Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Prasanna Patil, Rahul Mohod, Prasad Khaire, Punyabhuraj Suryawanshi, Avnesha Banik
DOI Link: https://doi.org/10.22214/ijraset.2023.52097
Certificate: View Certificate
We place a great deal of importance on our electoral system as a society. As a result of the election system, we developed the future of our nation and country. Technological advancements and inventions are very easy to come by in the modern world. Nowadays, everyone wants a sophisticated lifestyle and rapid speed. In this technology when the development of the nation is mandatory then trusted technology is also mandatory. Blockchain technology is secure and end-to-end encrypted. When the technology meets the human correct needs then technology correct use is invoked. We are using blockchain technology to create a secure voting system that eliminates concurrence. Blockchain technology is a decentralized, disruptive, encrypted voting system that is necessary for the current era. E-voting systems designed for end-to-end encryption, security, portability, user-friendliness, and preference are described in this paper.
I. INTRODUCTION
In our e-voting system we define selection is a smart contract between voter and our system. Each node is connected to another node in between the voting system. We developed a web where blockchain technology is used for validation, verification, authenticity, and accuracy. Based on the blockchain system, we build a secure model beyond the trust boundaries. Blockchain enables for decentralization, without intermediaries. The blockchain need is Voting system shouldn’t be traceable. Voters are sure of where their votes are counted. In the voting system eligibility also verify. The election system is cost-efficient. Blockchain is a tamperproof and non-alterable system. Html, CSS, and JScript are the web building languages used for the system.
We define selection in our e-voting system as a smart contract between the vote and our system. In the voting system, each node is connected to another node. With the help of blockchain technology, we developed a web that validates, verifies, authenticates, and ensures accuracy. We create a secure model that transcends trust boundaries through the blockchain system. Subsidiarity are enabled by blockchain, without the need for intermediaries. The blockchain need is Voting system shouldn't be traceable. Voters are sure of where their votes are counted. In the voting system eligibility also verify. The election system is cost-efficient. Blockchain is a tamperproof and non-alterable system. Html, CSS, and JScript are the web building languages used for the system.
II. METHODOLOGY
A. Frontend
Frontend of e-voting system involves several sub modules. The System user will interact with this module. This frontend module is consisting of various sub-modules, and all these sub-modules will work independently. There are a total of ten sub-modules, they are as follows:
B. Backend
In the backend, Ethereum is used to store data. In this system, there is no interaction between the votes cast by voters and their identities. A casting vote is permanently recorded and cannot be modified or altered at any circumstances. In order to ensure the number of votes is accounted for, the system will be verifiable. Voting will be restricted to registered voters.
Summary of Papers:
In order to keep the nation from being tripped up by premature results, the poll panel must not be activated before the end of the event.
13. “J. P. Gibson, R. Kri0069mmer, and V. Teague, and J. Pomares”[2015], Paper Name: “A review of: E-voting, the past, present; and future”, Block chain system Advantage They take a different view of electronic voting. The review focuses on past and current e-voting systems.
14. “Rachid Anane, and Richard Freeland and Georgios Theodor Poulos” [2014], Paper Name: “E- voting requirements & implementation Blockchain system, networking, cryptography advantage A prototype e-voting system is designed and implemented, and a context is provided for selection and deployment of appropriate mechanisms. By securing worthiness, and preventing bribery; and coercion, they could not maintain not maintain the integrity of the democratic process
III. PROPOSED SYSTEM
From above listed papers we have observed that many of papers used peer to peer network technology, cryptography, etc. technologies. We have observed some limitations, to overcome this limitation we have add a new idea in our system. In earlier system authentication is done by authenticating voter id number. In our system authentication is done by authenticating Aadhar number by sending OTP to the voter’s mobile number linked with Aadhar number, before authentication voter has to solve auto-generated captcha. If the voter has valid age, then voter can move further for next window. After that voter can cast vote for desired candidate.
IV. SHA 256 ALGORITHM
SHA-256 is a variant of SHA-2 (Secure Hash Algorithm 2), which was invented by the National Certain sensitive information must be protected by the US government using SHA-256Security Agency in 2001. Cryptographic hash function SHA-256 produces a value of 256 bits. Hashing functions like SHA-256 are among the most secure on the market. Certain sensitive information must be protected by the US government using SHA-256. Specifics of SHA-256's operation are classified, however, we know that it uses a Merkle-Damaged structure derived from a specialized block cipher's one-way compression function.
