SlideShare a Scribd company logo
1 of 39
A design & development of a model
to authorize certificates in
government sectors using cloud
computing environments .
Project team:
ANJAN PUNITHB.G(Team Leader)
RAJESH .B
Avinash .P
Harshith .J
Contact : anjanpuni5@gmail.com +91 8095438732
(www.Kunalshetty13.wix.com/anjan-punith )
Module 1:
ANJAN PUNITH B.G
Achievements :
Concept has been selected & published in Tumkur university national
conference on recent trends in communication technology on january
13,2012 .
Concept has been selected & published for International journal of
advanced technology & engineering research (IJATER) in volume 2
issue 2 of march 2012 .
Link:
http://www.ijater.com/Files/d05e9161-5587-49af-88e2-
f73f93facbdb_IJATER_03_20.pdf
Presented a DEMO to the thaslidar of periyapatna taluk Mrs . Shylaja
V.R and got an appreciation letter for the project .
Abstract :
In this project we have design and developed a
model, where user can request and administrator can
authorizes certificates through online in several
sectors. we used fifth generation cloud computing
environments to maintain data. This model enables a
convenient, on-demand network access for a shared
pool of configurable computing resources that can be
rapidly provisioned and released with minimal
management effort.
Introduction on cloud computing :
Cloud computing essentially provides services;
shared computational resources execute potentially
diverse requests on behalf of users who may have
widely differing expectations. In such a setting,
someplace in the architecture, decisions have to be
made as to which requests from which users are to be
executed on which computational resources, and
when.
Traditional systems:
There is no system exist to get an income
certificate through online. The user who wants
to get an income certificate has to go through
certain processes. After all these processes user
has to go to taluk office to get his/hers income
certificate. This method takes more time and
this is not an effective method.
Disadvantage :
More time consumption .
Proposed system :
In order to achieve easy and securable way to get an income
certificate we proposed a technique using cloud computing, we utilize
private and public cloud here. Here public cloud can be accessed by any one
but private cloud can be accessed only by privileged users( Thasildar and
village accountant).This system has the following steps.
● Uploading application form:
●Login of village accountant:
● Rejected record details of village accountant:
● Accepted record details of village accountant:
● Login of super admin:
● Accepted record details of super admin:
●Review of details by super admin:
Introduction to the project :
This project works on the basis of cloud
computing , here the main remote server is placed in the
public cloud which provides on-demand access for the
users and special privileged administrators (i.e. village
accountant and thashildar). Here the application is
placed or installed in main server that can be access by
the user through online by using website tools or web
browsers. The cloud computing provides and deliver
application via internet which are accessed from web
browsers by using devices such as the laptop, desktop,
mobile etc, while data is stored on the server at a remote
location .
Fig: Cloud computing architecture to authorize certificates
Cloud services: Cloud application services or "Software as a Service
(SaaS)" deliver software as a service over the Internet, eliminating the
need to install and run the application on the customer's own
computers and simplifying maintenance and support, In this case we
are providing the certificates(eg. Income tax, Ration card, Residential
and RTC…)
Cloud platforms: Cloud platform services, also known as platform as
a service (PaaS), deliver a computing platform and/or solution stack
as a service, often consuming cloud infrastructure and sustaining
cloud applications.
Cloud Infrastructure: Cloud infrastructure services, also known as
"infrastructure as a service" (IaaS), deliver computer infrastructure –
typically a platform virtualization environment – as a service, along
with raw (block) storage and networking. Rather than purchasing
servers, software, data-center space or network equipment, clients
instead buy those resources as a fully outsourced service.
Cloud Storage Server: The servers layer consists of computer hardware
and/or computer software products that are specifically designed for the
delivery of cloud services, including multi-core processors, cloud-
specific operating systems and combined offering .
Uses :
It is economic .
Application can be accessed at anytime anywhere .
It allows accessing the data only on demand .
Its faster, cheaper, simpler, to use cloud application .
No upfront capital required for server and storage .
No on going operational expanse for running data center .
The cloud computing infrastructure consist of services as a
single point of access for user need.
The user can access the server placed in the cloud at any time
in any place through internet by using web browsers or web
tool.
Cloud computing provides and deliver application via the
internet.
Provide access only for particulars based on the application.
Module 2:
RAJESH .B
System design :
Cloud processing stages :
This model uses cloud computing environment that works in five stages as follows:
Stage 1: The main server is placed in the public cloud, which
allows „n‟ number of users to make request by filling user
application form in order to get a certificates through online.
They need to fill the required information in the form and have
to attach a appropriate proof (voter id, Dl, Aadhar card, ration
card) in the .jpeg or .jpg format, and upload in to the public
cloud server by using any of the web browser that is available in
the system through Internet, then the documents are verified
and accepted by the particulars in by getting the data from
public to private cloud to authorizes certificate. After some
processes the particular user will get notification message, that
message consists of unique identity code (e.g.:INCXXXXXX)then
they have to use their unique identity code for downloading the
certificates.
Stage 2: The uploaded document of user is present in the main
public cloud server, which consist of all the uploaded documents
of the users through the internet. Once the document is uploaded
to server it does not allow any users to modify the documents
which have been uploaded. It allows only for accept or reject the
uploaded document for a special privileged user who are
operating in private cloud systems (i.e. village accountant of
particular remote area) through their unique account. The public
cloud server facilitates to send the notification massages to the
users about their document progress.
Stage 3: There are n numbers of private cloud remote areas, each
private cloud consist of two systems (i.e. village accountant
system and thashildar system) in each private cloud remote area
there are two special privileged users are present (i.e. village
accountant and thashildar). Each privileged users have a unique
account, through that they will be handling the public cloud
