Implementation of Authenticated and Secure Electronic Voting system
Hesham A. El Zouka
Computer Eng. Dept, College of Engineering and Technology
Arab Academy for Science, Technology, and Maritime Transport,
Alexandria, Egypt
helzouka@aast.edu, helzouka@gmail.com
Mustafa M. Hosni
Electrical Engineering Dept., Faculty of Engineering,
Managing Director of OMIKRON Technologies,
Alexandria, Egypt
mustafa.hosni@omikrontechnologies.com
Abstract — There are several issues should be addressed
and taken into consideration prior to initiating the e-voting
system. The proposed system in this paper will ensure the
integrity and the transparency of the electoral process. The
paper will also focus on what's really needed to design a
robust, secure and scalable electronic voting system that
ensures accuracy, neutrality, transparency, simplicity,
flexibility, Sustainability, and security of the information.
With respect to accuracy, the system must be safe and
secure in the face of numerous threats. In order to safeguard
the neutrality of voter registration process, the system
should not favour a particular party or group. Looking at the
risks and benefit associated with transparency, the process
must be clear in terms of counting the electronic votes,
taking the political and legal setting into account. For
simplicity, the process must be easy to understand for
citizens and elected politicians. The simplicity allows for
extreme flexibility in adapting to disabled and illiterate
voters as well. All the above mentioned points will be
addressed in the proposed contribution.
Keywords- e-voting, validation, verification, privacy,
authentication, threat, risk management.
I. INTRODUCTION
The objective of e-voting system is to permit voters to
practice their right to express their decisions in regards to
particular issues to pick their government and political party
representatives. To permit the activity of this right, all voting
frameworks around the world incorporate to achieve voter
identification proof, recording of votes cast, vote tallying,
and determination of election results. Voter distinguishing
proof is required during the electing process.
Therefore, it is quite agreeable to have computerized
voting system to reduce voting time, to make sure that the
voting is a occurred correctly, to reduce flaws and errors in
filling out ballots and finally to simplify the process for
people with special needs [1]. As e-voting is gradually
replacing the traditional voting systems, it becomes quite
obvious and undeniable how electronic principles are
depending upon electoral process’s credibility [2].
Consequently, securing e-voting system would not be an
easy task, as essential security properties will need to be
ensured. But as yet, some e-voting security requirement
sound contradicting and confusing like ensuring voter
authenticity and vote anonymity [3].
In this paper, A windows communication foundation
based distributed network and A NOSQL Cassandra
distributed database management system are used to
implement the proposed e-voting system [4]. The software
implementation can be classified into two phases: the local
phase and the global phase. The Local phase is organized by
Windows Presentation Foundation program, and the global
phase creates the "Silverlight ASP.NET website, and in both
phases the source code is written in C #.Net language [5]. In
addition, the mobile Agents technology is applied to achieve
tasks and remotely controlling objects in the network [6].
Mobile agent is concerned with the actual implementation of
deploying new objects as they do not need to be installed or
deployed before their use. Mobile agents are simply created,
and are self deploying. This makes it easier to deploy newer
objects as they do not have to be pre deployed and installed
before their use. Simply, NET Remoting runs over channel
objects and forms the mode of transport for mobile agents
between mobile agent platforms, providing larger bandwidth
and security to the e-voting machines. Therefore, the data
can be processed at various locations in the network and the
code portion of mobile agents can be cached, reducing the
bandwidth to just the data segments.
In the following sections the proposed architecture will
be described in details. In Section II, the security
requirements and concerns of e-voting systems are
introduced and the importance of improving election
transparency and ensuring the respect of democratic
principles is discussed. Challenges in implementing e-voting
systems are briefly introduced in section III. The architecture
of the proposed e-voting scheme is presented in Section IV,
while the implementation details are described in Section V.
In Section VI, the design diversity of the embedded codes is
discussed. Finally, a brief conclusion is given in Section VII.
II. SECURITY REQUIREMENTS
A set of laws is set in each country in order to guide the
voting system, to establish its organization and to ensure its
impartiality, integrity, and democratic principles. In general,
e-voting election processes should follow this set of laws and
fulfill the following requirements [7], [8],[9].
a) Accuracy – The system must provide accurate results
according to the rules of the electoral process. The
process must be clear in terms of counting the electronic
votes, taking the political and legal setting into account.
In addition, vote counting shouldn’t be observed by the
poll watchers as it is basically done computationally.
Vote receipts are needed, then, to allow voters check if
ISBN: 978-1-941968-23-9 ©2015 SDIWC 16
Proceedings of The International Conference on Information System Security, Robotics Modeling, and E-Commerce Transactions, Dubai, UAE 2015