Abstract

Voting is a tedious task in this nation. The highest amount of controversies and corruptions are involved along this path. A nation needs a fair and unbiased election for the masses to redeem their right to elect the leader of their choice. The latest trends of EVM (Electronic Voting Machine) hacking has taken over the ability to hold a clear and transparent election. In this paper, we discuss an innovative approach by imbibing the latest technologies with the traditional voting methods. The technology involves a secure data storage technique named as block chain which is used for cryptocurrencies and is proven [7] for its security. The votes which are recorded by the EVM will be updated with the cloud-based storage (SAAS). Any changes made to the voting panel or tampering with the votes will cause the hash to break the link and by detecting the manipulated votes, any discrepancy can be removed by marking them as NOTA, hence not affecting the polling by any means. Blockchain technology has a significant feature of Proof-of-Work which does not allow the continuous creation of data blocks hence protecting the rapid manipulation of data. Also, this system only requires uploading the hashes created along with the blocks which are stored in a hash table [12] on the cloud. The data of the EVM, when tallied with the hash table, can help in identifying the point of manipulation. Moreover, the areas with no broadband internet connection can also implement these techniques as it required only a few kilobytes of upload data rate to update the hash values. The already existing UIDAI based biometric system already adds an extra layer of security to the voting system. Each vote will be treated as a single block of data. Also, as added features of block chain technology, the P2P (Peer to Peer) network allows only communication between two already connected peers. Man-in-Middle attacks are impossible in this case as the blockchain proof-of-work does not allow mass updating of data at a time, hence reducing the rate at which votes can be manipulated, hence securing a country’s political future.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.