Privacy preserving E-voting cloud system based on ID based encryption
Most of the various sectors in today’s life such as bank, transport, voting, health, electricity, etc., are currently digitalized. In our research paper, we have surveyed the voting system and explored the existing drawbacks of the voting system concerning security and malfunction. The demerits in t...
Gespeichert in:
Veröffentlicht in: | Peer-to-peer networking and applications 2021-07, Vol.14 (4), p.2399-2409 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2409 |
---|---|
container_issue | 4 |
container_start_page | 2399 |
container_title | Peer-to-peer networking and applications |
container_volume | 14 |
creator | Shankar, Achyut Pandiaraja, P. Sumathi, K. Stephan, Thompson Sharma, Pavika |
description | Most of the various sectors in today’s life such as bank, transport, voting, health, electricity, etc., are currently digitalized. In our research paper, we have surveyed the voting system and explored the existing drawbacks of the voting system concerning security and malfunction. The demerits in the existing schemes include less data security, vote modification, man in the middle attack, masquerade attack, denial of service attack, impersonation attack, etc. Such attacks can compromise security and allows attackers to modify the results. To resolve the above-mentioned issues as well as the attacks, this research paper proposes a protocol to overcome security-based issues. In the proposed system, a secure online e-voting system is developed for end-to-end users to avoid misappropriation on the vote during the result publication in India or any other country. The proposed E-Voting Cloud System (ECS) system has three phases: The first phase is the registration phase, the second phase is vote polling, and the third phase is result announcements. In the proposed system, the election commission of India can search and verify the vote data through cloud computing. For a detailed description of our proposed protocol, a cube data storage structure and user differentiated system are first implemented. Based on the cube data structure and user differentiated system model, the proposed protocol helps to store voter data in the cloud with the encrypted model and ECS. Finally, the candidate can decrypt the data using their key. The people can verify the result announced by the ECS. The performance analysis clearly shows that our proposed system is highly secure when compared to the existing system. Using the proposed work, secure data transfer can be performed in an efficient way for online e-voting applications. |
doi_str_mv | 10.1007/s12083-020-00977-4 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2545289378</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2545289378</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-f0d10c2e9a779f654be23324864016d58c7e433f0ceecff8e6919826fca216ff3</originalsourceid><addsrcrecordid>eNp9kD1PwzAURS0EEqXwB5giMRueP2LHIyoFKlWCAWYrdZ6rVG0c7LRS_j0pqWBjene45z7pEHLL4J4B6IfEOBSCAgcKYLSm8oxMmBGKKpnD-W-W_JJcpbQBUEzkfELm77E-lK7P2ogJ46Fu1tmcHkJ3DG4b9lWW-tThLluVCassNNni6ZSxcbFvuzo01-TCl9uEN6c7JZ_P84_ZK12-vSxmj0vqBDMd9VAxcBxNqbXxKpcr5EJwWSgJTFV54TRKITw4ROd9gcowU3DlXcmZ8l5Myd2428bwtcfU2U3Yx2Z4aXkuc14YoYuhxceWiyGliN62sd6VsbcM7FGXHXXZQZf90WXlAIkRSkO5WWP8m_6H-gYuCmy9</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2545289378</pqid></control><display><type>article</type><title>Privacy preserving E-voting cloud system based on ID based encryption</title><source>SpringerLink Journals</source><creator>Shankar, Achyut ; Pandiaraja, P. ; Sumathi, K. ; Stephan, Thompson ; Sharma, Pavika</creator><creatorcontrib>Shankar, Achyut ; Pandiaraja, P. ; Sumathi, K. ; Stephan, Thompson ; Sharma, Pavika</creatorcontrib><description>Most of the various sectors in today’s life such as bank, transport, voting, health, electricity, etc., are currently digitalized. In our research paper, we have surveyed the voting system and explored the existing drawbacks of the voting system concerning security and malfunction. The demerits in the existing schemes include less data security, vote modification, man in the middle attack, masquerade attack, denial of service attack, impersonation attack, etc. Such attacks can compromise security and allows attackers to modify the results. To resolve the above-mentioned issues as well as the attacks, this research paper proposes a protocol to overcome security-based issues. In the proposed system, a secure online e-voting system is developed for end-to-end users to avoid misappropriation on the vote during the result publication in India or any other country. The proposed E-Voting Cloud System (ECS) system has three phases: The first phase is the registration phase, the second phase is vote polling, and the third phase is result announcements. In the proposed system, the election commission of India can search and verify the vote data through cloud computing. For a detailed description of our proposed protocol, a cube data storage structure and user differentiated system are first implemented. Based on the cube data structure and user differentiated system model, the proposed protocol helps to store voter data in the cloud with the encrypted model and ECS. Finally, the candidate can decrypt the data using their key. The people can verify the result announced by the ECS. The performance analysis clearly shows that our proposed system is highly secure when compared to the existing system. Using the proposed work, secure data transfer can be performed in an efficient way for online e-voting applications.