“Review citizens. Secondly, the voting process which will

“Review on mobilitybased secured e­-voting system”Jayshree Gajabe, Mrs.

Rashmi Jain Computer Science & engineering, RajivGandhi College of Engineering, Nagpur.Email: [email protected]                                                            Email: [email protected]      Abstract—The word”vote” means to choose from a list. The main goal of voting  is to come up with leaders of the people’schoice.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

In our conventional voting system we have problems when it comes tovoting. Some of the problems involved include ridging votes during election,insecure or inaccessible polling stations, inadequate polling materials. Due tosuch problems the percentage of voting in India is getting decrease year byyear.

This E-voting system seeks to address the above issues. User(candidates)will able to vote from their places using internet. In this system, assumingthat every person has smart phone we will design a Smartphone compatibleapplication. In this application we will authenticate the user by its aadharcard number. After authenticating user will able to see list of candidates.Then the vote of user will be stored on database server in encrypted formatsusing encryption algo.

This transmission of data from end user application todatabase server will be encrypted by using cryptography. For this purpose Diffie-Hellmanalgorithm will be used. Keywords— Election, e-voting, Android, Web server.      I.INTRODUCTIONSecureE-Voting system based on public-key encryption cryptosystem is proposed in thiswork.

This protocol is summarized in three processes: firstly, access controlprocess which involves the identification and authentication phases for theapplied citizens. Secondly, the voting process which will be done by cipheringthe voter information using public-key encryption cryptosystem, to be submittedover an insecure network to the specified government election server. Finally,the election server administrator will sort the final result by deciphering thereceived encrypted information using private key. Actually, this E-Votingprotocol is more efficient than traditional Voting protocols since the votercan vote from his/her own  mobileapplication without any extra cost and effort.   The main aim of the work is to allow mobile users fore-voting with the help of distributed system. It will verify whether the votingis done by an authorized user or not and provide the vote count after e-voting.II.LITERATURE REVIEWa method to encrypt data which can only be decrypted atspecified time this can be useful to encrypt some time sensitive data likebidding offer or electronic vote.

They used a combination of public keyencryption and hash function to enable decryption only at certain time. Butthis method does not cover communication between client and server and how tostore votes in the database in a secure manner1.To protect the confidentiality of the voters, they designa paper ballot that will be teared after people have given a vote. The teared paperballot then can be used to count the voting result while maintaining voterprivacy. Unlike the conventional paper ballot which always have parties andcandidates printed on the same order, this method randomized the order, butstill can be correctly counted2.There are some related research regarding this issues. Theoverall design of e-votinginfrastructure was proposed in this. They built a working ecosystem to deploy aremote voting and ensure its security especially the verifiability to ensurethe votes are valid and able to detect unauthorized one.

The mechanism was tomatch several parts of the secure key in some servers3.The attack to the verifiability of vote data was given inthis. The clash attack was simple since it exploited the voting machine tosupply different votes from the same voter. The author provided thecountermeasure by using the serial number onprinted receipt to Wombat and Helios e-voting systems4.Another ballot integrity procedure was proposed byemploying entanglement between two parties5. There were three phases included: initial, voting, andverification phase. A formal model for both weak and strong verifiability. Theyproof the proposed model to Helios-C(Helios with Credential) system.

However,we propose another system to provide more secure ballot in e- votingenvironment built on top of our own system6.Inthis system, assuming that every person has smart phone they had design a smartphone compatible application. In this application they had authenticated theuser by its aadhar card number along with biometrics such as face recognitionor finger print recognition. After authenticating user will able to see list ofcandidates. Then the vote of user will be stored on database server. Thistransmission of data from end user application to database server will beencrypted by using cryptography. For this purpose AES algorithm will be used7.

Technology moulds the life style of human in apromoting manner. We prefer reducing time and efforts in all our chores. One ofthe systems used majorly for this purpose is ON-LINE where security is themajor concern. This paper provides a secure approach for online voting systemusing the concept of encryption and digital signature. We have implemented theconcept of AES and RSA algorithm8.TheE-Voting means the voting process in election by using electronic device. Inthis proposed system described how the android mobile phones are efficient andcan be used for voting. The android platform is used to develop an application.

Our system support simultaneous voting due to the distributed nature of thedatabase. During election electronic device is used for voting process. A votermay only need to register only once for a particular election and that doesall, voter need to cast his /her vote without actually have to present at thevoting cell. The registration process must be done at Booth application foronce then voter is been given a facility to vote from his/her Android mobilephone irrespective of his/her location. This proposed system suppose to proposea new e-voting system, which ensures voter confidentiality and voting accuracy,thus providing an important framework that based on unique identificationADHAAR ID (U-ID) number. An online solution is very useful as the informationabout the voters and the election committee is also made available to thepeople in this system9.Votingis an important part of the democratic  process.The electorate makes a decision or expresses an opinion that is accepted foreveryone.

