Abstract

SQL injection attack is now the most common server-side attack in web applications whereby malicious codes are injected into the database through user input fields by unauthorized users and this could lead to data loss or in the worst case, to database hijacking. The utilization of Blockchain technology in e-voting applications is not a new thing. Many systems have been proposed using cryptography and other security techniques. In those systems, minimal involvement of third party is observed, a problem of coercion resistance and transparency maintenance at the same time is observed and most processes have not been implemented to evaluate the systems further. This paper applies the cryptographic signatures to validate the origin and integrity of the votes by preserving the voter’s choices during the election process. Furthermore, authors provide several possible extensions and improvements that can be made as an addition to the scope of this research.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call