Published on

Published in: Technology, Business
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1. A design & development of a model to authorize certificates in government sectors using cloud computing environments . Project team: ANJAN PUNITHB.G(Team Leader) RAJESH .B Avinash .P Harshith .J Contact : +91 8095438732 ( )
  2. 2. Module 1: ANJAN PUNITH B.G
  3. 3. Achievements : Concept has been selected & published in Tumkur university national conference on recent trends in communication technology on january 13,2012 . Concept has been selected & published for International journal of advanced technology & engineering research (IJATER) in volume 2 issue 2 of march 2012 . Link: f73f93facbdb_IJATER_03_20.pdf Presented a DEMO to the thaslidar of periyapatna taluk Mrs . Shylaja V.R and got an appreciation letter for the project .
  4. 4. Abstract : In this project we have design and developed a model, where user can request and administrator can authorizes certificates through online in several sectors. we used fifth generation cloud computing environments to maintain data. This model enables a convenient, on-demand network access for a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort.
  5. 5. Introduction on cloud computing : Cloud computing essentially provides services; shared computational resources execute potentially diverse requests on behalf of users who may have widely differing expectations. In such a setting, someplace in the architecture, decisions have to be made as to which requests from which users are to be executed on which computational resources, and when.
  6. 6. Traditional systems: There is no system exist to get an income certificate through online. The user who wants to get an income certificate has to go through certain processes. After all these processes user has to go to taluk office to get his/hers income certificate. This method takes more time and this is not an effective method. Disadvantage : More time consumption .
  7. 7. Proposed system : In order to achieve easy and securable way to get an income certificate we proposed a technique using cloud computing, we utilize private and public cloud here. Here public cloud can be accessed by any one but private cloud can be accessed only by privileged users( Thasildar and village accountant).This system has the following steps. ● Uploading application form: ●Login of village accountant: ● Rejected record details of village accountant: ● Accepted record details of village accountant: ● Login of super admin: ● Accepted record details of super admin: ●Review of details by super admin:
  8. 8. Introduction to the project : This project works on the basis of cloud computing , here the main remote server is placed in the public cloud which provides on-demand access for the users and special privileged administrators (i.e. village accountant and thashildar). Here the application is placed or installed in main server that can be access by the user through online by using website tools or web browsers. The cloud computing provides and deliver application via internet which are accessed from web browsers by using devices such as the laptop, desktop, mobile etc, while data is stored on the server at a remote location .
  9. 9. Fig: Cloud computing architecture to authorize certificates
  10. 10. Cloud services: Cloud application services or "Software as a Service (SaaS)" deliver software as a service over the Internet, eliminating the need to install and run the application on the customer's own computers and simplifying maintenance and support, In this case we are providing the certificates(eg. Income tax, Ration card, Residential and RTC…) Cloud platforms: Cloud platform services, also known as platform as a service (PaaS), deliver a computing platform and/or solution stack as a service, often consuming cloud infrastructure and sustaining cloud applications. Cloud Infrastructure: Cloud infrastructure services, also known as "infrastructure as a service" (IaaS), deliver computer infrastructure – typically a platform virtualization environment – as a service, along with raw (block) storage and networking. Rather than purchasing servers, software, data-center space or network equipment, clients instead buy those resources as a fully outsourced service.
  11. 11. Cloud Storage Server: The servers layer consists of computer hardware and/or computer software products that are specifically designed for the delivery of cloud services, including multi-core processors, cloud- specific operating systems and combined offering .
  12. 12. Uses : It is economic . Application can be accessed at anytime anywhere . It allows accessing the data only on demand . Its faster, cheaper, simpler, to use cloud application . No upfront capital required for server and storage . No on going operational expanse for running data center . The cloud computing infrastructure consist of services as a single point of access for user need. The user can access the server placed in the cloud at any time in any place through internet by using web browsers or web tool. Cloud computing provides and deliver application via the internet. Provide access only for particulars based on the application.
  13. 13. Module 2: RAJESH .B
  14. 14. System design :
  15. 15. Cloud processing stages : This model uses cloud computing environment that works in five stages as follows: Stage 1: The main server is placed in the public cloud, which allows „n‟ number of users to make request by filling user application form in order to get a certificates through online. They need to fill the required information in the form and have to attach a appropriate proof (voter id, Dl, Aadhar card, ration card) in the .jpeg or .jpg format, and upload in to the public cloud server by using any of the web browser that is available in the system through Internet, then the documents are verified and accepted by the particulars in by getting the data from public to private cloud to authorizes certificate. After some processes the particular user will get notification message, that message consists of unique identity code (e.g.:INCXXXXXX)then they have to use their unique identity code for downloading the certificates.
  16. 16. Stage 2: The uploaded document of user is present in the main public cloud server, which consist of all the uploaded documents of the users through the internet. Once the document is uploaded to server it does not allow any users to modify the documents which have been uploaded. It allows only for accept or reject the uploaded document for a special privileged user who are operating in private cloud systems (i.e. village accountant of particular remote area) through their unique account. The public cloud server facilitates to send the notification massages to the users about their document progress.
  17. 17. Stage 3: There are n numbers of private cloud remote areas, each private cloud consist of two systems (i.e. village accountant system and thashildar system) in each private cloud remote area there are two special privileged users are present (i.e. village accountant and thashildar). Each privileged users have a unique account, through that they will be handling the public cloud server documents that belong to their particular area. The village accountant (system 1) after accessing to the public cloud server he/she looks for uploaded document in order to verify, if the document is correct then the village accountant prepares a new document called FINAL CERTIFICATE consisting of user name, address and all required data for the certificate then it sends to thashildar system (system 2) in order to get signed to the income certificate. If the uploaded document is not correct then it is rejected by the village accountant and he guides the public cloud server to send a notification message to particular user i.e. “Your uploaded document is incorrect, please provide correct proof”.
