Skip to main content

Cloud-Based Secured QR Code for Self-service Access Control System at Resort and Hotels

  • Conference paper
  • First Online:
Computing and Network Sustainability

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 75))

Abstract

Self-service technologies (SSTs) are increasingly becoming popular with the advancement of mobile technologies, cheaper Internet prices and the growing popularity of mobile devices in daily life. Popular hotels/resorts tend to adopt SSTs to enhance their service quality standards, consumer experience, loyalty and most importantly overall customer satisfaction. The long queue in hotels and resorts has been the major problem for causing dissatisfaction for customers, especially for minors and senior citizen. Customer satisfaction has been the main criteria for the business to grow. With this goal, we propose a cloud-based secure access control for hotel and resort rooms using the QR code technique. To gain access to the hotel room, the customer needs just to scan the QR code sent from the secure cloud. The user details are encrypted using MD5 algorithm and stored as checksum in database to avoid various attacks such as phishing, malware, code injections and others possible in Web services. When the user scans the QR and decodes, it compares the checksum stored in database. In case of any discrepancies, further process is stopped and hence makes our approach more secure from other techniques. Also, cloud provides additional security for the Web services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kaushik AK, Agrawal AK, Rahman Z (2015) Tourist behaviour towards self-service hotel technology adoption: trust and subjective norm as key antecedents. Tour Manag Perspect 16:278–289. ISSN 2211-9736

    Article  Google Scholar 

  2. Oh H, Jeong M, Baloglu S (2013) Tourists adoption of self-service technologies at resort hotels. J Bus Res 66(6):692–699

    Article  Google Scholar 

  3. Iqbal MS, UI Hassan M, Habibah U (2018) Impact of self-service technology (SST) service quality on customer loyalty and behavioral intention: the mediating role of customer satisfaction. Cogent Bus Manage 5

    Google Scholar 

  4. Alshattnawi S (2012) Effective use of QR codes in religious tourism. Int Conf Adv Comput Sci Appl Technol (ACSAT), pp 497–451

    Google Scholar 

  5. Bechini A, Marcelloni F, Segatori (2013) A mobile application leveraging QR-codes to support efficient urban parking. In: 2013 sustainable internet and ICT for sustainability (SustainIT), Palermo, pp 1–3

    Google Scholar 

  6. Charoensiriwath C, Surasvadi N, Pongnumkul S, Pholprasit T (2015) Applying QR code and mobile application to improve service process in Thai hospital. In: 2015 12th international joint conference on computer science and software engineering (JCSSE), Songkhla, pp 114–119

    Google Scholar 

  7. Ishak I, Sidi F, Affendey LS, Sani NFM, Hamzah AS, Bawon P (2013) Mobile plant tagging system for urban forest eco-tourism using QR code. In: 2013 international conference on advanced computer science applications and technologies, Kuching, pp 37–41

    Google Scholar 

  8. Mohamed K, Sidi F, Jabar MA, Ishak I (2013) A novel watermarking technique in data transmission between QR codes and database. In: 2013 IEEE conference on open systems (ICOS), Kuching, pp 95–99

    Google Scholar 

  9. Vidas T, Owusu E, Wang S, Zeng C, Cranor LF, Christin N (2013) QRishing: the susceptibility of smartphone users to QR code phishing attacks. In: Adams AA, Brenner M, Smith M (eds) Financial cryptography and data security. FC 2013. Lecture Notes in Computer Science, vol 7862. Springer, Berlin, Heidelberg

    Chapter  Google Scholar 

  10. Kieseberg P Schrittwieser S, Leithner M, Mulazzani M, Weippl E, Munroe L, Sinha M (2012) Malicious pixels using QR codes as attack vector. In: Trustworthy ubiquitous computing. Atlantis Press, pp 21–38

    Google Scholar 

  11. https://www.owasp.org/index.php/Top_10–2017_A1-Injection

  12. Chow Y, Susilo W, Yang G, Phillips JG, Pranata I, Barmawi AM (2016) Exploiting the error correction mechanism in QR codes for secret sharing. In: Liu JK, Steinfeld R (eds) ACISP 2016. Lecture Notes in Computer Science, vol 9722. Springer, pp 1–17

    Google Scholar 

  13. Khandal D, Somwanshi D (2015) A novel cost effective access control and auto filling form system using QR code. In: 2015 international conference on advances in computing, communications and informatics (ICACCI), Kochi, pp 1–5

    Google Scholar 

  14. Fu X, Feng K, Wang C. Zhang J (2015) Improving fingerprint based access control system using quick response code. In: 2015 IEEE international conference on computational intelligence and virtual environments for measurement systems and applications (CIVEMSA), Shenzhen, pp 1–5

    Google Scholar 

  15. Haron NZ, Mohter MB, Yunus SAMJ, Isa MSM, Rahim YA (2013) SAFe: a secure and fast auto filling form system. In: IEEE symposium on industrial electronics and applications (ISiEA), pp 206–209, 22–25 Sept 2013

    Google Scholar 

  16. Shafin MK et al (2015) Development of an RFID based access control system in the context of Bangladesh. In: 2015 international conference on innovations in information, embedded and communication systems (ICIIECS), Coimbatore, pp 1–5

    Google Scholar 

  17. Mathew M, Divya RS (2017) Super secure door lock system for critical zones. In: 2017 international conference on networks & advances in computational technologies (NetACT), Thiruvanthapuram, pp 242–245

    Google Scholar 

  18. Cho JS, Yeo S-S, Kim SK (2011) Securing against brute-force attack: a hash-based RFID mutual authentication protocol using a secret value. Comput Commun 34(3):391–397

    Article  Google Scholar 

  19. Song B, Mitchell CJ (2008) RFID authentication protocol for low-cost tags. In: Proceedings of the first ACM conference on Wireless network security. ACM, pp 140–147

    Google Scholar 

  20. Yong-Xia Z, Ge Z (2010) MD5 research. In: 2010 second international conference on multimedia and information technology, Kaifeng, pp 271–273. https://doi.org/10.1109/mmit.2010.186

  21. Wang Z, Cao L (2013) Implementation and comparison of two hash algorithms. In: 2013 international conference on computational and information sciences, Shiyang, pp 721–725

    Google Scholar 

  22. Ning LW, Siah YK, Khalid M, Yusof R (2000) Design of an automated data entry system for hand-filled fonns. In: Proceedings of TENCON 2000, vol l, pp 162–166

    Google Scholar 

  23. Tsudik G (2006) YA-TRAP: yet another trivial RFID authentication protocol. In: Fourth annual IEEE international conference on pervasive computing and communications workshops (PERCOMW’06), Pisa, pp 4, 643

    Google Scholar 

  24. Kassem A, Murr SE, Jamous G, Saad E, Geagea M (2016) A smart lock system using Wi-Fi security. In: 2016 3rd international conference on advances in computational tools for engineering applications (ACTEA), Beirut, pp 222–225

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Anitha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Anitha, M., Babel, A., Kumar, A., Rauniyar, A., Zahid, K. (2019). Cloud-Based Secured QR Code for Self-service Access Control System at Resort and Hotels. In: Peng, SL., Dey, N., Bundele, M. (eds) Computing and Network Sustainability. Lecture Notes in Networks and Systems, vol 75. Springer, Singapore. https://doi.org/10.1007/978-981-13-7150-9_41

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-7150-9_41

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-7149-3

  • Online ISBN: 978-981-13-7150-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics