INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 2, No 2, 2011
|
|
- Annabel O’Connor’
- 8 years ago
- Views:
Transcription
1 Designing and developing secure protocol for mobile voting Abhishek Kumar 1,Ashok Kumar Srivastava 2 1- Junior Scientist, Computer Division, CSIR-Central Drug Research Institute, Chattar Manzil Palace, MG Marg, Lucknow Senior Principal Scientist, Computer Division, CSIR-Central Drug Research Institute, Chattar Manzil Palace, MG Marg, Lucknow CSIR-CDRI Communication Number: 8198 abhishek_kumar@cdri.res.in ABSTRACT In recent years, a drastic fall down is being noticed in the Indian general election s voting turnaround. Problem is becoming serious with the non-availability of a way to let voters cast votes who are residing outside their election-areas. The remote voting procedure for NRI s and Indian army is also not showing significant improvement. Somewhere the issues lie in ease of usage and somewhat lack of trust of current voting procedure. This article tries to solve this issue with the design and development of mobile voting protocol which is not only very easy to use but is also robust, secure and trusted. In this article, we have focused on designing a secure and globally trusted protocol to enable Indian citizens (or any other country s citizens who follows this protocol) to cast vote in their respective country s election via their GSM Mobile Phones from anywhere in the globe irrespective of their physical location. Apart from this, the motive of author is also to extend the usage of information technology to a scheme of Green-Election (Paperless election), addresses the issues of voting-problem in remote, disturb and sensible areas, and to suit the requirement of today s generation who, due to several problems, usually finds it difficult to go for manual vote casting. Keywords: Mobile Voting; Protocol for Mobile voting; Secure Mobile voting. Nomenclature EVM = Electronic Voting Machine NRI = Non Resident Indian SMS = Short Message Service UID = Unique Identification UIDAI = Unique Identification Authority of India (AADHAR) GSM = Global System for Mobile Communications 1. Introduction In democratic society, voting is used to collect and reflect people s opinion and making a trusted and accepted committee of representatives for successfully running the country. Currently, voting is being conducted in centralized or distributed voting booths. Voters have to present personally at the voting booth to cast their votes under the supervision of 522
2 authorized election commission members. For a variety of reasons, voters may not be able to attend voting booths physically but want to cast vote remotely. Accepted way of remote voting is Postal Voting (for NRI) and Proxy Voting (For Army), but it lacks proper authentication and involves a time-consuming procedure. This area needs to be explored properly due to following reasons: The current voting procedure is not very efficient and mostly probe to human error. Allegations keep being raised and there are enough ways for EVM tampering (Hari K. Prasad, 2010), (Tandayoshi Kohno, 2004), booth capturing, vote tampering, vote counting mistakes, violence and many more. The youth and the maximum voter portions of today are moving away from voting. Reasons are many such as: they find it difficult to manage time; out of their busy schedule for voting, they don t find any easy way of voting and the current way of remote voting is not very easy to use, lacks trust and also allowed for very specific group of people. The same problem is being faced by NRIs and Military men, the various remote voting ways were mainly targeted for this section only; Voting Via Embassies(for NRI) and Proxy Voting (from military persons); but they are not able to utilize it fully. The main reason remains as lack of authentication, flexibility and ease of use of current remote voting procedures. The voters who is residing outside their voting areas, also fails to cast their votes due to current not very effective voting procedures. The voting in remote and sensitive area always remains a problem and challenge. Major portion of people from this area fails to use right to vote. Taking example of Indian state Bihar which suffers from NAXALS and seen violence in election, the voting turnaround has decreased significally. In Bihar the Voting turnaround for Vidhna Sabha Election has fallen from 53.7 %( 1977) to 45.9 %( 2005 Nov). Politically disturbing areas like J&K also seeing constant reduction in voting turnaround. The overall effect of this trend is that the voting turnaround of Indian general election keeps falling drastically. Apart from this, there are many more reasons to look forward for a mobile voting as Reduced Costs, Greater accessibility for the disabled, Flexibility. (Manish Kumar) Table 1: Voting percentage in India s Lok Sabha elections General Election Year Male Female Total 1 st nd rd th th th th th th th th
3 12 th th th (Source: accessed on Oct 19, 2011) In 2009, general election has a voting percentage of % (Source: Wikipedia: India General Election, 2009) Hence, there is a great room for a remote voting protocol which is easy, transparent and most importantly secure. In this article, we have worked on a protocol development for secure and easy remote voting procedure via GSM mobile. Though GSM itself has inbuilt security features (Yang Feng, 2006), (Manish Kumar), this protocol further extends it for a secure mobile voting. We can also extend proposed protocol to define another inherent protocol/s for a secure online voting. 1.1 Protocol Description In current voting procedure, every valid voter has to register themselves to Election Commission of India and get their voter ID-Card. This ID-card is used as photo identification while casting vote. This protocol adds an extra field to the present Voter ID-Card namely: UID (The AADHAR UID) (Unique Identification Authority of India, Planning Commission).While registering to election commission, user will register his/her mobile number. Firstly, the user has to activate given mobile number to enable mobile voting. The mobile voting activation procedure for voters would be as follow: After proper verification, a secret number will be sent on the user s registered mobile number. After getting this number, user has to log-in to the Indian Election Commission s online mobile-voting activation gateway and provide following information: 1. The Secret Number 2. The UID as on voter s ID-card 3. The Voter ID as on voter s ID-card 4. Mobile number on which this information is sent This will be a single time activity which has to be done. An automated verification will be done on back end side and on success; the number will be activated for mobile voting. Also a secret key will be passed to the mobile user (this will be used to decrypt the secured encrypted SMS from election commission). The user also needs to download and install a small cryptography application (used to decrypt and view secure SMS from election commission).the detailed description of this protocol is elaborated down onwards. 2. Voting via this protocol 524
4 If a user is subscribed and allowed to cast mobile vote, on election day of his/her area, user will get an SMS from Election Commission of India, having a list of candidates name along with their parties name and parties symbol s name. User has to simply reply to this SMS to cast the vote. The Election commission s SMS format would be: <Sequel Number> <Candidates Name> <Candidates Parties Name> <Candidates Parties symbol s Name> Secret Key : <Highly robust randomly generated 12 characters length alphanumeric key> So, On Election Day, user will get an Election commission s SMS like: 1. Hira Yadav (INDIAN NATIONAL CONGRESS) (HAND) 2. Prabhu Lal (BJP) (LOTUS) 3. Priyanka Aggarwal (BSP) (ELEPHANT) 4. Vikash Yadav (NIRDALIYA) (AEROPLAN) Secret key: XX DFR To cast vote, user has to simply reply to this SMS in a predefined format. The reply format is: <SECRETKEY><SPACE>IM<SPACE><UID><SPACE>IS<SPACE><NUMERIC DIGIT> The extended full format of this SMS is: <Secret Key> I am <UID> is selecting <Candidates numeric digit> Ex: XX DFR IM 98XDUIDR45T IS 4 User will get an acknowledgement SMS on the same registered number after vote acceptance. 2.1 Backend architecture and working of protocol The backend of this protocol has one highly secured centralized database with three tables: Database_Name: Electorate_Information_Database Table 2: Electorate_Information_Table UID Voter_ID Voter_Name Father_Name //UID of the voter as on AADHAR UID CARD //Voter ID of the voter // Voter name //Voter s father name 525
5 Permanent_Address // Voter s registered permanent address Registered_Mobile_Number //Voter s registered mobile number for mobile voting Election_Area //Voter s election area (which area voter is allowed to vote for) Gender //Voter s gender Date_Of_Birth //Voter s Date of birth Date_Election_Commission_Registration //Date voter registered him/her self to election commission of India Date_Mobile_voting_registration //Date voter registered him/her self for mobile voting Date_Mobile_voting_activation //Date on which voter mobile information is validated and voter allowed for mobile voting Mobile_Voting_Allowed //Whether the voter is allowed for mobile voting or not. Usage: This table will be used for any usual query and fetch/update voter s basic information. This table can be published online on log-in basis for voter s to counter check their information. Election Area field will be used to decide, when user has to sent voting SMS. UID Secret_Symmetric_Key Table 2: Electorate_Cryptography_Key // UID of the voter as on AADHAR UID CARD //The voter s specific symmetric key used for Election commission s secure SMS encryption and decryption Usage: This is highly secured database s table and contains the symmetric secret key which will be used to encrypt and decrypt the SMS which will be sent to voters for casting mobile vote. This table s access can be restricted to only few people for security concerns. 526
6 Table 3: Electorate_Voting_Status UID Voting_Status Voting_Date_and_Time Voting_Mode Secret_PRNG_Number //UID of the voter as on AADHAR UID CARD // This is the field which provides information that whether user has yet casted vote or not // Date and Time when user casted vote // which mode was used to cast vote Mobile Mode or Polling Booth Mode (User manually casted vote by going to polling booth) //12 characters length secret Pseudo Random Number for carrying acknowledgment functionalities Usage This table will provide information regarding the current voting status of a voter and also provide many other fields for problem shooting like at what Date/Time vote has been casted, via which mode (mobile voting or voter casted vote from polling booth) vote has been casted, and also keep the a secret PRNG number for acknowledgment purpose. This table will be updated as soon as voter will cast vote via any mean and will be used by polling booth s officer and the mobile voting server to query/update voter s current voting status. The 4 fields of this table(voting Status, Date and Time, Voting Mode, Secret PRNG number) are volatile in nature and will be reset every time a new election helds in that area. Apart from this, this protocol also includes a small portable device which will be given to all of the Election camp officers. The prototype of this small portable device is: Figure1: Prototype of the small portable device for checking and updating voter s voting status 527
