A Framework To Make Voting System Transparent Using Blockchain Technology
A Framework To Make Voting System Transparent Using Blockchain Technology
10, 2022.
Digital Object Identifier 10.1109/ACCESS.2022.3180168
ABSTRACT A widespread mistrust towards the traditional voting system has made democratic voting in
any country very critical. People have seen their fundamental rights being violated. Other digital voting
systems have been challenged due to a lack of transparency. Most voting systems are not transparent enough;
this makes it very difficult for the government to gain voters’ trust. The reason behind the failure of the
traditional and current digital voting system is that it can be easily exploited. The primary objective is to
resolve problems of the traditional and digital voting system, which include any kind of mishap or injustice
during the process of voting. Blockchain technology can be used in the voting system to have a fair election
and reduce injustice. The physical voting systems have many flaws in it as well as the digital voting systems
are not perfect enough to be implemented on large scale. This appraises the need for a solution to secure the
democratic rights of the people. This article presents a platform based on modern technology blockchain that
provides maximum transparency and reliability of the system to build a trustful relationship between voters
and election authorities. The proposed platform provides a framework that can be implemented to conduct
voting activity digitally through blockchain without involving any physical polling stations. Our proposed
framework supports a scalable blockchain, by using flexible consensus algorithms. The Chain Security
Algorithm applied in the voting system makes the voting transaction more secure. Smart contracts provide a
secure connection between the user and the network while executing a transaction in the chain. The security
of the blockchain based voting system has also been discussed. Additionally, encryption of transactions using
cryptographic hash and prevention of attack 51% on the blockchain has also been elaborated. Furthermore,
the methodology for carrying out blockchain transactions during the process of voting has been elaborated
using Blockchain Finally, the performance evaluation of the proposed system shows that the system can be
implemented in a large-scale population.
INDEX TERMS E-polling, voting system, blockchain application, blockchain voting, E-voting, electoral
system, blockchain, cryptographic hash, secure voting.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
VOLUME 10, 2022 59959
M. S. Farooq et al.: Framework to Make Voting System Transparent Using Blockchain Technology
system, the use of encryption and secure networks minimize TABLE 1. Comparison of current systems with proposed.
the risk of intruders barging into the votes.
M. Pawlak et al. [15], proposed a system that does not
require any operating entities. However, it could not secure
a voter’s identity, and also required complex computing. The
system was able to collect votes from users but due to com-
plex computation, upon higher user rate the latency became
an issue. The identities of the voters became vulnerable. The
system could not compute a large amount of data hence it
has failed to be implemented at a large scale. Whereas in our
proposed voting system the latency is managed by flexible
use of consensus algorithms. The use of cryptographic hash
in blockchain omits the risk of the vulnerability of a voter’s
identity.
A proposed system by D. Chaum et al. [16] improved
the robustness and fair tallying of votes. End-to-end veri-
fication was made possible for voters to assure their count proposed system besides implementing blockchain is to
of the vote is integrated. Each voter was able to view if his assure security, transparency, and integrity of results in a
vote was considered and recorded correctly. The voters were voting system that empowers the trust of voters. This arti-
given a unique code that they could enter into the system cle proposes a more efficient and better implementation of
to verify their vote. Whereas in our proposed voting system blockchain in digital as well as a traditional voting system
the verification of votes has been further simplified. Voters that is already being used. It gives higher authorities more
can verify their votes through registered phone numbers and detailed insight into the system while keeping it decentralized
email addresses. Verification of votes after the voting activity and transparent for every voter.
builds up the trust of voters.
The voting system without polling stations was discussed III. PROPOSED FRAMEWORK OF VOTING SYSTEM
by P. Mccorry et al. [17]. He suggested that voting through Blockchain is mutable, unlike other programming structures
the internet using blockchain can give good results if imple- where an admin can add, delete or update the data. If such
mented correctly. They discussed some technical flaws in a system is used for voting, then anyone having access
digital voting systems. The robustness of the system could can tamper with the system and update or delete the votes.
