Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Mr. Prashanth Kumar N, Mrs. Renuka Malge
DOI Link: https://doi.org/10.22214/ijraset.2022.45466
Certificate: View Certificate
Electronic voting is frequently seen as a method for increasing the electoral system\'s monetary effectiveness and management trust. When implemented correctly, e-voting technologies can increase ballot integrity, accelerate the results mechanism, and simplify the voting process. However, the unit of methodological issues are well-organized. If not meticulously planned and managed, electronic voting has the tendency to endanger the reliability of the system electoral arena. Before selecting to employ new choosing innovations, it is essential to carefully evaluate essential concerns as they will have an impact on the performance of E-voting alternatives. Since the 1970s, electronic voting has been employed in a variety of ways, and it has a number of fundamental strengths beyond paper-based processes, including greater hyperbolic potency and fewer mistakes. Although the strength among these systems versus security vulnerabilities is growing with relevance, it is still complicated to understand their extensive applications. Block chain technology, which aims to increase the reliability of e-voting technologies, also might lead to riots. It demonstrates a potential way to make use of block chain\'s benefits, such as associated disclosure study, to comprehend a fiscally sustainable topic for electronic voting. The suggested motif satisfies the requirements for electronic voting systems and ensures end-to-end provability. The planned e-voting theme and how it will be implemented on the Multi chain platform are indeed thoroughly explained. The study offers in-depth analysis of a topic that consistently demonstrates its ability to understand a related, end-to-end, validated e-voting concern.
I. INTRODUCTION
The major democracies in the world employ electronic voting in polling places and other countries mostly small ones with a history of peaceful discord web voting. Several nations are now pondering instances, if used across a number of elections, may potentially diminish the value of subsequent elections or plebiscites. The electronic voting system is not error free. In certain instances, there were also complex legal difficulties, so although, there has already been suspicion or hostility to the implementation of cutting edge alternative technology about using e-voting policies in an attempt to improve various facets of the political process. E-voting is frequently identified as a means for promoting democracy, fostering confidence in electoral administration, enhancing the credibility of election outcomes, and enhancing the effectiveness of the political process. Election executives, observers, humanitarian bodies, resellers, and regulatory agencies are continuously changing their methodological approaches to ensure that they are in line with the rapid technological advancement. If successfully enforced e-voting workarounds will nullify all known common fraud routes, pace up the processes of results, enhance access, and create options that are more advantageous for community members in some countries.
Some inevitable difficulties of voting machines are commendable and appropriate due to the complex of electronic methods and techniques. Many electronic voting options don't provide voters or perhaps even election observers with enough insight. The majority of e-voting systems are only properly appreciated by small group of experts, therefore rather than hundreds of scrutineers and small group of software vendors are primarily responsible for maintaining the legality of the election process. If not well thought out and implemented, the implementation of e-voting will erode trust in the entire political process. Consequently, it is crucial to invest enough time and money into thinking through its launch and looking at past electronic alternative expertise.
One of the emerging technologies with solid encryptions foundations is block chain, which permits apps to be using these skills to construct robust cyber security remedies. A block chain is similar to a conceptual framework that preserves and communicates all of the transactions that have taken place since its inception. It is basically a dispersed regionalized computing system that keeps track of something like extensive set of continuously forming and expanding content resources that are protected against illegal manipulation, interference, and alteration. Owing to the presence to protect the vote's confidentiality as well as to prevent any connection between both the voter's identity and the vote cast e-voting systems function in a fundamentally different way.
II. RELATED WORK
Due to its intrinsic defensive ambiguity and ability to sustain a publicly accessible dispersed record of transactions through all servers, block chain might play a vital role in the field of electronic voting. This renders using block chain technology extremely cost-effective in order to handle the risk of using a certain unit again and again and to consider how this can affect the result's integrity. Researching the main issues such voter anonymity, vote secrecy, and end-to-end validation is where our evaluation places the greatest emphasis. These issues served as the impetus for the creation of a monetary means of protecting the validity of the voting process.
A. Follow my Vote
Electronic voting systems have been developed recently, however the bulk of them are lacking in information which includes on how they function. That ability to "Follow My Vote" is merely among the many available. This technique leaves a lot of questions unresolved on how a public block chain infrastructure works.
