ArticlePDF Available

Application of Biometric Security in Agent based Hotel Booking System -Android Environment

Authors:

Abstract and Figures

The process of finding the finest hotel in central location is time consuming, information overload and overwhelming and in some cases poses a security risk to the client. Some of the more advanced web sites allow for a search of the destination via a map for example hotelguidge.com and jamaica.hotels.hu. Booking of hotels is secured by the standard Secure Sockets Layer (SSL) to confirm the identity of a website or server, encrypt data during transmission, and ensure the integrity of transmitted data. Even with this in place, hackers have broken the Secure Sockets Layer (SSL) by targeting weaknesses in the MD5 algorithm. Recently good amount of work been carried in the use of Intelligent agents towards hotel search on J2ME based mobile handset which still has some weakness. So taking the weakness in the current agent based system, smart software agents been developed that overcomes the weakness in the previous system In addition to smart agent based system been developed and published elsewhere, we here propose to extend the system with the booking capability that allows the user to book a hotel of choice where the authenticity of the client may be determined securely using biometric security and information transmitted using Secure Sockets Layer (SSL) (Server-Gated Cryptography (SGC)) on the internet which is novel and unique. This will be facilitated on Android 2.2-enabled mobile phone using JADE-LEAP Agent development kit.
Content may be subject to copyright.
A preview of the PDF is not available
... For example, in the English county of Devon, a situation arose recently where a primary school inadvertently sent an email to parents, which leaked private data about 200 childrenthe information included, their date of birth, their educational needs and behavioral issues. Despite the sensitivity of the data, it was still shared across [6,16,24]. Our idea of introducing Validation Lamina comes here that if confidential data related to students would have been digitally signed by the concerned authority, the emails having the data generated by any machine would have been reviewed and automatically halted before sending it to all parents. ...
... Although digital signature is traditionally used for signing a digital document but it can be also implemented for cryptography. Some use the terms cryptography and cryptology interchangeably in English, while others (including US military practice generally) use cryptography to refer specifically to the use and practice of cryptographic techniques and cryptology to refer to the combined study of cryptography and cryptanalysis [15,16,20,24]. ...
... The validation will be provided by Validation Lamina having Access Control List (ACL). Thus, cipher text of any data is produced by performing a hashing algorithm which will be reducing the data into a unique number called message digest [16,17]. ...
Article
Full-text available
—In the white paper we strive to cogitate vulnerabilities of one of the most popular big data technology tool Hadoop. The elephant technology is not a bundled one rather by product of the last five decades of technological evolution. The astronomical data today looks like a potential gold mine, but like a gold mine, we only have a little of gold and more of everything else. We can say Big Data is a trending technology but not a fancy one. It is needed for survival for system to exist & persist. Critical Analysis of historic data thus becomes very crucial to play in market with the competitors. Such a state of global organizations where data is going more and more important, illegal attempts are obvious and needed to be checked. Hadoop provides data local processing computation style in which we try to go towards data rather than moving data towards us. Thus, confidentiality of data should be monitored by authorities while sharing it within organization or with third parties so that it does not get leaked out by mistake by naïve employees having access to it. We are proposing a technique of introducing Validation Lamina in Hadoop system that will review electronic signatures from an access control list of concerned authorities while sending & receiving confidential data in organization. If Validation gets failed, concerned authorities would be urgently intimated by the system and the request shall be automatically put on halt till required action is not taken for privacy governance by the authorities.
... The public keys are essentially cryptographic keys or sequences that can be obtained and used by anyone to encrypt data/message"s intended for particular recipient entity and can be unlocked or deciphered with the help of a key or sequence in knowledge of recipient (Private Key). Private Key is always paired with the public key and is shared only with key generator or initiator, ensuring a high degree of security and traceability  Key Generation: It is a method of creating keys in cryptography with the help of algorithms such as a symmetric key algorithm (DES or AES) and public key algorithm (such as RSA) [9]. Currently systems such as TLS [10] and SSH are using computational methods of these two. ...
... The key generator or initiator keeps one key to himself/herself and uploads the other key to server. In case of SSH the algorithm used is Diffie-Hellman key [9] exchange. In this arrangement, if the client does not possess a pair of public and private key along with published certificate. ...
... The result of this paper claim reduced server user side latency. Jorge Blasco et al. [9] worked on improving the efficiency of resources (space, bandwidth, efficiency) and on improving the security during the deduplication process. The improvement was done using the working of bloom filter [23] and it application in POW scheme to thwart a malicious client attack that colluded with the legitimate owner of the files. ...
... Restructuring services could improve customer service authentication so that voice interaction is not the only means of resolving issues. For example, biometrics and ofine One-Time-Passwords (OTP) are used to authenticate hotel booking and car rental systems [19,22]. There is an opportunity for research in this area, and DHH people must be included in the design process. ...
