Privacy preserving E-voting cloud system based on ID based encryption

被引:17
作者
Shankar, Achyut [1 ]
Pandiaraja, P. [2 ]
Sumathi, K. [2 ]
Stephan, Thompson [1 ]
Sharma, Pavika [3 ]
机构
[1] Amity Univ Uttar Pradesh, Amity Sch Engn & Technol, Dept Comp Sci & Engn, Noida, India
[2] M Kumarasamy Coll Engn, Dept Comp Sci & Engn, Karur 639113, Tamil Nadu, India
[3] Amity Univ Uttar Pradesh, Dept Elect & Commun Engn, Noida, Uttar Pradesh, India
关键词
Digital India; E-voting; ECS; Cube data storage; end-to-end user; SECURE;
D O I
10.1007/s12083-020-00977-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of the various sectors in today's life such as bank, transport, voting, health, electricity, etc., are currently digitalized. In our research paper, we have surveyed the voting system and explored the existing drawbacks of the voting system concerning security and malfunction. The demerits in the existing schemes include less data security, vote modification, man in the middle attack, masquerade attack, denial of service attack, impersonation attack, etc. Such attacks can compromise security and allows attackers to modify the results. To resolve the above-mentioned issues as well as the attacks, this research paper proposes a protocol to overcome security-based issues. In the proposed system, a secure online e-voting system is developed for end-to-end users to avoid misappropriation on the vote during the result publication in India or any other country. The proposed E-Voting Cloud System (ECS) system has three phases: The first phase is the registration phase, the second phase is vote polling, and the third phase is result announcements. In the proposed system, the election commission of India can search and verify the vote data through cloud computing. For a detailed description of our proposed protocol, a cube data storage structure and user differentiated system are first implemented. Based on the cube data structure and user differentiated system model, the proposed protocol helps to store voter data in the cloud with the encrypted model and ECS. Finally, the candidate can decrypt the data using their key. The people can verify the result announced by the ECS. The performance analysis clearly shows that our proposed system is highly secure when compared to the existing system. Using the proposed work, secure data transfer can be performed in an efficient way for online e-voting applications.
引用
收藏
页码:2399 / 2409
页数:11
相关论文
共 26 条
[1]  
Arnob MS, 2020, INT RES J ENG TECHNO, V7, P1826
[2]   Coverless Information Hiding Method Based on the Chinese Character Encoding [J].
Chen, Xianyi ;
Chen, Sheng ;
Wu, Yulei .
JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (02) :313-320
[3]   New Algorithms for Secure Outsourcing of Modular Exponentiations [J].
Chen, Xiaofeng ;
Li, Jin ;
Ma, Jianfeng ;
Tang, Qiang ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (09) :2386-2396
[4]   Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains [J].
Kang, Jiawen ;
Yu, Rong ;
Huang, Xumin ;
Maharjan, Sabita ;
Zhang, Yan ;
Hossain, Ekram .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (06) :3154-3164
[5]   An Efficient E2E Verifiable E-voting System without Setup Assumptions [J].
Kiayias, Aggelos ;
Zacharias, Thomas ;
Zhang, Bingsheng .
IEEE SECURITY & PRIVACY, 2017, 15 (03) :14-23
[6]   A belief propagation-based method for task allocation in open and dynamic cloud environments [J].
Kong, Yan ;
Zhang, Minjie ;
Ye, Dayong .
KNOWLEDGE-BASED SYSTEMS, 2017, 115 :123-132
[7]   Blockchain-Enabled E-Voting [J].
Kshetri, Nir ;
Voas, Jeffrey .
IEEE SOFTWARE, 2018, 35 (04) :95-99
[8]   Segmentation-Based Image Copy-Move Forgery Detection Scheme [J].
Li, Jian ;
Li, Xiaolong ;
Yang, Bin ;
Sun, Xingming .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) :507-518
[9]   A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing [J].
Li, Ruixuan ;
Shen, Chenglin ;
He, Heng ;
Gu, Xiwu ;
Xu, Zhiyong ;
Xu, Cheng-Zhong .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (02) :344-357
[10]  
Ma TH, 2015, COMPUTING, V97, P1165, DOI 10.1007/s00607-015-0453-x