7 This portable device will be used to make a secured connection and query the centralized election commission s database regarding the current voting status of a user. This machine will consist of following parts: An alphanumeric keypad for punching voter s UID Three punch buttons namely: Query (query election commission s centralized database regarding the voting status of voter), Vote casted (to update the voting status of voter in the centralized database after allowing for vote casting), and Reset (to reset the display of the machine and reset its functionalities and flush any old data) Two display panels: One for viewing the UID while punching the same and second for viewing the output of the query Before allowing any voter to cast vote, the pooling booth officer will punch his/her UID on the machine and press query. If the user has casted vote by any other means previously, the same was updated on the database and will be reflected on the machine. However if the user has not casted any vote, the same will be shown as the output and the user will be allowed to cast vote after carrying proper formalities. Parallel an update will also be sent to the centralized database regarding this action via the same machine, to stop voter doing a revoting. If the user has already casted the vote, the output panel will show result as: YES, else the output panel will show result as: NO and polling officer can update the database regarding voter s voting status by pressing button: Vote Casted, which will immediately update the centralized database. 3. Challenges and Solutions Challenges and scenarios which have to be addressed in this protocol. 3.1 Users should not be allowed to cast vote more than once at any cost There are 2 scenario of this case: Voter casts vote physically by going to Polling booth: In this scenario after doing a proper verification via the provided machine, the polling officer will allow the user to cast the vote and will update the same to the election commission centralized database immediately Voter casts mobile vote: In this scenario, as soon as the vote reaches election commission s server, a backend checking will be done with the centralized database whether voter has casted vote previously or not via any other mean. If found a case of re-voting, the vote will be immediately discarded, else, the vote will be accepted and the user will get a confirmation SMS on the registered mobile number. The backend database will be update immediately to reflect the latest voting status of the voter 3.2 Security This is the area which has to be put under special consideration. There are many levels of security checks designed for making this protocol robust and secure. 528
8 3.2.1 Secure SMS The SMS sent to user will be secured SMS. The SMS will be encrypted with a robust symmetric encryption algorithm with a secret user s specific symmetric key (which was already passed to the user while activating mobile number) and digitally signed. The motive is that even though if the SMS will get tapped, the intruder will never be able to decrypt the SMS and thus would never be able to cast a fake vote. On receiving the secured SMS, voter will open this via the application he/she downloaded from the Election commission s web site and after providing secret decryption key, voter will be able to see and reply to the SMS. Either Election commission can develop own proprietary SMS cryptography application or can use any robust third party solution Acknowledgment This protocol will have a full functional acknowledgment feature, to ensure that the voting has been casted via authorized person. If we see the format of the SMS: <Sequel Number> <Candidates Name> <Candidates Parties Name> <Candidates Parties symbol> Secret Key : <Highly robust randomly generated alphanumeric key> The <SECRET KEY> is the one which is used to manage this acknowledgement. This secret number will be a generated by a highly robust PRNG (Pseudo Random number generator algorithm) and will be embedded in the SMS. Due to secure SMS, the message will be decrypted once it will reach the right voter s phone. After decryption the voter will use the same number in voting reply: <SECRET_KEY><SPACE>IM<SPACE><UID><SPACE>IS<SPACE><NUMERIC DIGIT> This ensures the acknowledgment over the voting. This also stops voter to vote until unless an SMS is particularly sent to mobile by the election commission server. This feature can also be extended to black-list mobile numbers in special cases, because user won t be allowed to SMS vote until unless he/she gets SMS with secret number on his/her mobile number Add-on checking On receiving the mobile vote, the server will ensure that the vote has been sent from the same mobile number on which the SMS was sent to stop any burglary in the mobile voting. However this Add-on checking can be dropped to provide voters a flexible voting mechanism where they would be allowed to vote from any mobile once they get voting SMS on their registered mobile number Mobile Stolen Scenario There are many ways to handle this scenario: User can contact the election commission s help center and after proper verification, request to block the number can be accepted. 529
9 User can request election commission s help center to register a new mobile number for mobile-voting. As the user is registered with mobile number not the SIM CARD number, as soon as the user gets same number again from his/her respective mobile service company, he/she can do a mobile voting. Moreover, as the mobile voting format consists UID of the user, which is again a privately known number, the chances of using stolen mobile number for fake voting is very less Miscellaneous checks The mobile voting will be allowed as per Indian standard time and the voter won t be allowed to use mobile vote once the normal voting time of the area ended. Only the polling booth manager will be allowed to query the election commission s centralized database via the provided machine and update the same (regarding the voting status of the voter). All other users will simply cast votes and in a way simply updates the database. Figure 2: The overview of the mobile voting protocol s architecture 4. Working architecture of Mobile-Voting 4.1 Outside working architecture The outside working architecture of this protocol is: 530