Its intention of Electorate would be to develop a solid online voting mechanism that may avoid increased election transparency. Although since inception of democracy, charges of malpractice in elections always afflicted every country.
III. CAPABILTIES OF E-VOTING SYSTEMS
Along with technologies for organization, communication, encryption, and cryptographic, electronic voting systems perform a variety of internal tasks. An in-depth examination of these functions extends beyond the confines of this paper's immediate subject matter. Furthermore, it is indeed helpful to consider the following list of various end-user features that certain platforms can offer to both voters and election observers to get a fundamental knowledge about exactly e-voting platforms can perform.
A. Block Chain
Block chain is a peer-to-peer distributed ledger technology that generates precise, persistent, and comprehensive archives without requiring the involvement of a private entity. Along with its potential to reduce risks and frauds in a manageable way, this emerging and revolutionary technology has attracted wide recognition.
In comparison to a typical centralized system, a redistributed network has a number of benefits, including increased system security and privacy. Furthermore, these platforms are much simpler to grow and have no actual performance degradation. Integrated communication and distributed processes are responsible for the decentralized nature of the public block chain.
When opposed to outdated client-server-primarily cellular architecture, the P2P architecture of block chains offers several benefits, including enhanced stability. Block chains have fairly high level of resistance to harmful actions to a scattered P2P network and consensus agreeable preference.
B. Fundamental Elements of the Block Chain Architecture
C. Smart Contracts
Block chain maintains high security for the vote, and a smart contract, which is a component of the block chain, handles computation. Following installation the smart contract is released to the block chain - based system. The configurations may have attributes like timeframes or contenders. It is not necessary for the contender to be an individual; instead, they can stand for almost anything, which is what elections are for. This enhances to the voting's legitimacy because the published and it cannot be altered or updated. An access list of users with voting rights is included in the smart contract. Notable features that are carried out by the key authority must be followed by the access control list. The information is homomorphically scrambled and kept in a block chain. To create the concealed election outcome, the smart document must contain the homomorphic encryption public key.
The encryption key private which is used to view the statistics following the conclusion of voting this credential can be given out to involved entities that are in charge of evaluating votes. Nobody is aware of the ongoing outcomes as they're only apparent at the conclusion. Voters can only cast one vote and cannot cast more than one, thus we employed minimal proof to ensure that the votes had the appropriate data and to increase security.
D. Results interface
The gateway to the conclusions is represented by this element. The interface has to have access to the block chain and provide clients and monitors with data. Exit polls are also included in the metadata, and block chain technology should be accessible in order to view all interactions. Only the final data are summarized, and the findings were presented graphically for easier interpretation. As a consequence of the homomorphic encryption being used, official stats are not accessible.
This is also the rationale why sticking towards certain supervision and safeguarding standards, but also providing implicit proof of the reliability of the computer conclusions, including such safety and emergency preparedness or the use of empirical data, are crucial. Without these protections, altered or misleading results generated by an electronic voting system may take a very long time to be discovered.
IV. E-VOTING IN SUPERVISED AND UNSUPERVISED ENVIRONMENTS
E-voting is frequently done in settings that can be neither supervised nor unsupervised.
A. E-voting occurs in realistic conditions when ballots are cast at polling places voting machines or other sites under the supervision of staff members appointed by the electoral supervision authority. By doing so the election administrator will effectively control both the polling innovation and the rules and guidelines that voters must abide by when casting their votes.
V. SYSTEMS WITH OR WITHOUT VOTER AUTHENTICATION
Certain electronic voting techniques are just being used for voting with manual voter identification remaining others have an additional module for voter identification using an electronic voter list or poll book. A few voting devices in polling places and all web-based voting systems have an authentication module.
A voting system that handles both voter registration and ballot casting is inevitably open to criticism and almost certain to be corrupted. Even after the two components there may still be a chance for internal interpreters to compare the two sets of data. In order to prevent the joining of these two sets of expertise under scenarios this danger necessitates the establishment of special technical and administrative security precautions the covertness of these policies is what will be put to the vote thus it is crucial that they are explained and shown to all relevant parties.
A. Future scope of E-voting using Block chain
In order to evaluate many barriers to implementing such a technology for the Republic of India's judicial framework as a whole it is crucial to understand its practical and methodological foundations.
