scholarly journals Blockchain Enabled Online-Voting System

2020 ◽  
Vol 32 ◽  
pp. 03018
Author(s):  
Akhil Shah ◽  
Nishita Sodhia ◽  
Shruti Saha ◽  
Soumi Banerjee ◽  
Madhuri Chavan

A blockchain-enabled online-voting system is being proposed in this following paper. Blockchain technologies deliver an endless variety of applications that benefit from distributed economies. The proposed model is an android application that has enhanced security features which includes both authentication and authorization. Authentication is incorporated by using a unique identification key and authorization is done by using fingerprint. Voters are also being verified by One-time password. The security in this project is implemented by using a 128 bit AES encryption algorithm and SHA-256 along with blockchain. The vote is casted in the form of transaction, where a blockchain is created, which keeps track of tallies of votes. Through this atomicity and integrity are maintained. [4] Index Terms—Voting System , Blockchain , SHA-256, Security, AES-128, Ballot

Author(s):  
Firas A. Abdulatif ◽  
Maan Zuhiar

<p>Cloud computing is a new term to provide application and hardware as service over the internet. Demand for cloud has increased dramatically in recent years. However, a major drawback for cloud adoption is lack of security so that we will try to solve some security issues related to cloud storage by design and implement a secure system to store privet data in cloud storage. This secure system provide secure login to cloud by using third parity authentication (smart phone) and one time password depend on chaotic system to prevent unauthorized people from get access to cloud and modified AES algorithms to encrypt the data in the cloud storage.</p>


2018 ◽  
Vol 9 (1) ◽  
pp. 9-17
Author(s):  
Marcel Bonar Kristanda ◽  
Seng Hansun ◽  
Albert Albert

Library catalog is a documentation or list of all library collections. Unfortunately, there is a problem identified in the process of searching a book inside library catalog in Universitas Multimedia Nusantara’s library information system regarding the relevant result based on user query input. This research aims to design and build a library catalog application on Android platform in order to increase the relvancy of searching result in a database using calculated Rocchio Relevance Feedback method along with user experience measurement. User experience analysis result presented a good respond with 91.18% score based by all factor and relevance value present 71.43% precision, 100% recall, and 83.33% F-Measure. Differences of relevant results between the Senayan Library Information system (SLiMS) and the new Android application ranged at 36.11%. Therefore, this Android application proved to give relevant result based on relevance rank. Index Terms—Rocchio, Relevance, Feedback, Pencarian, Buku, Aplikasi, Android, Perpustakaan.


Sensors ◽  
2021 ◽  
Vol 21 (3) ◽  
pp. 772 ◽  
Author(s):  
Houshyar Honar Pajooh ◽  
Mohammad Rashid ◽  
Fakhrul Alam ◽  
Serge Demidenko

The proliferation of smart devices in the Internet of Things (IoT) networks creates significant security challenges for the communications between such devices. Blockchain is a decentralized and distributed technology that can potentially tackle the security problems within the 5G-enabled IoT networks. This paper proposes a Multi layer Blockchain Security model to protect IoT networks while simplifying the implementation. The concept of clustering is utilized in order to facilitate the multi-layer architecture. The K-unknown clusters are defined within the IoT network by applying techniques that utillize a hybrid Evolutionary Computation Algorithm while using Simulated Annealing and Genetic Algorithms. The chosen cluster heads are responsible for local authentication and authorization. Local private blockchain implementation facilitates communications between the cluster heads and relevant base stations. Such a blockchain enhances credibility assurance and security while also providing a network authentication mechanism. The open-source Hyperledger Fabric Blockchain platform is deployed for the proposed model development. Base stations adopt a global blockchain approach to communicate with each other securely. The simulation results demonstrate that the proposed clustering algorithm performs well when compared to the earlier reported approaches. The proposed lightweight blockchain model is also shown to be better suited to balance network latency and throughput as compared to a traditional global blockchain.


Sensors ◽  
2020 ◽  
Vol 20 (22) ◽  
pp. 6546
Author(s):  
Kazi Masum Sadique ◽  
Rahim Rahmani ◽  
Paul Johannesson

The Internet of things (IoT) will accommodate several billions of devices to the Internet to enhance human society as well as to improve the quality of living. A huge number of sensors, actuators, gateways, servers, and related end-user applications will be connected to the Internet. All these entities require identities to communicate with each other. The communicating devices may have mobility and currently, the only main identity solution is IP based identity management which is not suitable for the authentication and authorization of the heterogeneous IoT devices. Sometimes devices and applications need to communicate in real-time to make decisions within very short times. Most of the recently proposed solutions for identity management are cloud-based. Those cloud-based identity management solutions are not feasible for heterogeneous IoT devices. In this paper, we have proposed an edge-fog based decentralized identity management and authentication solution for IoT devices (IoTD) and edge IoT gateways (EIoTG). We have also presented a secure communication protocol for communication between edge IoT devices and edge IoT gateways. The proposed security protocols are verified using Scyther formal verification tool, which is a popular tool for automated verification of security protocols. The proposed model is specified using the PROMELA language. SPIN model checker is used to confirm the specification of the proposed model. The results show different message flows without any error.