10 4.2 Flow Chart demonstration for Mobile-voting at various stages Figure 3: Action flow chart for the automated election commission server for handling Mobile-Voting 531
11 Figure 4: Action flow chart for voters casting mobile votes Figure 5: Action flow chart for polling booth s officer for allowing a manual voting after checking the voter s voting status for stopping any burglary 532
12 5. Conclusion In our study we have found that there is a great scope of mobile voting in the current social scenario and the above proposed protocol not only provides a starting milestone in this direction but also opens a new room for further exploration and extending the proposed protocol for practical usage. 6. References 1. Tandayoshi Kohno, Adam Stubblefield, Aviel D.Rubin, Dan S. Wallach (February 27,2004), Analysis of an Electronic Voting System, pp Yang Feng, Siaw-Lynn Ng, Scarlet Schwiderski-Grosche ( June 26, 2006), An Electronic Voting System Using GSM Mobile Technology, pp Hari K. Prasad, J.Alex Halderman, Rop Gongriijp, Scott Wolchok, Eric Wustrow, Arun Kankipati, Sai Krishnan Sakhamuri, Vasavya Yagati (April 29,2010), Security Analysis of India s Electronic Voting Machines 4. Unique Identification Authority of India, Planning Commission, Government of India (July 7, 2010), Aadhar Handbook for Registrars, Version 1-July 2010, pp Manish Kumar, T.V. Suresh Kumar, M. Hanumanthappa, D Evangelin Geetha, Secure Mobile Based Voting System, pp India Elections Statistics, accessed 19 October, Wikipedia, Indian General Election 2009, general_election,_ 2009, accessed on 19 October,
An Implementation of Secure Online Voting System
An Implementation of Secure Online Voting System Prof. Anisaara Nadaph 1, Rakhi Bondre 2, Ashmita Katiyar 3, Durgesh Goswami 4, Tushar Naidu 5 1 Pune University, Trinity college of Eng. And res., anisaaranadaph@gmail.com
More informationCloud Computing E-Voting: A Technical Review
Cloud Computing E-Voting: A Technical Review Ms.Bhargavi Jadav 1, Ms.Aneri Desai 2, Mr.Fenil Patel 3, Mr.Ronak Patel 4, Ms.Julisha Patel 5, Ms.Bhumika Patel 6 and Mr.Manish vala 7 1,2,3,4,5 Uka Tarsadia
More informationThe Design of Web Based Secure Internet Voting System for Corporate Election
The Design of Web Based Secure Internet Voting System for Corporate Election Jagdish B. Chakole 1, P. R. Pardhi 2 \ 1 Deptt. of Computer Science & Engineering, R.C.O.E.M., Nagpur, Maharashtra (India) 2
More informationMonalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan
International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1410 Secured Authentication Using Mobile Phone as Security Token Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin
More informationInternational Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.
Android Based E-Voting. Harshad Velapure, Saurabh Rai, Saransh Sharma, Preetam Naiknavre, Pranali Jadhav, Kalyan Bamane Department of Information Technology, D. Y. Patil College of Engineering, Akurdi,
More informationIDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
More informationDynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
More informationClient Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
More informationMultifactor Graphical Password Authentication System using Sound Signature and Handheld Device
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Jyoti Rao *1,Kishan Mistry #2, Bhumika Mistry #3, Divya Malviya #4, Devesh Gudway #5 # Student & Department
More informationAn Electronic Voting System Based On Blind Signature Protocol
CSMR, VOL. 1, NO. 1 (2011) An Electronic Voting System Based On Blind Signature Protocol Marius Ion, Ionuţ Posea University POLITEHNICA of Bucharest Faculty of Automatic Control and Computers, Computer
More informationEFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT
EFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT 1 R.Sivaraman, 2 RM.Chandrasekaran 1 Dy.Director, Center for Convergence of Technologies (CCT), Anna University Tiruchirappalli, Tiruchirappalli,
More informationQuery Service on Aadhaar Mapper (QSAM)
Query Service on Aadhaar Mapper (QSAM) Aadhaar is a 12 digit individual identification number issued by the Unique Identification Authority of India on behalf of the Government of India. This number will
More informationSticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet
Sticky Password 7 Reviewer Guide Introduction Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet simple password manager and form-filler. Its main goal
More informationA secure email login system using virtual password
A secure email login system using virtual password Bhavin Tanti 1,Nishant Doshi 2 1 9seriesSoftwares, Ahmedabad,Gujarat,India 1 {bhavintanti@gmail.com} 2 SVNIT, Surat,Gujarat,India 2 {doshinikki2004@gmail.com}
More informationOffline and Online E-Voting System with Embedded Security for Real Time Application
Offline and Online E-Voting System with Embedded Security for Real Time Application Alaguvel.R 1 and Gnanavel.G 2 1 Department of Electrical and Electronics Engineering, V.R.S College of Engineering&Technology,
More informationONLINE DISABILITY CERTIFICATE GUIDELINES FOR APPLICANTS
Department of Health and Family Welfare ONLINE DISABILITY CERTIFICATE GUIDELINES FOR APPLICANTS The Disability form is designed to fill up the personal details of the people suffering from various types
More informationChapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
More informationOnline Voting Project. New Developments in the Voting System an Consequently Implemented Improvements in the Representation of Legal Principles.
