International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.

Size: px
Start display at page:

Download "International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015."

Transcription

1 Android Based E-Voting. Harshad Velapure, Saurabh Rai, Saransh Sharma, Preetam Naiknavre, Pranali Jadhav, Kalyan Bamane Department of Information Technology, D. Y. Patil College of Engineering, Akurdi, Pune, A B S T R A C T Today s world is all about Technology, Time is money becomes the equation. In such cases voting becomes very hectic if the process itself takes days. To help improve efficiency of voting system, on-line Voting is really a great option. A voter may only need to register only once for a particular election and that does all, voter need to cast his /her vote without actually have to present at the voting cell. The registration process must be done at Booth application for once then voter is been given a facility to vote from his Android mobile phone irrespective of his/her location. In addition as a service provider android application will be designed for voting purpose. Voter can see the list of applying candidates at the time of voting. Index Terms: Android, E-voting system, Web services, One time password, Digital signature, Face recognition. I. INTRODUCTION Voting for any social issue is essential for modern democratic societies now a day. So it is becoming very important to make the voting process more easy and efficient. In other hand the rapid development in operating system of the mobile phones gives rise to the application development on the large scale. The main reason behind the tremendous development in android application is that the android is an open source operating system. It means that the software developers can have customization rights. As well as the software development kit provides tools to build and run Android applications. [6] With the appearance of cell phones with programmable platform, it is possible the development of application for worldwide popular participation, by the digital vote using mobiles. There is a raising interest for voting on SMS cell phones, and through social networking tools like Facebook or Twitter. It s believed that the voting process by cell phones gives some decision power to the citizens, which can actuate directly on decisions of their concerns. The voting process also can give ways for numerical information surveillance about social phenomena. For this reason, the following research is being developed with the intension to survey future scenarios which can occur during the international voting process by mobile devices. Our system gives facility to voter to vote from any location through their cell phone. Also security is maintained for any external attacks on the system. II. LITERATURE SURVEY A. Electoral system in India the technology used in India for voting is Electronic voting machines. There are two systems developed for conducting an electronic voting machine. These are the DRE (Direct Recording Electronic) and Identical Ballot Boxes. A DRE voting system records votes by means of an electronic display provided with mechanical or electro-optical components that can be activated by the voter, that processes voter selections by means of a computer program, and that records that processed voting data in memory components. It produces a tabulation of the voting data that is stored in a removable memory component and may also provide printed renditions of the data. The system may further provide a means for transmitting the processed vote data to a central location in individual or accumulated forms for consolidating and reporting results from precincts at a central location. DRE , IJAFRC and NCRTIT 2015 All Rights Reserved

2 systems additionally can produce a paper ballot printout that can be verified by the voter before they cast their ballot. [4] B. Identical Ballot Boxes the Identical Ballot Boxes hold the ciphered vote, encrypted with the PMA voting key and the ciphered Identification Card Number, encrypted with their personal 4 digit key. It is designed to accept connections from the vote distribution server, and ensures an acceptable level of security as far as remote vote manipulation is concerned. In the current version of the system, it has been implemented in SQL Server The connection the voting distributor, and the administration server is established through JDBC 3.0. [4] C. Integrated Election Software package Integrated Election Software package, running on a Microsoft Windows computer, allows the election official to set up and record the details of an election. When voting is completed, it counts the votes and displays the outcome of the count results in the format Irish voters are familiar with. The PCs used are stand alone and security hardened for the election software only. Access to the PCs is also controlled by a security key. [4] III. SYSTEM SPECIFICATION Android e-voting application on smart phone user gives voter facility to vote, an application with an interface for consultation to a dynamic web page offers the main question to be answered (voted), and together to this page are available the buttons to send the votes: Yes, No. Admin can see the voting results according to vote options. Initially the voters should have to provide their voter id/ Aadhar number to authenticate themselves and establish their user-ids. This constraint is imposed to ensure that only the genuine person is allowed to vote in the elections. The aim of this work is to design and implement an electronic voting application for the Android platform that will enable people to vote securely from anywhere. The application as a whole is aimed at being compatible with devices from many manufacturers and running different versions of the operating system. The application is also aimed at being localized. IV. ANDROID BASED E-VOTING Making the electronic voting system has a security and confidence system by the user, usually user can access to the electronic voting system and voting on the text without security system, that any user can access to the electronic voting system through the ID number for another user and he/she can vote more than one time at the same text, The users could know the result of voting during the process of voting which make the system dicey and mistrust, The user can dominate the result of voting by the access that he or she has of the result before the end of election day. A. Definitions about system users To explain the system proposed by methodology, two types of users were defined. set of participants who tries to access the E-voting application and set of eligible voters which use the application available on smart phones. For the implementation of the application on the smart phones, it was assumed that every device is associated to its owner, through a validation database. A. Architectural Work The architecture for an e-voting system is as below in fig , IJAFRC and NCRTIT 2015 All Rights Reserved

