scholarly journals Digital Voting System as Internet of Things Application

The objective for the efficient functioning of the Indian democracy is purely dependent on the decisions made by the citizens of our country. To avoid duplicate or illegal votes we need a secure system which uniquely identifies our citizen. In India AADHAR uniquely identifies the citizens of INDIA by their thumb impression and also provides the other details like Date of birth, address, gender, father’s name, Spouse details etc. The election process is carried out in 3 steps Creation of voter list, actual voting process, and counting of votes. Creation of voter list can be done by database which is efficient to store big data with the person’s name and his AADHAR number. In actual voting process verification can be done by using fingerprint recognition and votes should be stored depending on ward numbers. Counting is the last process which can be done very easily if previous steps are digitized. In the world of Internet of things a voter should be able to cast his vote from anywhere by validating his credentials. This paper describes a voting system with 3 possible ways for voter to cast his vote

2021 ◽  
Vol 2 (1) ◽  
pp. 55-67
Author(s):  
Estefanía de las Mercedes Zurita Meza ◽  
Darwin Stalin Ramírez Supe

This paper presents a study of vulnerabilities, risks, considerations and securities that can occur in a system of electronic voting in an election process of any authority. It is proposed to make an analysis as an electronic voting system can impersonate the vote traditional manual that is used for several decades in all cities of the world, these systems must ensure the integrity and proper use of the data and information obtained, but some occasions not taken into account the security considerations that are necessary in this class of systems. For this, an analysis of the security provided by electronic voting system is made as well as the vulnerabilities that may occur during the election process and some considerations to consider about electronic voting.


Author(s):  
Ю. А. Данько ◽  
Н. Г. Білоцерківська Білоцерківська

The article considers the advantages and disadvantages of implementing and applying the electronic voting system in different countries of the world and the prospects for the introduction of electronic voting in Ukraine. It is noted that e-democracy is a direct tool of democratization and development of the society in the information direction. One of the mechanisms of e-democracy is e-voting. Electronic voting is considered as a procedure for the implementation of the expression of will with the use of electronic means and as an automated process of counting votes, which simplifies the voting procedure and contributes to raising the level of electoral activity. It has been determined that e-voting, although it is one of the most complex forms of e-democracy, can still increase the interest of citizens, namely, the young people in the political life of the country, reduce the cost of the election process, enable citizens with disabilities to carry out a process of expression of will, improve the reliability of the procedure for counting election results. The author also examines the forms of e-voting that are used in world practice, namely: voting through the Internet, voting in the booth using "electronic ballot boxes" and e-voting with the help of a mobile phone. The experience of using e-voting system in different countries of the world, such as USA, Brazil, Estonia, Austria, Finland, Switzerland, France, Great Britain, the Netherlands, Germany, Norway, etc., is analyzed. Identified problems faced by countries in elections when using the e-voting system. The author also considers the measures that Ukraine is developing to implement the e-voting system. In particular, it was noted that the first attempts to establish on the legislative level the introduction of electronic voting in Ukraine were recorded as early as 2011. At present, the use of electronic voting in Ukraine is only in the stage of active discussion. Based on the experience of other countries, it has been determined that electronic voting should be used in parallel with the traditional expression of will.


2019 ◽  
Vol 8 (11) ◽  
pp. 475
Author(s):  
Junghee Jo ◽  
Kang-Woo Lee

The conventional extracting–transforming–loading (ETL) system is typically operated on a single machine not capable of handling huge volumes of geospatial big data. To deal with the considerable amount of big data in the ETL process, we propose D_ELT (delayed extracting–loading –transforming) by utilizing MapReduce-based parallelization. Among various kinds of big data, we concentrate on geospatial big data generated via sensors using Internet of Things (IoT) technology. In the IoT environment, update latency for sensor big data is typically short and old data are not worth further analysis, so the speed of data preparation is even more significant. We conducted several experiments measuring the overall performance of D_ELT and compared it with both traditional ETL and extracting–loading– transforming (ELT) systems, using different sizes of data and complexity levels for analysis. The experimental results show that D_ELT outperforms the other two approaches, ETL and ELT. In addition, the larger the amount of data or the higher the complexity of the analysis, the greater the parallelization effect of transform in D_ELT, leading to better performance over the traditional ETL and ELT approaches.