New Developments in the Voting System an Consequently Implemented Improvements in the Representation of Legal Principles. Introduction. Since 2001 T-Systems made research on secure online voting systems
More informationSection A: Change in Personal Details (Please refer to Sr. No.1 to 5of the instructions for supporting document)
Annexure CS-S2 Page 1 Request For Change/Correction in Subscriber Master details And/Or Reissue of I-Pin/T-Pin/PRAN Card (To avoid mistake(s), please read the accompanying instructions carefully before
More informationCanMobile. CanMobile is mobile banking service provided by Canara Bank. It helps you to do following banking transactions:
CanMobile Frequently Asked Questions 1. What is CanMobile? CanMobile is mobile banking service provided by Canara Bank. It helps you to do following banking transactions: Balance Enquiry of accounts enabled
More informationSurvey on Various Initiatives and Challenges of Mobile based Public Services in India
1 Survey on Various Initiatives and Challenges of Mobile based Public Services in India Ranjan Kumar, Manish Kumar, Kapil Kant Kamal, Dr. Zia Saquib, Ms. Kavita Bhatia ranjank@cdac.in, kmanish@cdac.in,
More informationSECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
More informationSECURED DATA STORAGE IN CLOUD
International Journal of Information Technology & Management Information System (IJITMIS) Volume 6, Issue 2, July-December-2015, pp. 44-48, Article ID: IJITMIS_06_02_007 Available online at http://http://www.iaeme.com/issue.asp?jtype=ijitmis&vtype=6&itype=2
More informationOPERATIONAL GUIDELINES FOR STUDENT REGISTERATION
OPERATIONAL GUIDELINES FOR STUDENT REGISTERATION National Scholarship Portal Main Features National Scholarship Portal is the Web Based Application having the following important features:- Students can
More informationFrequently Asked Questions by Investors
(I) Basics 1) What do you mean by Conversion of Mutual Fund Units (represented by Statement of Account)? If you are holding Mutual Fund Units in physical form, which are represented by Statement of Account,
More informationWeb Portal: Housing Society Management System
RESEARCH ARTICLE OPEN ACCESS Web Portal: Housing Society Management System Kushal Patadia*, Keshav Manjrekar** Tejal Zope***, Pranav Patil****, *,**(Department of Information Technology, Padmabhushan Vasantdada
More informationDIGITIZATION NATIONAL POPULATION REGISTER TRAINING MANUAL (ADMINISTRATOR) 2011
DIGITIZATION OF NATIONAL POPULATION REGISTER TRAINING MANUAL (ADMINISTRATOR) 2011 CONTENT ABBREVIATIONS & ACRONYMS INTRODUCTION TO THE MANUAL PART I Introduction PART II 1.1 Introduction to NPR 1.2 Roles
More informationE-Democracy and e-voting
E-Democracy and e-voting How to make them secure and transparent August 2013 Jordi Puiggali CSO and SVP R&D Jordi.puiggali@scytl.com Index Introduction e-democracy Security and Transparency in e-voting
More informationZipit Chat. Functional Specification / User Manual
Zipit Chat Functional Specification / User Manual 1 Table of Contents 1. Zipit Chat Overview... 4 How to download... 4 Supported version... 4 2. Functionalities... 4 Get Started... 4 Login... 7 Payment
More informationKeywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
More informationTwo-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table
More informationRespected Sir, Subject: Reg. e-bharat: Integrated e-payment and e-governance system.
From Santhosh Hebbar, Date: 24-04-2015 Kumbar Jaddi, Hitlalli, Yellapur, Uttar Kannada, Karnataka-581347 To THE PRIME MINISTER, Prime Minister's Office, South Block, Raisina Hill, New Delhi-110011 Respected
More informationPRAN is mandatory. Fill only the field(s) which is/are to be modified with the revised details.