3 B. Working Flow Figure 1: Architectural Design of Android Based E-Voting At first any new voter has to register through booth i.e. on the Internet web site through provided web services. At the time of registration voter will be asked to enter his u-id and password. Also his aadhar card number will be asked also voter s face will be captured and stored into the database. On successful registration an /sms get sent to user regarding further announcement of election or any important details. Also an Android application will be provided to voter for voting purpose. All voting details will be given to voter. on the day of voting voter can see list of participants. At the time of requesting vote, voter will be asked to have his/her face recognized. Also one time password (OTP) will be generated and sent to the phone number of the voter. [5] If voter s face is matched with the one in the database and also voter entered right OTP. [2] Then vote will be considered and voter is automatically logged out. C. Algorithms Used 1. Message Digest 5 The MD5 message-digest algorithm is a widely used cryptographic hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number. [1] MD5 has been utilized in a wide variety of cryptographic applications, and is also commonly used to verify data integrity. [7] , IJAFRC and NCRTIT 2015 All Rights Reserved

4 2. One Time Password Figure 2: Message Digest 5 A one-time password (OTP) is a password that is valid for only one login session or transaction. OTPs avoid a number of shortcomings that are associated with traditional (static) passwords. The most important shortcoming that is addressed by OTPs is that, in contrast to static passwords, they are not vulnerable to replay attacks. This means that a potential intruder who manages to record an OTP that was already used to log into a service or to conduct a transaction will not be able to abuse it, since it will be no longer valid. [5] Figure 3: One Time Password 3. Face Algorithm Face detection algorithm is useful in keeping track of voters who actually voted. Also it extends security measures in the system , IJAFRC and NCRTIT 2015 All Rights Reserved

5 V. TECHNICAL SPECIFICATIONS A. Advantages Figure 4: Face Algorithm Unique Identification of voter through Aadhar number/user-id. Extremely secure system with One time password, Face recognition. Secure vote casting through Digital signature algorithm. Improves voting with friendly Android Interface. Portable system, as system itself on Android platform. No fraud vote can be submitted. B. Disadvantages Device dependency: The application is only for an Android smart phone. So this is device dependent. Failure of device: If sometimes Android phone is get failure because of other applications of an phone, then user is not able to run the e-voting application. C. Applications College elections Confidential recruitment , IJAFRC and NCRTIT 2015 All Rights Reserved

6 General elections. International Journal of Advance Foundation and Research in Computer (IJAFRC) VI. MATHEMATICAL MODEL Mathematical model can be created using set theory 1. V - Set of eligible voters (Those who have already registered and have not yet cast a vote) 2. A - Set of all people(voters) who tries to access electronic voting system, whether or not this voter has right to vote. 3. S - Set of votes(encrypted) stored in main Database. A is a superset of V. A V only those voters can vote who are authorized. [6] Unauthorized Voter s, S : voters(s) V that is, the e voting system contains only those e-votes (ss) from which the corresponding voter (voters(s)v) is listed in the voter list. In order to ensure this, the voter needs to identified and authenticated. One voter one vote: s, s S : voters(s)=voters(s ) s=s that is, whenever the set S of cast votes contains two votes from the same voter, then these two votes are identical. Thus, only one of the stored e-votes is tallied. This means that each voter can cast only one vote. VII. CONCLUSION This paper focused on the analysis of development of E-voting application on an android platform. The usability of this system is very high if it gets implemented in real life election process. It will definitely helpful for the users who wish to vote and the voting process will be made very easy by using this application. The uniqueness with registration through aadhar number and face recognition will provide very strong security for the confidential information about vote. VIII. REFERENCES [1] B. den Boer and A. Bosselaers. Collisions for the compression function of md5. Advances in Cryptology, Proc. Eurocrypt 93, LNCS 765, T. Hellseth, Ed., Springer Verlag,194, pp [2] Aaima Najam Faizan Ahmad and Zeeshan Ahmed. Image based face recognition. IJCSI International Journal of Computer Science Issues, [3] Sainath Gupta. Passblot: A usable way of authentication scheme to generate one time passwords. [4] Online resource material at : [5] Ahmad Alamgir Khan. Preventing phishing attacks using one time password and user machine identification. International Journal of Computer Applications, [6] Sarika Kale Kirti Autade, Pallavi Ghadge. E-voting on android system. International Journal of Emerging Technology and Advanced Engineering, , IJAFRC and NCRTIT 2015 All Rights Reserved