not be controlled. The error of doubling users gets minimal by This is not the case with blockchain technology. Once a
using end-to-end verification. These voting systems had low node is added to the chain, it cannot be deleted or updated
latency and did not secure the privacy of voters. This latency under any condition. If a node is attacked by an intruder,
in the system is controlled by using a flexible consensus the corresponding nodes detects it and rebuild the damaged
algorithm and smart contracts in the blockchain voting system node, hence the chain becomes immutable. The blockchain
being proposed. is decentralized which makes the voting system independent
The Table 1 shows a detailed comparison of our proposed of any single computing node. The voting activity remains
VMS with other voting systems based on blockchain tech- operational even if any one or more nodes get attacked or
nology. The state-of-the-art blockchain voting system was become unavailable. It assures reliability under any severe
based on a single fixed consensus algorithm however our condition. The main stakeholders of the proposed framework
proposed system supports a flexible consensus algorithm at are voters, Identification Authorities (IA), and Administra-
run time that helps to control the performance of the voting tion Authority (AA) of election commission.
activity. We have also proposed a solution for the prevention
of the 51% attack to prevent malicious activities during the A. VOTING SYSTEM ARCHITECTURE
voting process. Our system has further proposed the Chain In Fig. 2 a high-level architecture of the proposed system has
Security Algorithm which automatically verifies the validity been presented. It shows how the main stakeholders; Voters,
of the chain each time a new block is added to it or some VMS, AA, and IA work together to perform certain voting
unauthorized change occurs in block data. We have also pro- tasks. All voters are connected to VMS directly through
posed a mechanism of Unspent Transaction Output(UTXO) dAPP; it is either a mobile application or a web portal. The
and Smart Contracts that allow the system to prevent any identification authority verifies voters registering in the sys-
incomplete and malicious transaction in the blockchain. tem. Any voter who is verified and eligible to vote is allowed
The above discussion shows that there has been a lot of in the application to take part in voting.
debate about making a secure, efficient, and transparent vot- The process of the whole system includes certain parts;
ing system in past but any comprehensive solution or system the first one is the user interface of the application, which
has not been proposed that could fulfill all requirements also requires front-end security. It is critical because the user
and key purposes of the voting system. The novelty of the enters his credentials on that interface, so it should be secure
B. UNIQUENESS OF VOTERS
The uniqueness of users can be established by using their
computerized National ID. When voters enter their details,
those are then verified with the assistance of identifying
authorities. This makes sure that a person’s identity is not
being used by another voter. By taking credentials, the author-
ities verify, if the person is eligible to cast a vote in the
FIGURE 5. Smart contract casting vote in VMS.
election or not and whether any transaction hash has already
been assigned to his/her National ID. If voter is eligible, the
system registers the voter and one Voting Coin is awarded TABLE 2. Transaction in VMS.
to every voter wallet. Verifying the user by this method also
enables the system to judge user either fulfills the require-
ments imposed by the law and cast the vote. When the voter
casts the vote, a transaction hash is assigned against the
National ID of the voter. Furthermore, the wallet balance of
voters is also updated to zero voting coin, which eliminates
the possibility of doubling a vote from the same user. When a
voter casts a vote, the blockchain updates and saves the vote
of the voter, which means that the user is not be able to cast
a vote again unless a new VC is issued.
nodes keep mining the blocks as shown in Fig. 8 a). When block and locked using the public key of the voter. While
the affected Node 2 is connected again with the network, tracking the vote, the node is identified by the voter’s public
the longer chain wins as per blockchain rule i.e. Node 1 is key. The voter uses his private key to view the transaction
considered the valid chain and replicated on the affected made by his wallet. Voters can only view the vote; they can
Node 2. never change or delete the vote once it is cast. Any user
information being transferred in a transaction is encrypted by
D. TRANSACTIONS IN VMS (UTXO) cryptography. The process of casting vote in VMS is further
This section explains the concept of Unspend Transaction elaborated in Fig. 10. It shows that while casting vote the
Outputs (UTXO) in the proposed system. As discussed in voter adds a digital signature to the transaction. This digital
Section IV part c, each voter is given one VC in his wallet signature keeps the transaction secure.
at the time of registering. Voters can spend it only once
while voting for candidates. Voting transactions in VMS are
performed using the UTXO mechanism. In Fig. 9 there are
several transactions by different voters to candidates. While
performing each transaction 1 VC is spent. Miner gets this VC
as a reward. There is no transaction fee in the voting system as
system keep the rights of all voters equal. Voter1 spends 1 VC
to cast the vote for Candidate2. This transaction is recorded
and forwarded to the memPool of transactions. From there,
miners pick up multiple transactions and start to mine. Here
the value of UTXO after each transaction is updated to zero,
ensuring that a voter cannot vote again.