Author(s):  
Surya Narayan Panda ◽  
Sumit Badotra ◽  
Simranjeet Singh ◽  
Rajesh Kaushal ◽  
Naveen Kumar

Aim: The method of utilization of IoT and other evolving techniques in medical equipment design field is discussed in the present paper. A remotely managed interface equipped in a wheel chair cum bed is embedded for elderly or physically challenged people. With the help of a camera embedded in the proposed solution a real time remote monitoring of the patient is achieved using a android application over the concerned person. For achieving the above said purpose, the use of linear actuators has been done. This paper further aims to explore the hidden potentials of merger of all these fields to benefit the end users. Objectives: Remote monitoring of health of the patient through a cloud based android application. Automatic adjustment of the wheelchair into bed and vice-versa. Automatic stool passing chamber facility is available under the proposed model. Injuries during transportation of the patient from one chair to another (or chair to bed) have been limited in our designed model. Methods: The basic mechanism of proposed wheelchair has been designed using the computer aided design software. The basic methodology adopted for development of prototype & subsequent “user review analysis” is displayed below. The CAD Model of the wheelchair cum stretcher was designed using the “Solid works solid modelling techniques”. The basic structure has been designed with several modifications when compared to the conventional wheelchair design. The computer made design was then utilized for final fabrication of prototype. The prototype was tested for endurance, Load bearing capacity and customer comfort during various phases of development. The feedbacks of several subjects were recorded for future utilization in improved design & fabrication Results: The proposed model is of utmost importance as the number of critical patients like accident cases, critical pre and post-surgery cases are increasing day by day. Sometimes these patients need in-time medication during transition in ambulance either picked up from house or are referred to nearby big hospitals. During transition or in hospital critical patients can be handled efficiently by a specialist doctor through his/her smart phone applications. It also optimizes the services of specialist doctors as we find the shortage of specialists in Indian hospitals. In a nutshell, this Wheel Chair system can be moved anywhere due to it portability. Following are the most highlighted features: 1. Authorized relatives and Doctors can see and interact with the patient at any time remotely on his/her smart phone. 2. Authorized relatives and Doctors can see the Vital Sign of patient like BP, ECG, and Pulse etc. at any time through Smart Phone. 3. Doctor can instruct the care taker to release the emergency drugs through Infusion Pump. 4. Doctor can plan the exceptions, drug infusion, alarm etc. 5. System is portable and can easily be shifted to ambulance. All transmissions are wireless so there is no hassle of wires and connectivity. Conclusion: The presented work is limited to the design and fabrication of a new model of wheelchair, which works as a stretcher and has the locomotive capabilities. The key feature of design is its versatility and adaptability to various working conditions. The feedback obtained from various subjects during the testing of wheelchair shows their confidence and fair degree of comfort which they felt while using the wheelchair. The easy and user-friendly use of android application helps to monitor the health of the patient. The smart phone camera helped to achieve this data. The analysis of the data can be done in the cloud base station. Linear actuator has proved to be the low cost and highly reliable equipment to propel the wheelchair.


Author(s):  
Christos Stergiou ◽  
Kostas E. Psannis

Mobile cloud computing provides an opportunity to restrict the usage of huge hardware infrastructure and to provide access to data, applications, and computational power from every place and in any time with the use of a mobile device. Furthermore, MCC offers a number of possibilities but additionally creates several challenges and issues that need to be addressed as well. Through this work, the authors try to define the most important issues and challenges in the field of MCC technology by illustrating the most significant works related to MCC during recent years. Regarding the huge benefits offered by the MCC technology, the authors try to achieve a more safe and trusted environment for MCC users in order to operate the functions and transfer, edit, and manage data and applications, proposing a new method based on the existing AES encryption algorithm, which is, according to the study, the most relevant encryption algorithm to a cloud environment. Concluding, the authors suggest as a future plan to focus on finding new ways to achieve a better integration MCC with other technologies.


2021 ◽  
pp. 217-244
Author(s):  
Mehak Wadhwani ◽  
Nisha Mansoori ◽  
Shivangi Tanwar ◽  
Aanchal Handa ◽  
Bhavesh N. Gohil
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document