7 [7] Subrata Kumar Das Md. Alam Hossain, Md. Kamrul Islam and Md. Asif Nashiry. Cryptanalyzing of message digest algorithms md4 and md5. International Journal on Cryptography and Information Security (IJCIS), [8] Vineet Kumar Singh. Analyzing cryptographic network for secure cloud network. International Journal of advance studies in computer engineering , IJAFRC and NCRTIT 2015 All Rights Reserved

An Implementation of Secure Online Voting System

An Implementation of Secure Online Voting System An Implementation of Secure Online Voting System Prof. Anisaara Nadaph 1, Rakhi Bondre 2, Ashmita Katiyar 3, Durgesh Goswami 4, Tushar Naidu 5 1 Pune University, Trinity college of Eng. And res., anisaaranadaph@gmail.com

More information

Online Voting System Powered by Biometric Security using Cryptography and Stegnography

Online Voting System Powered by Biometric Security using Cryptography and Stegnography ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Online

More information

Cloud Computing E-Voting: A Technical Review

Cloud Computing E-Voting: A Technical Review Cloud Computing E-Voting: A Technical Review Ms.Bhargavi Jadav 1, Ms.Aneri Desai 2, Mr.Fenil Patel 3, Mr.Ronak Patel 4, Ms.Julisha Patel 5, Ms.Bhumika Patel 6 and Mr.Manish vala 7 1,2,3,4,5 Uka Tarsadia

More information

E-Democracy and e-voting

E-Democracy and e-voting E-Democracy and e-voting How to make them secure and transparent August 2013 Jordi Puiggali CSO and SVP R&D Jordi.puiggali@scytl.com Index Introduction e-democracy Security and Transparency in e-voting

More information

LOCATIONS AROUND ME (ANDROID)

LOCATIONS AROUND ME (ANDROID) IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 4, Apr 2014, 193-198 Impact Journals LOCATIONS AROUND ME (ANDROID)

More information

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to

More information

Securing corporate assets with two factor authentication

Securing corporate assets with two factor authentication WHITEPAPER Securing corporate assets with two factor authentication Published July 2012 Contents Introduction Why static passwords are insufficient Introducing two-factor authentication Form Factors for

More information

Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725

Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725 Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725 Rahul Kale Neha Gore Kavita Nilesh Jadhav Mr. Swapnil Shinde Bachelor s Degree program in Information Technology Engineering

More information

An Electronic Voting System Based On Blind Signature Protocol

An Electronic Voting System Based On Blind Signature Protocol CSMR, VOL. 1, NO. 1 (2011) An Electronic Voting System Based On Blind Signature Protocol Marius Ion, Ionuţ Posea University POLITEHNICA of Bucharest Faculty of Automatic Control and Computers, Computer

More information

Cleaning Encrypted Traffic

Cleaning Encrypted Traffic Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation

More information

Secure Cloud Architecture for Preserving Privacy in Cloud Computing using OTPWTP

Secure Cloud Architecture for Preserving Privacy in Cloud Computing using OTPWTP Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 3 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Controller of Certification Authorities of Mauritius

Controller of Certification Authorities of Mauritius Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)

More information

Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device

Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Jyoti Rao *1,Kishan Mistry #2, Bhumika Mistry #3, Divya Malviya #4, Devesh Gudway #5 # Student & Department

More information

Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns

Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns RESEARCH ARTICLE OPEN ACCESS Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns Mrs. Jayashree Katti, Sharadchandra Chavan, Dr. Sudeep Thepade, Samruddhi Puranik, Triloknath