  18. 18. Stage 4: In this stage the signed income certificate from the thashildar sends to the public cloud server and thashildar guides the public cloud server to send notification message to the particular user i.e. ”Your income certificate is ready and collect by downloading in our website by providing this unique identity code : INCXXXXXX. This income certificate is valid only for current year”.
  19. 19. Stage 5: In this stage the all notification messages from the public cloud server will be delivered to mobile tower then that message will be delivered to particular users mobile and the users also allowed replying their feedback.
  20. 20. Module 3: HARSHITH .J
  21. 21. UML DIAGRAMS : Types : Use case Sequence Class
  22. 22. Use case diagram :
  23. 23. Class diagram :
  24. 24. Sequence diagram :
  25. 25. Modules : 1) Uploading application form: Here user get his application form from the internet and filled up his/hers details which is required. User have to upload the required documents such as voter ID, Driving liscence, Ration card, Adhar card etc. Now user can submit his/hers details for verification purpose and then user gets an unique ID code to check the status of his/hers request. 2) Login of village accountant: village accountant has to login into his account by entering his password. His account will be containing the details of clients upload. Here he verifies the details of the clients and he has the authority to accept or to reject the request. 3)Rejected record details of village accountant: village accountant verifies the details of the clients and checks his uploaded documents by using the unique ID of the uploaded document. If any mistakes will be there means or details are not enough means he rejects the request.
  26. 26. 4)Accepted record details of village accountant: village accountant verifies the details of the clients and checks his uploaded documents by using the unique ID of the uploaded document. If all the uploaded details and documents of the clients are correct means village accountant accepts the request and send this client request to super admin. 5) Login of super admin: Super admin has to enter his password to login into his account to accept or to reject the request of the client for Income certificate. Super admin also have an option to review the request for the purpose of clarification. In this module the one important thing is Super admin have to login into his account two times for the sake of security. 6)Rejected record details of super admin: Super admin checks the details of the clients which is verified and sent by village accountant and then if he is not satisfied with these details and with the documents he has the authority to reject the request of the clients.
  27. 27. 7)Accepted record details of super admin: Super admin accepts the request of the clients if he is satisfied with the details of the clients which is verified and sent by village accountant and now the client can download or save his/hers Income certificate by using the unique ID. 8)Review of details by super admin: Here super admin can review the details of the clients for any clarification if he want. But here he cant accept or reject the request of the clients by any means, only he can view the details that's it.
  28. 28. Module 4: AVINASH .P
  29. 29. Screen shots : Index page
  30. 30. Login form for the user :
  31. 31. Adminstrators(thaslidar & village accountant) login page :
  32. 32. Certificates login :
  33. 33. How to achieve security: By identifying attackers, assets, threats, and other components. Rank the threats. Choose mitigation strategies. Build solutions based on the strategies.
  34. 34. System requirements : Hardware requirements : • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 17 VGA Colour. • Mouse : Logitech. • Ram : 256 Mb. Software requirements: i. Operating System :Windows XP Professional or Windows 7 ii. Front End :Struts, JSP,HTML,CSS 3 iii. Back End : MS-Access iv. Tool :Eclipse 3.3
  35. 35. cloud computing provides a supercomputing power the cloud of computers extend beyond a single company or enterprise. To ensure the correctness of users‟ data in cloud data storage, we proposed an effective and flexible distributed scheme with explicit dynamic data support, including block update, delete, and append. We believe that data storage security in Cloud Computing, an area full of challenges and of paramount importance, is still in its infancy now, and many research problems are yet to be identified . Conclusion :
  36. 36. Future work : This application reduces time to get certificates and allows access them from anytime, any where through Internet. Users can able access through any web based tools(web browsers) and requires only minimum knowledge of internet, user can easily download or collect Approved authorized certificates through online/office. It overcome the traditional way of getting certificates by standing in queue, running from one offices to other to get signatures and mainly corruption in government sectors. It also environmental friendly as it reduces the papers usage and also replication of certificates is very easy. We can enhance this application by adding good mathematical model ,algorithms and web rich application tools for increasing efficiency of time, space complexity of processing applications and good looking of user interface design .
  37. 37. References: [1] Cloud Computing: The Fifth generation of Computing. IEEE 2011 International Conference on Communication Systems and Network Technologies, Sameer Rajan Apurva Jairath Govt.of India, MCIT, DIT Department. Of C.S. & Engg. National Informatics Centre (NIC) G.G.I.T.S.Naharlagun, Arunachal Pradesh (India) Jabalpur M.P. (India). [2] Mobile Cloud Computing Service Based on Heterogeneous Wireless and Mobile P2P Networks [3] Bernd Mohr, Computational Yanuarius Teofilus Larosa_, Jiann-Liang Chen_, Der- Jiunn Dengy, and Han-Chieh Chaoz_Department of Electrical Engineering, National Taiwan University of Science and Technology. [3] Cloud computing - Wikipedia, the free encyclopedia [4] Alberto leon-garcia communication networks, fundamental concepts and key architecture second edition. [5] Ontology and Search Engine for Cloud Computing System, Proceedings of 2011 International Conference on System Science and Engineering, Macau, China - June 2011. [6]1st international IEEE workshop on collaboration and computing, Creating Next Generation Cloud Computing based Network Services and The Contributions of Social Cloud Operation Support System (OSS) to Society - Miyuki Sato, Fujitsu Co. Ltd, Japan