Some parts could be interested in the election results deviationwithout anyone else noticing it. However, ensuring that the whole votingprocess is performed correctly and according to current rules and law is, then,even more important. We present in this work a review of existing verificationsystems for electronic voting systems, from both academia and the commercial world.To do so, we realize a fair comparison against a set of representative votingverification systems, by using an evaluation framework. We define thisframework to be composed of several properties and covering important systemareas, ranging from the user interaction to security issues. We then model thenatural evolution of verifiability issues on electronic voting systems, whichare influenced by restrictions on current laws and by technological advances10.Remotevoting has been an active research field for application of cryptographictechniques in the last two decades with many schemes and systems inpublication.

In this paper we present an overview of recent efforts indeveloping voting schemes and security models that involve a variety of real worldconstraints to ensure election integrity. We classify voting schemes based ontheir primary cryptographic techniques. We analyze recent typical schemes andsystems against the basic and counter attack requirements with briefdescription. Such analysis shows difference among these security requirementsand aids in design of future schemes. Our conclusion is provided regardingsuitability of a particular voting system/scheme under various conditions11.   III.ALGORITHAMCOMPARISON TABLE Name Description Advantages Disadvantages   RSA Algorithm RSA is a cryptosystem which is known as one of the first practicable public-key cryptosystems and is widely used for secure data transmission 1.it is public key cipher 2.

RSA algorithm is hard to crack. 3.RSA algo the public key to encrypt data.   1.Slow signing and decryption, which are slightly tricky to implement securely. 2.Very slow key generation. 3.

Key is vulnerable to various attacks if poorly implemented.          Diffie Hellman A simple public-key algorithm is Diffie-Hellman key exchange .This protocol enables two users to establish  a secret key using a public-key scheme based on discrete logarithms. 1.The sender and receiver have no prior knowledge of each other. 2.Communication can take place through an insecure channel. 3.

Sharing of secret key is safe.     1.can not be used for symmetric key exchange. 2.can not used for signing digital signatures.

3.the nature of diffie-hellman key exchange does make it susceptible to man in the middle attacks in the exchange. Digital Signature DSS is uses the secure hash algorithm a digital signature is an authentication mechanism that enable the creator of a message to attach a code that acts as a signature. 1.Non repudiation, because the author cannot be denied of his work(he created and sent). 2.Imposter prevention Integrity of data, ever change will be detected.         1.

Expiry:Digital signatures, like all technological products, are highly dependent on the technology it is based on. Hash Function Hash function also called as message digest and one way encryption, are in some sense use no key. 1.

the  main advantage is synchronization. 2.in many situations, hash tables turn out more efficient than lookup structures. 1.hash collisions are practically unavoidable. 2.hash tables becomes quite inefficient when there are many collisions.     IV.

BLOCK  DIAGRAM Fig.1 Example of E-votingsystem. V. CONCLUSION Intraditional voting system the percentage of voting is getting low year by year.There are so many security issues also due to which frauds happens in voting system.

So our proposed  e-voting system whichwill be a highly secure. Through this system a user can cast his vote from anyremote location. And hence percentage of voting will increase and fraud alsowill decrease. Such a highly secure voting system is also very useful in decisionmaking process in any organization.  REFERENCESPAPERS : 1R.

L.Rivest, A. Shamir and D.A Wagner(1996), ” Time lock puzzles and time related Crpto”, Research Showcase @ MIT. 2 H. Pan, E. Hou, and N.

Ansari (2011), “Ensuringvoters’ and candidate confidentiality in E-votingsystems”, 34th IEEE Sarnoff  Symposium. 3 A. Hassan and X.

Zhang (2013), “Design and build a secure e-votinginfrastructure,” IEEE Systems,Technology and Applications Conference. 4 R. Kusters, T. Truderung and A. Vogt (2012), “Clashattacks on the verifiability of e-voting systems,” IEEE Symposium on Securityand Privacy. 5 H. Alshammari, K. Elleithy, K.

Almgren, and S. Albelwi (2014), “Groupsignature entanglement in e-voting system,” IEEE Systems, Application and TechnologyConference. 6 V. Cortier, D. Galindo , S. Glondu, and M.Izabachene(2014), “Election verifiability for Helios under weaker trust assumptions,”Computer Security- ESORICS.

 7 Ketaki Bhoyar,Pranav R. Patil ,Ashish R. Zaware ,Arvind S. Pawar (2015), “AnAssurable E-Voting System That Ensures Voter Confidentiality and VotingAccuracy,” International Journal of Computer Applications.Volume 132 – No.14, December2015 8Jena Catherine Bel.

D,Savithra.K , Divya.M “A Secure Approach for E-Voting Using Encryption and Digital Signature”,2015 IJEDR | NC3N 2015 9Akshay Akhare A,Manoj Gadale R,RajashreeRaskar S,Bhagyashree Jaykar V,Mrs. D.A.Phalke”Secure Mobile Based E-VotingSystem”, International Journal onRecent and Innovation Trends in Computing and Communication 10  JordiPujol-Ahulló, Roger Jardí-Cedó, and Jordi Castellà-Roca  “Verification Systems forElectronic Voting  Survey”.

 11 Huian Li, Abhishek Reddy Kankanala,Xukai Zou ,”A Taxonomy andComparison of Remote Voting Schemes”,  

x

Hi!
I'm Mary!

Would you like to get a custom essay? How about receiving a customized one?

Check it out