server documents that belong to their particular area. The village
accountant (system 1) after accessing to the public cloud server
he/she looks for uploaded document in order to verify, if the
document is correct then the village accountant prepares a new
document called FINAL CERTIFICATE consisting of user name,
address and all required data for the certificate then it sends to
thashildar system (system 2) in order to get signed to the income
certificate. If the uploaded document is not correct then it is
rejected by the village accountant and he guides the public cloud
server to send a notification message to particular user i.e. “Your
uploaded document is incorrect, please provide correct proof”.
Stage 4: In this stage the signed income certificate from the
thashildar sends to the public cloud server and thashildar guides the
public cloud server to send notification message to the particular user
i.e. ”Your income certificate is ready and collect by downloading in
our website by providing this unique identity code : INCXXXXXX. This
income certificate is valid only for current year”.
Stage 5: In this stage the all notification messages from the
public cloud server will be delivered to mobile tower then that
message will be delivered to particular users mobile and the
users also allowed replying their feedback.
Module 3:
HARSHITH .J
UML DIAGRAMS :
Types :
Use case
Sequence
Class
Use case diagram :
Class diagram :
Sequence diagram :
Modules :
1) Uploading application form:
Here user get his application form from the internet and filled
up his/hers details which is required. User have to upload the required
documents such as voter ID, Driving liscence, Ration card, Adhar card
etc. Now user can submit his/hers details for verification purpose and
then user gets an unique ID code to check the status of his/hers
request.
2) Login of village accountant:
village accountant has to login into his account by entering
his password. His account will be containing the details of clients
upload. Here he verifies the details of the clients and he has the
authority to accept or to reject the request.
3)Rejected record details of village accountant:
village accountant verifies the details of the clients and
checks his uploaded documents by using the unique ID of the
uploaded document. If any mistakes will be there means or details are
not enough means he rejects the request.
4)Accepted record details of village accountant:
village accountant verifies the details of the clients and checks
his uploaded documents by using the unique ID of the uploaded
document. If all the uploaded details and documents of the clients are
correct means village accountant accepts the request and send this
client request to super admin.
5) Login of super admin:
Super admin has to enter his password to login into his account
to accept or to reject the request of the client for Income certificate.
Super admin also have an option to review the request for the purpose of
clarification. In this module the one important thing is Super admin have
to login into his account two times for the sake of security.
6)Rejected record details of super admin:
Super admin checks the details of the clients which is verified
and sent by village accountant and then if he is not satisfied with these
details and with the documents he has the authority to reject the request
of the clients.
7)Accepted record details of super admin:
Super admin accepts the request of the clients if he is
satisfied with the details of the clients which is verified and sent by
village accountant and now the client can download or save his/hers
Income certificate by using the unique ID.
8)Review of details by super admin:
Here super admin can review the details of the clients for any
clarification if he want. But here he cant accept or reject the request
of the clients by any means, only he can view the details that's it.
Module 4:
AVINASH .P
Screen shots :
Index page
Login form for the user :
Adminstrators(thaslidar & village accountant) login
page :
Certificates login :
How to achieve security:
By identifying attackers, assets, threats, and other
components.
Rank the threats.
Choose mitigation strategies.
Build solutions based on the strategies.
System requirements :
Hardware requirements :
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 17 VGA Colour.
• Mouse : Logitech.
• Ram : 256 Mb.
Software requirements:
i. Operating System :Windows XP Professional or Windows 7
ii. Front End :Struts, JSP,HTML,CSS 3
iii. Back End : MS-Access
iv. Tool :Eclipse 3.3
cloud computing provides a supercomputing power
the cloud of computers extend beyond a single company or
enterprise.
To ensure the correctness of users‟ data in cloud data
storage, we proposed an effective and flexible distributed
scheme with explicit dynamic data support, including block
update, delete, and append.
We believe that data storage security in Cloud
Computing, an area full of challenges and of paramount
importance, is still in its infancy now, and many research
problems are yet to be identified .
Conclusion :
Future work :
This application reduces time to get certificates and
allows access them from anytime, any where through Internet.
Users can able access through any web based tools(web
browsers) and requires only minimum knowledge of internet,
user can easily download or collect Approved authorized
certificates through online/office. It overcome the traditional
way of getting certificates by standing in queue, running from
one offices to other to get signatures and mainly corruption in
government sectors. It also environmental friendly as it
reduces the papers usage and also replication of certificates is
very easy. We can enhance this application by adding good
mathematical model ,algorithms and web rich application
tools for increasing efficiency of time, space complexity of
processing applications and good looking of user interface
design .
References:
[1] Cloud Computing: The Fifth generation of Computing. IEEE 2011 International Conference
on Communication Systems and Network Technologies, Sameer Rajan Apurva Jairath Govt.of
India, MCIT, DIT Department. Of C.S. & Engg. National Informatics Centre (NIC)
G.G.I.T.S.Naharlagun, Arunachal Pradesh (India) Jabalpur M.P. (India).
[2] Mobile Cloud Computing Service Based on Heterogeneous Wireless and Mobile P2P
Networks [3] Bernd Mohr, Computational Yanuarius Teofilus Larosa_, Jiann-Liang Chen_, Der-
Jiunn Dengy, and Han-Chieh Chaoz_Department of Electrical Engineering, National Taiwan
University of Science and Technology.
[3] Cloud computing - Wikipedia, the free encyclopedia
[4] Alberto leon-garcia communication networks, fundamental concepts and key architecture
second edition.
[5] Ontology and Search Engine for Cloud Computing System, Proceedings of 2011 International
Conference on System Science and Engineering, Macau, China - June 2011.
[6]1st international IEEE workshop on collaboration and computing, Creating Next Generation
Cloud Computing based Network Services and The Contributions of Social Cloud Operation
Support System (OSS) to Society - Miyuki Sato, Fujitsu Co. Ltd, Japan
Anjanpunith anjanpuni5@gmail.com

