Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM

2017, International Journal of Computer-Aided technologies (IJCAx)

The process of exploitation the database to ensure the correctness of data manipulation, and a tendency to accomplished associations. The transaction is a fit of logic procedure units; the data modification from one state to some other state is represented with database transaction state diagram to substantiate uniformity of data inside the database. The data manipulation ought to separate groups of logic cells, and once it all finished, data consistency can be maintained, and once a piece of this unit fails, the whole transaction ought to be absolutely thought-about an error, all succeeding operations from the starting point should all fall back to the starting state. It has become a necessary to test database transaction states; a replacement technique of state transition testing is represented and designed test cases in this paper. The database State diagram direct testing by given the states, events, actions, and transitions that ought to be tested.

International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017 ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM Ganaraj K PG Scholar, Computer Science Department, Bearys Institute of technology and Engineering Mangalore, Karnataka, India ABSTRACT The advancement in the mobile devices, wireless and web technologies given rise to the new application that will make the voting process very easy and efficient. The E-voting promises the possibility of convenient, easy and safe way to capture and count the votes in an election[1]. This research project provides the specification and requirements for E-Voting using an Android platform. The e-voting means the voting process in election by using electronic device. The android platform is used to develop an evoting application. At first, an introduction about the system is presented. Sections II and III describe all the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed evoting system will be presented. This technology helps the user to cast the vote without visiting the polling booth. The application follows proper authentication measures in order to avoid fraud voters using the system. Once the voting session is completed the results can be available within a fraction of seconds. All the candidates vote count is encrypted and stored in the database in order to avoid any attacks and disclosure of results by third person other than the administrator. Once the session is completed the admin can decrypt the vote count and publish results and can complete the voting process. KEYWORDS Electronic voting, e-mail Network 1. INTRODUCTION The proper execution of democratic rights has become linked to the availability and reliable functioning of advanced information and communication technology (ICT). While modern societies fully rely on ICT for business, work and leisure time activities, the use of ICT for democratic decision making is still in its infancy. In fact, the out date technological concepts for voting have been blamed in part for lost and uncounted votes and could therefore be responsible for biased political decisions making [2]. Countries all over the world are examining e-voting [3], for it has some striking advantages over traditional paper voting, including security for casting votes, accuracy of counting and analyzing votes, options to conduct voting in a centralized and decentralized manner, etc. The reasons why the e-voting technology has not matured to equivalent levels as known for business and leisure time activities lies mostly in an inherent lack of trust and fear of electronic threats. While most countries are still conceptualizing or testing evoting systems, three cantons in Switzerland have pioneered the development of e-voting to its full technological maturity. The world is always in improvement and growth in technology, that's why we should go parallel with it, to be able as much as we can get benefit from these improvements. DOI:10.5121/ijcax.2017.4201 1 International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017 The advanced e-voting technique makes use of main two phases- the registration and login phase. During the registration phase the user need to provide required information and can get a secured password in order to login the application for voting. In the second phase using the user-id and password provided the user can login and can cast the vote from home or office or anywhere securely. The votes are properly encrypted so that any third person cannot able to find voting information of any others. The whole operation is managed by an administrator. The admin can monitor the process and finally announces the result soon after voting session is completed. Even the vote counts are stored in the encrypted form while getting stored in the database maintained and managed by administrator. Hence the overall voting process will be safe and secure. 2. COMPARISON WITH THE EXISTING SYSTEMS The current system which is present now is a machine and paper based voting system which needs much man power and requires lot of resources. The present voting system finds difficulty during the counting also because it is counted manually. To overcome this as we said earlier the e voting system provides an efficient way to complete the whole voting system. The e voting system is an android application which enables user to vote in his smart phone. This is more advanced compared to the present system because it doesn't need any man power. And voter doesn’t need to visit the polling booth. The application also reduces the complexity of counting since it is automatic. 