A design & development of a model
to authorize certificates in
government sectors using cloud
computing environments .
ANJAN PUNITHB.G(Team Leader)
Contact : email@example.com +91 8095438732
Concept has been selected & published in Tumkur university national
conference on recent trends in communication technology on january
Concept has been selected & published for International journal of
advanced technology & engineering research (IJATER) in volume 2
issue 2 of march 2012 .
Presented a DEMO to the thaslidar of periyapatna taluk Mrs . Shylaja
V.R and got an appreciation letter for the project .
In this project we have design and developed a
model, where user can request and administrator can
authorizes certificates through online in several
sectors. we used fifth generation cloud computing
environments to maintain data. This model enables a
convenient, on-demand network access for a shared
pool of configurable computing resources that can be
rapidly provisioned and released with minimal
Introduction on cloud computing :
Cloud computing essentially provides services;
shared computational resources execute potentially
diverse requests on behalf of users who may have
widely differing expectations. In such a setting,
someplace in the architecture, decisions have to be
made as to which requests from which users are to be
executed on which computational resources, and
There is no system exist to get an income
certificate through online. The user who wants
to get an income certificate has to go through
certain processes. After all these processes user
has to go to taluk office to get his/hers income
certificate. This method takes more time and
this is not an effective method.
More time consumption .
Proposed system :
In order to achieve easy and securable way to get an income
certificate we proposed a technique using cloud computing, we utilize
private and public cloud here. Here public cloud can be accessed by any one
but private cloud can be accessed only by privileged users( Thasildar and
village accountant).This system has the following steps.
● Uploading application form:
●Login of village accountant:
● Rejected record details of village accountant:
● Accepted record details of village accountant:
● Login of super admin:
● Accepted record details of super admin:
●Review of details by super admin:
Introduction to the project :
This project works on the basis of cloud
computing , here the main remote server is placed in the
public cloud which provides on-demand access for the
users and special privileged administrators (i.e. village
accountant and thashildar). Here the application is
placed or installed in main server that can be access by
the user through online by using website tools or web
browsers. The cloud computing provides and deliver
application via internet which are accessed from web
browsers by using devices such as the laptop, desktop,
mobile etc, while data is stored on the server at a remote
Fig: Cloud computing architecture to authorize certificates
Cloud services: Cloud application services or "Software as a Service
(SaaS)" deliver software as a service over the Internet, eliminating the
need to install and run the application on the customer's own
computers and simplifying maintenance and support, In this case we
are providing the certificates(eg. Income tax, Ration card, Residential
Cloud platforms: Cloud platform services, also known as platform as
a service (PaaS), deliver a computing platform and/or solution stack
as a service, often consuming cloud infrastructure and sustaining
Cloud Infrastructure: Cloud infrastructure services, also known as
"infrastructure as a service" (IaaS), deliver computer infrastructure –
typically a platform virtualization environment – as a service, along
with raw (block) storage and networking. Rather than purchasing
servers, software, data-center space or network equipment, clients
instead buy those resources as a fully outsourced service.
Cloud Storage Server: The servers layer consists of computer hardware
and/or computer software products that are specifically designed for the
delivery of cloud services, including multi-core processors, cloud-
specific operating systems and combined offering .
It is economic .
Application can be accessed at anytime anywhere .
It allows accessing the data only on demand .
Its faster, cheaper, simpler, to use cloud application .
No upfront capital required for server and storage .
No on going operational expanse for running data center .
The cloud computing infrastructure consist of services as a
single point of access for user need.
The user can access the server placed in the cloud at any time
in any place through internet by using web browsers or web
Cloud computing provides and deliver application via the
Provide access only for particulars based on the application.
Cloud processing stages :
This model uses cloud computing environment that works in five stages as follows:
Stage 1: The main server is placed in the public cloud, which
allows „n‟ number of users to make request by filling user
application form in order to get a certificates through online.
They need to fill the required information in the form and have
to attach a appropriate proof (voter id, Dl, Aadhar card, ration
card) in the .jpeg or .jpg format, and upload in to the public
cloud server by using any of the web browser that is available in
the system through Internet, then the documents are verified
and accepted by the particulars in by getting the data from
public to private cloud to authorizes certificate. After some
processes the particular user will get notification message, that
message consists of unique identity code (e.g.:INCXXXXXX)then
they have to use their unique identity code for downloading the
Stage 2: The uploaded document of user is present in the main
public cloud server, which consist of all the uploaded documents
of the users through the internet. Once the document is uploaded
to server it does not allow any users to modify the documents
which have been uploaded. It allows only for accept or reject the
uploaded document for a special privileged user who are
operating in private cloud systems (i.e. village accountant of
particular remote area) through their unique account. The public
cloud server facilitates to send the notification massages to the
users about their document progress.
Stage 3: There are n numbers of private cloud remote areas, each
private cloud consist of two systems (i.e. village accountant
system and thashildar system) in each private cloud remote area
there are two special privileged users are present (i.e. village
accountant and thashildar). Each privileged users have a unique
account, through that they will be handling the public cloud
server documents that belong to their particular area. The village
accountant (system 1) after accessing to the public cloud server
he/she looks for uploaded document in order to verify, if the
document is correct then the village accountant prepares a new
document called FINAL CERTIFICATE consisting of user name,
address and all required data for the certificate then it sends to
thashildar system (system 2) in order to get signed to the income
certificate. If the uploaded document is not correct then it is
rejected by the village accountant and he guides the public cloud
server to send a notification message to particular user i.e. “Your
uploaded document is incorrect, please provide correct proof”.
