Secure Mobile Based Voting System
Secure Mobile Based Voting System
Vote at
Any Time Any Where Any Mobile
Presented by:
Under The Guidance of:
Ningappa.T.P Suma.B(2TG07CS045) Veeramma.R.K(2TG07CS053) Vidya.H.B(2TG07CS055)
Vijayalakshmi.S(2TG07CS058)
OVERVIEW
Introduction Overview of Mobile Technology VoiceXML Architecture VXML Components JSP Overview System Architecture Phases of Mobile Voting Scheme Internal Structure of 3-tier Architecture Speech Recognition Process in Mobile Voting DFD-Vote Casting Testing Advantages and Disadvantages of Proposed System Conclusion and Future Enhancements References
EXISTING SYSTEM
1.Ballot System
Electronic voting machines are currently used for vote casting. These systems allow the user to cast his vote reducing possible errors like wrong candidate selections and loss of votes, reducing manual work during counting. Still these have the drawbacks.
2.Travel to Vote
3.Elederly people
PROPOSED SYSTEM
Vote at
Any Time Any Where Any Mobile
Enabling the voter to vote with absolute confidentiality, nobody will ever know what he/she voted. Enabling the voter to vote from anywhere in the globe, wherever he/she will be, and without needing any special Network, nor equipment ,nor a personal computer(PC). Enabling only the voter to vote, avoiding the possibility to sell a vote.
The voter is allowed to cast their vote or to know the results depending upon their choice of selection.
The system authenticates the user using security informations like biometric id, voter id, year of birth, pin code.
INTRODUCTION
In India all earlier elections be it state elections or centre elections a voter used to cast his/her vote to his/her favorite candidate by putting the stamp against his/her name and then folding the ballot paper as per a prescribed method before putting it in the Ballot box. This is a long, time-consuming process and very much prone to errors. This method wanted voters to be skilled voters to know how to put a stamp, and methodical folding of ballot paper. Millions of paper would be printed and heavy ballot boxes would be loaded and unloaded to and from ballot office to polling station. A vote once recorded in an EVM cannot be tampered with, where as in the ballot paper system the votes marked and put into the box can be pulled out and destroyed.
Cont. .
The followings are requirements that should be considered for secure and trustworthy e-voting. - The relation between voter and vote content should not be revealed. - The result of a poll should be retained as a secret before counting the ballot. - A voter can cast his vote just one time. - Only an identified person by an e-voting device can participate in e-voting. - Other people excepting a voter himself should not know the vote content. - It is not permitted to rig the ballot.
VOICEXML:
VoiceXML (VXML) is the W3C's standard XML format for specifying interactive voice dialogues between a human and a computer.
VoiceXML ARCHITECTURE
JSP OVERVIEW
JSP may be viewed as a high-level abstraction of Java servlets. JSP pages are loaded in the server and operated from a structured special installed Java server packet called a Java EE Web Application, often packaged as a .war or .ear file archive. JSP allows Java code and certain pre-defined actions to be interleaved with static web markup content, with the resulting page being compiled and executed on the server to deliver an HTML or XML document. JSP syntax is a fluid mix of two basic content forms: scriptlet elements and markup. Markup is typically standard HTML or XML, while scriptlet elements are delimited blocks of Java code which may be intermixed with the markup.
SYSTEM ARCHITECTURE
Cont
Verification Server (VS):
VS belong to the voting authority, who organizes the voting event. It verifies the legitimacy of the voter and issues a voting token to the voter. VS also publish a list of voter information.
Voting Phase:
In this phase, the voter dial a designated phone number and follow the instructions using a password already provided. The voter selects the appropriate option to vote the particular party. The voter checks the signature and retrieves the VS- signed voter, voter ID.
Cont
Counting Phase:
Counting Phase At the scheduled time of counting CS decrypts the ballot and checks whether the voting token is valid or not. If it is valid it will be counted else it will be rejected.
Security Analysis Authentication only the authorized voters can vote. Privacy all votes remain secret while the voting takes place and each individual vote cannot be linked to the voter who casts it.
Party_Details
Successful Validation
Check Election ID
Election Details
TESTING
White Box Testing:
By using this technique it was tested that all the individual logical paths were executed at least once. All the logical decisions were tested on both their true and false sides
UNIT TESTING:
This is the first and the most important level of testing. As soon as the programmer develops a unit of code the unit is tested for various scenarios. As the application is built it is much more economical to find and eliminate the bugs early on. Hence Unit Testing is the most important of all the testing levels.
Cont
INTEGRATION TESTING:
Since Integration Testing focuses on Integration of components and components can be built by different developers and even different development teams, it is important the right versions of components are tested.
CONCLUSION
This system allows the user to cast his vote with high level of confidentiality and keep voters away from the possible threats like booth capturing and it may increase the voter turnouts in remote areas and even in urban areas. Since the system operates on IVR platform the voter session will be interactive and user friendly which makes the user to feel in a very comfortable zone. The system provides security features like checking the unique identification number of the voter.
FUTURE ENHANCEMENT
As a measure of security features mobile devices allows the user to make use of biometric informations which are unique to individuals. For example voice biometrics can be used with voiceXML to authenticate a user. Similarly finger prints can also be used with mobiles that provide those options.
REFERENCES
Creating VoiceXML pages within a Java Web developer framework
http://www.ibm.com/developerworks/web/library/wa-voicexml
VoiceXML Tutorials
http://www.vxml.org
Thank you