Privacy preserving E-voting cloud system based on ID based encryption

Most of the various sectors in today’s life such as bank, transport, voting, health, electricity, etc., are currently digitalized. In our research paper, we have surveyed the voting system and explored the existing drawbacks of the voting system concerning security and malfunction. The demerits in t...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Peer-to-peer networking and applications 2021-07, Vol.14 (4), p.2399-2409
Hauptverfasser: Shankar, Achyut, Pandiaraja, P., Sumathi, K., Stephan, Thompson, Sharma, Pavika
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 2409
container_issue 4
container_start_page 2399
container_title Peer-to-peer networking and applications
container_volume 14
creator Shankar, Achyut
Pandiaraja, P.
Sumathi, K.
Stephan, Thompson
Sharma, Pavika
description Most of the various sectors in today’s life such as bank, transport, voting, health, electricity, etc., are currently digitalized. In our research paper, we have surveyed the voting system and explored the existing drawbacks of the voting system concerning security and malfunction. The demerits in the existing schemes include less data security, vote modification, man in the middle attack, masquerade attack, denial of service attack, impersonation attack, etc. Such attacks can compromise security and allows attackers to modify the results. To resolve the above-mentioned issues as well as the attacks, this research paper proposes a protocol to overcome security-based issues. In the proposed system, a secure online e-voting system is developed for end-to-end users to avoid misappropriation on the vote during the result publication in India or any other country. The proposed E-Voting Cloud System (ECS) system has three phases: The first phase is the registration phase, the second phase is vote polling, and the third phase is result announcements. In the proposed system, the election commission of India can search and verify the vote data through cloud computing. For a detailed description of our proposed protocol, a cube data storage structure and user differentiated system are first implemented. Based on the cube data structure and user differentiated system model, the proposed protocol helps to store voter data in the cloud with the encrypted model and ECS. Finally, the candidate can decrypt the data using their key. The people can verify the result announced by the ECS. The performance analysis clearly shows that our proposed system is highly secure when compared to the existing system. Using the proposed work, secure data transfer can be performed in an efficient way for online e-voting applications.
doi_str_mv 10.1007/s12083-020-00977-4
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2545289378</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2545289378</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-f0d10c2e9a779f654be23324864016d58c7e433f0ceecff8e6919826fca216ff3</originalsourceid><addsrcrecordid>eNp9kD1PwzAURS0EEqXwB5giMRueP2LHIyoFKlWCAWYrdZ6rVG0c7LRS_j0pqWBjene45z7pEHLL4J4B6IfEOBSCAgcKYLSm8oxMmBGKKpnD-W-W_JJcpbQBUEzkfELm77E-lK7P2ogJ46Fu1tmcHkJ3DG4b9lWW-tThLluVCassNNni6ZSxcbFvuzo01-TCl9uEN6c7JZ_P84_ZK12-vSxmj0vqBDMd9VAxcBxNqbXxKpcr5EJwWSgJTFV54TRKITw4ROd9gcowU3DlXcmZ8l5Myd2428bwtcfU2U3Yx2Z4aXkuc14YoYuhxceWiyGliN62sd6VsbcM7FGXHXXZQZf90WXlAIkRSkO5WWP8m_6H-gYuCmy9</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2545289378</pqid></control><display><type>article</type><title>Privacy preserving E-voting cloud system based on ID based encryption</title><source>SpringerLink Journals</source><creator>Shankar, Achyut ; Pandiaraja, P. ; Sumathi, K. ; Stephan, Thompson ; Sharma, Pavika</creator><creatorcontrib>Shankar, Achyut ; Pandiaraja, P. ; Sumathi, K. ; Stephan, Thompson ; Sharma, Pavika</creatorcontrib><description>Most of the various sectors in today’s life such as bank, transport, voting, health, electricity, etc., are currently digitalized. In our research paper, we have surveyed the voting system and explored the existing drawbacks of the voting system concerning security and malfunction. The demerits in the existing schemes include less data security, vote modification, man in the middle attack, masquerade attack, denial of service attack, impersonation attack, etc. Such attacks can compromise security and allows attackers to modify the results. To resolve the above-mentioned issues as well as the attacks, this research paper proposes a protocol to overcome security-based issues. In the proposed system, a secure online e-voting system is developed for end-to-end users to avoid misappropriation on the vote during the result publication in India or any other country. The proposed E-Voting Cloud System (ECS) system has three phases: The first phase is the registration phase, the second phase is vote polling, and the third phase is result announcements. In the proposed system, the election commission of India can search and verify the vote data through cloud computing. For a detailed description of our proposed protocol, a cube data storage structure and user differentiated system are first implemented. Based on the cube data structure and user differentiated system model, the proposed protocol helps to store voter data in the cloud with the encrypted model and ECS. Finally, the candidate can decrypt the data using their key. The people can verify the result announced by the ECS. The performance analysis clearly shows that our proposed system is highly secure when compared to the existing system. Using the proposed work, secure data transfer can be performed in an efficient way for online e-voting applications.