Cloud Computing E-Voting: A Technical Review



Similar documents
An Implementation of Secure Online Voting System

International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.

Dynamic Query Updation for User Authentication in cloud Environment

INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION

An Electronic Voting System Based On Blind Signature Protocol

Security Issues in Cloud Computing

Reallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Chapter 1: Introduction

The Design of Web Based Secure Internet Voting System for Corporate Election

Quattra s Cloud Vision & Framework Value

Offline and Online E-Voting System with Embedded Security for Real Time Application

A Survey on Cloud Security Issues and Techniques

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing

Cloud Computing Security Issues And Methods to Overcome

How To Understand Cloud Computing

Security Threat Risk Assessment: the final key piece of the PIA puzzle

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Keywords: Cloud computing, Characteristics of Cloud computing, Models of Cloud computing, Distance learning, Higher education.

Cloud Panel Service Evaluation Scenarios

Secure Cloud Computing through IT Auditing

Keyword: Cloud computing, service model, deployment model, network layer security.

Migration Improved Scheduling Approach In Cloud Environment

APPLICATION OF CLOUD COMPUTING IN ACADEMIC INSTITUTION

CRVS and Identity Management

A Comparative Study of cloud and mcloud Computing

Remote (Internet) Voting in Digital India

A STUDY ON CLOUD STORAGE

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

Mobile Cloud Computing In Business

A Study on the Cloud Computing Architecture, Service Models, Applications and Challenging Issues

Dynamic Load Balancing: Improve Efficiency in Cloud Computing Argha Roy * M.Tech CSE Netaji Subhash Engineering College West Bengal, India.

International Research Journal of Engineering and Technology (IRJET) e-issn: Volume: 02 Issue: 05 Aug p-issn:

Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes

Cloud Computing Architectures and Design Issues

CHAPTER 8 CLOUD COMPUTING

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

E-Democracy and e-voting

CLOUD COMPUTING AND ITS SECURITY ASPECTS

Role of Cloud Computing to Overcome the Issues and Challenges in E-learning

Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract

Iaas for Private and Public Cloud using Openstack

Decision on adequate information system management. (Official Gazette 37/2010)

NATIONAL TALLY CENTER (NTC) OPERATIONS PROCEDURES Presidential and Provincial Council Elections

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

Cloud-Security: Show-Stopper or Enabling Technology?

CLOUD COMPUTING OVERVIEW

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access

A Survey Paper: Cloud Computing and Virtual Machine Migration

A Survey on Load Balancing Techniques Using ACO Algorithm

Efficient Cost Scheduling algorithm with Load Balancing in a Cloud Computing Environment

THE IMPACT OF CLOUD COMPUTING ON ENTERPRISE ARCHITECTURE. Johan Versendaal

De-duplication The Complexity in the Unique ID context

Private vs. Public Cloud Solutions

A Study on Service Oriented Network Virtualization convergence of Cloud Computing

International Journal of Advanced Research in Computer Science and Software Engineering

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT OF STATE Harrisburg, PA BASIC GUIDE TO STUDENT VOTING IN PENNSYLVANIA

The Key Components of a Cloud-Based Unified Communications Offering

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

Securing e-government Web Portal Access Using Enhanced Two Factor Authentication

A Novel Approach for Efficient Load Balancing in Cloud Computing Environment by Using Partitioning

EXIN Cloud Computing Foundation

Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service

Security Considerations for Public Mobile Cloud Computing

Secure Electronic Voting

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May ISSN

Manage all your Office365 users and licenses

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

AN EFFICIENT LOAD BALANCING APPROACH IN CLOUD SERVER USING ANT COLONY OPTIMIZATION

International Journal of Engineering Research & Management Technology

Designing Virtual Labs Using Cloud Computing

Microsoft Azure Multi-Factor authentication. (Concept Overview Part 1)

Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka.

Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure

The Private Cloud Your Controlled Access Infrastructure

Migration of Virtual Machines for Better Performance in Cloud Computing Environment

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Optimized Multi-tenancy Secure mechanism in SPI Cloud Architecture

LEGAL ISSUES IN CLOUD COMPUTING

Improving Online Security with Strong, Personalized User Authentication

Load Balancing for Improved Quality of Service in the Cloud

Load Balancing in Cloud Computing using Observer's Algorithm with Dynamic Weight Table

Presenter: Hamed Vahdat-Nejad

Transcription:

Cloud Computing E-Voting: A Technical Review Ms.Bhargavi Jadav 1, Ms.Aneri Desai 2, Mr.Fenil Patel 3, Mr.Ronak Patel 4, Ms.Julisha Patel 5, Ms.Bhumika Patel 6 and Mr.Manish vala 7 1,2,3,4,5 Uka Tarsadia University, Bardoli. 6, 7 Uka Tarsadia University, Bardoli, Ass.Prof ABSTRACT Cloud computing is used for data storing in distributed environment and these data can be accessed easily from anywhere anytime. E Voting can be thought of as Good Governance in India. Current E-Voting system has some issues of counting votes, fraud in making dummy votes and lake of privacy. However, to solve such issues cloud computing offers numbers of opportunities, but the developments of cloud computing technologies are still at babyhood stage. In this paper, we represent the survey of cloud computing, review of different methods used for cloud based E-Voting system over the aadhar-card, SMS and Traditional System. The main aim of this paper is to find out the challenges faced in current E-Voting system and privacy issues, which are important aspect of E-Voting. Keywords: Cloud Computing, E-Voting 1. INTRODUCTION 1.1 Cloud Computing Cloud computing is a new technology that provides the computing platform for sharing resources that includes infrastructures, software, data centers, applications, and business processes. It is a focus on sharing data. These nodes include end user, computers, data centers and cloud services. Cloud computing provides the computer technology via the Internet. This was the predecessor to today s Internet, which currently has approximately 2.8 billion users worldwide [7]. With the rapid development of processing and storage technologies and the success of the Internet, computing resources have become cheaper, more powerful and more ubiquitously available than ever before. This technological trend has enabled the realization of a new computing model called cloud computing [3]. Clouds offer services that can be grouped into three categories: software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS). Figure 1.1 Services of Cloud Computing. [3] 1.1.1 Infrastructure as a Service: IaaS refers to on-demand provisioning of infrastructural resources, usually in terms of VMs. The cloud owner who offers IaaS is called an IaaS provider. 1.1.2 Platform as a Service: PaaS refers to providing platform layer resources, including operating system support, software development frameworks and software patches. 1.1.3. Software as a Service: SaaS refers to providing ondemand applications over the Internet. 1.2 Types of Clouds: 1.2.1 Public Cloud : These services are open for all public VOLUME-2, ISSUE-11, NOV-2015 COPYRIGHT 2015 IJREST, ALL RIGHT RESERVED 8