2021 ◽  
Vol 3 (3) ◽  
pp. 255-268
Author(s):  
Yasir Babiker Hamdan ◽  
A. Sathesh

Voting is now governed by regulations that specify how a person's choices may be communicated and their desires can be realized. This study proposes an electronic voting machine (EVM) as an alternative for traditional voting methods, which may include the manual utilization of only microcontroller-based circuits. With the identified fingerprint liveness, the proposed technique will make voting considerably easier, more effective, and less likely to result in fraud. The suggested model will support and advance the trustworthiness of all votes and it will also assist in streamlining the counting and verification process. It is difficult to demonstrate that an advanced voting system has been properly designed since several critical criteria must be satisfied. Poll results should be kept private in the database in order to preserve the data. The voting process must also show the votes obtained by the respective candidates. The proposed authenticated voting machine can be applied to the local area elections in order to speed up the process and make the election process more transparent. To maintain its theoretical strength, the proposed research idea needs further study. The model employs radio frequency and fingerprint recognition to maintain the protection.


2020 ◽  
pp. 109
Author(s):  
Syahrul Mubaroq ◽  
Inas Mufidatul Insyiroh

Coronavirus Disease 2019 (COVID-19) has spread throughout the world including Indonesia. The poor prevention and treatment of the initial phase results in a continuing increase in the number of positive cases and mortality caused by this virus. On the other hand, countries that have adopted policies that are fast and appropriate technology have been able to reduce the rate of additional cases and mortality rates. In this paper the authors conduct an analytical study of the application of technologies such as artificial intelligence, big data, and the internet of things in accelerating the detection, prevention, response, and recovery of COVID-19 cases in several countries and their possibilities to be applied in Indonesia. The authors suggest the Indonesian government to apply appropriate policies and technologies to reduce the high growth of COVID-19 cases.


2021 ◽  
Vol 8 (4) ◽  
pp. 685-733
Author(s):  
Jennifer Zwagerman

Technology advancements make life, work, and play easier and more enjoyable in many ways. Technology issues are also the cause of many headaches and dreams of living out the copier destruction scene from the movie “Office Space.” Whether it be user error or technological error, one key technology issue on many minds right now is how all the data produced every second of every day, in hundreds of different ways, is used by those that collect it. How much data are we talking about here? In 2018, the tech company Domo estimated that by 2020 “1.7 MB of data will be created every second” for every single person on Earth. In 2019, Domo’s annual report noted that “Americans use 4,416,720 GB of internet data including 188,000,000 emails, 18,100,000 texts and 4,497,420 Google searches every single minute.” And this was before the pandemic of 2020, which saw reliance on remote technology and the internet skyrocket. It is not just social media and working from home that generates data—the “Internet of Things” (“IoT”) is expanding exponentially. From our homes (smart appliances and thermostats), to entertainment (smart speakers and tablets), to what we wear (smartwatches and fitness devices), we are producing data constantly. Over 30 billion devices currently make up the IoT, and that number will double by 2025. The IoT is roughly defined as “devices—from simple sensors to smartphones and wearables—connected together.” That connection allows the devices to “talk” to each other across networks that stretch across the world, sharing information that in turn can be analyzed (alone or combined with data from other users) in ways that may be beneficial to the user or the broader economy. The key word in that last sentence is “may.” When it comes to the data that individuals and businesses across the world produce every second of every day, some of it—perhaps most of it—could be used in ways that are not beneficial to the user or the entire economy. Some data types can be used to cause harm in obvious ways, such as personal identifying information in cases of identity theft. While some data types may seem innocuous or harmful when viewed on their own, when combined with other data from the same user or even other users, it can be used in a wide variety of ways. While I find it beneficial to know how many steps I take in a day or how much time I sleep at night, I am not the only individual or entity with access to that information. The company that owns the device I wear also takes that information and uses it in ways that are beyond my control. Why would a company do that? In many instances, “[t]he data generated by the Internet of Things provides businesses with a wealth of information that—when properly collected, stored, and processed—gives businesses a depth of insight into user behavior never before seen.” Data security and privacy in general are issues that all companies manage as they work to protect the data we provide. Some types of data receive heightened protections, as discussed below, because they are viewed as personal, as private, or as potentially dangerous since unauthorized access to them could cause harm to the user/owner. Some states and countries have taken a step further, focusing not on industry-related data that needs particular types of protection, but in-stead looking at an individual’s overall right to privacy, particularly on the internet. Those protections are summarized below. It makes sense, you might say, to worry about financial or healthcare data remaining private and to not want every website you have ever visited to keep a file of information on you. But why might we care about the use of data in agricultural operations? Depending on who you ask, the answer may be that agricultural data needs no more care or concern than any other type of business data. Some argue that the use of “Big Data” in agriculture provides opportunities for smaller operations and shareholders. These opportunities include increased power in a market driven for many years by the mantra “bigger is better” and increased production of food staples across the world—both in a more environmentally-friendly fashion. While the benefits of technology and Big Data in the agricultural sector unarguably exist, questions remain as to how to best manage data privacy concerns in an industry where there is little specific law or regulation tied to collection, use, and ownership of this valuable agricultural production data. In the following pages, this Article discusses what types of data are currently being gathered in the agricultural sector and how some of that data can and is being used. In addition, it focuses on unique considerations tied to the use of agricultural data and why privacy concerns continue to increase for many producers. As the Article looks at potential solutions to privacy concerns, it summarizes privacy-related legislation that currently exists and ends by looking at whether any of the current privacy-related laws might be used or adapted within the agricultural sector to address potential misuse of agricultural data.


