You are on page 1of 15

International Journal of Information Technologies and Systems Approach

Volume x ∙ Issue x ∙ November-December 2020

Method Study of Security Patrol Guards System Based on QR Code and


Mobile Cloud Computing (Case Study)
Bimandika Hasanah, Master in Computer Science, Computer Science Department, Bina Nusantara University,
Jakarta, Indonesia

Joao Antonio Martins, Master in Computer Science, Computer Science Department, Bina Nusantara University,
Jakarta, indonesia
Muhuji Amin, Master in Computer Science, Computer Science Department, Bina Nusantara University, Jakarta,
Indonesia
Rezki Saputra, Master in Computer Science, Computer Science Department, Bina Nusantara University, Jakarta,
Indonesia

Tarmudi, Master in Computer Science, Computer Science Department, Bina Nusantara University, Jakarta,
Indonesia

Ulderico Ze Machado, Master in Computer Science, Computer Science Department, Bina Nusantara University,
Jakarta, Indonesia

ABSTRACT
Security can also be interpreted as a state free from danger. This term can be used with connection to the crime, all
forms of accidents, and others. Security is a topic that is always interesting to study both IT cybersecurity or security
management for an organization.
One of the managerial security topics is securing the asset. The organization still relies on security guards, who are
in charge of daily guarding the company's assets, patrolling the specified area and supervising, the company can
legally control the activities by the security guards with a technology called patrol guard.
Patrol guards enable security guards to record every routine patrol activity using RFID technology. Still, the weakness
of patrol guards at this time can only be used offline from not directly connected to the computer. so, this paper will
propose the use of the current Mobile Cloud Computing technology adopted in patrol guard to make the technology
more effective and efficient in controlling.
Keywords: Security, Patrol Guards, Smartphone, QR-Code, Mobile Cloud Computing.

ABSTRAK
Keamanan dapat juga diartikan sebagai kondisi bebas dari bahaya. Istilah ini dapat digunakan sehubungan dengan
kejahatan, segala bentuk kecelakaan dan lain-lain. Keamanan adalah topik yang selalu menarik untuk dipelajari baik
keamanan siber TI atau management keamanan untuk suatu organisasi.
Salah satu topik keamanan manajerial adalah mengamankan asset. Organisasi saat ini masih mengandalkan satpam
(satuan pengamanan) yang bertugas sehari-hari menjaga asset perusahaan, melakukan patrol di area yang telah
ditentukan dan supervisi. Perusahaan secara legal dapat mengontrol aktivitas patrol yang dilakukan oleh satpam
dengan teknologi yang disebut dengan patrol guard.
Patrol guard memungkinkan satpam mencatat setiap aktivitas patrol rutin menggunakan teknologi RFID. Namun
kelemahan teknologi tersebut saat ini hanya dapat digunakan secara offline dan tidak terkoneksi secara online dengan
computer. Jadi, paper ini akan mengusulkan penggunaan teknologi mobile cloud.computing yang saat ini diadopsi
oleh penjaga patrol agar teknologi tersebut dapat lebih efektif dan efisien dalam hal kontrol.
Kata kunci: Security, Patrol Guards, Smartphone, QR-Code, Mobile Cloud Computing,
International Journal of Information Technologies and Systems Approach
Volume x ∙ Issue x ∙ November-December 2020

INTRODUCTION
Security Guards are a vital subject in the company area. Their job is to make sure every component in a
company area is safe. Patrols are the daily duty of security guards to monitor the security system in the
designation area. However, the Security Guards job must be controlled by the company to prevent the
misuse of duty and impacted the security factor in a company. To Monitored and regulated the activity of
Security Guards, there is a technology that exists in the marketplace called Patrol Guard.

Patrol Guard is a device using by Security Guards to record their daily routines patrols. This device will be
examined later by their superior to judges whether the Security Guards follow the Patrol scheme or not.
This conventional device using RF-ID Technology. There are two-elements in the Patrol Guard system.
The first one is the Patrol Device that being kept by Security Guards, and the second one is the Check-Point
Tag that deployed in the entire patrol area. Whenever security guards did the routines Patrol, they will
synchronize the checkpoint tag by tapping it with Patrol Device. After these two elements are synchronized,
The Patrol Device will record the synchronized time. Data will be downloaded from Patrol Device using
Bluetooth connection and saved in PDF Format.