use. These clouds are owned and maintained by third parties. It may be free of cost. 1.2.2. Private Cloud : These clouds are hosted and managed by single organization. These cloud services are accessible only to authorized members of the organization. 1.2.3. Hybrid Cloud : It is the combination of both public and private cloud. It not only provides the benefits of both public and private cloud models, but also overcomes their drawbacks. [9] [2]. When existing services of the private cloud does not satisfy the requirements then organization can use the services of public cloud and that leads to hybrid cloud. 1.3 Characteristics of Cloud Computing Cloud computing provides many prominent features those are different from traditional system. Multi-tenancy: In this cloud environment, services owned by different providers are located to one single data center. The mutual management and performance issues will be shared among service provider. Shared resource pooling: Resource pooling allows cloud provider to provide one pool of large IT scale resources to serve multiple cloud consumers. Different resources will be assigned or reassigned according to the cloud consumer demand.[ 3] 1.4 Benefits of Cloud Computing: Cloud helps you in analyzing large amount of data and in detecting any discrepancy. Provides mechanism to enhance the security and reliability of data. It Provide the location independent platform for the communication using fast reliable Internet with efficient fast computing power so that a user can work anytime form anywhere using the web cast the votes. It allows you to do backup and also restoring the data. It will provide the quality services at the tome of high load by using the number of resources. E voting application can be speedup using the cloud architecture that provides more powerful server, more memory, CPU, and fast storage device. 1.5 E-Voting [5] E voting is an election system that allow voter to cast their votes electronically. This voting technology includes punched cards, optical scan voting system. It can involve transmission of votes via computer network or Internet. In General, Two main types of e voting can be identified: E voting which is physically supervised by independent electoral authorities (e.g. voting machine located at polling stations) Remote e voting, which is not physically, and it will also supervised by independent electoral authorities (e.g. voting from personal computer, mobile phone via Internet) called I voting. e-voting using cloud technology provides the following solutions to overcomes the deficiency in the existing system: It will reduce the expenses of voting by reducing the cost of printing and distribution of the paper, creating the polling booths etc. It will provide speed, privacy, authentication, and userfriendly environment to the voter. Number of user can cast their votes at a one time depending on the computer and Internet connection. E voting system is directly connected to the election commission server so the system is fair and accurate. E Voting system provides the facility to record the individual s vote and count accurately, so the result can be declared quickly. 2. LITERATURE REVIEW 2.1 Related Work: Cloud computing is used in many different area, one of the area is e voting. There are many methods have been proposed in E voting with cloud computing, in [7] author has used traditional voting system with open cloud system. The voter identity is done manually by election officer by cross verifying the voter Id and their manual data present over the database. The voter identity is not cross verified by the electronic voting machine, so there is no complete security over the voting machine system. This cloud voting system where the system verifies the voter uniquely from his database present on the server. In [7] there will provide security and authenticity of the voter the voting system. The cloud voting system will be controlled over the centralized server of the voting system. The voter will cast the vote once then automatically the system will close. VOLUME-2, ISSUE-11, NOV-2015 COPYRIGHT 2015 IJREST, ALL RIGHT RESERVED 9

Figure 3: two-fold Voting System [6] The above system can define using fore phases: Figure 2: Proposed cloud voting system with security over cloud voting [7] Author explains the [6] existing system using DRE voting system. This system provides a smartcard for every voter to vote. Using smartcard voter can vote for the candidate of their choice. The advantages of using this card is that it reduces the chances of duplication in voting a single voter can cast only in vote with that smartcard number. It will provide confidentiality, and security in the system by storing the biometric details is the registered earlier. After the process of voting is completed the voter is given to chance to review and confirm their vote but it will give only 30sec for reviewing and for the conformation. This proposed system is a two-fold system of SMS voting system and website voting. 1) Registration 2) Authentication 3) Voting 4) Counting 2.3.1 Registration Phase: If Voter want to do voting into the system than, Voter has to register him/her self in to the website or system 2.2 SMS Voting System: Voter can cast his/her vote by sending SMS to the system using any kind of hand set through the mobile switching center. In this case voter dial a toll-free number in which he/she has to answer the recorded call. During the voting process the voter has to give his/her voice sample on the call in order to prove his/her identity and avoid frauds. This system works only on Android phone. 2.3 Website Voting System: Voter can also use the Internet for the Voting proposed. Both android phone and the website are link with same database on backend so that the voter can vote from two-way. Only once voter can vote otherwise system will deny him/her to do so. Figure 4: Registration [6] 2.3.2 Authentication phase: Voter will be verified from the voter database. If it is completed than it provided access to next stage. VOLUME-2, ISSUE-11, NOV-2015 COPYRIGHT 2015 IJREST, ALL RIGHT RESERVED 10

2.3.4 Counting Phase: Counting authority directly count the votes and declare the election results. In this case security is major issue for voting. Author explains the [5] electronic election process or e- voting, involves three basic steps: 1) Election booth setup 2) Voting 3) Result Figure 5: Authentication [6] 2.3.2 Voting Phase: Voter cast his/her votes for the election and voting authority encrypt the vote and sends it to counting authority. Election booth setup: It required polling officer for election setup, which will provide the infrastructure for voter to scan the fingerprint and iris. Voting: They provide one voting website in which first system will authenticate the identity of voter if successful voter can cast there vote. Voter will clicking on election and election ballot is appear when he/she submit the ballot the vote is encrypted and the voter issue a token number and now voter is block so it can not vote again. Result: Now result is calculated after voting has ended and election commission declares result. About this proposed system they use three modules: 1) User Request and authentication (URA) 2) Vote counting server (VCS) 3) Service management (SM) Figure 6: Voting [6] User Request and authentication: When voter request for doing vote from any of the polling center of the country then system ask for UID (user identification) No and scan the iris and fingerprint of both the hand. Then UAS (User Authentication Server) will verify the identity by using UID card i.e., AADHAR CARD. If authentication is done then voter is connected to polling server and e-ballot paper is loaded on register computer that is mention on aadhar permanent address. Vote counting server: It is the server that receives the votes by the election commission server. The VCS collects the votes and provide the result. Service management: The model will essentially monitor the services in terms of authenticity, privacy, security, service delivery time and quality, also responsible for secured service by fetching and delivering the service. VOLUME-2, ISSUE-11, NOV-2015 COPYRIGHT 2015 IJREST, ALL RIGHT RESERVED 11

