Implementation of Authenticated and Secure Electronic Voting system Hesham A. El Zouka Computer Eng. Dept, College of Engineering and Technology Arab Academy for Science, Technology, and Maritime Transport, Alexandria, Egypt helzouka@aast.edu, helzouka@gmail.com Mustafa M. Hosni Electrical Engineering Dept., Faculty of Engineering, Managing Director of OMIKRON Technologies, Alexandria, Egypt mustafa.hosni@omikrontechnologies.com Abstract There are several issues should be addressed and taken into consideration prior to initiating the e-voting system. The proposed system in this paper will ensure the integrity and the transparency of the electoral process. The paper will also focus on what's really needed to design a robust, secure and scalable electronic voting system that ensures accuracy, neutrality, transparency, simplicity, flexibility, Sustainability, and security of the information. With respect to accuracy, the system must be safe and secure in the face of numerous threats. In order to safeguard the neutrality of voter registration process, the system should not favour a particular party or group. Looking at the risks and benefit associated with transparency, the process must be clear in terms of counting the electronic votes, taking the political and legal setting into account. For simplicity, the process must be easy to understand for citizens and elected politicians. The simplicity allows for extreme flexibility in adapting to disabled and illiterate voters as well. All the above mentioned points will be addressed in the proposed contribution. Keywords- e-voting, validation, verification, privacy, authentication, threat, risk management. I. INTRODUCTION The objective of e-voting system is to permit voters to practice their right to express their decisions in regards to particular issues to pick their government and political party representatives. To permit the activity of this right, all voting frameworks around the world incorporate to achieve voter identification proof, recording of votes cast, vote tallying, and determination of election results. Voter distinguishing proof is required during the electing process. Therefore, it is quite agreeable to have computerized voting system to reduce voting time, to make sure that the voting is a occurred correctly, to reduce flaws and errors in filling out ballots and finally to simplify the process for people with special needs [1]. As e-voting is gradually replacing the traditional voting systems, it becomes quite obvious and undeniable how electronic principles are depending upon electoral process’s credibility [2]. Consequently, securing e-voting system would not be an easy task, as essential security properties will need to be ensured. But as yet, some e-voting security requirement sound contradicting and confusing like ensuring voter authenticity and vote anonymity [3]. In this paper, A windows communication foundation based distributed network and A NOSQL Cassandra distributed database management system are used to implement the proposed e-voting system [4]. The software implementation can be classified into two phases: the local phase and the global phase. The Local phase is organized by Windows Presentation Foundation program, and the global phase creates the "Silverlight ASP.NET website, and in both phases the source code is written in C #.Net language [5]. In addition, the mobile Agents technology is applied to achieve tasks and remotely controlling objects in the network [6]. Mobile agent is concerned with the actual implementation of deploying new objects as they do not need to be installed or deployed before their use. Mobile agents are simply created, and are self deploying. This makes it easier to deploy newer objects as they do not have to be pre deployed and installed before their use. Simply, NET Remoting runs over channel objects and forms the mode of transport for mobile agents between mobile agent platforms, providing larger bandwidth and security to the e-voting machines. Therefore, the data can be processed at various locations in the network and the code portion of mobile agents can be cached, reducing the bandwidth to just the data segments. In the following sections the proposed architecture will be described in details. In Section II, the security requirements and concerns of e-voting systems are introduced and the importance of improving election transparency and ensuring the respect of democratic principles is discussed. Challenges in implementing e-voting systems are briefly introduced in section III. The architecture of the proposed e-voting scheme is presented in Section IV, while the implementation details are described in Section V. In Section VI, the design diversity of the embedded codes is discussed. Finally, a brief conclusion is given in Section VII. II. SECURITY REQUIREMENTS A set of laws is set in each country in order to guide the voting system, to establish its organization and to ensure its impartiality, integrity, and democratic principles. In general, e-voting election processes should follow this set of laws and fulfill the following requirements [7], [8],[9]. a) Accuracy The system must provide accurate results according to the rules of the electoral process. The process must be clear in terms of counting the electronic votes, taking the political and legal setting into account. In addition, vote counting shouldn’t be observed by the poll watchers as it is basically done computationally. Vote receipts are needed, then, to allow voters check if ISBN: 978-1-941968-23-9 ©2015 SDIWC 16 Proceedings of The International Conference on Information System Security, Robotics Modeling, and E-Commerce Transactions, Dubai, UAE 2015