</description><identifier>ISSN: 1936-6442</identifier><identifier>EISSN: 1936-6450</identifier><identifier>DOI: 10.1007/s12083-020-00977-4</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Architecture ; Cloud computing ; Communications Engineering ; Computer Communication Networks ; Data storage ; Data structures ; Data transfer (computers) ; Denial of service attacks ; Elections ; Electronic voting systems ; Encryption ; End users ; Engineering ; Information Systems and Communication Service ; Networking and Applications ; Networks ; Online voting ; Scientific papers ; Security ; Signal,Image and Speech Processing ; Special Issue on Network In Box ; Voting machines</subject><ispartof>Peer-to-peer networking and applications, 2021-07, Vol.14 (4), p.2399-2409</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020</rights><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-f0d10c2e9a779f654be23324864016d58c7e433f0ceecff8e6919826fca216ff3</citedby><cites>FETCH-LOGICAL-c319t-f0d10c2e9a779f654be23324864016d58c7e433f0ceecff8e6919826fca216ff3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s12083-020-00977-4$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s12083-020-00977-4$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Shankar, Achyut</creatorcontrib><creatorcontrib>Pandiaraja, P.</creatorcontrib><creatorcontrib>Sumathi, K.</creatorcontrib><creatorcontrib>Stephan, Thompson</creatorcontrib><creatorcontrib>Sharma, Pavika</creatorcontrib><title>Privacy preserving E-voting cloud system based on ID based encryption</title><title>Peer-to-peer networking and applications</title><addtitle>Peer-to-Peer Netw. Appl</addtitle><description>Most of the various sectors in today’s life such as bank, transport, voting, health, electricity, etc., are currently digitalized. In our research paper, we have surveyed the voting system and explored the existing drawbacks of the voting system concerning security and malfunction. The demerits in the existing schemes include less data security, vote modification, man in the middle attack, masquerade attack, denial of service attack, impersonation attack, etc. Such attacks can compromise security and allows attackers to modify the results. To resolve the above-mentioned issues as well as the attacks, this research paper proposes a protocol to overcome security-based issues. In the proposed system, a secure online e-voting system is developed for end-to-end users to avoid misappropriation on the vote during the result publication in India or any other country. The proposed E-Voting Cloud System (ECS) system has three phases: The first phase is the registration phase, the second phase is vote polling, and the third phase is result announcements. In the proposed system, the election commission of India can search and verify the vote data through cloud computing. For a detailed description of our proposed protocol, a cube data storage structure and user differentiated system are first implemented. Based on the cube data structure and user differentiated system model, the proposed protocol helps to store voter data in the cloud with the encrypted model and ECS. Finally, the candidate can decrypt the data using their key. The people can verify the result announced by the ECS. The performance analysis clearly shows that our proposed system is highly secure when compared to the existing system. Using the proposed work, secure data transfer can be performed in an efficient way for online e-voting applications.</description><subject>Architecture</subject><subject>Cloud computing</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Data storage</subject><subject>Data structures</subject><subject>Data transfer (computers)</subject><subject>Denial of service attacks</subject><subject>Elections</subject><subject>Electronic voting systems</subject><subject>Encryption</subject><subject>End users</subject><subject>Engineering</subject><subject>Information Systems and Communication Service</subject><subject>Networking and Applications</subject><subject>Networks</subject><subject>Online voting</subject><subject>Scientific papers</subject><subject>Security</subject><subject>Signal,Image and Speech Processing</subject><subject>Special Issue on Network In Box</subject><subject>Voting machines</subject><issn>1936-6442</issn><issn>1936-6450</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>BENPR</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp9kD1PwzAURS0EEqXwB5giMRueP2LHIyoFKlWCAWYrdZ6rVG0c7LRS_j0pqWBjene45z7pEHLL4J4B6IfEOBSCAgcKYLSm8oxMmBGKKpnD-W-W_JJcpbQBUEzkfELm77E-lK7P2ogJ46Fu1tmcHkJ3DG4b9lWW-tThLluVCassNNni6ZSxcbFvuzo01-TCl9uEN6c7JZ_P84_ZK12-vSxmj0vqBDMd9VAxcBxNqbXxKpcr5EJwWSgJTFV54TRKITw4ROd9gcowU3DlXcmZ8l5Myd2428bwtcfU2U3Yx2Z4aXkuc14YoYuhxceWiyGliN62sd6VsbcM7FGXHXXZQZf90WXlAIkRSkO5WWP8m_6H-gYuCmy9</recordid><startdate>20210701</startdate><enddate>20210701</enddate><creator>Shankar, Achyut</creator><creator>Pandiaraja, P.</creator><creator>Sumathi, K.