Reduces the expenses of voting by reducing the cost of paper ballots, crating polling booths & parties expenses. Voter can cast their votes for anyplace. It will provide speed, authentication and user friendly environment to the voter. Figure 7: Proposed Framework Model for e Voting [5] Figure 8: Service Request & Delivery in Proposed e Voting [5] In this figure the voter request for the voting, first polling server do authentication and than it will provide the e-ballot paper, than the voter submit their votes in election commission server, and generate the token. 2.4 Benefits E voting based on cloud technology provides the following solutions to overcome the difficulty in existing system. 3. CONCLUSION In e voting with cloud computing we conclude that user can do their votes easily but the problem is that they can t provide the privacy to the user. They can see the users details and they can also do the changes. There are different types of methods like Message, web Sites, using Aadhar Card, Phone calls etc., to do voting in that only one problem will arrive that is a user privacy so using pay-liar algorithm we can secure the user privacy and maintain safe. REFERENCE [1] Tadayoshi kohno, Adam stubblefied, Analysis of an Electronic Voting System,IEEE computer society press, July 2003. [2] Haibo Yang, Mary Tate, Where are we at with cloud computing?:a Descriptive Literature Review,AIS Electronic Library(AISeL), Dec 2009. [3] Qi Zhang, Lu Cheng, Raouaf Boutaba, Cloud computing: state-of-the-art and research challenges,j Internet Serv Appl, April 2010. [4] Feras a. haziemeh, mutaz kh. Khazaaleh, khairall m. aktalafha, new applied e-voting system, Publication of little lion scientific R&D, Islamabad, vol.25.no.2, March 31. [5] Ashutosh Gupta, Praveen Dhyani,O.P.Rishi, Cloud based e-voting: one step ahead for good governance in India, International journal of computer application,vol.67.no.6,april 2013. [6] Anisaara Nadaph, Ashmita Katiyar, Tushar Naidu, Rakhi Bondre, Durgesh Kumari Goswami, An Analysis of secure online voting system, International journal of Innovative Research in computer science & technology(ijircst),vol.2. September 2014. [7] Mohan Reddy, Electronic-voting approach with an open cloud computing architecture, International journal of engineering and computer science,vol.3.no.9012-9015, November 2014. VOLUME-2, ISSUE-11, NOV-2015 COPYRIGHT 2015 IJREST, ALL RIGHT RESERVED 12

[8] Pankaj Kumar malviya, E-voting system using cloud in indian scenario, International journal of engineering science & advanced Techonology(IJESAT),vol.3, Mar- Apr 2014. [9] Rabinadnan kishor, Implementation of cloud for online election system,international journal of advance research in computer science and management studies,vol.3, March 2015. [10] Patrick honer, Cloud Computing Security Requirements and Solutions:A Systematic Literature Review June 2014. [11] llango Sriram, Ali Khajeh-Hosseini, Research Agenda in Cloud Technologies August 2006. [12] Krishan Kant Lavania, Yogita Sharma, Chandresh bakliwal, A Review On Cloud Computing Model,Internaton journal on Recent and Innovation Trends in Computing and Communication(IJRITCC),vol.1.Mar 2013. [13] Robert Krimmer, Electronic Voting,2 nd Internation workshop co-organized council of Europe, Augest 2006. VOLUME-2, ISSUE-11, NOV-2015 COPYRIGHT 2015 IJREST, ALL RIGHT RESERVED 13