International Journal of Electrical and Computer Engineering (IJECE)
Vol. 6, No. 6, December 2016, pp. 2994~3000
ISSN: 2088-8708, DOI: 10.11591/ijece.v6i6.11972 2994
Journal homepage: http://iaesjournal.com/online/index.php/IJECE
A Cloud Based Secure Voting System using Homomorphic
Encryption for Android Platform
Manish Ranjan, Ayub Hussain Mondal, Monjul Saikia
Department of Computer Science and Engineering, North Eastern Regional Institute of Science and Technology, Nirjuli,
Arunachal Pradesh, India
Article Info ABSTRACT
Article history:
Received Jul 26, 2016
Revised Nov 8, 2016
Accepted Nov 22, 2016
Cloud based service provider are at its top of its services for various
applications, as their services are very much reachable from anywhere
anytime in current days. It is responsibility of the company that the Cloud
storage is owned and maintained by themselves keeping the data available
and accessible, and the physical environment protected and running. Could
storage provider seem to be uncertain of confidentiality in many cases, as we
need to limit ourselves on trust to a third party. Keeping our sensitive data
ready to access any time anywhere with preventing any information leakage
is a challenging task. Cryptography in this scenario plays an important role,
providing security for information to protect valuable information resources
on intranets, Internet and the cloud. In addition, Homomorphic cryptosystem
is a form of Cryptography where some specific computation can be
performed over the cipher text producing a resultant cipher text which, when
decrypted, equals the result of operations carry out on the plaintext. With
help of this unique property of homomorphism cryptography we proposed a
system to keep sensitive information in encrypted form in the cloud
storage/service provider and used those data as whenever we require. The
scheme proposed here is designed for a secure online voting system on
Android platform and voted information is encrypted and stored those in the
cloud.
Keyword:
Android plateform
Cloud computing
Cryptography
Homomorphic cryptosystem
Security and privacy
Copyright © 2016 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Monjul Saikia,
Departement of Computer Science and Engineering,
North Eastern Regional Institute of Science and Technology,
Nirjuli-791109, Arunachal Pradesh, India.
Email: monjuls@gmail.com
1. INTRODUCTION
The meaning of Encryption contains in the word itself, the base "encrypt" can be seen as "en" and
"crypt". The meaning of "en" is "to make", and the word "crypt" means hidden or secret. Therefore the
meaning of "encrypt" is "to make hidden or secret" [1].
In cryptography, encryption is the process of encoding messages or information in such a manner
that only authorized user can interpret it. Hence the scheme of encryption is widely used for secrete
communication between two parties. In an encryption scheme a large pseudo-random number called
encryption key is generated by an algorithm which is to be used for computation of the cipher text. Later the
receiver uses the same key to decrypt to extract the actual message being transmitted (in case of symmetric
key encryption). A user without having the same key used for encryption cannot decrypt correctly.
The objective of modern cryptography can be classified in four categories:
a. Confidentiality: The information is secrete and cannot be recognize by unintended person.
b. Integrity: No modification can be done on the information send in between the sender and the intended
receiver.