International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.



Similar documents
An Implementation of Secure Online Voting System

Online Voting System Powered by Biometric Security using Cryptography and Stegnography

Cloud Computing E-Voting: A Technical Review

E-Democracy and e-voting

LOCATIONS AROUND ME (ANDROID)

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers

Securing corporate assets with two factor authentication

Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN

An Electronic Voting System Based On Blind Signature Protocol

Cleaning Encrypted Traffic

Secure Cloud Architecture for Preserving Privacy in Cloud Computing using OTPWTP

Controller of Certification Authorities of Mauritius

Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device

Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns

e-voting software CS 312 Project Software Requirements Specification (SRS) Document {Anurag, Ashish, Harshavardhan, Ramkrishan, Sumesh}

The Design of Web Based Secure Internet Voting System for Corporate Election

Secure Data Exchange Solution

Integration of Sound Signature in 3D Password Authentication System

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia

ABSTRACT I. INTRODUCTION

Research Article. Research of network payment system based on multi-factor authentication

Implementation of Electronic Voting System in Mobile Phones with Android Operating System 1

A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD

Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network

VoteID 2011 Internet Voting System with Cast as Intended Verification

A Groundwork for Troubleshooting IP Based Booking with Subjection of Multiple User IDs by Blacklisting

One Time Password Generation for Multifactor Authentication using Graphical Password

Secure Web Access Solution

Journal of Electronic Banking Systems

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

Single Sign-On Secure Authentication Password Mechanism

A Study on Secure Electronic Medical DB System in Hospital Environment

An Efficient Windows Cardspace identity Management Technique in Cloud Computing

DRAFT Standard Statement Encryption

Chapter 1: Introduction

A B S T R A C T. Index Terms - Android, GPRS, GSM modem, Desktop, LAN. I. INTRODUCTION

Engineering 2,3,4,5 Department of Computer Science & Engineering, Shree.L.R.Tiwari College of All rights Reserved 242

Online Voting System Using Three Factor Authentication

Keywords Distributed database system, Database security, Single sign-on, Web Services, Facebook Connect services

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 2, No 2, 2011

Efficient construction of vote-tags to allow open objection to the tally in electronic elections

Applying Data Mining Techniques to Improve Information Security in the Cloud: A Single Cache System Approach.

E-voting System: Specification and Design Document

IDRBT Working Paper No. 11 Authentication factors for Internet banking

Dynamic Query Updation for User Authentication in cloud Environment

An Enhanced Countermeasure Technique for Deceptive Phishing Attack

PUBLIC REPORT. Red Team Testing of the ES&S Unity Voting System. Freeman Craft McGregor Group (FCMG) Red Team

INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

Remote (Internet) Voting in Digital India

Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt,

Data Leakage Detection in Cloud Computing using Identity Services

Cryptographic Data Security over Cloud

DNS Security FAQ for Registrants

Secure Hybrid Cloud Architecture for cloud computing

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Computer Security. Draft Exam with Answers

LAN Monitoring Using Android Phone

TOWN OF LACOMBE PROVINCE OF ALBERTA BYLAW 358

A puzzle based authentication method with server monitoring

Copyright MyPW LLC.

Eballot Software Storage Solutions

Policy Of Government of India

Secure USB Flash Drive. Biometric & Professional Drives

Offline and Online E-Voting System with Embedded Security for Real Time Application

Centralized Self-service Password Reset: From the Web and Windows Desktop

QR Code for Digital Signature Online/Offline Payment. James Wu 1

ISL AlwaysOn 1.0 Manual

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC

Enhanced Login Security Frequently Asked Questions

Secure Electronic Voting

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

Cloud FTP: A Case Study of Migrating Traditional Applications to the Cloud

Registration for My Profile & Administration

Cryptography and Security

Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet

Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.

SHORT MESSAGE SERVICE SECURITY

Lab 7. Answer. Figure 1

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

BANKING AUTHEMTICATION SYSTEM USING MOBILE-OTP WITH QR-CODE

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Summary of Results from California Testing of the ES&S Unity /AutoMARK Voting System

Enterprise Security Critical Standards Summary

Analyzing the Security Schemes of Various Cloud Storage Services

Security Analysis of Cloud Computing: A Survey

Cloud Security:Threats & Mitgations

California Democratic Party INTRODUCTION TO MOE (Mobilize, Organize, Elect)

Network FAX Driver. Operation Guide

How To Make A Secure Storage On A Mobile Device Secure

Savitribai Phule Pune University

Electronic Voting Protocol Analysis with the Inductive Method

Accessing Derbyshire County Council s Outlook Web Access (OWA) Service. Smart Phone App version

USER GUIDE FOR CET-2016 ONLINE APPLICATION

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Transcription:

Android Based E-Voting. Harshad Velapure, Saurabh Rai, Saransh Sharma, Preetam Naiknavre, Pranali Jadhav, Kalyan Bamane Department of Information Technology, D. Y. Patil College of Engineering, Akurdi, Pune, 411044 hvelapure@yahoo.com A B S T R A C T Today s world is all about Technology, Time is money becomes the equation. In such cases voting becomes very hectic if the process itself takes days. To help improve efficiency of voting system, on-line Voting is really a great option. A voter may only need to register only once for a particular election and that does all, voter need to cast his /her vote without actually have to present at the voting cell. The registration process must be done at Booth application for once then voter is been given a facility to vote from his Android mobile phone irrespective of his/her location. In addition as a service provider android application will be designed for voting purpose. Voter can see the list of applying candidates at the time of voting. Index Terms: Android, E-voting system, Web services, One time password, Digital signature, Face recognition. I. INTRODUCTION Voting for any social issue is essential for modern democratic societies now a day. So it is becoming very important to make the voting process more easy and efficient. In other hand the rapid development in operating system of the mobile phones gives rise to the application development on the large scale. The main reason behind the tremendous development in android application is that the android is an open source operating system. It means that the software developers can have customization rights. As well as the software development kit provides tools to build and run Android applications. [6] With the appearance of cell phones with programmable platform, it is possible the development of application for worldwide popular participation, by the digital vote using mobiles. There is a raising interest for voting on SMS cell phones, and through social networking tools like Facebook or Twitter. It s believed that the voting process by cell phones gives some decision power to the citizens, which can actuate directly on decisions of their concerns. The voting process also can give ways for numerical information surveillance about social phenomena. For this reason, the following research is being developed with the intension to survey future scenarios which can occur during the international voting process by mobile devices. Our system gives facility to voter to vote from any location through their cell phone. Also security is maintained for any external attacks on the system. II. LITERATURE SURVEY A. Electoral system in India the technology used in India for voting is Electronic voting machines. There are two systems developed for conducting an electronic voting machine. These are the DRE (Direct Recording Electronic) and Identical Ballot Boxes. A DRE voting system records votes by means of an electronic display provided with mechanical or electro-optical components that can be activated by the voter, that processes voter selections by means of a computer program, and that records that processed voting data in memory components. It produces a tabulation of the voting data that is stored in a removable memory component and may also provide printed renditions of the data. The system may further provide a means for transmitting the processed vote data to a central location in individual or accumulated forms for consolidating and reporting results from precincts at a central location. DRE 33 2015, IJAFRC and NCRTIT 2015 All Rights Reserved www.ijafrc.org

systems additionally can produce a paper ballot printout that can be verified by the voter before they cast their ballot. [4] B. Identical Ballot Boxes the Identical Ballot Boxes hold the ciphered vote, encrypted with the PMA voting key and the ciphered Identification Card Number, encrypted with their personal 4 digit key. It is designed to accept connections from the vote distribution server, and ensures an acceptable level of security as far as remote vote manipulation is concerned. In the current version of the system, it has been implemented in SQL Server 2000. The connection the voting distributor, and the administration server is established through JDBC 3.0. [4] C. Integrated Election Software package Integrated Election Software package, running on a Microsoft Windows computer, allows the election official to set up and record the details of an election. When voting is completed, it counts the votes and displays the outcome of the count results in the format Irish voters are familiar with. The PCs used are stand alone and security hardened for the election software only. Access to the PCs is also controlled by a security key. [4] III. SYSTEM SPECIFICATION Android e-voting application on smart phone user gives voter facility to vote, an application with an interface for consultation to a dynamic web page offers the main question to be answered (voted), and together to this page are available the buttons to send the votes: Yes, No. Admin can see the voting results according to vote options. Initially the voters should have to provide their voter id/ Aadhar number to authenticate themselves and establish their user-ids. This constraint is imposed to ensure that only the genuine person is allowed to vote in the elections. The aim of this work is to design and implement an electronic voting application for the Android platform that will enable people to vote securely from anywhere. The application as a whole is aimed at being compatible with devices from many manufacturers and running different versions of the operating system. The application is also aimed at being localized. IV. ANDROID BASED E-VOTING Making the electronic voting system has a security and confidence system by the user, usually user can access to the electronic voting system and voting on the text without security system, that any user can access to the electronic voting system through the ID number for another user and he/she can vote more than one time at the same text, The users could know the result of voting during the process of voting which make the system dicey and mistrust, The user can dominate the result of voting by the access that he or she has of the result before the end of election day. A. Definitions about system users To explain the system proposed by methodology, two types of users were defined. set of participants who tries to access the E-voting application and set of eligible voters which use the application available on smart phones. For the implementation of the application on the smart phones, it was assumed that every device is associated to its owner, through a validation database. A. Architectural Work The architecture for an e-voting system is as below in fig.1 34 2015, IJAFRC and NCRTIT 2015 All Rights Reserved www.ijafrc.org

