0% found this document useful (0 votes)
3 views8 pages

Cloud Based Attendance Management System

The document outlines a cloud-based attendance management system designed to address inefficiencies and security vulnerabilities of traditional manual attendance methods in educational institutions. It emphasizes the use of two-factor authentication for secure access, aims to automate attendance processes, and supports data analytics for improved decision-making. The project includes a detailed work plan, system requirements, and a research methodology to ensure effective implementation.

Uploaded by

augustosinak559
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views8 pages

Cloud Based Attendance Management System

The document outlines a cloud-based attendance management system designed to address inefficiencies and security vulnerabilities of traditional manual attendance methods in educational institutions. It emphasizes the use of two-factor authentication for secure access, aims to automate attendance processes, and supports data analytics for improved decision-making. The project includes a detailed work plan, system requirements, and a research methodology to ensure effective implementation.

Uploaded by

augustosinak559
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Cloud-Based Attendance

Management System
In this digital age, cloud-based systems are revolutionizing
education and attendance management could be part. The
conventional manual methods for recording attendance in
educational institutions have proven inefficient, error-prone, and
susceptible to unauthorized modifications.
This project introduces a novel cloud-based attendance
management system combining two-factor authentication
methods: Password and One-Time Password (OTP). The system will
streamline attendance processes, allowing institutions to
conveniently track and manage records while reducing
administrative overhead and improving data accuracy.

AS
by Augusto TIEMANI SINAK
Current Challenges in
Educational Institutions
Increased Student Data-Driven Decision
Population Making
As school campuses grow, Modern educational
managing attendance administration relies heavily on
manually becomes data for informed decision-
increasingly cumbersome and making. Manual records often
time-consuming. Tracking lack the granularity and
hundreds or thousands of accessibility required for
students across multiple effective analysis of student
classes presents significant presence patterns.
logistical challenges.

Security and Data Integrity


Paper-based records are susceptible to loss, damage, and unauthorized
alteration. Digital systems offer enhanced security measures and
ensure the integrity of attendance data.
Problems with Traditional Attendance Systems
Inefficiency
1 Time-consuming manual processes

Error-Prone
2 Susceptible to human recording errors

Security Vulnerabilities
3 Easy to manipulate or falsify records

Limited Analytics
4 Difficult to generate insights from paper records

Storage Issues
5 Physical space requirements and risk of damage

Traditional paper-based attendance systems are fraught with challenges that impact educational efficiency. These manual methods not only
consume valuable teaching time but also create barriers to real-time data access and analysis, hindering prompt intervention for chronic
absenteeism.
Project Objectives
Automate Attendance Process
Develop a system that allows marking and management of attendance
electronically through ID scanning, reducing manual errors and saving
time.
Enable Secure Access
Establish robust security measures to protect student data, ensuring
compliance with relevant data protection regulations and instilling trust
among users.

Support Data Analytics


Design the system to identify attendance trends and issues, supporting
various user roles (admin, teacher, student, parent) with appropriate
access and functionalities.

Generate Accurate Reports


Enable the generation of accurate and timely attendance reports for
lecturers and administrators to improve decision-making processes.
System Requirements
Functional Requirements Non-Functional Requirements

• Student ID scanning at designated points • Performance: Handle multiple concurrent scans with
• Secure lecturer authentication interface minimum response time

• • Security: End-to-end encryption (AES-256) for all data


Class management and scheduling
• • Reliability: Highly available with minimal downtime
Manual attendance marking capabilities
• • Usability: Mobile-responsive design
Secure data storage in cloud database
• • Scalability: Support 10,000+ users without degradation
Comprehensive reporting features
• • Compatibility: Support major browsers across
User-friendly web interface
platforms
Project Work Plan
Planning & Requirements
Testing & QA
Detailed requirement gathering, finalize project
scope, system design specification, database Unit testing, integration testing, user acceptance
schema design, technology stack selection (2-3 testing, bug fixing and refinement (2-3 weeks)
weeks)

1 2 3 4

System Development Deployment & Implementation


Set up cloud infrastructure, develop back-end API Deploy to cloud environment, set up ID card
and front-end interface, implement security scanners, conduct user training (2-3 weeks)
features (8-12 weeks)
Authentication Methods
Knowledge-Based Possession-Based
Authentication Authentication
Requires users to provide Involves something the user
something they know, such as possesses, such as a physical
passwords or PINs. While token, smart card, or school ID.
common, these methods are Tokens can generate one-time
vulnerable to brute force passwords, enhancing security
attacks and phishing attempts. despite potential logistical
challenges.

Multi-Factor Authentication (MFA)


Combines two or more authentication methods to enhance security.
This project specifically uses MFA based on possession (school IDs)
and knowledge (passwords) to create a robust security system.
Research Methodology & Materials
Design Base Implementation Research
1 Investigating what works, when, for whom, and under what conditions

Agile Hybrid Approach


2 Combining Scrum for iterative development with Waterfall elements

Unified Modeling Language Design


3 Visualizing system architecture, structure, behavior,
and interactions

The project requires both hardware components (development workstations, ID card scanners, testing hardware) and
software tools (cloud platform services, database management systems, programming frameworks). Documentation
includes project plans, software requirements specifications, architecture diagrams, and user manuals to ensure
comprehensive implementation.

You might also like