More information

e-voting software CS 312 Project Software Requirements Specification (SRS) Document {Anurag, Ashish, Harshavardhan, Ramkrishan, Sumesh}

e-voting software CS 312 Project Software Requirements Specification (SRS) Document {Anurag, Ashish, Harshavardhan, Ramkrishan, Sumesh} e-voting software CS 312 Project Software Requirements Specification (SRS) Document {Anurag, Ashish, Harshavardhan, Ramkrishan, Sumesh} 1 Introduction 1.1 Purpose The purpose of this document is to make

More information

The Design of Web Based Secure Internet Voting System for Corporate Election

The Design of Web Based Secure Internet Voting System for Corporate Election The Design of Web Based Secure Internet Voting System for Corporate Election Jagdish B. Chakole 1, P. R. Pardhi 2 \ 1 Deptt. of Computer Science & Engineering, R.C.O.E.M., Nagpur, Maharashtra (India) 2

More information

Secure Data Exchange Solution

Secure Data Exchange Solution Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates

More information

Integration of Sound Signature in 3D Password Authentication System

Integration of Sound Signature in 3D Password Authentication System Integration of Sound Signature in 3D Password Authentication System Mr.Jaywant N. Khedkar 1, Ms.Pragati P. Katalkar 2, Ms.Shalini V. Pathak 3, Mrs.Rohini V.Agawane 4 1, 2, 3 Student, Dept. of Computer

More information

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Electronic Voting Committee General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Document: IVXV-ÜK-0.98 Date: 23 May 2016 Tallinn 2016 Annotation This paper

More information

ABSTRACT I. INTRODUCTION

ABSTRACT I. INTRODUCTION Mobile Backup Web Application Using Image Processing Authentication 1 Walse Reshma S. 2 Khemnar Archana M. 3 Padir Maya S. 4 Prof.K.P.Somase Department Of Computer Engineering, Jcoe(Kuran),Tal:Junnar,Dist:Pune

More information

Research Article. Research of network payment system based on multi-factor authentication

Research Article. Research of network payment system based on multi-factor authentication Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor

More information

http://www.cisjournal.org Implementation of Electronic Voting System in Mobile Phones with Android Operating System 1

http://www.cisjournal.org Implementation of Electronic Voting System in Mobile Phones with Android Operating System 1 Implementation of Electronic Voting System in Mobile Phones with Android Operating System 1 Eliver Pérez Villegas, 2 Gina Gallegos-García, 3 Gualberto Aguilar Torres, 4 Héctor Flores Gutiérrez 1, 4 Universidad

More information

A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD

A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD Yerragudi Vasistakumar Reddy 1, M.Purushotham Reddy 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.Professor, Dept. of CSE, Vignana

More information

Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network

Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Peer-to-Peer

More information

VoteID 2011 Internet Voting System with Cast as Intended Verification

VoteID 2011 Internet Voting System with Cast as Intended Verification VoteID 2011 Internet Voting System with Cast as Intended Verification September 2011 VP R&D Jordi Puiggali@scytl.com Index Introduction Proposal Security Conclusions 2. Introduction Client computers could

More information

A Groundwork for Troubleshooting IP Based Booking with Subjection of Multiple User IDs by Blacklisting

A Groundwork for Troubleshooting IP Based Booking with Subjection of Multiple User IDs by Blacklisting A Groundwork for Troubleshooting IP Based Booking with Subjection of Multiple User IDs by Blacklisting Asrani Nitin 1, Ashutosh Zajariya 2, Mangesh Sutar 3, Mukund Desai 4, K. D. Bamane 5 Division of Bachelor

More information

One Time Password Generation for Multifactor Authentication using Graphical Password

One Time Password Generation for Multifactor Authentication using Graphical Password One Time Password Generation for Multifactor Authentication using Graphical Password Nilesh B. Khankari 1, Prof. G.V. Kale 2 1,2 Department of Computer Engineering, Pune Institute of Computer Technology,

More information

Secure Web Access Solution

Secure Web Access Solution Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...