More Related Content

Similar to Anjanpunith anjanpuni5@gmail.com

Khadamaty_MOI_Smart_Gov_Award_Documentation
Khadamaty_MOI_Smart_Gov_Award_DocumentationKhadamaty_MOI_Smart_Gov_Award_Documentation
Khadamaty_MOI_Smart_Gov_Award_Documentation
Khadija Mohammed
 
Event Management System Document
Event Management System Document Event Management System Document
Event Management System Document
LJ PROJECTS
 
Etaxi Documentation
Etaxi DocumentationEtaxi Documentation
Etaxi Documentation
M.Saber
 
ProjectReport.docx project report pdf file
ProjectReport.docx project report pdf fileProjectReport.docx project report pdf file
ProjectReport.docx project report pdf file
komkar98230
 
ProjectReport.docx project documentation
ProjectReport.docx project documentationProjectReport.docx project documentation
ProjectReport.docx project documentation
komkar98230
 
Documentation
DocumentationDocumentation
Documentation
Kalyan A
 

Similar to Anjanpunith anjanpuni5@gmail.com (20)

A Software Engineering Project on Cyber cafe management
A Software Engineering Project on Cyber cafe managementA Software Engineering Project on Cyber cafe management
A Software Engineering Project on Cyber cafe management
 
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSDATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
 
SMART ASSIST SERVICE AT YOUR DOOR STEPS
SMART ASSIST SERVICE AT YOUR DOOR STEPSSMART ASSIST SERVICE AT YOUR DOOR STEPS
SMART ASSIST SERVICE AT YOUR DOOR STEPS
 
