-Based Secured QR Code for Self-service Access Control System at Resort and Hotels. In: Peng, SL., Dey, N., Bundele, M. (eds) Computing and Network Sustainability. Lecture Notes in Networks and Systems, vol 75. Springer, Singapore. https://doi.org/10.1007/978-981-13-7150-9_41
Download citation
DOI: https://doi.org/10.1007/978-981-13-7150-9_41
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-7149-3
Online ISBN: 978-981-13-7150-9
eBook Packages: EngineeringEngineering (R0)