Home | MyGov

Accessibility
Accessibility Tools
Color Adjustment
Text Size
Navigation Adjustment
Screen Reader iconScreen Reader

Shareable Private Space on a Public Cloud

Shareable Private Space on a Public Cloud
Start Date :
Sep 09, 2014
Last Date :
Sep 25, 2014
18:30 PM IST (GMT +5.30 Hrs)
Submission Closed

Providing citizens with easy access to a shareable private space on a public cloud can greatly facilitate process reengineering through paperless processes. Citizens can digitally ...

Providing citizens with easy access to a shareable private space on a public cloud can greatly facilitate process reengineering through paperless processes. Citizens can digitally store their documents, certificates, etc. and share them with public agencies or others without the need to physically submit them.  Such a ‘digital locker’ will greatly improve citizen convenience and usher in paperless transactions across the entire ecosystem of public services. The access to the private space could be through an online authentication mechanism.

\

Ideas and suggestions are welcome on how to achieve the objective mentioned above. The suggestions may include technical architecture and platform, software to be used, policy guidelines, process improvements, cost effectiveness, operational efficiency, viability analysis, implementation procedures, etc. Suggestions are also welcome on a name for this private space on a public cloud and how the citizen could use the same. You can upload your ideas in doc or pdf format.   

SUBMISSIONS UNDER THIS TASK
76
Total
41
Approved
35
Under Review
Reset
Showing 41 Submission(s)
Ajay Meher
Ajay Meher 11 years 3 months ago
This has reference to ROAD TRANSPORT & SAFETY BILL 2014 BY GOVERNMENT OF INDIA. We would like to propose an automated system to issue Motor Driving license. 1. Issue of learning license by motor training school through government centralized portal. 2. Driving training to be conducted under infrastructure & syllabus specified by central Authority. 3. MDL to be conducted on auto Test track guarded by CCTV and connected directly to portal. 4. Good drivers, no corruption. Report attach
arun purushothaman
arun purushothaman 11 years 3 months ago
With already available iris scans and fingerprint database from e-Aadhaar initiative. we can test the integration of these data to have a unique accessibility to indigenously developed Firewall on a secured cloud platform.So to access the documents the individual will be aware of his usage and scamming can be reduced to a large extent.
Vishal Goel
Vishal Goel 11 years 3 months ago
We can utilize the processing power of established computer labs at premier institutes such as IITs NITs and other govt colleges and schools connected with high speed network with National informatic center by deploying local clouds(pods). As nodes may fail, every lab must have redundancy for data storage. Host machine may have light weight OS just to support cloud control over hyperwisor. Students may use a machine and unused cores may be utilized at same time. to be developed at IIT Mandi
Lakshmi Panat
Lakshmi Panat 11 years 3 months ago
Name: iKey This will be India/Internet/Integrated key for all kind of authentication needs. A very large parallel processing based infrastructure will be required as test bed, as well as production area, with proper Disaster Recovery plan in place, 24x7 operational call centre for large scale operationalization.
venkat balaji
venkat balaji 11 years 3 months ago
govt can provide free digital parks, i mean like cybers and give people ID's through which they can access informations, new companies emerging, new rules and regulations etc. let this be applicable for all in this country,let govt build "MERA CYBER" for aam aadmi
KETHANA PADALA
KETHANA PADALA 11 years 3 months ago
this is really a good idea to use technology to the maximum extent.but without perfect security it is really a risky process.today even our personal accounts are being hacked.in such a situation document with all our data should be taken the best care without third party snatching it.who ever does a software should remember this and do such that there is not even a single percent change of going this data into hands of others.