Annexure CS-S2 Page 1 Request For Change/Correction in Subscriber Master details And/Or Reissue of I-Pin/T-Pin/PRAN Card (To avoid mistake(s), please read the accompanying instructions carefully before
More informatione-voting software CS 312 Project Software Requirements Specification (SRS) Document {Anurag, Ashish, Harshavardhan, Ramkrishan, Sumesh}
e-voting software CS 312 Project Software Requirements Specification (SRS) Document {Anurag, Ashish, Harshavardhan, Ramkrishan, Sumesh} 1 Introduction 1.1 Purpose The purpose of this document is to make
More informationKeyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
More informationAdvance Technique for Online Payment Security in E-Commerce : Double Verification
Advance Technique for Online Payment Security in E-Commerce : Double Verification Shilpa Research Scholar Shri Krishan Institute of Engineering & Technology, Kurukshetra University Kurukshetra, India er.shilpa2011@gmail.com
More informationA Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
More informationPRIVATE TEXTUAL NETWORK USING GSM ARCHITECTURE
PRIVATE TEXTUAL NETWORK USING GSM ARCHITECTURE * Qurban A. Memon, **Zubair Shaikh and ***Ghulam Muhammad * Associate Professor; **Associate Professor, ***Senior Year Student Karachi Institute of Information
More informationWhite Paper. The risks of authenticating with digital certificates exposed
White Paper The risks of authenticating with digital certificates exposed Table of contents Introduction... 2 What is remote access?... 2 Authentication with client side digital certificates... 2 Asymmetric
More informationElection Monitoring Dashboard
Election Commission of India Election Monitoring Dashboard Objective : Computerized tracking of the election process with the critically important objective of being able to take timely action in real
More informationRFID based Bill Generation and Payment through Mobile
RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce
More informationReview Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725 Rahul Kale Neha Gore Kavita Nilesh Jadhav Mr. Swapnil Shinde Bachelor s Degree program in Information Technology Engineering
More informationObject oriented model for Bank Account Number Portability
Object oriented model for Bank Account Number Portability Dr. Sonali Agarwal Assistant Professor, Indian Institute of Information Technology, Allahabad, India. sonali@iiita.ac.in Ankur Agarwal Banking
More informationVoteID 2011 Internet Voting System with Cast as Intended Verification
VoteID 2011 Internet Voting System with Cast as Intended Verification September 2011 VP R&D Jordi Puiggali@scytl.com Index Introduction Proposal Security Conclusions 2. Introduction Client computers could
More informationTransparent Recruitment Process (TRP) of UP Police Recruitment and Promotion Board. Kamal Saksena Member Secretary UPPR&P Board Lucknow
Transparent Process (TRP) of UP Police and Promotion Board Kamal Saksena Member Secretary UPPR&P Board Lucknow Transparent Process (TRP) of UP Police and Promotion Board UP Police and Promotion Board is
More informationVirtual Code Authentication User s Guide. June 25, 2015
Virtual Code Authentication User s Guide June 25, 2015 Virtual Code Authentication User s Guide Overview of New Security Modern technologies call for higher security standards as practiced among many other
More informationConnected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
More informationSURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE
SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE Manoj S. Rewatkar 1 and Shital A. Raut 2 1,2 Department of Computer Science and Engineering, Visvesvaraya National Institute of Technology, Nagpur,
More informationAADHAAR ENABLED PAYMENT SYSTEM
FREQUENTLYASKEDQUESTIONS BY CUSTOMERS FOR AADHAAR ENABLED PAYMENT SYSTEM Page 1 1. What is AEPS? AEPS is a new payment service offered by the National Payments Corporation of India to banks, financial
More informationPRAN is mandatory. Fill only the field(s) which is/are to be modified with the revised details.
Annexure UOS-S2 Page 1 Request For Change/Correction in Subscriber Master details And/Or Reissue of I-Pin/T-Pin/PRAN Card (To avoid mistake(s), please read the accompanying instructions carefully before
More informationJournal of Electronic Banking Systems
Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative
More informationBuilding A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
More informationSecure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor
More informationSecure Voice v 1.1 Mobile conversation encryption for Symbian Smartphones
Secure Voice v 1.1 Mobile conversation encryption for Symbian Smartphones www.5pro-software.com General Info about Secure Voice Enterprise solution for mobile conversation security Secures sensitive information
More informationA Study on Secure Electronic Medical DB System in Hospital Environment
A Study on Secure Electronic Medical DB System in Hospital Environment Yvette E. Gelogo 1 and Sungwon Park 2 * 1 Catholic University of Daegu, Daegu, Korea 2 Department of Nursing, Hannam University, 133
More informationProtected Cash Withdrawal in Atm Using Mobile Phone
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 1346-1350 Protected Cash Withdrawal in Atm Using Mobile Phone M.R.Dineshkumar
More informationUser Manual. NGO Proposal Online Application and Processing Tracking System. Ministry of Social Justice and Empowerment
User Manual (for NGO Users) NGO Proposal Online Application and Processing Tracking System (Version 1.2 ) URL: http://ngograntsje.gov.in Ministry of Social Justice and Empowerment Application Designed
More informationPlease read this guideline before filling up your online application form.