Nanoscale ◽  
2020 ◽  
Vol 12 (39) ◽  
pp. 20118-20130 ◽  
Author(s):  
Yike Liu ◽  
Chenguo Hu

New technologies such as the Internet of Things and big data have become the strategic focus of national development in the world.


2018 ◽  
Vol 7 (3.3) ◽  
pp. 200
Author(s):  
Subrata Chowdhury ◽  
Dr P. Mayilvahanan

The paper gives the introduction of the IoT, which lay forward the capabilties to detect and link with the world wide web with the con-nectivity to connect this with the physical objects into a cognate systems. On the other hand some severe concers as the part of the IoT, are been highlighted over the passage gateways of critical personal informations relevants to device and personalized privacy.This survey will summerize and tries to highlight the core issues related to the security threats,and the privacy interest of the IoT.  


2018 ◽  
Vol 2018 ◽  
pp. 1-8 ◽  
Author(s):  
Liaoliang Jiang ◽  
Tong Li ◽  
Xuan Li ◽  
Mohammed Atiquzzaman ◽  
Haseeb Ahmad ◽  
...  

Under the environment of the big data, the correlation between the data makes people have a greater demand for privacy. Moreover, the world has become more diversified and democratic than ever before. Freedom of speech is considered to be very important; thus, anonymity is also a very important security demand. The research of our paper proposes a scheme which can ensure both the privacy and the anonymity of a communication system, that is, the protection of message privacy while ensuring the users’ anonymity. It is based on anonymous identity-based encryption (IBE), by which the users’ metadata are protected. We implement our scheme in JAVA with Java pairing-based cryptography library (JPBC); the experiment shows that our scheme has significant advantage in efficiency compared with other anonymous communication system. Internet-of-Things (IoT) involves many devices, and privacy of devices is very significant. Anonymous communication system provides a secure environment without leaking metadata, which has many application scenarios in IoT.


Author(s):  
Arsheenath Beegam ◽  
Ismail P. K.

Nowadays the advances in the computer technology have validated great development on healthcare technologies in numerous fields. However these new technologies have made also healthcare data not only much bigger but also much more difficult to handle and process. Currently the peoples are leading to death because of the proper distribution of medical resources over the world. Cloud and big data not only are important techniques but also are gradually becoming the trends in healthcare innovation. However these problems can be greatly solved by building a healthcare system with the help of these new technologies. But the greatest challenge of building a comprehensive healthcare system is in the handling of the heterogeneous healthcare data captured from multiple sources. In-order to provide a more convenient service and environment of healthcare, this paper proposes a big health application system based on the health internet of things and big data. The world is confronting issues, for example, uneven conveyance of restorative assets, the developing endless maladies, and the expanding restorative costs. Mixing the most recent data innovation into the human services framework will enormously alleviate the issues. So building huge well being application framework by adequately coordinating medicinal well being assets utilizing keen terminals, well being Internet of Things (IoT), enormous information and distributed computing is the significant method to unravel the above issues. Also in this work proposes a new convolutional neural network based multi-modal disease risk prediction (CNN-MDRP) algorithm using structured and unstructured data from hospital.


Sign in / Sign up

Export Citation Format

Share Document