More information

Journal of Electronic Banking Systems

Journal of Electronic Banking Systems Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative

More information

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,

More information

SubmitedBy: Name Reg No Email Address. Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se

SubmitedBy: Name Reg No Email Address. Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se SubmitedBy: Name Reg No Email Address Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se Abid Hussain 780927-T039 abihus07 (at) student.hh.se Imran Ahmad Khan 770630-T053 imrakh07 (at) student.hh.se

More information

Single Sign-On Secure Authentication Password Mechanism

Single Sign-On Secure Authentication Password Mechanism Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,

More information

A Study on Secure Electronic Medical DB System in Hospital Environment

A Study on Secure Electronic Medical DB System in Hospital Environment A Study on Secure Electronic Medical DB System in Hospital Environment Yvette E. Gelogo 1 and Sungwon Park 2 * 1 Catholic University of Daegu, Daegu, Korea 2 Department of Nursing, Hannam University, 133

More information

An Efficient Windows Cardspace identity Management Technique in Cloud Computing

An Efficient Windows Cardspace identity Management Technique in Cloud Computing IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. VII (May-Jun. 2014), PP 61-66 An Efficient Windows Cardspace identity Management Technique

More information

DRAFT Standard Statement Encryption

DRAFT Standard Statement Encryption DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

A B S T R A C T. Index Terms - Android, GPRS, GSM modem, Desktop, LAN. I. INTRODUCTION

A B S T R A C T. Index Terms - Android, GPRS, GSM modem, Desktop, LAN. I. INTRODUCTION Accessing Remote Desktop and LAN through Android Smart Phone. Pranjal Badgujar, Sujit Korade, Lata Nagalapur, Rakesh Shinde D. Y. Patil College of Engineering Akurdi, Pune pranjdb@gmail.com, Sujit.korade91@gmail.com,

More information

Engineering 2,3,4,5 Department of Computer Science & Engineering, Shree.L.R.Tiwari College of Engineering. @IJMTER-2016, All rights Reserved 242

Engineering 2,3,4,5 Department of Computer Science & Engineering, Shree.L.R.Tiwari College of Engineering. @IJMTER-2016, All rights Reserved 242 Hospital Appointment Scheduling System Using Intelligent Agent Agent Based Appointment Scheduler Prof. Deepali Patil 1, Bhavna Tiwari 2, Harshad Solanki 3, Aditya Pawar 4, Ashutosh Shah 5 1 Assistant Professor,

More information

Online Voting System Using Three Factor Authentication

Online Voting System Using Three Factor Authentication ISSN(Online): 232-98 Vol. 3, Issue 3, March 25 Online Voting System Using Three Factor Authentication Rashmi Nade, Monali Raut, Punam Agawane, Jayshree Shinde Student, Dept. of I.T., BVCOEW, Savitribai

More information

Keywords Distributed database system, Database security, Single sign-on, Web Services, Facebook Connect services

Keywords Distributed database system, Database security, Single sign-on, Web Services, Facebook Connect services Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Implementation

More information

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 2, No 2, 2011

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 2, No 2, 2011 Designing and developing secure protocol for mobile voting Abhishek Kumar 1,Ashok Kumar Srivastava 2 1- Junior Scientist, Computer Division, CSIR-Central Drug Research Institute, Chattar Manzil Palace,

More information

Efficient construction of vote-tags to allow open objection to the tally in electronic elections

Efficient construction of vote-tags to allow open objection to the tally in electronic elections Information Processing Letters 75 (2000) 211 215 Efficient construction of vote-tags to allow open objection to the tally in electronic elections Andreu Riera a,,joseprifà b, Joan Borrell b a isoco, Intelligent

More information

Applying Data Mining Techniques to Improve Information Security in the Cloud: A Single Cache System Approach.

Applying Data Mining Techniques to Improve Information Security in the Cloud: A Single Cache System Approach. TITLE PAGE Applying Data Mining Techniques to Improve Information Security in the Cloud: A Single Cache System Approach. Amany M. Al-Shawi* King Abdulaziz City for Science and Technology, P.O. Box 6086

More information

E-voting System: Specification and Design Document

E-voting System: Specification and Design Document 1 E-voting System: Specification and Design Document March 6, 2003 Jamie Brown Domari Dickinson Carl Steinebach Jeff Zhang 2 Introduction During the 2000 General Elections, America realized that our election

More information

IDRBT Working Paper No. 11 Authentication factors for Internet banking

IDRBT Working Paper No. 11 Authentication factors for Internet banking IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