Security is provided by three properties of SHA-256. In the first place, reconstructing the original data from a hash value is nearly impossible. To generate the initial data, there would need to be 2256 attempts to perform a brute-force attack. Secondly, it is extremely unlikely that two messages will have the exact equal hash value (called a collision). Since there are 2256 possible hash values (more than the number of atoms in the known universe), it is highly unlikely that two have the same hash value. Lastly, changing the original data so much changes the hash value so it isn't immediately apparent it comes from the same source; this is known as the avalanche effect.
V. RESEARCH GAP ANALYSIS
By referring to several related works, the following challenges associated with the E-voting system are noticed:
The primary initiative is for developed an easier, cheaper, and more secure voting system. We focused on the use of a sensible voting system. We have also focused on security issues in the previous system and tried to overcome them. This voting system is providing transparency between the voter and the election system. Blockchain-based E-Voting system gives surety of authentication to the voter. We are trying to avoid data loss and interference from the third party. The system has only one admin and only the admin can change and update the data of the voting system for avoiding mismatch and loss of data. OTP generation is a mandatory part of the system. After OTP generation voter is ensured that he is in the login phase. Authenticity is the main part of our system that it invokes very well. On the other hand, after getting successfully OTP voters are visible to the next window, where they can see party names and their symbols, candidate names, and the vote option button. After one vote initializes the voter vote option gets disabled, that is one voter can give only one vote.
[1] Bitcoin: A peer-to-peer electronic cash system”, by Saki Nakamoto, [2008] [2] “Decentralized Electronic Voting System Using Blockchain Technology”, [11 | November 2018] , Mrs. Harsha V. Patil1, Mrs. Kanchan G. Rathi2, Mrs. Malate V. Tribhuwan3. [3] A Decentralized Voting Application Based on Blockchain Technology\", [06 Issue: 04], Manoj Shriniivas1, Chandann S2, Mohammed Shamal Farhan3 - April 2019 Ramyashree. [4] \"Star-vote: A secured, transparent, auditable and reliable voting system. \", [2013, By Bell, S., Benaloh, J., Byrne, M. D., De Beauvoir, R., Kortum, P., Mc Burnett, N., Pereira, O., Stark, P. B., Wallach, D. S., Fisher, G., Montoya, J., Parker, M. and Wien, M.. [5] A fair and robust voting system. [2012] By Daliea, K., Benn, R., Peter Y. A; and Feng, H [6] \"Web-based open-audit voting.\" , [2008] , by Adida, B.; \"Helios\" [7] The \"Scantegrity;- End-to-end voter-verifiable optical scan voting.\"; [2008] By Chaumm, D., Essex, A., Carbacck, R., Clark, J., Popoveeniuc, S., Sheirman, A., as well as Voria, P. [8] \"Bingo voting; Secure and coercion-less voting using a main random number generator\", by Bohlin, J. M., Muller-Quaide, J., Rohricch. [9] The \"Scratch and vote; Self-contained paper based on cryptographic voting\", [2006] by Adieda B. with R.L. Rievest. [10] A Conceptual Secure Block Chain-Based Electronic Voting System, 2017 IEEE International Journal of Network & Its Applications (IJNSA). [11] A Blockchain-based E-Voting Recording System Design by Rifa Hanifatunnisa and Budi Rahardjo, IEEE, 2017. [12] “Towards Secure E-Voting Using Ethereum Blockchain”, 2018 IEEE Conference on. [13] \"Blockchain and Its Applications - A Detailed Survey\", International Journal of Computer Applications (0975 - 8887) Volume 180 - No. 3, December 2017. [14] \"E-Voting with Blockchain: An E-Voting Protocol with Decentralization and Voter Privacy\", IEEE 2018,03 July 2018. [15] Mrs. Harsha V. Patil1, Ms. Kanchan G. Rathi2, and Mrs. Malati V. Tribhuwan3 Dece ntralized voting system study using blockchain technology IRJET, International Research Jou rnal of Engineering and Technology, Volume: 5, Issue: 11, November 2018.
Copyright © 2023 Prasanna Patil, Rahul Mohod, Prasad Khaire, Punyabhuraj Suryawanshi, Avnesha Banik. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET52097
Publish Date : 2023-05-12
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here