Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Atharva Raskar, Mayur Pansare, Vishal Chumbalkar, Tushar Kamble, Mrs. Manisha Desai
DOI Link: https://doi.org/10.22214/ijraset.2023.52071
Certificate: View Certificate
India, known for its massive population of over 1 billion, holds the distinction of being the world\'s largest democracy. The voting process serves as a crucial link between the government and the electorate. However, recent years have witnessed a renewed focus on the technology used in the electoral process due to the numerous security loopholes in the existing system. Ensuring the security and transparency of the electoral process is crucial, and developing an electronic voting system that can be proven to be secure poses several challenges. Electronic voting systems offer several benefits, such as increased convenience and reduced costs. Nevertheless, there are still issues that need to be addressed, such as the inability of electronic voting machines to identify authentic users and the possibility of obtaining machines from unreliable sources. To address these concerns, the proposed solution involves developing a secure and efficient voting machine that uses blockchain technology to enhance security and transparency between users.
I. INTRODUCTION
Voting, whether it be done through traditional paper ballots or electronic means, is the cornerstone of modern democracies. However, in recent years, there has been an increase in voter apathy, particularly among the younger, more technologically-inclined generation. To combat this, e-voting has been touted as a potential solution to attract more young voters. In order to create a successful e-voting scheme, it is essential to meet a number of functional and security requirements, including transparency, accuracy, auditability, data integrity, privacy, availability, and distributed authority. One technology that has the potential to address many of these requirements is blockchain. Blockchain is a distributed network of interconnected nodes, each with its own copy of a ledger that contains a complete record of all transactions processed by the network. This network operates without a single controlling authority, and transactions are only accepted if the majority of nodes agree. This technology allows users to remain anonymous and has the potential to make e-voting more reliable and acceptable.
II. RELATED WORK
In a paper [1], a secure voting system that uses RFID-based biometric technology is proposed. The system involves two verification steps, with the first being the use of an RFID tag containing stored verification data in LPC 2148, and the second step using a fingerprint scanner to check if the RFID tag belongs to the individual. However, the system is deemed costly due to the use of RFID technology. Another proposed solution [3] is the development of a smart voting system utilizing fingerprint recognition technology, which enables voters to cast their votes from anywhere in India by going to their nearest voting booth. The aim is to create a secure biometric-based voting system that allows voters to securely vote from any region within India to their respective residential constituency using the nearest voting booth without any issues or concerns.
In a paper [4], a secure voting system is proposed to prevent unlawful voting. Authentication of an individual is performed using biometric data, while the voter's eligibility is verified through their Aadhaar information. The security of the system is ensured through the use of fingerprint biometrics. The fingerprint data stored in the Aadhaar serves as a reference and is used to authenticate voters during the voting process.
However, the basic electronic voting machines used today [5] have certain limitations, such as the possibility of multiple votes being cast by a single individual and the automatic rejection of invalid votes. To address these limitations, a smart system has been developed that uses fingerprint biometrics to prevent multiple voting in a straightforward manner. This system also employs automatic processing to verify and validate votes.
In a paper [6], an E-Voting protocol based on the RSA public key encryption cryptosystem is proposed. This protocol allows voters to cast their votes from their personal computers without any additional cost or effort. The security of the system depends on the public key encryption protocol, which is considered more reliable than previous voting systems. The proposed protocol is expected to increase voter confidence in the system and ensure that their votes are counted accurately.
Similarly, in another system [7], security measures have been implemented to protect against all types of attacks during the transmission of votes from the client to the server. These measures include protecting against both passive and active intruders. Additionally, the system proposes the use of biometric data such as thumb impressions or facial recognition to authenticate voters, rather than relying on usernames, for increased security.
The paper [8] proposes the use of a block-chain-based voting system, which may take some time to become widely accepted as it is a new concept and voting is a crucial aspect of democracy. On the other hand, the proposed model in [9] is considered to be highly secure compared to other models and is suitable for conducting major elections on a large scale. Once a vote is cast using the NCVVS system, the voter is sent a confirmation email that includes the ballot fingerprint and the election fingerprint, both of which are calculated using the SHA (256) hash function.
The proposed solution in [10] utilizes block-chain technology to eliminate potential risks in the communication channel. The system is decentralized and implements hashing and encryption methods to ensure security.
On the other hand, the approach described in [2] uses Aadhaar cards with a QR code issued by UIDAI. The voting process is conducted online and the data is stored on a secure server. The administrator can view the results by entering their user ID and password.
The emergence [11] of blockchain technology is creating opportunities for the development of innovative digital services. While research on the theme is as yet arising, it has for the most part centered on the specialized and legitimate issues as opposed to exploiting this novel idea and making progressed computerized administrations. In this paper, author will use the open source Blockchain innovation to propose a plan for another electronic democratic framework that could be utilized in nearby or public decisions. The Blockchain-based framework will be secure, solid, and mysterious, and will help increment the quantity of electors just as the trust of individuals in their administrations.