This is the method of a patrol that is used in a company where becoming a subject of this case study. This
company's business area is an industrial parks operator. To create a conducive environment is one of this
company's vision. It is necessary because most tenants are foreigners who want a secure place where they
can expand their business and produce their products.

CASE REPORT

The main problem of the current Patrol Guards System is: too long to get the final data. There is a risk of
misuse authority to manipulate the last data because an Officer does the transfer process by saving it
manually, and Current software to download the data is desktop base and only compatible with Windows
XP (end-of-life version of windows operating system). There is 3 issue that has been identified in the current
time. This methodology research will be focused on finding methods to solve these three problems with the
mobile cloud computing approach.

DISCUSSION

Quick Response (QR) codes are two-dimensional barcodes that visually encode bits of information
represented as black square dots placed on a white square grid [3]. QR was developed by a Japanese
corporation Denso Wave in 1994. It was developed to safely and easily identify various components [3].
International Journal of Information Technologies and Systems Approach
Volume x ∙ Issue x ∙ November-December 2020

QR Code contains data in both vertical and horizontal directions, whereas a bar code has only one direction
of data, usually the vertical one. QR Code can also correspondingly hold more information and are easily
digested by scanning equipment [1].

The Mobile phone is used to make calls and receive calls in a wide geographic area. Mobile phones are
used more by people because of their portability, wireless, easy access, user-friendliness, etc. Advanced
software can be installed on the mobile. Mobile devices are built with a good number of useful applications
[3]

Therefore, in this research, creating a system using QR Code will be a choice to develop. Below is a block
diagram of existing research [1]

Figure 1. QR code reader block diagram [1]


International Journal of Information Technologies and Systems Approach
Volume x ∙ Issue x ∙ November-December 2020

This Block Diagram [1] can be used on Patrol Guard System with a few modifications. The Cloud
has an additional feature, which is to save the data in the database because the Patrol data must be recorded
due to company policy.

Process models of this system will refer to An Image Sharing Technique Using QR Code through
Cloud for Mobile Device research [3]

Figure 2. An Image Sharing Technique Using QR Code through Cloud for Mobile Device research [3]

For this Patrol Guard System research, this process models can be used with a few modifications in the
function of mobile device and Cloud. The mobile device is used to capture the QR Code and translate it
into binary data then send it to Cloud. The Cloud will receive the data, automatically authenticate it by
comparing stored checkpoint parameters and store the data for further use.

On the research of Authentication Using QR Code and Smartphone [2]. In the below picture.

Figure 3. Authentication using QR Code and Smartphone [2]


International Journal of Information Technologies and Systems Approach
Volume x ∙ Issue x ∙ November-December 2020

This process model will be used to authenticate the parameters of this research [3]. Matriculation number
will be replaced with Checkpoint Parameters that stored the source data to generate the QR Code to be used
as a checkpoint tag in this research. Verifications will be between Check-Parameters and captured QR Code
a Checkpoint Tag. If both of them match, it means to authenticate, and if they did not match means, the QR
Code has not existed

on the parameters. After the authentication process, the verified data will be stored in the cloud database
for further use.

In this model, the computing technology used to connect the mobile devices with the central web server is
Cloud Computing, which allows the users (Security Guards) from various locations to scan a checkpoint
tag, then authenticated it and stored the data [1]. Figure 4 shows the structure of cloud computing [1]

Figure 4. Structure of cloud computing [1]

It can be explained simply as it is a Client-Server architecture where the clients request a service and not a
server. In general, the Cloud computing users do not own their data, all the data is placed in the Cloud, and
the user can access the data through a computer or a mobile device. [1]
International Journal of Information Technologies and Systems Approach
Volume x ∙ Issue x ∙ November-December 2020

From the company infrastructure, which becomes a subject in this research, the Cloud will be located on-
premise at the central server room, and mobile devices can access it from anywhere as long as the mobile
application can access the internet. The Cloud role will do the authentication process and store the data then
notify the users (mobile device) that the data has been authenticated.

