E Voting Application
E Voting Application
Abstract— The elevated utilization of information protocols need to be established for the E-voting
te chnology seems to revolutionize both the provision of system. To reduce threats, different rules
governmental services and the vivacity of democracy. E-
voting or Ele ctronic voting symbolizes modern democracy.
concerning eligibility, ballot-privacy, singular
E-voting will be at its best when complied with the existing verifiab ility, comp leteness, fairness, universal
legal and regulatory framework. "Vote", the word means verifiab ility, and robustness have to be developed.
to dete rmine or to elect or select from a list or who will run "ELECTRONIC VOTING APPLICATION" is an
the country or the organization or a group. To find leaders
selecte d by people is the prime aim of voting (Scenario:
online voting method. In this system, individuals
Citizens electing their country leaders). Most countries, who are citizens of India and are over the age of 18
India is no exception, have trouble voting. Some of the and all sexes should be able to cast their ballot
issues at stake are incorrect voting during elections, without visiting polling stations. There is a
inexperienced personnel, inaccessible or insecure polling
stations, and inadequate voting equipment. The new database managed by the Indian Electoral
indigenous flagship internet-based voting system solves this Co mmission that stores all voters' names with
exact problem. It should be noted that users, in this case , complete information.
citizens, have a large time frame during the voting period
with the system running. The objective of this paper is to
come up with a new solution, does come with a small
In "ELECTRONIC VOTING APPLICATION",
learning curve, citizens will have to be trained on how to voters can easily use their voting rights online.
e xe rcise their right to vote online. They must be registered first to be able to vote.
The system admin istrator registers everyone
Keywords- voting, E-voting, electronic voting mainly for security reasons. The system
system. admin istrator registers voters on a special system
site that they only visit by simply filling out a
I. INT RODUCT ION registration form to register the voter. Citizens
wishing to register should contact the system
E-voting plays a vital role in the evolution of a
admin istrator to submit their contact information.
democratic society. The voting technique currently
The verification of the individual is done using
used involves voters to cast their votes by visiting
existing databases such as AADHAR, PA N-Card,
polling stations. Polling stations are either installed
Passport, etc., by the registration authority, the
fro m scratch or just some public places are used.
citizen is therefore registered as a voter by the
Implementation of E-voting would save a lot of
Indian Electoral Commission.
time for both voters and the election commission.
An ideal voting application should allow fu lly
After registration, the voter receives a Voter_Id
functional online voting using general household
number and a password with which he can access
devices [1]. Counting of voting can be done
the system and use the services provided by the
automatically and anonymously. E-voting system
system, e.g. Voting, reviewing results, etc. If
introduces a different type of threats and
invalid/incorrect information is sent, the citizen is
challenges as it relies on the internet,
not registered to vote.
simultaneously solving the problems faced while
using current voting systems. Different sets of
Authorized licensed use limited to: University of New South Wales. Downloaded on July 13,2020 at 06:20:08 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Fifth International Conference on Communication and Electronics Systems (ICCES 2020)
IEEE Conference Record # 48766; IEEE Xplore ISBN: 978-1-7281-5371-1
II. PROBLEMS WIT H EXISTING SYST EMS in the ballot bo x, which poll works should be
watching.
A. Current Scenario
“If the election is later disputed or found being
In the early days, the voting process was rigged, officials can optically scan these paper
performed using a paper ballot. After the ballots or hand-count them accordingly.”
advancement of technology, Electronic Vot ing
Machines were developed, and like any
technology, it also has its pros and cons.
C. Electronic Voting Machine
B. Election Commission of INDIA Electronic voting machines (EVMs) were
The duties of the Election Commission of India originally developed to smoothen the process of
(ECI) as established by Article 324 of the voting. They were a great success but created new
Constitution are to ensure that the election process problems of their own. Furthermo re, EVMs do not
is being performed in a fair and free manner [2]. satisfy the basic legal requirements that were
For any election to qualify as free and fair, the being established in the IT Act 2000 [4].
standards are as follows:
The current version of EVMs that are being used
i. Individuals must be meticulously verified in the election process cannot verify the identity of
as eligible voters; the voter. This leads to a new problem, which if
ii. Voters must be able to vote only a single exploited any nu mber of fake and bogus votes can
ballot, wh ich should be anonymous be cast in the ballot.