Khadamaty_MOI_Smart_Gov_Award_Documentation
Khadamaty_MOI_Smart_Gov_Award_DocumentationKhadamaty_MOI_Smart_Gov_Award_Documentation
Khadamaty_MOI_Smart_Gov_Award_Documentation
 
ProjectReport_Subhayu
ProjectReport_SubhayuProjectReport_Subhayu
ProjectReport_Subhayu
 
Event Management System Document
Event Management System Document Event Management System Document
Event Management System Document
 
Ethereum Decentralized Application for Storing Student Results
Ethereum Decentralized Application for Storing Student ResultsEthereum Decentralized Application for Storing Student Results
Ethereum Decentralized Application for Storing Student Results
 
An in-building multi-server cloud system based on shortest Path algorithm dep...
An in-building multi-server cloud system based on shortest Path algorithm dep...An in-building multi-server cloud system based on shortest Path algorithm dep...
An in-building multi-server cloud system based on shortest Path algorithm dep...
 
H017113842
H017113842H017113842
H017113842
 
Etaxi Documentation
Etaxi DocumentationEtaxi Documentation
Etaxi Documentation
 
IRJET - Vahaan Registration System
IRJET - Vahaan Registration SystemIRJET - Vahaan Registration System
IRJET - Vahaan Registration System
 
ProjectReport.docx project report pdf file
ProjectReport.docx project report pdf fileProjectReport.docx project report pdf file
ProjectReport.docx project report pdf file
 
ProjectReport.docx project documentation
ProjectReport.docx project documentationProjectReport.docx project documentation
ProjectReport.docx project documentation
 
Electronic form srs
Electronic form srsElectronic form srs
Electronic form srs
 
Documentation
DocumentationDocumentation
Documentation
 
Optical Character Recognition based KYC System
Optical Character Recognition based KYC SystemOptical Character Recognition based KYC System
Optical Character Recognition based KYC System
 
IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate System
 
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET-  	  Guarded Remittance System Employing WANET for Catastrophe RegionIRJET-  	  Guarded Remittance System Employing WANET for Catastrophe Region
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
 
Project synopsis.
Project synopsis.Project synopsis.
Project synopsis.
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting System
 

Recently uploaded

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Anjanpunith anjanpuni5@gmail.com