This system requires minimum hardware specification of Intel Pentium Dual-core i5 with RAM size of
2GB and minimum hard disk capacity of 500 GB. An additional device of an Android smartphone with
camera equipment. [4]

The required software used for the development process of the QR codes scan and Web-based program
requires an operating system Microsoft Windows 7 or Server with 64 bit. A web-based WAMP server
(PHP, MySQL & Apache) with an additional QR code scanner application. [4]

RELATED SYSTEM ADVANTAGES AND DISADVANTAGES

This section will be explained about the advantages and disadvantages of the existing system that has been
found in related works.

Advantages

The advantages of the existing system are :

1) Utilization of QR Codes

The usage of QR Codes in this system is an advantage because the QR Code is correspondingly held much
information and easily digested by scanning equipment. To create a fast and straightforward system, an
easily understood target is the best choice.

Part of the strength of QR codes in the physical environment is their ability to withstand damage and remain
to function even when a part of the QR code image is disguised, vandalized, or indifferent. [4]

This is accomplished by using the Reed-Solomon Error Correction Code algorithm, where several serious
algebras that occur in the background when the QR code is created. [4]
International Journal of Information Technologies and Systems Approach
Volume x ∙ Issue x ∙ November-December 2020

2) Utilization of Smartphone

The Smartphone is the most flexible device in the current time. Several features in a smartphone can be
utilized to help the working process in many sectors. With proper development, the Smartphone can handle
the task anywhere and anytime.

3) Utilization of Web Server as Cloud Computing

The web server will be used as the authenticator and data storage. The Web environment is multi-platform.
Web-based applications also can be developed for mobile devices like a smartphone.

Disadvantages

The disadvantages of the existing system are :

1) The mobile device computing process is limited. [3]

Mobile devices like a smartphone are full of limitation, utilizing the Smartphone as the main module have
potential risk to become an obstacle in the implementation process.

2) Manual input in the authentication process. [2]

Manual input in the authentication process is at the disadvantage because this kind of technology should be
executed automatically.

3) One consideration from the Patrol Guards is the concern about the mobile application that they have to
install their smartphones. They are reluctant to install it because they hesitate that this software can track
them outside of the area as well, even though the system is explained well. [5]

SUGGESTION FOR IMPROVEMENT

Several improvements could be made to improve the performance and simplicity of the current project

A. The Computing process should be offloading to Cloud.

In figure 1, the Smartphone takes a role in computational function. This could make the process takes more
time than use the server to read the QR code. In mobile cloud computing, the Smartphone should not own
the data. Smartphones just take the role of a scanner, and the server will take computing roles.
International Journal of Information Technologies and Systems Approach
Volume x ∙ Issue x ∙ November-December 2020

B. Use Mobile Web Application on the Smartphone.

The Cloud will be built-in the webserver platform. The most effective way to utilize this server is to access
it from the web application from smartphone.

C. Automate the authentication process.

For Patrol guard purposes, this will be the proposed model for the authentication process.

Figure 5. Automate the authentication process

D. Biometric Authentication on application

To Ensure the user of the application is the intended person; the authentication process should be
implemented on the application level. This authentication could be done by integrating the fingerprint
sensor on the Smartphone to the patrol guard application.
International Journal of Information Technologies and Systems Approach
Volume x ∙ Issue x ∙ November-December 2020

CONCEPTUAL FRAMEWORK OF THE PROPOSED SYSTEM

While the proposed system in this research shared an excellent attribute of the existing efforts, those have
a slight difference in the implementation concepts and algorithms. The significance of this is that in QR
Code usability and the cloud function.

The proposed system has three modules, QR Code checkpoint tag as a scanning target, a mobile device as
a scanner, and a Web Server to authenticate and save the data.

A. Proposed Procedure to Produce QR Code Check-point target.

1) Decide Check-Point Locations

These locations will be decided by the security guards coordinator in the company and convert it into
location codes.

2) Encode Decided Checkpoint Locations

Encode the location codes from the previous step and generate the QR Code from them.

3) Print the generated QR Codes and place them in decided checkpoint locations.