In this article [12], author propose the principal self-counting decentralized e-casting a ballot convention for a positioned decision casting a ballot framework based on Broad check. This convention needn't bother with any confided in arrangement or counting power to process the count. The citizens communicate through an openly open notice board for executing the convention in a way that is openly irrefutable. Our fundamental convention comprises of two adjusts. In the first round, the electors distribute their public keys, what's more, in the second round they distribute their randomized polling forms. All citizens give Non-intelligent Zero-Knowledge (NIZK) verifications to show that they have been following the convention determination sincerely without uncovering their mysterious votes. Toward the finish of the political race, anybody including an outsider spectator will actually want to register the count without requiring any counting authority. This system give security verifications to show that our convention ensures the most extreme security for every citizen.
Author [13] propose a functional stage free secure and obvious democratic framework that can be sent on any blockchain that bolsters an execution of a savvy contract. Undeniable nature is intrinsically given by the fundamental blockchain stage, though cryptographic procedures like Paillier encryption, confirmation of-information, and linkable ring mark are utilized to give a structure to framework security and client protection that are free from the security and protection highlights of the blockchain stage. We break down the accuracy and intimidation obstruction of our proposed casting a ballot framework. We utilize Hyperledger Fabric to convey our democratic framework and break down the exhibition of our conveyed conspire mathematically.
According to [14], the authors have developed a pioneering method of internet voting using Blockchain technology called the Open Vote Network. It is a decentralized and self-tallying protocol that offers maximum privacy to voters. It is specifically designed for boardroom elections and is implemented as a smart contract on the Ethereum Blockchain.
Unlike previous Blockchain e-voting protocols, the Open Vote Network does not require a trusted authority to compute the tally or protect the voter's privacy. Instead, the protocol is self-tallying, and each voter has complete control over the privacy of their own vote. The only way to compromise the privacy of a vote is through a collusion involving all other voters.
This is a significant advancement in the field of e-voting as it addresses major concerns such as potential vote tampering and a lack of transparency. With the Open Vote Network, voters can have confidence in the security of their vote and the accuracy of the election results.
Political violence [15] related to elections has been common in Africa and other developing countries
The use of BEV (Blockchain-based Electronic Voting) has several advantages in the electoral process. It can offer high levels of security and transparency, minimizing the risk of electoral violence. Additionally, BEV has the potential to generate more precise election results, based on mathematical calculations.
One of the key benefits of BEV is its decentralized nature, which eliminates the need for a central authority to manage the voting process. As a result, the costs associated with traditional voting methods are significantly reduced.
Furthermore, BEV has the potential to decrease the expenses associated with paper-based elections while increasing voter participation. By leveraging the convenience and accessibility of digital technologies, BEV can make the voting process more efficient and accessible to a wider range of people.
Overall, the implementation of BEV in electoral processes has the potential to revolutionize the way we vote, by making it more secure, accurate, and cost-effective.
III. EXISTING APPROACH
Numerous approaches have been implemented in the field of electronic voting to enhance the security, reliability, and efficiency of the voting process. These efforts are distinct from the algorithms used in e-voting systems. Despite these advancements, the existing electronic voting machines still have security risks that can compromise the integrity of the election process. Human error and technical malfunctions can occur, while internet-based e-voting is vulnerable to hacking, voter impersonation, system failure, and other threats from both domestic and foreign saboteurs. To address these issues, researchers and experts in the field of electronic voting continue to develop and implement innovative solutions. These include the use of blockchain technology to enhance security, the development of cryptographic protocols to protect privacy, and the use of advanced statistical techniques to ensure accurate vote counting. Overall, the ongoing efforts to enhance electronic voting systems are critical to ensuring the reliability and trustworthiness of the election process.
IV. PROPOSED APPROACH
The Smart E-voting system we developed uses blockchain concepts and a web interface to provide a secure online voting experience. To ensure security, voters are required to confirm their identity with a high-security OTP and their Aadhar Card before their vote is added to the main database. Another feature of the system is that voters can confirm that their vote has been counted for the correct candidate or party. The system automatically tallies the votes, which saves a lot of time, and enables the Election Commissioner of India to announce the results quickly. Overall, our proposed Smart E-voting system provides a secure, user-friendly, and efficient way for voters to participate in the democratic process.
A. Flow Diagram
B. Algorithm
The AES (Advanced Encryption Standard) algorithm is a symmetric algorithm used to convert plain text into cipher text for secure transmission or storage. It was developed to address the weaknesses of the DES (Data Encryption Standard) algorithm, which had a 56-bit key and 64-bit block size that were no longer secure against modern attacks. The AES algorithm uses a block size of 128 bits and keys of 128, 192, or 256 bits. It was developed by Joan Daemen and Vincent Rijmen, who called it Rijndael. To encrypt data using AES, the algorithm takes in a secret key and plain text input of the same bit size (e.g., 128-bit key and 128-bit input). The algorithm then processes the input through 10, 12, or 14 rounds, depending on the key and input size. Each round consists of four steps: substitution of the input bytes, shifting of the rows, mixing of the columns, and adding of the round key. The final round differs slightly from the previous rounds. The output of the AES algorithm is the cipher text, which is the encrypted version of the plain text input. The cipher text is also of the same size as the input, typically 128 bits for most modern applications.