B. Working Flow Figure 1: Architectural Design of Android Based E-Voting At first any new voter has to register through booth i.e. on the Internet web site through provided web services. At the time of registration voter will be asked to enter his u-id and password. Also his aadhar card number will be asked also voter s face will be captured and stored into the database. On successful registration an e-mail/sms get sent to user regarding further announcement of election or any important details. Also an Android application will be provided to voter for voting purpose. All voting details will be given to voter. on the day of voting voter can see list of participants. At the time of requesting vote, voter will be asked to have his/her face recognized. Also one time password (OTP) will be generated and sent to the phone number of the voter. [5] If voter s face is matched with the one in the database and also voter entered right OTP. [2] Then vote will be considered and voter is automatically logged out. C. Algorithms Used 1. Message Digest 5 The MD5 message-digest algorithm is a widely used cryptographic hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number. [1] MD5 has been utilized in a wide variety of cryptographic applications, and is also commonly used to verify data integrity. [7] 35 2015, IJAFRC and NCRTIT 2015 All Rights Reserved www.ijafrc.org

2. One Time Password Figure 2: Message Digest 5 A one-time password (OTP) is a password that is valid for only one login session or transaction. OTPs avoid a number of shortcomings that are associated with traditional (static) passwords. The most important shortcoming that is addressed by OTPs is that, in contrast to static passwords, they are not vulnerable to replay attacks. This means that a potential intruder who manages to record an OTP that was already used to log into a service or to conduct a transaction will not be able to abuse it, since it will be no longer valid. [5] Figure 3: One Time Password 3. Face Algorithm Face detection algorithm is useful in keeping track of voters who actually voted. Also it extends security measures in the system. 36 2015, IJAFRC and NCRTIT 2015 All Rights Reserved www.ijafrc.org

V. TECHNICAL SPECIFICATIONS A. Advantages Figure 4: Face Algorithm Unique Identification of voter through Aadhar number/user-id. Extremely secure system with One time password, Face recognition. Secure vote casting through Digital signature algorithm. Improves voting with friendly Android Interface. Portable system, as system itself on Android platform. No fraud vote can be submitted. B. Disadvantages Device dependency: The application is only for an Android smart phone. So this is device dependent. Failure of device: If sometimes Android phone is get failure because of other applications of an phone, then user is not able to run the e-voting application. C. Applications College elections Confidential recruitment. 37 2015, IJAFRC and NCRTIT 2015 All Rights Reserved www.ijafrc.org

General elections. International Journal of Advance Foundation and Research in Computer (IJAFRC) VI. MATHEMATICAL MODEL Mathematical model can be created using set theory 1. V - Set of eligible voters (Those who have already registered and have not yet cast a vote) 2. A - Set of all people(voters) who tries to access electronic voting system, whether or not this voter has right to vote. 3. S - Set of votes(encrypted) stored in main Database. A is a superset of V. A V only those voters can vote who are authorized. [6] Unauthorized Voter s, S : voters(s) V that is, the e voting system contains only those e-votes (ss) from which the corresponding voter (voters(s)v) is listed in the voter list. In order to ensure this, the voter needs to identified and authenticated. One voter one vote: s, s S : voters(s)=voters(s ) s=s that is, whenever the set S of cast votes contains two votes from the same voter, then these two votes are identical. Thus, only one of the stored e-votes is tallied. This means that each voter can cast only one vote. VII. CONCLUSION This paper focused on the analysis of development of E-voting application on an android platform. The usability of this system is very high if it gets implemented in real life election process. It will definitely helpful for the users who wish to vote and the voting process will be made very easy by using this application. The uniqueness with registration through aadhar number and face recognition will provide very strong security for the confidential information about vote. VIII. REFERENCES [1] B. den Boer and A. Bosselaers. Collisions for the compression function of md5. Advances in Cryptology, Proc. Eurocrypt 93, LNCS 765, T. Hellseth, Ed., Springer Verlag,194, pp.293-304. [2] Aaima Najam Faizan Ahmad and Zeeshan Ahmed. Image based face recognition. IJCSI International Journal of Computer Science Issues, 2012. [3] Sainath Gupta. Passblot: A usable way of authentication scheme to generate one time passwords. [4] Online resource material at : www.lynda.com [5] Ahmad Alamgir Khan. Preventing phishing attacks using one time password and user machine identification. International Journal of Computer Applications, 2013. [6] Sarika Kale Kirti Autade, Pallavi Ghadge. E-voting on android system. International Journal of Emerging Technology and Advanced Engineering, 2012. 38 2015, IJAFRC and NCRTIT 2015 All Rights Reserved www.ijafrc.org

[7] Subrata Kumar Das Md. Alam Hossain, Md. Kamrul Islam and Md. Asif Nashiry. Cryptanalyzing of message digest algorithms md4 and md5. International Journal on Cryptography and Information Security (IJCIS), 2012. [8] Vineet Kumar Singh. Analyzing cryptographic network for secure cloud network. International Journal of advance studies in computer engineering. 39 2015, IJAFRC and NCRTIT 2015 All Rights Reserved www.ijafrc.org