Print the QR Codes and place them in the location that being decided by the security guards coordinator.

Figure 6. Proposed QR Code checkpoint locations production model


International Journal of Information Technologies and Systems Approach
Volume x ∙ Issue x ∙ November-December 2020

B. Proposed procedure to authenticate checkpoint QR code

1) Security guard equipped with a smartphone with an application as a QR code scanners

2) Security guard visits the checkpoint location

3) Make sure the Smartphone is connected to the intranet and Open the smartphone app and pointing the
camera to the QR Code.

4) Wait until the authentication being processed by the webserver (Cloud)

5) After the authentication process has been completed, security guards will see a notification on the apps,
and these checkpoints have been passed otherwise failed.

6) Security guards will click next-button for the next point, and data will be saved.

7) At the end of the checkpoint process, security guards will click finished-button, and Patrol has been
completed.

C. Proposed Flowchart of patrol procedure


International Journal of Information Technologies and Systems Approach
Volume x ∙ Issue x ∙ November-December 2020

Figure 7. Proposed Flowchart for patrol procedure


International Journal of Information Technologies and Systems Approach
Volume x ∙ Issue x ∙ November-December 2020

1) Make sure the mobile device is connected to the intranet network.

2) Walk to the checkpoint location and scan the QR Code

3) Upon scanned, wait for the authentication process.

4) After the QR code authenticated, press the next button and move to the following checkpoint location.

5) After verified in the last location, click the finished button and the patrol process is done.

D. Proposed Flowchart for Cloud Computing model

Figure 8. Proposed Flowchart for the cloud computing model


International Journal of Information Technologies and Systems Approach
Volume x ∙ Issue x ∙ November-December 2020

1) The server will receive data that is scanned on the mobile device.

2) The server will read the data and match the data with authentication parameters.

3) After the authentication process is completed, the server will save the data to the database and show a
pop-up notification that the data already authenticated.

4) If the authentication process failed, the server would be ready to re-receive the data.

E. The user interface of Mobile application (Mock-up)

Figure 9. Mock-up of mobile application

1) The proposed application should be on a hybrid mobile app written on the HTML5 platform because the
cloud type should be web service.

2) Launcher icons of the application should be available on the application screen to launch the app and
will open the web interface, such as fig.9.
International Journal of Information Technologies and Systems Approach
Volume x ∙ Issue x ∙ November-December 2020

DESIGN OF EVALUATION METHOD

The patrol guard system in this paper will be evaluated the performance using quantitative methods. The
objective of this evaluation is to determine which technology is faster than another on the operational
process.

CONCLUSION

Three elements in this patrol guard can be replaced by ICT Technologies. Patrol Device can be replaced by
a mobile device, Software (Desktop-Base), to download the data will be replaced by a web server (Cloud)
that is utilized by a mobile device to compute the Check-Point Process and Check-Point Tag will be
replaced with a QR Code.
International Journal of Information Technologies and Systems Approach
Volume x ∙ Issue x ∙ November-December 2020

REFERENCE

[1] Thiyagarajan M, Dinesh Kumar K, QR Code Authentication For Product Using Cloud
Computing, Vol 3 No 2, Journal of Global Research and Computer Science, 2012.

[2] Emmanuel C.Ayeleso, Adebanjo Adekiigbe, Ndidi C. Onyeka, Mathias O. Oladede, Identity Card
Authentication Using QR Code and Smartphone, International Journal of Science, Engineering &
Environmental, 2017.

[3] N. Aysha Farina, Jossy P. George, Joseph Varghese Kureethara, An Image Sharing Technique
Using QR Code Through Cloud for Mobile Device, International Journal of Engineering &
Technology, 2018

[4] Md Rizal Md Hendry, Mohd Noah A. Rahman, Afzaal. H. Seyal, Smart Attendance System
Applying QR Code. 12th International Conference on Latest Trends in Engineering and
Technology (ICLTET'2017), 2017

[5] Murat Karakaya, Gokhan Sengul, Atila Bostan, A Wireless Control System Based on Smart
Bluetooth and Ibeacon Technology for Auditing The Patrols, International Journal Of Scientific
Research System and Engineering, 2016

You might also like