</description><identifier>ISSN: 1936-6442</identifier><identifier>EISSN: 1936-6450</identifier><identifier>DOI: 10.1007/s12083-020-00977-4</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Architecture ; Cloud computing ; Communications Engineering ; Computer Communication Networks ; Data storage ; Data structures ; Data transfer (computers) ; Denial of service attacks ; Elections ; Electronic voting systems ; Encryption ; End users ; Engineering ; Information Systems and Communication Service ; Networking and Applications ; Networks ; Online voting ; Scientific papers ; Security ; Signal,Image and Speech Processing ; Special Issue on Network In Box ; Voting machines</subject><ispartof>Peer-to-peer networking and applications, 2021-07, Vol.14 (4), p.2399-2409</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020</rights><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-f0d10c2e9a779f654be23324864016d58c7e433f0ceecff8e6919826fca216ff3</citedby><cites>FETCH-LOGICAL-c319t-f0d10c2e9a779f654be23324864016d58c7e433f0ceecff8e6919826fca216ff3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s12083-020-00977-4$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s12083-020-00977-4$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Shankar, Achyut</creatorcontrib><creatorcontrib>Pandiaraja, P.</creatorcontrib><creatorcontrib>Sumathi, K.</creatorcontrib><creatorcontrib>Stephan, Thompson</creatorcontrib><creatorcontrib>Sharma, Pavika</creatorcontrib><title>Privacy preserving E-voting cloud system based on ID based encryption</title><title>Peer-to-peer networking and applications</title><addtitle>Peer-to-Peer Netw. Appl</addtitle><description>Most of the various sectors in today’s life such as bank, transport, voting, health, electricity, etc., are currently digitalized. In our research paper, we have surveyed the voting system and explored the existing drawbacks of the voting system concerning security and malfunction. The demerits in the existing schemes include less data security, vote modification, man in the middle attack, masquerade attack, denial of service attack, impersonation attack, etc. Such attacks can compromise security and allows attackers to modify the results. To resolve the above-mentioned issues as well as the attacks, this research paper proposes a protocol to overcome security-based issues. In the proposed system, a secure online e-voting system is developed for end-to-end users to avoid misappropriation on the vote during the result publication in India or any other country. The proposed E-Voting Cloud System (ECS) system has three phases: The first phase is the registration phase, the second phase is vote polling, and the third phase is result announcements. In the proposed system, the election commission of India can search and verify the vote data through cloud computing. For a detailed description of our proposed protocol, a cube data storage structure and user differentiated system are first implemented. Based on the cube data structure and user differentiated system model, the proposed protocol helps to store voter data in the cloud with the encrypted model and ECS. Finally, the candidate can decrypt the data using their key. The people can verify the result announced by the ECS. The performance analysis clearly shows that our proposed system is highly secure when compared to the existing system. Using the proposed work, secure data transfer can be performed in an efficient way for online e-voting applications.</description><subject>Architecture</subject><subject>Cloud computing</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Data storage</subject><subject>Data structures</subject><subject>Data transfer (computers)</subject><subject>Denial of service attacks</subject><subject>Elections</subject><subject>Electronic voting systems</subject><subject>Encryption</subject><subject>End users</subject><subject>Engineering</subject><subject>Information Systems and Communication Service</subject><subject>Networking and Applications</subject><subject>Networks</subject><subject>Online voting</subject><subject>Scientific papers</subject><subject>Security</subject><subject>Signal,Image and Speech Processing</subject><subject>Special Issue on Network In Box</subject><subject>Voting machines</subject><issn>1936-6442</issn><issn>1936-6450</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>BENPR</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp9kD1PwzAURS0EEqXwB5giMRueP2LHIyoFKlWCAWYrdZ6rVG0c7LRS_j0pqWBjene45z7pEHLL4J4B6IfEOBSCAgcKYLSm8oxMmBGKKpnD-W-W_JJcpbQBUEzkfELm77E-lK7P2ogJ46Fu1tmcHkJ3DG4b9lWW-tThLluVCassNNni6ZSxcbFvuzo01-TCl9uEN6c7JZ_P84_ZK12-vSxmj0vqBDMd9VAxcBxNqbXxKpcr5EJwWSgJTFV54TRKITw4ROd9gcowU3DlXcmZ8l5Myd2428bwtcfU2U3Yx2Z4aXkuc14YoYuhxceWiyGliN62sd6VsbcM7FGXHXXZQZf90WXlAIkRSkO5WWP8m_6H-gYuCmy9</recordid><startdate>20210701</startdate><enddate>20210701</enddate><creator>Shankar, Achyut</creator><creator>Pandiaraja, P.</creator><creator>Sumathi, K.