GUIDELINE F OR FILLING UP ONLINE PHD APPLICATION FORM Please read this guideline before filling up your online application form. New User Sign up New user need to Sign up before Login to the site. During
More informationData Integrity by Aes Algorithm ISSN 2319-9725
Data Integrity by Aes Algorithm ISSN 2319-9725 Alpha Vijayan Nidhiya Krishna Sreelakshmi T N Jyotsna Shukla Abstract: In the cloud computing, data is moved to a remotely located cloud server. Cloud will
More informationa. StarToken controls the loss due to you losing your Internet banking username and password.
1. What is StarToken? StarToken is the next generation Internet banking security solution that is being offered by Bank of India to all its Internet Banking customers (Retail as well as Corporate). StarToken
More informationRfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System
Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System ArchanaThange Post Graduate Student, DKGOI s COE, Swami Chincholi, Maharashtra, India archanathange7575@gmail.com,
More informationTechnical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for
Technical Description DigitalSign 3.1 State of the art legally valid electronic signature The best, most secure and complete software for Adding digital signatures to any document, in conformance with
More information(C) Global Journal of Engineering Science and Research Management
DEPENDABLE STORAGE FOR VEHICLE INSURANCE MANAGEMENT THROUGH SECURED ENCRYPTION IN CLOUD COMPUTING Prof.Abhijeet A.Chincholkar *1, Ms.Najuka Todekar 2 *1 M.E. Digital Electronics, JCOET Yavatmal, India.
More informationAn in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. I (Jan Feb. 2015), PP 38-42 www.iosrjournals.org An in-building multi-server cloud system based
More informationOpen-Xchange Guard Major Release v2.0.0. Feature Overview V1.4
Open-Xchange Guard Major Release v2.0.0 Feature Overview V1.4 2015 Copyright Open-Xchange Inc. This document is the intellectual property of Open-Xchange Inc. The document may be copied in whole or in
More informationGUIDELINE FOR FILLING UP ONLINE DUAL(MTech/MS + PhD) APPLICATION. Please read this guideline before filling up your online application form.
GUIDELINE FOR FILLING UP ONLINE DUAL(MTech/MS + PhD) APPLICATION Please read this guideline before filling up your online application form. New User Sign up New user need to Sign up before Log in to the
More informationPaperClip Incorporated 3/7/06; Rev 9/18/09. PaperClip Compliant Email Service Whitepaper
Incorporated 3/7/06; Rev 9/18/09 PaperClip Compliant Email Service Whitepaper Overview The FTC Safeguard Rules require Financial, Insurance and Medical providers to protect their customer s private information
More informationSecure Electronic Voting
7 th Computer Security Incidents Response Teams Workshop Syros,, Greece, September 2002 Secure Electronic Voting New trends, new threats... Prof.. Dr. Dimitris Gritzalis Dept. of Informatics Athens University
More informationCHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS
70 CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS 4.1 INTRODUCTION In this research work, a new enhanced SGC-PKC has been proposed for improving the electronic commerce and
More informationFrequently Asked Questions (FAQ) on HSBC Chip Credit Cards
Frequently Asked Questions (FAQ) on HSBC Chip Credit Cards Cards issued by The HongKong and Shanghai Banking Corporation Limited, India (HSBC) 1. What is EMV Chip Card? EMV (Europay MasterCard Visa) is
More informationA Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification
Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August
More informationDATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
More informationSYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.
SYNCSHIELD FEATURES This document describes the diversity of SyncShield features. Please note that many of the features require a certain platform version, often earlier software versions do not support
More informationSmart Queue Management System Using GSM Technology
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 941-950 Research India Publications http://www.ripublication.com/aeee.htm Smart Queue Management System Using
More informationEnhanced Model of SQL Injection Detecting and Prevention
Enhanced Model of SQL Injection Detecting and Prevention Srinivas Baggam, Assistant Professor, Department of Computer Science and Engineering, MVGR College of Engineering, Vizianagaram, India. b_srinio@yahoo.com
More informationEmployee Active Directory Self-Service Quick Setup Guide
Employee Active Directory Self-Service Quick Setup Guide (V2.0) Last update: 11/5/2014 Copyright 2014 InfraDog Inc. All rights reserved Corporate Phone: +1 (416) 473-4096, Fax: +1 (888) 863-3936, Email:
More informationCLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,
More informationSecuring e-government Web Portal Access Using Enhanced Two Factor Authentication
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication Ahmed Arara 1, El-Bahlul Emhemed Fgee 2, and Hamdi Ahmed Jaber 3 Abstract This paper suggests an advanced two-factor authentication
More informationthrough ATM Machine 1* Mohd. Arif Siddique and 2 Dr. Amit Kumar Awasthi
An Advance ATM Machine Service: Making Demand Draft through ATM Machine 1* Mohd. Arif Siddique and 2 Dr. Amit Kumar Awasthi 1 Department of Computer Science, Radha Govind Engineering College,Meerut (U.