  • 1. A design & development of a model to authorize certificates in government sectors using cloud computing environments . Project team: ANJAN PUNITHB.G(Team Leader) RAJESH .B Avinash .P Harshith .J Contact : anjanpuni5@gmail.com +91 8095438732 (www.Kunalshetty13.wix.com/anjan-punith )
  • 3. Achievements : Concept has been selected & published in Tumkur university national conference on recent trends in communication technology on january 13,2012 . Concept has been selected & published for International journal of advanced technology & engineering research (IJATER) in volume 2 issue 2 of march 2012 . Link: http://www.ijater.com/Files/d05e9161-5587-49af-88e2- f73f93facbdb_IJATER_03_20.pdf Presented a DEMO to the thaslidar of periyapatna taluk Mrs . Shylaja V.R and got an appreciation letter for the project .
  • 4. Abstract : In this project we have design and developed a model, where user can request and administrator can authorizes certificates through online in several sectors. we used fifth generation cloud computing environments to maintain data. This model enables a convenient, on-demand network access for a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort.
  • 5. Introduction on cloud computing : Cloud computing essentially provides services; shared computational resources execute potentially diverse requests on behalf of users who may have widely differing expectations. In such a setting, someplace in the architecture, decisions have to be made as to which requests from which users are to be executed on which computational resources, and when.
  • 6. Traditional systems: There is no system exist to get an income certificate through online. The user who wants to get an income certificate has to go through certain processes. After all these processes user has to go to taluk office to get his/hers income certificate. This method takes more time and this is not an effective method. Disadvantage : More time consumption .
  • 7. Proposed system : In order to achieve easy and securable way to get an income certificate we proposed a technique using cloud computing, we utilize private and public cloud here. Here public cloud can be accessed by any one but private cloud can be accessed only by privileged users( Thasildar and village accountant).This system has the following steps. ● Uploading application form: ●Login of village accountant: ● Rejected record details of village accountant: ● Accepted record details of village accountant: ● Login of super admin: ● Accepted record details of super admin: ●Review of details by super admin:
  • 8.
  • 9. Introduction to the project : This project works on the basis of cloud computing , here the main remote server is placed in the public cloud which provides on-demand access for the users and special privileged administrators (i.e. village accountant and thashildar). Here the application is placed or installed in main server that can be access by the user through online by using website tools or web browsers. The cloud computing provides and deliver application via internet which are accessed from web browsers by using devices such as the laptop, desktop, mobile etc, while data is stored on the server at a remote location .
  • 10. Fig: Cloud computing architecture to authorize certificates
  • 11. Cloud services: Cloud application services or "Software as a Service (SaaS)" deliver software as a service over the Internet, eliminating the need to install and run the application on the customer's own computers and simplifying maintenance and support, In this case we are providing the certificates(eg. Income tax, Ration card, Residential and RTC…) Cloud platforms: Cloud platform services, also known as platform as a service (PaaS), deliver a computing platform and/or solution stack as a service, often consuming cloud infrastructure and sustaining cloud applications. Cloud Infrastructure: Cloud infrastructure services, also known as "infrastructure as a service" (IaaS), deliver computer infrastructure – typically a platform virtualization environment – as a service, along with raw (block) storage and networking. Rather than purchasing servers, software, data-center space or network equipment, clients instead buy those resources as a fully outsourced service.
  • 12. Cloud Storage Server: The servers layer consists of computer hardware and/or computer software products that are specifically designed for the delivery of cloud services, including multi-core processors, cloud- specific operating systems and combined offering .
  • 13. Uses : It is economic . Application can be accessed at anytime anywhere . It allows accessing the data only on demand . Its faster, cheaper, simpler, to use cloud application . No upfront capital required for server and storage . No on going operational expanse for running data center . The cloud computing infrastructure consist of services as a single point of access for user need. The user can access the server placed in the cloud at any time in any place through internet by using web browsers or web tool. Cloud computing provides and deliver application via the internet. Provide access only for particulars based on the application.
  • 16. Cloud processing stages : This model uses cloud computing environment that works in five stages as follows: Stage 1: The main server is placed in the public cloud, which allows „n‟ number of users to make request by filling user application form in order to get a certificates through online. They need to fill the required information in the form and have to attach a appropriate proof (voter id, Dl, Aadhar card, ration card) in the .jpeg or .jpg format, and upload in to the public cloud server by using any of the web browser that is available in the system through Internet, then the documents are verified and accepted by the particulars in by getting the data from public to private cloud to authorizes certificate. After some processes the particular user will get notification message, that message consists of unique identity code (e.g.:INCXXXXXX)then they have to use their unique identity code for downloading the certificates.
  • 17. Stage 2: The uploaded document of user is present in the main public cloud server, which consist of all the uploaded documents of the users through the internet. Once the document is uploaded to server it does not allow any users to modify the documents which have been uploaded. It allows only for accept or reject the uploaded document for a special privileged user who are operating in private cloud systems (i.e. village accountant of particular remote area) through their unique account. The public cloud server facilitates to send the notification massages to the users about their document progress.