Conference Paper
Full-text available
Customer services are important for answering questions, providing information, and handling issues. Often people want to connect with a customer service representative, yet, this can be an accessibility barrier for Deaf and Hard of Hearing People (DHH) when voice calls are the only method. However, little is known about the challenges experienced by DHH people in solely voice-based customer service settings (e.g., authenticating themselves over the phone to their banks). To address this, we interviewed 18 DHH people to understand the challenges when remotely authenticating themselves with customer service. Though DHH people are not unique in their attitudes and behaviors toward mobile authentication, we found that voice-based authentication and services are challenging. Furthermore, DHH people can often be put in positions where they must trust third-party support (e.g., human interpreters) when discussing sensitive information to authenticate themselves through voice-based authentication and services. We present several avenues of future work needed to address these challenges.
... This finding is consistent with the previous studies which mentioned that perceived decrease consumers' attitude and intention to use the online application including for travel reservation [15,6]. The security risks perceived as the main and common causing factors of the consumers' reluctance to use online booking applications [23,24,6]. The consumers percei ved that the process of finding the finest hotels and making financial transaction the system is not fully secure in their system or it can be hacked. ...
... Evaluation [10,3] of this type is an application of the conformity assessment procedures of certain aspects of the biometric system with precisely defined requirements by several international standards. Such requirements are the certification base of international standards where, some of them are the following: This standard defines the framework for testing the Common Biometric Format -CBEFF 3 and defines a common structure data format to enable sharing data by multiple biometric systems. ...
Article
Full-text available
Everyday spread use of biometric system in many fields of human life as security or access control systems make serious concern about its reliability. Actual research concerning analysis of technical function impact on general function of biometric system taking into account hardware characteristics, software functionality and its performance parameters. Also international ISO/IEC standard make same consideration by defining technical aspects of functional use. Need to define wide reliability assessment approach is of imminent importance. Authors in this paper shall define bases of reliability assessment approach formulated as an open framework.
Article
The project INAV- Informative Net Asset Value is used to reduce efforts used by the land buyers and land sellers by directing the land buyers directly with the land sellers who are interested to sell their properties without interfering with the mediators, who plays a role in between buyer and seller. The main aim of our research paper is to connect land or flat buyers and sellers from different place, by using this application they can find the location and the land for selling and also there will be the contact details of seller with that they can directly contact them. The customer can search the location of the land which they need using the google maps which is in build into the application. The project uses the Android Studio software using the java language and MySQL Server to store data.
Article
Mobile phone usage and its adoption have been growing at exponential rates. It is this exponential growth rate that has led many to predict Mobile Commerce (M-Commerce) as the next major evolution of Electronic Commerce (E-Commerce). While M-Commerce comes rich with unique features, it is currently lacking in usage when compared to traditional e-commerce. There are many challenges that must be addressed in this respect. These challenges are mostly inherent in the mobile devices, communication network, legal and regulatory infrastructure. The use of agents in e-commerce has long been explored in the context, resulting in a number of agent based e-commerce systems. It is not surprising then to note that many researchers believe that the problems that the M-Commerce now faces can be addressed well using agent technology. While there is an abundance of information on the use of agent based systems in other areas, there has been no great surge yet in the use of agent based systems in real world M-Commerce applications. We believe that this slow adoption of this agent technology is due to a lack of standards. There has been a quite an amount of research work carried out in the use of software intelligent agents in the M-Commerce applications like Shopping, Hotel, and Airline industries. These are outlined in the paper with appropriate screenshots and descriptions.
Article
The project "REAL ESTATE MANAGER" is used to reduce efforts used by the land buyers and land sellers by directing the land buyers directly with the land sellers who are interested to sell their properties without interfering with the mediators, who plays a role in between buyer and seller. The main aim of our project is to connect land or flat buyers and sellers from different place, by using this application they can find the location and the land for selling and also there will be the contact details of seller with that the can directly contact them. The customer can search the location of the land which they need using the google maps which is in builded into the application. The project uses the Android Studio software using the java language and Mysql to store data.
Chapter
Mobile phone usage and its adoption have been growing at exponential rates. It is this exponential growth rate that has led many to predict Mobile Commerce (M-Commerce) as the next major evolution of Electronic Commerce (E-Commerce). While M-Commerce comes rich with unique features, it is currently lacking in usage when compared to traditional e-commerce. There are many challenges that must be addressed in this respect. These challenges are mostly inherent in the mobile devices, communication network, legal and regulatory infrastructure. The use of agents in e-commerce has long been explored in the context, resulting in a number of agent based e-commerce systems. It is not surprising then to note that many researchers believe that the problems that the M-Commerce now faces can be addressed well using agent technology. While there is an abundance of information on the use of agent based systems in other areas, there has been no great surge yet in the use of agent based systems in real world M-Commerce applications. We believe that this slow adoption of this agent technology is due to a lack of standards. There has been a quite an amount of research work carried out in the use of software intelligent agents in the M-Commerce applications like Shopping, Hotel, and Airline industries. These are outlined in the paper with appropriate screenshots and descriptions.