An Enhanced Countermeasure Technique for Deceptive Phishing Attack

An Enhanced Countermeasure Technique for Deceptive Phishing Attack An Enhanced Countermeasure Technique for Deceptive Phishing Attack K. Selvan 1, Dr. M. Vanitha 2 Research Scholar and Assistant Professor, Department of Computer Science, JJ College of Arts and Science

More information

PUBLIC REPORT. Red Team Testing of the ES&S Unity 3.0.1.1 Voting System. Freeman Craft McGregor Group (FCMG) Red Team

PUBLIC REPORT. Red Team Testing of the ES&S Unity 3.0.1.1 Voting System. Freeman Craft McGregor Group (FCMG) Red Team PUBLIC REPORT Red Team Testing of the Voting System Freeman Craft McGregor Group (FCMG) Red Team Prepared for the California Secretary of State by: Jacob D. Stauffer, FCMG Red Team Project Manager Page

More information

INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY

INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY Asst.Prof. S.N.Wandre Computer Engg. Dept. SIT,Lonavala University of Pune, snw.sit@sinhgad.edu Gitanjali Dabhade Monika Ghodake Gayatri

More information

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463

More information

Remote (Internet) Voting in Digital India

Remote (Internet) Voting in Digital India Remote (Internet) Voting in Digital India Ideas for today and tomorrow National Conference on Remote Voting (NCRV) 2015 20-21 st July 2015 @IITM, Meghdoot, Pune The fundamental challenge in public voting

More information

Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt,

Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt, Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt, authenticate, and compress transmitted data. The main

More information

Data Leakage Detection in Cloud Computing using Identity Services

Data Leakage Detection in Cloud Computing using Identity Services International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-04 E-ISSN: 2347-2693 Data Leakage Detection in Cloud Computing using Identity Services K. Mythili 1*,

More information

Cryptographic Data Security over Cloud

Cryptographic Data Security over Cloud Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.

More information

DNS Security FAQ for Registrants

DNS Security FAQ for Registrants DNS Security FAQ for Registrants DNSSEC has been developed to provide authentication and integrity to the Domain Name System (DNS). The introduction of DNSSEC to.nz will improve the security posture of

More information

Secure Hybrid Cloud Architecture for cloud computing

Secure Hybrid Cloud Architecture for cloud computing Secure Hybrid Cloud Architecture for cloud computing Amaresh K Sagar Student, Dept of Computer science and Eng LAEC Bidar Email Id: mr.amarsagar@gmail.com Sumangala Patil Associate prof and HOD Dept of

More information

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

More information

Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan

Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1410 Secured Authentication Using Mobile Phone as Security Token Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin

More information

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2. CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and

More information

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Whitepaper on AuthShield Two Factor Authentication with ERP Applications Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password

More information

Computer Security. Draft Exam with Answers. 2009.

Computer Security. Draft Exam with Answers. 2009. Computer Security Draft Exam with Answers. 2009. Please note that the questions written here are a draft of the final exam. There may be typos in the questions that were corrected in the final version

More information

LAN Monitoring Using Android Phone

LAN Monitoring Using Android Phone LAN Monitoring Using Android Phone Prof. Rakhi Bhardwaj 1, Sandesh S. Jangam 2, Prashant N. Shinde 3, Abhijit B. Raut 4, Rajesh S. Trigune 5 Professor, Dept. of Computer Engg., KJEI s Trinity College of

More information

TOWN OF LACOMBE PROVINCE OF ALBERTA BYLAW 358

TOWN OF LACOMBE PROVINCE OF ALBERTA BYLAW 358 TOWN OF LACOMBE PROVINCE OF ALBERTA BYLAW 358 BEING A BYLAW OF THE TOWN OF LACOMBE, IN THE PROVINCE OF ALBERTA, TO PROVIDE FOR MUNICIPAL ELECTIONS IN THE TOWN OF LACOMBE. WHEREAS the Local Authorities

More information

A puzzle based authentication method with server monitoring

A puzzle based authentication method with server monitoring A puzzle based authentication method with server monitoring GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus

More information

Copyright 2005-2007 MyPW LLC.