Stage 4: In this stage the signed income certificate from the
thashildar sends to the public cloud server and thashildar guides the
public cloud server to send notification message to the particular user
i.e. ”Your income certificate is ready and collect by downloading in
our website by providing this unique identity code : INCXXXXXX. This
income certificate is valid only for current year”.
Stage 5: In this stage the all notification messages from the
public cloud server will be delivered to mobile tower then that
message will be delivered to particular users mobile and the
users also allowed replying their feedback.
1) Uploading application form:
Here user get his application form from the internet and filled
up his/hers details which is required. User have to upload the required
documents such as voter ID, Driving liscence, Ration card, Adhar card
etc. Now user can submit his/hers details for verification purpose and
then user gets an unique ID code to check the status of his/hers
2) Login of village accountant:
village accountant has to login into his account by entering
his password. His account will be containing the details of clients
upload. Here he verifies the details of the clients and he has the
authority to accept or to reject the request.
3)Rejected record details of village accountant:
village accountant verifies the details of the clients and
checks his uploaded documents by using the unique ID of the
uploaded document. If any mistakes will be there means or details are
not enough means he rejects the request.
4)Accepted record details of village accountant:
village accountant verifies the details of the clients and checks
his uploaded documents by using the unique ID of the uploaded
document. If all the uploaded details and documents of the clients are
correct means village accountant accepts the request and send this
client request to super admin.
5) Login of super admin:
Super admin has to enter his password to login into his account
to accept or to reject the request of the client for Income certificate.
Super admin also have an option to review the request for the purpose of
clarification. In this module the one important thing is Super admin have
to login into his account two times for the sake of security.
6)Rejected record details of super admin:
Super admin checks the details of the clients which is verified
and sent by village accountant and then if he is not satisfied with these
details and with the documents he has the authority to reject the request
of the clients.
7)Accepted record details of super admin:
Super admin accepts the request of the clients if he is
satisfied with the details of the clients which is verified and sent by
village accountant and now the client can download or save his/hers
Income certificate by using the unique ID.
8)Review of details by super admin:
Here super admin can review the details of the clients for any
clarification if he want. But here he cant accept or reject the request
of the clients by any means, only he can view the details that's it.
How to achieve security:
By identifying attackers, assets, threats, and other
Rank the threats.
Choose mitigation strategies.
Build solutions based on the strategies.
System requirements :
Hardware requirements :
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 17 VGA Colour.
• Mouse : Logitech.
• Ram : 256 Mb.
i. Operating System :Windows XP Professional or Windows 7
ii. Front End :Struts, JSP,HTML,CSS 3
iii. Back End : MS-Access
iv. Tool :Eclipse 3.3
cloud computing provides a supercomputing power
the cloud of computers extend beyond a single company or
To ensure the correctness of users‟ data in cloud data
storage, we proposed an effective and flexible distributed
scheme with explicit dynamic data support, including block
update, delete, and append.
We believe that data storage security in Cloud
Computing, an area full of challenges and of paramount
importance, is still in its infancy now, and many research
problems are yet to be identified .
Future work :
This application reduces time to get certificates and
allows access them from anytime, any where through Internet.
Users can able access through any web based tools(web
browsers) and requires only minimum knowledge of internet,
user can easily download or collect Approved authorized
certificates through online/office. It overcome the traditional
way of getting certificates by standing in queue, running from
one offices to other to get signatures and mainly corruption in
government sectors. It also environmental friendly as it
reduces the papers usage and also replication of certificates is
very easy. We can enhance this application by adding good
mathematical model ,algorithms and web rich application
tools for increasing efficiency of time, space complexity of
processing applications and good looking of user interface
 Cloud Computing: The Fifth generation of Computing. IEEE 2011 International Conference
on Communication Systems and Network Technologies, Sameer Rajan Apurva Jairath Govt.of
India, MCIT, DIT Department. Of C.S. & Engg. National Informatics Centre (NIC)
G.G.I.T.S.Naharlagun, Arunachal Pradesh (India) Jabalpur M.P. (India).
 Mobile Cloud Computing Service Based on Heterogeneous Wireless and Mobile P2P
Networks  Bernd Mohr, Computational Yanuarius Teofilus Larosa_, Jiann-Liang Chen_, Der-
Jiunn Dengy, and Han-Chieh Chaoz_Department of Electrical Engineering, National Taiwan
University of Science and Technology.
 Cloud computing - Wikipedia, the free encyclopedia
 Alberto leon-garcia communication networks, fundamental concepts and key architecture
 Ontology and Search Engine for Cloud Computing System, Proceedings of 2011 International
Conference on System Science and Engineering, Macau, China - June 2011.
1st international IEEE workshop on collaboration and computing, Creating Next Generation
Cloud Computing based Network Services and The Contributions of Social Cloud Operation
Support System (OSS) to Society - Miyuki Sato, Fujitsu Co. Ltd, Japan