and allowed to opt-in private space;
iii. The ballot box or any storage medium D. Related work
must be secure and carefully surveyed E-voting applications’ trails have been carried out
during the election, voters must only by several countries, depending on their
have the power to cast in the vote note capabilities to carry out such an event. Some of the
redact them; success stories are listed:
iv. After the election is over, the votes must In 2000, elections were carried out using an E-
be extracted fro m the ballot in voting system in the United States’ election. Even
presence of observers from all though it was only carried out in some parts of
participating parties, the votes and the Florida, it marked its name in the history of E-
voters must remain anonymous ; voting systems’ development [5].
v. When or if there is any doubt in the result In 2002, an electronic voting system was tested
the verification of votes must be in the United Kingdom. During this process, 16
available; authorities were rewarded for building that E-
vi. The vote of the respective voter must go voting system. For the same, 18 more authorities
to the candidate he/she cast it to. were awarded after a year.
Over the last few centuries, the paper ballot In the year 2004, the United States conducted
satisfies all the six needs for a fair and free the election using an E-voting system DRE for the
election. However, the way EVMs are being used first time in history at a national level.
in India for general elections dissatisfies the The first mass internet-based voting was
requirements shown above. recorded in the French Presidential election. In the
Election Co mmission of India then integrated year 2007, history was made in France in E-voting
the EVMs with the assurance of a “paper backup” which involved more than 31,000 voters to
or “paper trail” as is performed in different participate in the 2007 French Presidential
states/countries. This was an easy and practical election.
way to meet the last two needs mentioned. In the year 2014, 17,60,000 ballots were
As intended, the “paper trail” procedure is recorded in the election of the Min istry of National
supposed to support the process of voting, Education of France.
described below:
E. Problem with Existing Systems
When the voter gets approved then he/she can
● Costly and time taking: The stages of
make decisions in the ballot. If they confirm the
choice displayed to them, the vote is being gathering and registering the data into the
recorded in some storage medium [3]. database take too much time and is
expensive to conduct, for example, time
After that the EVM prints out the choice made and money is spent in printing data
by the voter in the receipt form and gets deposited capture forms, in preparing registration
stations together with human resources,
Authorized licensed use limited to: University of New South Wales. Downloaded on July 13,2020 at 06:20:08 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Fifth International Conference on Communication and Electronics Systems (ICCES 2020)
IEEE Conference Record # 48766; IEEE Xplore ISBN: 978-1-7281-5371-1
B. Voting phase
1. To cast a vote, open the login page.
2. Enter your voter_id and password to log
in.
3. Select the candidate you want to vote for
from the list.
4. Check Or verify your vote.
5. Submit, to end your voting process.
Authorized licensed use limited to: University of New South Wales. Downloaded on July 13,2020 at 06:20:08 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Fifth International Conference on Communication and Electronics Systems (ICCES 2020)
IEEE Conference Record # 48766; IEEE Xplore ISBN: 978-1-7281-5371-1
B. Viruses
Viruses are a malicious piece o f code that attaches
IV. LEGAL ISSUES
itself to a host intended to spread fro m one to
Any application in these times has to follow some another. It can replicate itself and even copy it to
legal rules and must be under some regulations of other programs. The infected vulnerable system
some sort. may lose data, admin control, sensitive data, and
who knows what. if an E-voting application gets
A. Remote voting: infected then it may co mpro mise the elect ion or
perform several malicious tasks.
Remote elect ions at the mo ment fail to provide
any kind of super visional factor. When the
individual casts its votes in the voting booth, they C. Worms
are given some privacy or space, but still kept in A worm is a malicious program that replicates
surveillance fro m a d istance; which is not possible itself and spreads to the network or any other
in the E-voting system. While an indiv idual is connection present without any human interaction.
casting votes in the election process, a family It doesn't need to attach itself to any software
member o r coercer can watch over your shoulder program i.e. it does not require any host to carry
and compro mise the process [6]. The website on the code. Worms can harm E-voting application
which the application is hosted can be by either compro mising server storage or network
compromised by an attacker/ hacker. bandwidth. If programmed accordingly, the ability
B. Transparency: to overwrite file and change result of the election,
bringing the purity of the ballet into danger.