More informationEfficient Integrity Checking Technique for Securing Client Data in Cloud Computing
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 05 41 Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing Abstract-- It has been widely observed
More informationDATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan
More information802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi Giulio.Rossetti@gmail.com
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi Giulio.Rossetti@gmail.com 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
More informationEnabling bizhub HDD Security Features
Hard Disk Drive Security Enabling bizhub HDD Security Features bizhub C652/C552/C452 bizhub C360/C280/C220 bizhub 423/363/283/223 1 Enabling bizhub HDD Security - Overview This guide is intended to assist
More informationA REVIEW ON ENHANCING DATA SECURITY IN CLOUD COMPUTING USING RSA AND AES ALGORITHMS
A REVIEW ON ENHANCING DATA SECURITY IN CLOUD COMPUTING USING RSA AND AES ALGORITHMS Dr.S.Gunasekaran, M.P.Lavanya Professor, CSE, Coimbatore Institute of Engineering and Tech, Coimbatore PG Scholar, Coimbatore
More informationRemote (Internet) Voting in Digital India
Remote (Internet) Voting in Digital India Ideas for today and tomorrow National Conference on Remote Voting (NCRV) 2015 20-21 st July 2015 @IITM, Meghdoot, Pune The fundamental challenge in public voting
More informationSecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
More informationCiphire Mail. Abstract
Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the
More informationGovernment of India. Ministry of Minority Affairs
Government of India Ministry of Minority Affairs Merit-cum-Means Scholarship Scheme For Minority Communities Students s i o n 1. 0 Page 1/19 USER MANUAL FOR STUDENTS (PHASE-I) s i o n 1. 0 Page 2/19 STUDENT
More informationDesign and Analysis of Methods for Signing Electronic Documents Using Mobile Phones
Design and Analysis of Methods for Signing Electronic Documents Using Mobile Phones Pramote Kuacharoen School of Applied Statistics National Institute of Development Administration 118 Serithai Rd. Bangkapi,
More informationConfiguring SonicWALL TSA on Citrix and Terminal Services Servers
Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,
More informationA Proxy-Based Data Security Solution in Mobile Cloud
, pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,
More informationSyncSwitch Quick Start Guide For Making First Test Call V 2.1
SyncSwitch Quick Start Guide For Making First Test Call V 2.1 This version is a revision of V. 2.0, some gramatical mistakes has been corrected on this version. There are no major changes between V.2.0
More informationDesign of Secure Electronic Voting System Using Multifactor Authentication and Cryptographic Hash Functions
Design of Secure Electronic Voting System Using Multifactor Authentication and Cryptographic Hash Functions Olayemi Mikail Olaniyi Department of Computer Engineering Federal University of Technology Minna,
More informationKeywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Computing
More informationCloud Services MDM. ios User Guide
Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...
More informationCommon Patient Portal (ors.gov.in)
Common Patient Portal (ors.gov.in) ON-BOARING MANUAL FOR HOSPITALS National Informatics Centre July 2015 (version 1.0) Target Audience As part of the Digital India program of Government of India, Hon ble
More informationA Robust Multimedia Contents Distribution over IP based Mobile Networks
, pp. 283-288 http://dx.doi.org/10.14257/ijseia.2015.9.9.24 A Robust Multimedia Contents Distribution over IP based Mobile Networks Ronnie D. Caytiles, Seungyong Shin and Byungjoo Park * Multimedia Engineering
More informationData Leakage Detection in Cloud Computing using Identity Services
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-04 E-ISSN: 2347-2693 Data Leakage Detection in Cloud Computing using Identity Services K. Mythili 1*,
More informationVery large scale systems
Very large scale systems - Challenges, needs and methods Ravindra Gadde Research Engineer Iris ID Systems, Inc. 1 Large scale biometric systems and philosophy 1 Million? 10 Million? 100 Million? Large
More informationThe Initial Registration Process. During the initial registration process, this guide assumes the user has been provided a login ID.
eopf Account Guide The following processes are covered in this guide: Initial Registration Process (for new users) Forgotten Password Process Forgotten Login ID Process The Initial Registration Process
More information