</creator><creator>Stephan, Thompson</creator><creator>Sharma, Pavika</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>88I</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>M2O</scope><scope>M2P</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20210701</creationdate><title>Privacy preserving E-voting cloud system based on ID based encryption</title><author>Shankar, Achyut ; Pandiaraja, P. ; Sumathi, K. ; Stephan, Thompson ; Sharma, Pavika</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-f0d10c2e9a779f654be23324864016d58c7e433f0ceecff8e6919826fca216ff3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Architecture</topic><topic>Cloud computing</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Data storage</topic><topic>Data structures</topic><topic>Data transfer (computers)</topic><topic>Denial of service attacks</topic><topic>Elections</topic><topic>Electronic voting systems</topic><topic>Encryption</topic><topic>End users</topic><topic>Engineering</topic><topic>Information Systems and Communication Service</topic><topic>Networking and Applications</topic><topic>Networks</topic><topic>Online voting</topic><topic>Scientific papers</topic><topic>Security</topic><topic>Signal,Image and Speech Processing</topic><topic>Special Issue on Network In Box</topic><topic>Voting machines</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Shankar, Achyut</creatorcontrib><creatorcontrib>Pandiaraja, P.</creatorcontrib><creatorcontrib>Sumathi, K.</creatorcontrib><creatorcontrib>Stephan, Thompson</creatorcontrib><creatorcontrib>Sharma, Pavika</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Science Database (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Science Database</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Peer-to-peer networking and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shankar, Achyut</au><au>Pandiaraja, P.</au><au>Sumathi, K.</au><au>Stephan, Thompson</au><au>Sharma, Pavika</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Privacy preserving E-voting cloud system based on ID based encryption</atitle><jtitle>Peer-to-peer networking and applications</jtitle><stitle>Peer-to-Peer Netw. Appl</stitle><date>2021-07-01</date><risdate>2021</risdate><volume>14</volume><issue>4</issue><spage>2399</spage><epage>2409</epage><pages>2399-2409</pages><issn>1936-6442</issn><eissn>1936-6450</eissn><abstract>Most of the various sectors in today’s life such as bank, transport, voting, health, electricity, etc., are currently digitalized. In our research paper, we have surveyed the voting system and explored the existing drawbacks of the voting system concerning security and malfunction. The demerits in the existing schemes include less data security, vote modification, man in the middle attack, masquerade attack, denial of service attack, impersonation attack, etc. Such attacks can compromise security and allows attackers to modify the results. To resolve the above-mentioned issues as well as the attacks, this research paper proposes a protocol to overcome security-based issues. In the proposed system, a secure online e-voting system is developed for end-to-end users to avoid misappropriation on the vote during the result publication in India or any other country. The proposed E-Voting Cloud System (ECS) system has three phases: The first phase is the registration phase, the second phase is vote polling, and the third phase is result announcements. In the proposed system, the election commission of India can search and verify the vote data through cloud computing. For a detailed description of our proposed protocol, a cube data storage structure and user differentiated system are first implemented. Based on the cube data structure and user differentiated system model, the proposed protocol helps to store voter data in the cloud with the encrypted model and ECS. Finally, the candidate can decrypt the data using their key. The people can verify the result announced by the ECS. The performance analysis clearly shows that our proposed system is highly secure when compared to the existing system. Using the proposed work, secure data transfer can be performed in an efficient way for online e-voting applications.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s12083-020-00977-4</doi><tpages>11</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1936-6442 |
ispartof | Peer-to-peer networking and applications, 2021-07, Vol.14 (4), p.2399-2409 |
issn | 1936-6442 1936-6450 |
language | eng |
recordid | cdi_proquest_journals_2545289378 |
source | SpringerLink Journals |
subjects | Architecture Cloud computing Communications Engineering Computer Communication Networks Data storage Data structures Data transfer (computers) Denial of service attacks Elections Electronic voting systems Encryption End users Engineering Information Systems and Communication Service Networking and Applications Networks Online voting Scientific papers Security Signal,Image and Speech Processing Special Issue on Network In Box Voting machines |
title | Privacy preserving E-voting cloud system based on ID based encryption |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-06T08%3A22%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Privacy%20preserving%20E-voting%20cloud%20system%20based%20on%20ID%20based%20encryption&rft.jtitle=Peer-to-peer%20networking%20and%20applications&rft.au=Shankar,%20Achyut&rft.date=2021-07-01&rft.volume=14&rft.issue=4&rft.spage=2399&rft.epage=2409&rft.pages=2399-2409&rft.issn=1936-6442&rft.eissn=1936-6450&rft_id=info:doi/10.1007/s12083-020-00977-4&rft_dat=%3Cproquest_cross%3E2545289378%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2545289378&rft_id=info:pmid/&rfr_iscdi=true |