Abstract

Electronic voting (e-Voting) has totally replaced the traditional voting system. Due to the rapid growth of computer networks and cloud computing the existing e-Voting system can be replaced with online voting system.When data is on cloud,the major challenge in voting system is confidentiality, security and accuracy. The advances in cryptography can be used to a face these challenges. The presented work implements Okamoto-Uchiyama algorithm with its additive homomorphic property. This work focuses on serving voting system on large scale of voters. We have made our system more user friendly and faster but secured than existing systems.

Highlights

  • In the past two decades, various types of electronic voting systems have got considerable attention

  • Electronic voting promises to make the electoral process simpler and more efficient for political parties, candidates, election administration, and for voters[7].For developing nations like Egypt, many voting schemes are evolving with newer strategies[6].While choosing India as a case study, a framework should be developed with security of the voting data for direct deployment.Cloud computing services provides efficiency and cost saving

  • For encryption of data various algorithms can be used among which Elgamel, Okamoto-uchiyama&Paillier are now-a-days most likely to be used[3][4][5].Okamoto-Uchiyama algorithm is asymmetric cryptographic algorithm

Read more

Summary

INTRODUCTION

In the past two decades, various types of electronic voting systems have got considerable attention. The decrypted result matches the result of operations as if they had been performed on plaintext This property is used to hide the vital voting data form counting system [2].In this work we propose an approach for secure authentication of users in the cloud in online voting system. We make sure that there will not be violation of user credentials at the authentication stage , We make sure the vote given by voter will not be tampered as their values are encrypted and as we use algorithm with homomorphic property it will not be revealed at transferring on cloud. for meeting integrity constrain message digest is used so that an attempt for tampering of data will be detected. As with paper ballot system security of voting data cannot be handled

SYSTEM DESIGN
Message Decryption
RESULT
Vote message to be encrypted
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call