Article
Full-text available
Wireless Networks and mobile computing is experiencing an explosive growth, with millions of users and business ventures are explores its usage. A traveler (tourist, or a businessman) has to travel quite frequently. WAP (Wireless Application Protocol) has allowed mobile service providers to take their users one step forward to that promise of mobility. Hotels must operate around the clock to fulfill the demand for travelers and providing excellent service to their customers. The objectives of our paper are how WAP, AIML and Internet can help these hotels. How can they acquire the maximum number of clients? How can they survive the increased competition? How can they keep their travelers better informed about their services? Travelers are the hotels' targeted market, and travelers are always on the move, and so should be the hotel to get their attention and make it easy for them. Our proposed solution not only helps hotels to work around the clock they can make use of AIML in promoting their services. We investigate how the customization of ALICE can get more customer satisfaction.
Article
Full-text available
The process of finding the finest hotel in central location is time consuming, information overload and overwhelming and in some cases poses a security risk to the client. Over time with competition in the market among travel agents and hotels, the process of hotel search and booking has improved with the advances in technology. Various web sites allow a user to select a destination from a pull-down list along with several categories to suit one's preference.. Some of the more advanced web sites allow for a search of the destination via a map for example hotelguidge.com and jamaica.hotels.hu. Recently good amount of work been carried in the use of Intelligent agents towards hotel search on J2ME based mobile handset which still has some weakness. The proposed system so developed uses smart software agents that overcomes the weakness in the previous system by collaborating among themselves and search Google map based on criteria selected by the user and return results to the client that is precise and best suit the user requirements. In addition, the agent possesses learning capability of searching the hotels too which is based on past search experience. The booking of hotel involving cryptography has not been incorporated in this research paper and been published elsewhere. This will be facilitated on Android 2.2-enabled mobile phone using JADE-LEAP Agent development kit.
Article
Full-text available
M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as cellular telephone and personal digital assistants PDA. M-commerce provides lot of services like Mobile ticketing, Mobile banking, Mobile location based services, Mobile auctions, Mobile purchasing and so on. This represents an incredible opportunity to enable mobile devices, as a universal device for mobile commerce applications. For such applications, we normally want to choose the best hotel in prime locations, with modern facilities, clean environment and affordable rates. This can be time consuming and sometimes costly when doing this on our own or using human agents. So based on this we here propose "Intelligent Agent Based Hotel Search and Booking System". This system here would use an intelligent agent (instead of the human agent) to perform similar search and booking activities that can improve the speed of the search and reduce cost significantly. So in summary we propose developing a an agent that will move from hotel to hotel from the mobile devices like Smart phones by collecting details on the list of available facilities, price, customer experience, transportation etc and forward-feeding them back to the user's mobile phone. The implementation will be carried using JADE-LEAP agent development kit.
Article
In this paper we have survey on biometric payment system. Biometric payment system is used for various kinds of payment system instead of the tension of cards to put with them and to memorize theirs difficult passwords and pin numbers. Biometric payment system is much safe and secure and very easy to use and even without using any password or secret codes to remember as compare with previous system like credit card payment system, wireless system and mobile system etc. Biometric payment system is reliable, economical and it has more advantages as compare with others. In daily life the usage of credit cards, check card for shopping, bus card, subway card for traveling, student card for library and department, and many kinds of cards for unlimited purposes and so on. So problem is that a person has to take many cards and has to remember their passwords or secret codes and to keep secure to take with him all time. So the biometric payment system will solve this problem. Greater adoption of biometric payment system will drive down the cost of biometric readers and thus making it more affordable to small business owners. We really need alternate payment systems. This "perpetual toll" to credit card companies has to stop.
Conference Paper
Mobile commerce (m-commerce) is the buying and selling of goods and services through wireless handheld devices such as cellular telephone and personal digital assistants (PDA). This research focuses on the use of mobile devices for shopping. The normal shopping process involves a human visiting each store and perusing the items available. A purchase decision is then made based on the information gathered. There however a number of unique challenges that a human shopper will face if they are executing this process using a mobile device such as a phone. With this in mind we now propose an intelligent agent based mobile shopper that performs shopping on behalf of customers. This research demonstrates that by employing an intelligent mobile agent in this mobile environment, we can address many of these challenges. For our research we concentrated on shopping for mobile phones, but we believe that the principles can be applied to any product or service. The intelligent mobile agent replicates the job of the human being. Agents gather information about the products through Store Coordinator Agents and compare it with the user preferences. The agent adapts user's preferences based on the products that are available. The proposed agent based system is composed of two agents: a User Agent and Store Coordinator Agent. The implementation has been done using JADE-LEAP development kit and the performance results are discussed in the paper.