</creator><creator>Stephan, Thompson</creator><creator>Sharma, Pavika</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>88I</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>M2O</scope><scope>M2P</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20210701</creationdate><title>Privacy preserving E-voting cloud system based on ID based encryption</title><author>Shankar, Achyut ; Pandiaraja, P. ; Sumathi, K. ; Stephan, Thompson ; Sharma, Pavika</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-f0d10c2e9a779f654be23324864016d58c7e433f0ceecff8e6919826fca216ff3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Architecture</topic><topic>Cloud computing</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Data storage</topic><topic>Data structures</topic><topic>Data transfer (computers)</topic><topic>Denial of service attacks</topic><topic>Elections</topic><topic>Electronic voting systems</topic><topic>Encryption</topic><topic>End users</topic><topic>Engineering</topic><topic>Information Systems and Communication Service</topic><topic>Networking and Applications</topic><topic>Networks</topic><topic>Online voting</topic><topic>Scientific papers</topic><topic>Security</topic><topic>Signal,Image and Speech Processing</topic><topic>Special Issue on Network In Box</topic><topic>Voting machines</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Shankar, Achyut</creatorcontrib><creatorcontrib>Pandiaraja, P.</creatorcontrib><creatorcontrib>Sumathi, K.</creatorcontrib><creatorcontrib>Stephan, Thompson</creatorcontrib><creatorcontrib>Sharma, Pavika</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Science Database (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Science Database</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Peer-to-peer networking and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shankar, Achyut</au><au>Pandiaraja, P.</au><au>Sumathi, K.</au><au>Stephan, Thompson</au><au>Sharma, Pavika</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Privacy preserving E-voting cloud system based on ID based encryption</atitle><jtitle>Peer-to-peer networking and applications</jtitle><stitle>Peer-to-Peer Netw. Appl</stitle><date>2021-07-01</date><risdate>2021</risdate><volume>14</volume><issue>4</issue><spage>2399</spage><epage>2409</epage><pages>2399-2409</pages><issn>1936-6442</issn><eissn>1936-6450</eissn><abstract>Most of the various sectors in today’s life such as bank, transport, voting, health, electricity, etc., are currently digitalized. In our research paper, we have surveyed the voting system and explored the existing drawbacks of the voting system concerning security and malfunction. The demerits in the existing schemes include less data security, vote modification, man in the middle attack, masquerade attack, denial of service attack, impersonation attack, etc. Such attacks can compromise security and allows attackers to modify the results. To resolve the above-mentioned issues as well as the attacks, this research paper proposes a protocol to overcome security-based issues. In the proposed system, a secure online e-voting system is developed for end-to-end users to avoid misappropriation on the vote during the result publication in India or any other country. The proposed E-Voting Cloud System (ECS) system has three phases: The first phase is the registration phase, the second phase is vote polling, and the third phase is result announcements. In the proposed system, the election commission of India can search and verify the vote data through cloud computing. For a detailed description of our proposed protocol, a cube data storage structure and user differentiated system are first implemented. Based on the cube data structure and user differentiated system model, the proposed protocol helps to store voter data in the cloud with the encrypted model and ECS. Finally, the candidate can decrypt the data using their key. The people can verify the result announced by the ECS. The performance analysis clearly shows that our proposed system is highly secure when compared to the existing system. Using the proposed work, secure data transfer can be performed in an efficient way for online e-voting applications.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s12083-020-00977-4</doi><tpages>11</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1936-6442
ispartof Peer-to-peer networking and applications, 2021-07, Vol.14 (4), p.2399-2409
issn 1936-6442
1936-6450
language eng
recordid cdi_proquest_journals_2545289378
source SpringerLink Journals
subjects Architecture
Cloud computing
Communications Engineering
Computer Communication Networks
Data storage
Data structures
Data transfer (computers)
Denial of service attacks
Elections
Electronic voting systems
Encryption
End users
Engineering
Information Systems and Communication Service
Networking and Applications
Networks
Online voting
Scientific papers
Security
Signal,Image and Speech Processing
Special Issue on Network In Box
Voting machines
title Privacy preserving E-voting cloud system based on ID based encryption
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-06T08%3A22%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Privacy%20preserving%20E-voting%20cloud%20system%20based%20on%20ID%20based%20encryption&rft.jtitle=Peer-to-peer%20networking%20and%20applications&rft.au=Shankar,%20Achyut&rft.date=2021-07-01&rft.volume=14&rft.issue=4&rft.spage=2399&rft.epage=2409&rft.pages=2399-2409&rft.issn=1936-6442&rft.eissn=1936-6450&rft_id=info:doi/10.1007/s12083-020-00977-4&rft_dat=%3Cproquest_cross%3E2545289378%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2545289378&rft_id=info:pmid/&rfr_iscdi=true