scholarly journals Development of audit and data protection principles in electronic voting systems

2021 ◽  
Vol 4 (2(112)) ◽  
pp. 47-57
Author(s):  
Yuriy Khlaponin ◽  
Volodymyr Vyshniakov ◽  
Viktoriia Ternavska ◽  
Oleksandr Selyukov ◽  
Oleg Komarnytskyi

It is assumed in standard information protection technologies that there are owners of this information who put forward requirements for protection. In secret voting systems, the information belongs to the community of citizens, and to protect it, vote organizers must create conditions that allow each voter to make sure that the vote secrecy and accuracy of vote counting are preserved. In developed democracies, this issue is resolved through a widely available audit of all procedures that may be mistrusted. Any voter can conduct such an audit. The anxiety of citizens of democratic countries is based on the idea that if electronic voting is introduced, it will be impossible to conduct such an audit. The article proposes principles of auditing all those software and hardware tools and processes of the online voting system that can generate voter distrust. This audit is carried out using a dedicated server open to voters and their fiduciaries. This server provides continuous monitoring of actions of the service staff in terms of possible interference in the operation of the voting system. Also, due to this server, auditors receive data on the integrity of the voting system hardware and software including its audit tools and an alarm signal in the event of a threat. It was possible to reduce the average time of processing the voter requests to two seconds. This means that processing a maximum of 2,500 voter requests at a vote station will take no more than two hours. Simultaneous access of 50 voters to the server will not make them wait in the queue for more than 2 minutes. Implementation results were described and links were given for conducting experimental voting on the Internet.

2010 ◽  
Vol 2 (1) ◽  
pp. 30-44
Author(s):  
Thomas Rössler

E-voting increasingly gains interest in e-Democracy and e-Government movements. Not only the technical security issues of electronic voting systems are of paramount importance, but also the necessity of following an all-embracing approach is challenging and needs to be addressed. This paper discusses e-voting as being a supreme discipline of e-Government. It introduces an innovative e-voting concept using the Internet as the voting channel. The concept introduced is based on Austrian e-Government elements and the Austrian identity management concept in particular. This paper presents a novel approach of building an e-voting system relying on two core principles: strong end-to-end encryption and stringent identity domain separation.


2014 ◽  
Vol 56 (6) ◽  
Author(s):  
Ralf Küsters ◽  
Tomasz Truderung

AbstractSystems for electronic voting (e-voting systems), including systems for voting over the Internet and systems for voting in a voting booth, have been employed in many countries. However, most of the systems used in practice today do not provide a sufficient level of security. For example, programming errors and malicious behavior resulting in the loss of votes and incorrect election outcomes easily go undetected. In fact, numerous problems with e-voting systems have been reported in various countries. Therefore, in recent years modern e-voting systems have been designed that, among others, allow voters to check that their votes were counted correctly, even if voting machines and servers have programming errors or are outright malicious.In this paper, after a brief discussion of the problems of today's e-voting systems, we explain fundamental security properties modern e-voting systems should provide, including the above mentioned so-called verifiability property, and present a simple e-voting system to illustrate some of these properties. One important goal of our work is to provide security guarantees of such systems not only for abstract mathematical/cryptographic models of the systems but for the implementation of the systems directly. This requires us to combine various techniques and tools from security/cryptography, program analysis, and verification.


Voting is important for any democratic country. It can be considered as one of the major factors that make a government for the people and by the people. The most common methods of voting that currently exist are ballot-based voting, purely electronic methods, and Electronic Voting Machines, among others. Over the years, it has been a challenge to build a secure E-voting program that provides the privacy of current voting systems while offering a means of accountability and versatility. Using blockchain technology and cryptography we can make the process of elections as open and cost-effective as possible. In this review paper we discuss a new, blockchain-based electronic voting system that addresses some of the limitations in existing systems and evaluates some of the popular systems designed to create a blockchain-based e-voting system.


2013 ◽  
Vol 5 (1) ◽  
pp. 15-21 ◽  
Author(s):  
M. Mesbahuddin Sarker ◽  
M Nazrul Islam

Abstract In this modern age countries worldwide evince a growing interest in electronic voting (e-Voting), which brings the idea of modernizing elections through electronic systems and provides many advantages such as efficiency, disseminating results more quickly, and in a cost-effective way. The paper gives a brief overview on recent developments of electronic voting systems in Bangladesh by using electronic voting machine (EVM) and addresses some strategies and principles in order to improve accessibility, easiness, accuracy, and security of election for better democratic process.


