Abstract
Electronic voting (e-Voting) has totally replaced the traditional voting system. Due to the rapid growth of computer networks and cloud computing the existing e-Voting system can be replaced with online voting system.When data is on cloud,the major challenge in voting system is confidentiality, security and accuracy. The advances in cryptography can be used to a face these challenges. The presented work implements Okamoto-Uchiyama algorithm with its additive homomorphic property. This work focuses on serving voting system on large scale of voters. We have made our system more user friendly and faster but secured than existing systems.
Highlights
In the past two decades, various types of electronic voting systems have got considerable attention
Electronic voting promises to make the electoral process simpler and more efficient for political parties, candidates, election administration, and for voters[7].For developing nations like Egypt, many voting schemes are evolving with newer strategies[6].While choosing India as a case study, a framework should be developed with security of the voting data for direct deployment.Cloud computing services provides efficiency and cost saving
For encryption of data various algorithms can be used among which Elgamel, Okamoto-uchiyama&Paillier are now-a-days most likely to be used[3][4][5].Okamoto-Uchiyama algorithm is asymmetric cryptographic algorithm
Summary
In the past two decades, various types of electronic voting systems have got considerable attention. The decrypted result matches the result of operations as if they had been performed on plaintext This property is used to hide the vital voting data form counting system [2].In this work we propose an approach for secure authentication of users in the cloud in online voting system. We make sure that there will not be violation of user credentials at the authentication stage , We make sure the vote given by voter will not be tampered as their values are encrypted and as we use algorithm with homomorphic property it will not be revealed at transferring on cloud. for meeting integrity constrain message digest is used so that an attempt for tampering of data will be detected. As with paper ballot system security of voting data cannot be handled
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.