2. SHA 512
A hashing algorithm's main purpose is to ensure that it is almost impossible to find two different inputs that produce the same output, which is known as a collision. If a collision is detected, it can call into question the accuracy of the original message that was un-hashed. SHA-0 and SHA-1 have both been found to have several collisions, making them unsuitable for use in real-world scenarios. On the other hand, SHA-2 encryption has proven to be highly secure, with no collisions detected and no current technology capable of breaking it. However, given the development of quantum computers, it is possible that SHA-512 could have a security advantage in the future. It is more likely, though, that new, quantum-resistant algorithms will need to be developed to replace all SHA-2 algorithms to protect against potential collision attacks.
This paper described, an electronic Voting system for small to medium sized Internet-based public opinion systems that provides privacy of vote, voter’s authentication, auditability, security, double-voting prevention, fairness voting device from manipulating the authenticated voters voting choices.
[1] J.Deepika, S.Kalaiselvi, S.Mahalakshmi, S.Agnes Shifani, “Smart Electronic Voting System Based On Biometric Identification-Survey”, International Conference on Science Technology Engineering Management (ICONSTEM) March 2017. [2] Ravindra Mishra, Shildarshi Bagde, Tushar Sukhdeve, J. Shelke, “Review on Aadhaar Based Voting System using Biometric Scanner”, International Research Journal of Engineering and Technology(IRJET), Feb 2018. [3] Girish H S, Gowtham R, Harsha K N, Manjunatha B, “Smart Voting System”, International Research Journal of Engineering and Technology (IRJET) May 2019. [4] K. Lakshmi, R. Karthikamani, N. Divya “Aadhar Card based smart e-voting system”, International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 8958, Volume-8, Issue-2S, December 2018. [5] G.Saranya, R.Mahalakshmi, J.Ramprabu, “Smart Electronic Voting Machine surveillance”, International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 8958, Volume-8, Issue- 2S, December 2018. [6] Ashish Singh, Kakali Chatterjee, SecEVS: Secure Electronic Voting System Using Blockchain Technology, International Conference on Computing, Power and Communication Technologies (GUCON) Galgotias University, Greater Noida, UP, India. Sep 28-29, 2018. [7] Prof. Mrunal Pathak, Amol Suradkar, Ajinkya Kadam, Akansha Ghodeswar, Prashant Parde, \"Blockchain Based E-Voting System\", International Journal of Scientific Research in Science and Technology (IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 8 Issue 3, pp. 134-140, May-June 2021. [8] Ritika Singh, Riya Chaudhary, Adarsh Tripathi, “Electronic Voting System Using Blockchain”, International Journal of Scientific Research in Engineering and Management (IJSREM), Volume: 05 Issue: 05 | May -2021 [9] Abhijit J. Patankar, Kotrappa Sirbi, Kshama V. Kulhalli, “Preservation of Privacy using Multidimensional K-Anonymity Method for Non-Relational Data”, International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8 Issue-2S10, September 2019. [10] Ashraf Darwish and Maged M El-Gendy, A New Cryptographic Voting Verifiable Scheme for E-Voting System Based on Bit Commitment and Blind Signature, International Journal of Swarm Intelligence and Evolutionary Computation. [11] A.B. Ayed, ”A conceptual secure blockchain-based electronic voting system,” Int. J. Netw. Secur., vol. 9, no. 3, pp. 01-09, May. 2017. [12] S. Panja, S. Bag, F. Hao and B. Roy, “A Smart Contract System for Decentralized Borda Count Voting,” IEEE Trans. on Eng. Manag.,DOI: 10.1109/TEM.2020.2986371, 2020. [13] Yu, J.K. Liu, A. Sakzad, S. Nepal, R. Steinfeld, P. Rimba, and M.H. Au, “Platform-Independent Secure Blockchain-Based Voting System,” in ISC, Guildford, UK, Sept. 2018, pp. 369-386. [14] P. McCorry, S.F. Shahandashti, and F. Hao, “A smart contract for boardroom voting with maximum voter privacy,” in FC, Sliema, Malta, Apr. 2017, pp. 357-375. [15] N. Kshetri and J. Voas, “Blockchain-enabled e-voting,” IEEE Softw., vol. 35, no. 4, pp. 95-99, Jul. 2018
Copyright © 2023 Atharva Raskar, Mayur Pansare, Vishal Chumbalkar, Tushar Kamble, Mrs. Manisha Desai. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET52071
Publish Date : 2023-05-11
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here