E. CRYPTOGRAPHIC HASH A miner in blockchain can only change the nonce value of
Cryptographic hash keeps the data hidden from any intruder the transaction, as all the data is encrypted by using a hash.
in the system; it has multiple benefits that include the privacy Fig. 11 shows an example of a block added to the chain in
of the user’s identity. Cryptographic hash uses encryption VMS. All the voting transactions are placed in chain. The
to keep the transaction secure when it is transmitted on the nonce value is the one that the miner can change, to mine
network to be added to a node, only the authorized owner the block in the chain. All other values are not editable by a
of the transaction can decrypt the transaction and view the miner. Fig. 11 elaborates the block data in detail but in a real
content using his private key. The tracking of the user’s vote block, this data is stored in the form of hexadecimal. The hash
is made possible by providing the voter with the address value is the tracking address of this block given to the voter to
of his transaction; as soon as the vote is cast the voter is verify his vote. Miner tries to reach the golden nonce in order
notified through SMS and email. Voters can track their vote to add the block in chain.
in blockchain through the hash value of the transaction that Integrity and confidentiality are key features of blockchain
is provided on the registered phone number. The voting data technology. The system uses signatures to lock and unlock the
includes all the information saved while casting the vote. The messages in the blockchain. Hence, only the voter is authenti-
data remains secured, unharmed, and hidden. The only person cated to view the message. The private key and message of the
with the tracking information is the voter, who can view and user create a signature. A function called signing algorithm
verify his voting information. The transaction is saved in a takes the private key and Vote (message) of the voter to create
F. CHAIN DEPLOYMENT
This section elaborates the chain deployment. The voter casts
the vote in the system, the voting transaction is mined into
the blockchain. Each successful transaction in the blockchain
is notified to the voter via registered phone number. The
voter can verify his vote by using the hash value of the
transaction. As this method of changing the status of vote FIGURE 13. Prevention of 51% attack in VMS.
transactions on chain overcomes the issue of the partial pro-
cess transactions, the chain only computes the voting result V. PERFORMANCE EVALUATION
by processing the successful transactions, as only those votes This part contains the performance evaluation of the proposed
are counted. The delay of 10 minutes has been decided to framework; data is taken with real-life scenarios using Remix
tackle the transactions load on blockchain. After voting the a browser-based Blockchain tool. Solidity is used as the
election authorities can view the votes result on the dashboard programming language in the experimentation of the pro-
of the VMS. The dashboard shows the details of registered posed model.
approach of implementing a flexible consensus algorithm to [7] S. Shah, Q. Kanchwala, and H. Mi. (2016). Block Chain Voting
reduce extensive computing resources in the blockchain. This System. Economist. [Online]. Available: https://www.economist.com/
sites/default/files/northeastern.pdf
transparent behavior of the system tends to be promising for [8] S. Park, M. Specter, N. Narula, and R. L. Rivest, ‘‘Going from bad to worse:
voters to rely and trust. The Chain Security Algorithm is also From internet voting to blockchain voting,’’ J. Cybersecurity, vol. 7, no. 1,
added, which automatically verifies the validity of the chain pp. 1–15, Feb. 2021, doi: 10.1093/cybsec/tyaa025.
[9] K. M. Khan, J. Arshad, and M. M. Khan, ‘‘Secure digital voting sys-
each time a new block is added to it. Smart Contracts play tem based on blockchain technology,’’ Int. J. Electron. Government Res.,
an important role to prevent any incomplete and malicious vol. 14, no. 1, pp. 53–62, Jan. 2018, doi: 10.4018/IJEGR.2018010103.
transactions in the blockchain voting system. [10] C. K. Adiputra, R. Hjort, and H. Sato, ‘‘A proposal of blockchain-
based electronic voting system,’’ in Proc. 2nd World Conf. Smart
The proposed system is a secure, transparent, and reli- Trends Syst., Secur. Sustainability (WorldS), Oct. 2018, pp. 22–27, doi:
able platform for the authorities, and voters. The proposed 10.1109/WorldS4.2018.8611593.