The only difference between remote voting using the block chain system and digital currencies is that remote voting uses a synthetic token to symbolize a "vote" rather than electronic cash. Peer-to-peer technology using concept where in data once published can't be modified and crypto may be necessary for this. This guarantees that, once written, the information cannot be altered. The computerized ledger can allow for secure preservation of personal information and the online transmission of ballots. To provide openness and thwart unfair tactics the ballot rolls and consequently the vote total would be posted within in the proprietary interest.
This analysis aims to analyse and evaluate flow on block chain based electronic voting systems. The article looks at block chain-based delayed electronic voting machines. Existing electronic voting systems are introduced after the block chain concept as well as its goals. Then, at that time a number of deficiencies in the current electronic voting systems are identified and addressed. The full potential of the public block chain is crucial to advancing electronic voting providing compelling solutions for block chain based online voting and exploring potential avenues for such systems. Many experts concur that block chain is the best technology for decentralised electronic voting systems. Furthermore the democratic archives maintained in these suggested frameworks might be seen by all registrants and impartial observers. However experts discovered that the majority of block chain based virtual democracy deployments discriminated and handled comparison concerns. In electronic democratic there have been several review gaps that need to be filled in throughout continuing exams. Asymmetric attacks a lack of honesty a reliance on dishonest systems and resistance to impulsive behaviour are potential drawbacks that need to be addressed. We need to do more research since we are not fully aware of all the risks connected to the security and adaptability of block chain based digital democracy systems. Using block chain voting techniques could expose users to unforeseen security risks and flaws. Technological sophistication and organisational prowess are needed for block chain advancements. In order to encourage participation the critical concerns outlined above addressed in more detail during actual voting procedures. Therefore before being used more widely voting machines methods should first be tested in small areas. The web and surveying devices genuinely have several security flaws. Significant safety changes will be needed for electronic voting over a strong and dependable web. Despite seeming like the perfect solution these flaws prevented the block chain structure from fully resolving the problems with electoral processes. This study showed that there are still many technical problems and that block chain systems created problems that needed to be addressed. Therefore it\'s crucial to understand that block chain based innovation.
[1] S. Cosmas Krisna Adiputra, Rikard Hjort, and Hiroyuki Sato, “ A Proposal of Block chain-based Electronic Voting System ”, Dept. of Electrical Engineering and Information Systems.Artis Mednis, Girts Strazdins, Reinholds Zviedris, Georgijs Kanonirs, Leo Selavo, “Real Time Pothole Detection using Android Smartphones with Accelerometers.” [2] Ashish Singh,Kakali Chatterjee,” Secure Electronic Voting System Using Block chain Technology”,2018 International Conference on Computing, Power and Communication Technologies (GUCON) Sep 28-29, 2018. [3] Ali Kaan Koc,Umut Can abuk,Emre Yavuz ,Gokhan Dalkoloc,”Towards Secure E-Voting Using Ethereum Blockchain”.Available at: ieeexplore.ieee.org/document/8355340/. [4] Henry Rossi Andrian, Novianto Budi Kurniawan, Suhardi,”Block chain Technology and Implementation : A Systematic Literature Review”.2018 International Conference on Information Technology Systems and Innovation (ICITSI) October 22-25,2018. [5] Dipali Pawar, Pooja Sarode, Shilpa Santpure, Poonam Thore, Prof. Pravin Nimbalkar, “Secure Voting System Using Blockchain”, Department of Computer Engineering, JSPMs Imperial College of Engineering and Research Pune,India.Available:https://www.ijert.org/secure-voting-systemusing-blockchain [6] H Halpin,M Piekarska,”Introduction to Security and Privacy on the Blockchain”, 2017 IEEE European Symposium on 2017 - ieeexplore.ieee.org. [7] Christopher G.Harris,”The Risks and Challenges of Implementing Ethereum Smart Contracts”.Available at:https://ieeexplore.ieee.org/document/8751493. [8] Basit Shahzad and Jon Crowcraft,”Trustworthy Electronic Voting Using Adjusted Blockchain Technology.”
Copyright © 2022 Mr. Prashanth Kumar N, Mrs. Renuka Malge. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET45466
Publish Date : 2022-07-09
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here