A Novel Approach to Database Confidentiality in Online Voting System

Author(s):  
P. Sanyasi Naidu ◽  
Reena Kharat
Cryptography ◽  
2020 ◽  
pp. 391-414
Author(s):  
Lauretha Rura ◽  
Biju Issac ◽  
Manas Kumar Haldar

Though there are online voting systems available, the authors propose a new and secure steganography based E2E (end-to-end) verifiable online voting system, to tackle the problems in voting process. This research implements a novel approach to online voting by combining visual cryptography with image steganography to enhance system security without degrading system usability and performance. The voting system will also include password hashed-based scheme and threshold decryption scheme. The software is developed on web-based Java EE with the integration of MySQL database server and Glassfish as its application server. The authors assume that the election server used and the election authorities are trustworthy. A questionnaire survey of 30 representative participants was done to collect data to measure the user acceptance of the software developed through usability testing and user acceptance testing.


2016 ◽  
Vol 12 (3) ◽  
pp. 71-93 ◽  
Author(s):  
Lauretha Rura ◽  
Biju Issac ◽  
Manas Kumar Haldar

Though there are online voting systems available, the authors propose a new and secure steganography based E2E (end-to-end) verifiable online voting system, to tackle the problems in voting process. This research implements a novel approach to online voting by combining visual cryptography with image steganography to enhance system security without degrading system usability and performance. The voting system will also include password hashed-based scheme and threshold decryption scheme. The software is developed on web-based Java EE with the integration of MySQL database server and Glassfish as its application server. The authors assume that the election server used and the election authorities are trustworthy. A questionnaire survey of 30 representative participants was done to collect data to measure the user acceptance of the software developed through usability testing and user acceptance testing.


2021 ◽  
pp. 217-244
Author(s):  
Mehak Wadhwani ◽  
Nisha Mansoori ◽  
Shivangi Tanwar ◽  
Aanchal Handa ◽  
Bhavesh N. Gohil
Keyword(s):  

2010 ◽  
Vol 2 (1) ◽  
pp. 30-44
Author(s):  
Thomas Rössler

E-voting increasingly gains interest in e-Democracy and e-Government movements. Not only the technical security issues of electronic voting systems are of paramount importance, but also the necessity of following an all-embracing approach is challenging and needs to be addressed. This paper discusses e-voting as being a supreme discipline of e-Government. It introduces an innovative e-voting concept using the Internet as the voting channel. The concept introduced is based on Austrian e-Government elements and the Austrian identity management concept in particular. This paper presents a novel approach of building an e-voting system relying on two core principles: strong end-to-end encryption and stringent identity domain separation.


Author(s):  
Joseph D.Enoch ◽  
◽  
Nne .R Saturday
Keyword(s):  

2018 ◽  
Vol 14 (1) ◽  
pp. 1
Author(s):  
Vijayalakshmi Subramani ◽  
G.R. Karpagam
Keyword(s):  

Author(s):  
K S Gururaj ◽  
Dr K Thippeswamy

<p>Accessing and Utilization of data and information from remote location is one of the major requirements of present world. Due to the increase in the requirement of the data access from remote locations, challenges in the enhancement of technology based systems also have increased proportionately. Technology based solution for accessibility of remote data with available infrastructure is the need of the hour. Implementation of technology based solutions for the challenges may be expensive due to the current technical limitations. In this paper, we have attempted to design a secured cloud based framework for Online Voting System and analyzed its performance based on the three cryptographic algorithms namely Blowfish, AES and RSA.</p>


2018 ◽  
Vol 17 (2) ◽  
pp. 7326-7334
Author(s):  
Sneha N. Patil ◽  
Vidyullata Devmane

Electronic voting (e-Voting) has totally replaced the traditional voting system. Due to the rapid growth of computer networks and cloud computing the existing e-Voting system can be replaced with online voting system.When data is on cloud,the major challenge in voting system is confidentiality, security and accuracy. The advances in cryptography can be used to a face these challenges.  The presented work implements Okamoto-Uchiyama algorithm with its additive homomorphic property. This work focuses on serving voting system on large scale of voters. We have made our system more user friendly and faster but secured than existing systems.


Sign in / Sign up

Export Citation Format

Share Document