  • 18. Stage 3: There are n numbers of private cloud remote areas, each private cloud consist of two systems (i.e. village accountant system and thashildar system) in each private cloud remote area there are two special privileged users are present (i.e. village accountant and thashildar). Each privileged users have a unique account, through that they will be handling the public cloud server documents that belong to their particular area. The village accountant (system 1) after accessing to the public cloud server he/she looks for uploaded document in order to verify, if the document is correct then the village accountant prepares a new document called FINAL CERTIFICATE consisting of user name, address and all required data for the certificate then it sends to thashildar system (system 2) in order to get signed to the income certificate. If the uploaded document is not correct then it is rejected by the village accountant and he guides the public cloud server to send a notification message to particular user i.e. “Your uploaded document is incorrect, please provide correct proof”.
  • 19. Stage 4: In this stage the signed income certificate from the thashildar sends to the public cloud server and thashildar guides the public cloud server to send notification message to the particular user i.e. ”Your income certificate is ready and collect by downloading in our website by providing this unique identity code : INCXXXXXX. This income certificate is valid only for current year”.
  • 20. Stage 5: In this stage the all notification messages from the public cloud server will be delivered to mobile tower then that message will be delivered to particular users mobile and the users also allowed replying their feedback.
  • 22. UML DIAGRAMS : Types : Use case Sequence Class
  • 26. Modules : 1) Uploading application form: Here user get his application form from the internet and filled up his/hers details which is required. User have to upload the required documents such as voter ID, Driving liscence, Ration card, Adhar card etc. Now user can submit his/hers details for verification purpose and then user gets an unique ID code to check the status of his/hers request. 2) Login of village accountant: village accountant has to login into his account by entering his password. His account will be containing the details of clients upload. Here he verifies the details of the clients and he has the authority to accept or to reject the request. 3)Rejected record details of village accountant: village accountant verifies the details of the clients and checks his uploaded documents by using the unique ID of the uploaded document. If any mistakes will be there means or details are not enough means he rejects the request.
  • 27. 4)Accepted record details of village accountant: village accountant verifies the details of the clients and checks his uploaded documents by using the unique ID of the uploaded document. If all the uploaded details and documents of the clients are correct means village accountant accepts the request and send this client request to super admin. 5) Login of super admin: Super admin has to enter his password to login into his account to accept or to reject the request of the client for Income certificate. Super admin also have an option to review the request for the purpose of clarification. In this module the one important thing is Super admin have to login into his account two times for the sake of security. 6)Rejected record details of super admin: Super admin checks the details of the clients which is verified and sent by village accountant and then if he is not satisfied with these details and with the documents he has the authority to reject the request of the clients.
  • 28. 7)Accepted record details of super admin: Super admin accepts the request of the clients if he is satisfied with the details of the clients which is verified and sent by village accountant and now the client can download or save his/hers Income certificate by using the unique ID. 8)Review of details by super admin: Here super admin can review the details of the clients for any clarification if he want. But here he cant accept or reject the request of the clients by any means, only he can view the details that's it.
  • 31. Login form for the user :
  • 32. Adminstrators(thaslidar & village accountant) login page :
  • 34. How to achieve security: By identifying attackers, assets, threats, and other components. Rank the threats. Choose mitigation strategies. Build solutions based on the strategies.
  • 35. System requirements : Hardware requirements : • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 17 VGA Colour. • Mouse : Logitech. • Ram : 256 Mb. Software requirements: i. Operating System :Windows XP Professional or Windows 7 ii. Front End :Struts, JSP,HTML,CSS 3 iii. Back End : MS-Access iv. Tool :Eclipse 3.3
  • 36. cloud computing provides a supercomputing power the cloud of computers extend beyond a single company or enterprise. To ensure the correctness of users‟ data in cloud data storage, we proposed an effective and flexible distributed scheme with explicit dynamic data support, including block update, delete, and append. We believe that data storage security in Cloud Computing, an area full of challenges and of paramount importance, is still in its infancy now, and many research problems are yet to be identified . Conclusion :
  • 37. Future work : This application reduces time to get certificates and allows access them from anytime, any where through Internet. Users can able access through any web based tools(web browsers) and requires only minimum knowledge of internet, user can easily download or collect Approved authorized certificates through online/office. It overcome the traditional way of getting certificates by standing in queue, running from one offices to other to get signatures and mainly corruption in government sectors. It also environmental friendly as it reduces the papers usage and also replication of certificates is very easy. We can enhance this application by adding good mathematical model ,algorithms and web rich application tools for increasing efficiency of time, space complexity of processing applications and good looking of user interface design .
  • 38. References: [1] Cloud Computing: The Fifth generation of Computing. IEEE 2011 International Conference on Communication Systems and Network Technologies, Sameer Rajan Apurva Jairath Govt.of India, MCIT, DIT Department. Of C.S. & Engg. National Informatics Centre (NIC) G.G.I.T.S.Naharlagun, Arunachal Pradesh (India) Jabalpur M.P. (India). [2] Mobile Cloud Computing Service Based on Heterogeneous Wireless and Mobile P2P Networks [3] Bernd Mohr, Computational Yanuarius Teofilus Larosa_, Jiann-Liang Chen_, Der- Jiunn Dengy, and Han-Chieh Chaoz_Department of Electrical Engineering, National Taiwan University of Science and Technology. [3] Cloud computing - Wikipedia, the free encyclopedia [4] Alberto leon-garcia communication networks, fundamental concepts and key architecture second edition. [5] Ontology and Search Engine for Cloud Computing System, Proceedings of 2011 International Conference on System Science and Engineering, Macau, China - June 2011. [6]1st international IEEE workshop on collaboration and computing, Creating Next Generation Cloud Computing based Network Services and The Contributions of Social Cloud Operation Support System (OSS) to Society - Miyuki Sato, Fujitsu Co. Ltd, Japan