Copyright 2005-2007 MyPW LLC. Simple & Secure Authentication It's common knowledge that most people use the same or similar passwords wherever they have an online account. Because of this, it can only take one security breach for Identity

More information

Eballot Software Storage Solutions

Eballot Software Storage Solutions Protecting Your Elections Through a World-Class Security Infrastructure 1420 K St. NW Suite 200 Washington, D.C.20005 www.votenet.com 1-800-VOTENETTM 2010 Votenet Solutions, Inc. ELECTION AND VOTING

More information

E-mail Policy Of Government of India

E-mail Policy Of Government of India E-mail Policy Of Government of India October 2014 Version 1.0 Department of Electronics and Information Technology Ministry of Communications and Information Technology Government of India New Delhi -

More information

Secure USB Flash Drive. Biometric & Professional Drives

Secure USB Flash Drive. Biometric & Professional Drives Secure USB Flash Drive Biometric & Professional Drives I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE FLASH DRIVE... 3 DESCRIPTION... 3 IV. MODULES OF SECURE

More information

Offline and Online E-Voting System with Embedded Security for Real Time Application

Offline and Online E-Voting System with Embedded Security for Real Time Application Offline and Online E-Voting System with Embedded Security for Real Time Application Alaguvel.R 1 and Gnanavel.G 2 1 Department of Electrical and Electronics Engineering, V.R.S College of Engineering&Technology,

More information

Centralized Self-service Password Reset: From the Web and Windows Desktop

Centralized Self-service Password Reset: From the Web and Windows Desktop Centralized Self-service Password Reset: From the Web and Windows Desktop Self-service Password Reset Layer v.3.2-007 PistolStar, Inc. dba PortalGuard PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200

More information

QR Code for Digital Signature Online/Offline Payment. James Wu www.jrsys.com.tw 1

QR Code for Digital Signature Online/Offline Payment. James Wu www.jrsys.com.tw 1 QR Code for Digital Signature Online/Offline Payment James Wu www.jrsys.com.tw 1 Big Risk of Online Shopping You may lost Card Number + Expiration Date + CVV Card Not Present Transaction Trojan, Sniffer,

More information

ISL AlwaysOn 1.0 Manual

ISL AlwaysOn 1.0 Manual Contents 2 Table of Contents Foreword 0 Part I Introduction 3 Part II Security Statement 4 Part III System requirements 6 Part IV Setting up ISL AlwaysOn on a computer 7... 1 Register ISL Online account

More information

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC Ferozepur, Punjab, India Email: 1 soniaarora141@gmail.com, 2 pawanluthra81@gmail.com

More information

Enhanced Login Security Frequently Asked Questions

Enhanced Login Security Frequently Asked Questions Enhanced Login Security Frequently Asked Questions Below are Frequently Asked Questions to assist you and you can also contact Customer Service at 903-657-8525 or 800-962-1610. Q: What is Enhanced Login

More information

Secure Electronic Voting

Secure Electronic Voting 7 th Computer Security Incidents Response Teams Workshop Syros,, Greece, September 2002 Secure Electronic Voting New trends, new threats... Prof.. Dr. Dimitris Gritzalis Dept. of Informatics Athens University

More information

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India

More information

Cloud FTP: A Case Study of Migrating Traditional Applications to the Cloud

Cloud FTP: A Case Study of Migrating Traditional Applications to the Cloud Cloud FTP: A Case Study of Migrating Traditional Applications to the Cloud Pooja H 1, S G Maknur 2 1 M.Tech Student, Dept. of Computer Science and Engineering, STJIT, Ranebennur (India) 2 Head of Department,

More information

Registration for My Profile & Administration

Registration for My Profile & Administration Registration for My Profile & Administration Table Of Contents User Registration... 1 Registering as a New User... 1 About the IDcipherTM Card... 7 How Do I Get An IDcipher TM Card?... 8 Two-Factor Authentication...

More information

Cryptography and Security

Cryptography and Security Cunsheng DING Version 3 Lecture 17: Electronic Mail Security Outline of this Lecture 1. Email security issues. 2. Detailed introduction of PGP. Page 1 Version 3 About Electronic Mail 1. In virtually all

More information

Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet

Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet Sticky Password 7 Reviewer Guide Introduction Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet simple password manager and form-filler. Its main goal

More information

Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.

Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation. eblvd enables secure, cloud-based access to a PC or server over the Internet. Data, keyboard, mouse and display updates are transmitted over a highly compressed, encrypted stream, yielding "as good as

More information

SHORT MESSAGE SERVICE SECURITY

SHORT MESSAGE SERVICE SECURITY SHORT MESSAGE SERVICE SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Lab 7. Answer. Figure 1

Lab 7. Answer. Figure 1 Lab 7 1. For each of the first 8 Ethernet frames, specify the source of the frame (client or server), determine the number of SSL records that are included in the frame, and list the SSL record types that

More information

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan

More information

BANKING AUTHEMTICATION SYSTEM USING MOBILE-OTP WITH QR-CODE

BANKING AUTHEMTICATION SYSTEM USING MOBILE-OTP WITH QR-CODE BANKING AUTHEMTICATION SYSTEM USING MOBILE-OTP WITH QR-CODE Abhishek B. Iyer G.H.Raisoni College of Engineering and Management, Wagholi, Pune, Maharashtra, India- 412 207 Rohit A. Shah G.H.Raisoni College

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

Summary of Results from California Testing of the ES&S Unity 3.0.1.1/AutoMARK Voting System

Summary of Results from California Testing of the ES&S Unity 3.0.1.1/AutoMARK Voting System Summary of Results from California Testing of the ES&S Unity 3.0.1.1/AutoMARK Voting System The California Secretary of State tasked Freeman Craft McGregor Group (FCMG) to perform functional testing, accessibility

More information

Enterprise Security Critical Standards Summary

Enterprise Security Critical Standards Summary Enterprise Security Critical Standards Summary The following is a summary of key points in the Orange County Government Board of County Commissioners (OCGBCC) security standards. It is necessary for vendors

More information

Analyzing the Security Schemes of Various Cloud Storage Services

Analyzing the Security Schemes of Various Cloud Storage Services Analyzing the Security Schemes of Various Cloud Storage Services ECE 646 Project Presentation Fall 2014 12/09/2014 Team Members Ankita Pandey Gagandeep Singh Bamrah Pros and Cons of Cloud Storage Services

More information

Security Analysis of Cloud Computing: A Survey

Security Analysis of Cloud Computing: A Survey Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now

More information

Cloud Security:Threats & Mitgations

Cloud Security:Threats & Mitgations Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer

More information

California Democratic Party INTRODUCTION TO MOE (Mobilize, Organize, Elect)

California Democratic Party INTRODUCTION TO MOE (Mobilize, Organize, Elect) California Democratic Party INTRODUCTION TO MOE (Mobilize, Organize, Elect) Printed in house WELCOME TO MOE (Mobilize, Organize, Elect)! Page 2 I am pleased to provide the Mobilize, Organize, Elect (MOE)

More information

Network FAX Driver. Operation Guide

Network FAX Driver. Operation Guide Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network

More information

How To Make A Secure Storage On A Mobile Device Secure

How To Make A Secure Storage On A Mobile Device Secure Outsourcing with secure accessibility in mobile cloud computing Monika Waghmare 1, Prof T.A.Chavan 2 Department of Information technology, Smt.Kashibai Navale College of Engineering, Pune, India. Abstract

More information

Savitribai Phule Pune University

Savitribai Phule Pune University Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter

More information

Electronic Voting Protocol Analysis with the Inductive Method

Electronic Voting Protocol Analysis with the Inductive Method Electronic Voting Protocol Analysis with the Inductive Method Introduction E-voting use is spreading quickly in the EU and elsewhere Sensitive, need for formal guarantees Inductive Method: protocol verification

More information

Accessing Derbyshire County Council s Outlook Web Access (OWA) Service. Smart Phone App version

Accessing Derbyshire County Council s Outlook Web Access (OWA) Service. Smart Phone App version Accessing Derbyshire County Council s Outlook Web Access (OWA) Service Smart Phone App version Contents About this guide... 2 Before accessing Outlook Web Access... 3 Accessing Outlook Web Access (OWA)

More information

USER GUIDE FOR CET-2016 ONLINE APPLICATION

USER GUIDE FOR CET-2016 ONLINE APPLICATION USER GUIDE FOR CET-2016 ONLINE APPLICATION Table content 1. HOME PAGE 1 2. INSTRUCTIONS 2 3. NEW REGISTRATION FORM 3 4. LOGIN FORM 4 5. FORGOT PASSWORD 4 6. STUDENT INFORMATION 5 7. STUDY DETAILS 7 8.

More information

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Authentication Types. Password-based Authentication. Off-Line Password Guessing Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:

More information