Voting is the principal incident in any democratic country. Generally voting is done using ballots system, but this technique is ancient and can be easily sabotaged. There is a necessity to bring in new technologies to ensure effective implementation of digital voting systems. The security of digital voting is a significant aspect for implementation and must meet the requirements to be appropriate for trust worthiness. Block chain technology provides reliable electronic voting system that can be secured by adding more decision so that the possible attacks can be avoided. Block chain technology based on crypto currency implements diffused database architecture with transaction records secured by transactions.


Author(s):  
B U Umar ◽  
O M Olaniyi ◽  
L A Ajao ◽  
D Maliki ◽  
I C Okeke

            Democratic government in the world today rely on electronic voting as the foremost means of providing credible, transparent and fair elections for the electorate. There is a need for developed electronic voting systems to be security enhanced to ensure the authenticity of the developed system. Traditional paper balloting systems suffer from vote tampering, multiple voting and illegal voting by unregistered voters. They are also, susceptible to under aged voting due to the difficulty in authenticating the identity of prospective voters. Manual collation and publication of vote results also leads to slow response times and inaccuracies in published results. This research paper proposes a system to combat the current challenges through the development of a fingerprint biometric authentication system for secure electronic voting machines. It uses a fingerprint biometric sensor, integrated via Python to verify users of the system. The inclusion of biometrics improves the security features of the system. The secure voting system is built using PHP and easy to use Graphical User Interface was designed using HTML and CSS. Users are required to interact with the machine via a 7” touchscreen interface. From the results, it shows that the developed machine has a minimum response time of 0.6 seconds for specific operation, an FAR of 2%, FRR of 10% and overall system accuracy of 94%. The developed machine is able to combat the challenges of authentication of users, thereby guaranteeing the transparency, credibility, integrity and vote authenticity of the elections.


2021 ◽  
Vol 7 (2) ◽  
pp. 102-109
Author(s):  
W. Salman

The analysis of the performance of two cryptographic algorithms (Paillier and Benaloh), in order to apply them in the construction of electronic voting systems is carried out. A description of each system and their homomorphic properties is given. Electronic voting systems based on these schemes are described. The requirements for the voting system are formulated and a comparative analysis of the voting systems based on the schemes of Paillier and Benaloh is carried out. The analysis showed that the Paillier scheme is the best and simplest method for building secure electronic voting systems, while the Benaloh scheme is more complex and computationally more time-consuming.


2013 ◽  
Vol 7 (2) ◽  
pp. 1-28
Author(s):  
Katharina Bräunlich ◽  
Rüdiger Grimm

Trust that an electronic voting system realizes the security requirements in an adequate manner is an essential premise for electronic elections. Trust in a system can be achieved by controlling the system security. There are two ways to assure system security. One way is the evaluation and certification of the implementation’s security by neutral experts. Another way is the verification of the outcome by the users. Both approaches, verification and certification, should be combined to reasonably justify the voter’s trust in the electronic voting system. In this paper a formal security model with respect to the requirements of Fairness, Eligibility, Secrecy and Receipt-Freeness, Verifiability and Protection against Precipitation is given. This formal model helps to clarify and truly understand these requirements. Furthermore, it can be used for the evaluation and certification of online voting products according to the Common Criteria.


Author(s):  
Thomas Rössler

E-voting increasingly gains interest in e-Democracy and e-Government movements. Not only the technical security issues of electronic voting systems are of paramount importance, but also the necessity of following an all-embracing approach is challenging and needs to be addressed. This paper discusses e-voting as being a supreme discipline of e-Government. It introduces an innovative e-voting concept using the Internet as the voting channel. The concept introduced is based on Austrian e-Government elements and the Austrian identity management concept in particular. This paper presents a novel approach of building an e-voting system relying on two core principles: strong end-to-end encryption and stringent identity domain separation.


Author(s):  
Yurong Yao ◽  
Edward Watson

Electronic voting has become a viable form of e-government due to the rapid advances in technologies and communication networks. The United States and most European and Asian Countries, like Japan, have taken the first step towards electronic elections. The unique features of electronic voting systems bring advantages to the public as well as resulting in concerns about electronic voting system (EVS) implementation. In this chapter, we examine those advantages of EVS and the principal obstacles in its implementation: privacy, security and accessibility. By investigating the current technology and government efforts to overcome these problems, some recommendations are proposed to gain voters’ trust on EVS and further increase their participation by using EVS.


Sign in / Sign up

Export Citation Format

Share Document