In today’s election scheme, an ind ividual has no
way to verify that his/her vote is counted correctly
and fairly [7]. For any reason, if an individual’s D. Trojan Horses
vote gets misplaced, there is no way of even A trojan horse is a program or file that appears to
realizing that the vote is lost. be safe but may be performing tasks like giv ing
Transparency in the electoral process is very admin access to the system or network, sending
tricky and difficu lt to achieve. So metimes it can informat ion to an attacker(s), and so on. They are
be dangerous as it may leak more information than an immense reason for concern to the
it should or is allowed to. confidentiality and integrity of the E-voting
application(s) and/or systems' network. The data
C. Voter privacy: of the voting process or voters can be stolen.
In an election process, voter’s privacy or
anonymity is the key element. It is forbidden by E. Physical Attacks
law to even know what another individual opted There are several ways in wh ich an E-voting
for in the ballot. To achieve, the privacy of each system can be co mp ro mised physically. They may
voter, no vote should be traceable back to the damage, disrupt, change, or destroy computer
voter [8]. equipment or the data itself. Physical attacks on E-
voting can be a scheme of a candidate/party to
sabotage the election process. It may also be an
V. SECURIT Y A NALYSIS
attempt to steal the voters’ personal informat ion
No web application is entirely secure in this for illegal uses. So, the infrastructure of the E-
world; bad people (attackers) catch up with voting system should be kept secret.
developers and all very quickly [9]. Various
threats can harm the E-voting system in different
phases of security leaving an unsecured system. VI. NULLIFIERS OF THREAT S A GAINST E-
VOT ING SYST EMS
Authorized licensed use limited to: University of New South Wales. Downloaded on July 13,2020 at 06:20:08 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Fifth International Conference on Communication and Electronics Systems (ICCES 2020)
IEEE Conference Record # 48766; IEEE Xplore ISBN: 978-1-7281-5371-1
should gain access with the help of non-trivial G. Open Source Systems in E-Voting
authorization and authentication mechanis ms for The idea of including open source systems in E-
improved security[10]. For example, Public Key voting has been suggested. It’s still not a wise
Infrastructure was applied in the Estonian E- decision to include an open-source system running
voting System (EstEVS), which enabled voters to E-voting over the internet. An open-source system
vote only when they used their authentication and cannot be trusted more than a closed source
Digital signature certificates. system. In an art icle by Ken Thompson entitled
However, t raditional methods with some tweaks “Reflections on Trusting Trust” it was stated that
can also provide great authentication method like “you can’t trust code that you did not totally create
making it mandatory for the user to set complex yourself” [13]. Any application written in a way
credentials. that it is derived fro m an ingenious piece of code
can be used to include or insert backdoors in the
B. Phishing Scams application.
A Social ph ishing scam could be avoided by
spreading knowledge of E-voting applicat ion VII. RESULT ANALYSIS
about different tactics using which phishing scam
Ideal Electronic voting or any voting method for
could be launched [11].
that matter should follow certain parameters for the
The above can be done only if the educators are successful voting process[14].
up to date with the newest methods of
exploitation. Technical phishing scams could be In order to perform an internet-based election,
more harmfu l than the social phishing scams as some parameters need to be addressed.
they have the ability to disrupt the elect ion
process. A. Ballot privacy
No one other than the voter themselves cannot
acquire knowledge of someone’s ballot.
C. Mutual authentication
This is the method in which the client is required
to authenticate the server and server must B. Individual verifiability.
authenticate the client for further interaction.
The voter must have an option to verify or
confirm after the voting process.
D. Integrity Threats
Integrity threats are those which makes you C. Eligibility
question the integrity of the data. Integrity threats Only the legal voter would be allowed to enrol
in an E-voting application can be minimized by in the voting process.
forbidding changes during the active stages of the
voting process [12]. E-voting applicat ion must be D. Completeness
reviewed by an independent third party before Each and every vote should be counted
deployment to verify that it does exact ly what it is precisely.
supposed to and further to find any kind of
anomaly in the code. Using Cryptographic
techniques while data transmission can reduce E. Uniqueness
integrity threats. Every voter should only be allo wed to vote
once during an election. An individual should not
be allowed to vote again.
E. Subverting System Accountability Solutions
The usage of checksums and encryption on the F. Robustness
audit trails helps to catch or to prevent any kind of No one should have the ability to modify the
changes to the file system. It helps to reduce the results during the process of counting and/or
risk of running source code with side effects. tallying.
Authorized licensed use limited to: University of New South Wales. Downloaded on July 13,2020 at 06:20:08 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Fifth International Conference on Communication and Electronics Systems (ICCES 2020)
IEEE Conference Record # 48766; IEEE Xplore ISBN: 978-1-7281-5371-1
Authorized licensed use limited to: University of New South Wales. Downloaded on July 13,2020 at 06:20:08 UTC from IEEE Xplore. Restrictions apply.