framework has a promising output based on the performance [11] A. Barnes, C. Brake, and T. Perry. Digital Voting with the use
of Blockchain Technology Team Plymouth Pioneers-Plymouth
evaluation of blockchain technology in VMS. The experiment University. Accessed: Feb. 14, 2022. [Online]. Available:
shows that the system keeps processing efficiently while https://www.economist.com/sites/default/files/plymouth.pdf
processing a large number of transactions in the blockchain. [12] J. Huang, D. He, M. S. Obaidat, P. Vijayakumar, M. Luo, and
K.-K.-R. Choo, ‘‘The application of the blockchain technology in vot-
ing systems: A review,’’ ACM Comput. Surv., vol. 54, no. 3, pp. 1–28,
REFERENCES Apr. 2022, doi: 10.1145/3439725.
[1] S. S. Hossain, S. A. Arani, M. T. Rahman, T. Bhuiyan, D. Alam, and [13] F. Fusco, M. I. Lunesu, F. E. Pani, and A. Pinna, ‘‘Crypto-voting,
M. Zaman, ‘‘E-voting system using blockchain technology,’’ in Proc. a blockchain based e-voting system,’’ in Proc. 10th Int. Joint Conf.
2nd Int. Conf. Blockchain Technol. Appl., Dec. 2019, pp. 113–117, doi: Knowl. Discovery, Knowl. Eng. Knowl. Manage., 2018, pp. 223–227, doi:
10.1145/3376044.3376062. 10.5220/0006962102230227.
[2] B. Shahzad and J. Crowcroft, ‘‘Trustworthy electronic voting using [14] G. Rathee, R. Iqbal, O. Waqar, and A. K. Bashir, ‘‘On the design and
adjusted blockchain technology,’’ IEEE Access, vol. 7, pp. 24477–24488, implementation of a blockchain enabled E-Voting application within IoT-
2019, doi: 10.1109/ACCESS.2019.2895670. oriented smart cities,’’ IEEE Access, vol. 9, pp. 34165–34176, 2021, doi:
[3] F. P. Hjálmarsson, G. K. Hreiòarsson, M. Hamdaqa, and G. Hjálmtýsson, 10.1109/ACCESS.2021.3061411.
‘‘Blockchain-based E-Voting system,’’ in Proc. IEEE 11th Int. Conf. Cloud [15] M. Pawlak, A. Poniszewska-Marańda, and N. Kryvinska, ‘‘Towards
Comput. (CLOUD), Jul. 2018, pp. 983–986. the intelligent agents for blockchain e-voting system,’’ Proc. Com-
[4] M. S. Farooq, M. Khan, and A. Abid, ‘‘A framework to make put. Sci., vol. 141, pp. 239–246, Jan. 2018, doi: 10.1016/j.procs.2018.
charity collection transparent and auditable using blockchain technol- 10.177.
ogy,’’ Comput. Electr. Eng., vol. 83, May 2020, Art. no. 106588, doi: [16] D. Chaum, A. Essex, R. Carback, J. Clark, S. Popoveniuc, A.
10.1016/j.compeleceng.2020.106588. Sherman, and P. Vora, ‘‘E-voting 40 scantegrity: End-to-end voter-
[5] N. M. Crosby, P. Pattanayak, S. Verma, and V. Kalyanaraman, ‘‘Blockchain verifiable optical-scan voting,’’ IEEE Secur. Privacy, vol. 6, no. 3,
technology—Beyond bitcoin,’’ Sutardja Center Entrepreneurship Tech- pp. 40–46, May 2008. Accessed: Feb. 14, 2021. [Online]. Available:
nol., Univ. California, Berkeley, CA, USA, Tech. Rep., Oct. 2015. https://www.computer.org/security/
Accessed: Jan. 24, 2018. [Online]. Available: http://scet.berkeley.edu/wp- [17] P. McCorry, S. Shahandashti, and F. Hao, ‘‘A smart contract for boardroom
content/uploads/BlockchainPaper.pdf voting with maximum voter privacy,’’ in Financial Cryptography and Data
[6] T. Dimitriou, ‘‘Efficient, coercion-free and universally verifiable Security. Sliema, Malta: Springer, 2017, pp. 357–375, doi: 10.1007/978-3-
blockchain-based voting,’’ Comput. Netw., vol. 174, Jun. 2020, 319-70972-7_20.
Art. no. 107234, doi: 10.1016/j.comnet.2020.107234.