3. PROPOSED SYSTEM The application can be installed in the android phones and voting will be enabled by the administrator on the polling day. If there are different stages of polling then application will enable the user only on the polling day. The user can enter into the application by giving his voter id/Aadhar number (unique number) and a secret password which is provided to the user. As soon as the user enters into the application he selects his constituency and his booth number or place then the user can cast his vote and logout from the application. The vote should be kept secret and it should be available on the voting day in the counting center. To keep the vote secret an encryption and a decryption algorithm is used. So as soon as the user casts his vote the vote is encrypted so that it is secret and the same is encrypted on the polling day. 4. REQUIREMENTS OF THE E-VOTING SYSTEM The proposed project contain following modules: Administrator User Account ADMINISTRATOR: • User Information: Consists of all information of the user those who are eligible for voting. • User Verification: Verify the user during registration and user Login. • Voting Information: Storage for storing the vote information casted by the user. 2 International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017 USER: • • • Registration: Registers with administrator to obtain a password for voting. Login: Initiates voting using the password provided by the administrator. Encryption: Encrypting the vote after the vote casted by the user ACCOUNT: • • Registration: The user should register before using the application. Login: Logging into the application using user name and password. 5. E-VOTING SYSTEM DESIGN Like most of the systems in the world, the security consideration is very important. We are taken into account this part through sending password to users email account. Further encrypting the vote while sending it to the admin. It is clear that the user information should be stored in the database, so that the valid users can register themselves to get the password. It also stores the password once it is sent to the user until the user cast s the vote. It is also possible to get information of user who doesn't participated in voting process. The application should be secure because it should not reveal vote information. So the vote should be encrypted once user confirms the vote. Also the password is sent to users e-mail account in order to avoid the misuse of password . Since the e-mail account is confidential we used that feature to avoid the misuse of our applications password. Figure 1: Sequence diagram of registration The registration process is illustrated as in the figure1 shown above. When user chooses registration option and provides required details those details are compared with the information maintained by the admin. If user provided data is found to be correct a password is generated and given to the user through mail service in order to make it safe and secure. 3 International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017 Figure 2: The Voting Process 6. E-VOTING SYSTEM WORKING Android e-Voting application on smart phone user gives user to vote]. Admin can see the voting results according to vote options[3].System can maintain the data about the voter like Name, ID number and other relevant data. Even though the system enables voters to poll their vote from anywhere, initially the voters should register themselves to get a password for voting purpose. This constraint is imposed to ensure that only the genuine person is allowed to vote in the elections. The aim of this work is to design and implement an electronic voting application for the Android platform that will enable people to vote securely from anywhere. The application as a whole is aimed at being compatible with devices from many manufacturers and running different versions of the operating system. The application is also aimed at being localized [4]. Figure Below shows the overall voting process. Electronic voting refers to the use of computers or computerized voting equipment to cast ballots in an election. Electronic systems can be used to register voters, tally ballots, and record votes [5].The Caltech/MIT Voting Technology Project [6] came into being in order to develop a new voting technology in order to prevent a recurrence of the problems that threatened the 2000 U. S. Presidential Elections. The report assesses the magnitude of the problems, their root causes and how technology can reduce them. They address a wide range of “What is” issues including voting procedures, voting equipment, voter registration, polling places, absentee and early voting, ballot security, cost and public finance of elections, etc 4 International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017 Figure 3: Overall voting process . The overall flow of the application is as depicted in the Figure4. It is clear that the user should register in the beginning and obtain a password. The obtained password need to be used for login and cast the vote. 5 International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017 Figure 4: Flowchart of Overall voting process 6.1 REGISTRATION PHASE In the home page registration category will ask you to enter the following details. • Name • E-mail id • Voter id • Aadhar id 6 International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017 Figure 5: User Registration example The Figure5 illustrates the registration procedure example when the application is developed and installed in a smart phone for testing. It is clear that in the registration form the user need to provide valid details. Whenever the valid details are matching the registration procedure becomes successful. Else the user does not allowed for registration. After you submit the details asked by the registration the application will give you a toast message whether your registration is successful or not. At the same time if your registration is successful the application will send you a mail which contains the password which is needed later for logging in. 6.2 LOGIN AND VOTING PROCESS You need to login for voting by giving the the below details • Aadhar id • Voter id • Password Figure 6: Login Example 7 International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017 Once user submits the details the application checks the details given by the user in database at the server side. If the details provided are proper then login successful status is shown as a toast message. After this the user can choose voting option to cast the vote. A list of candidates contesting in the election along with their details is displayed in users Smartphone. The candidate list is updated from the server. Now it’s the right time to select a candidate from the available list. When user taps against a candidate the application asks for confirming the vote. When user confirms the candidate selected the information is sent to the server. Now vote count against the selected candidate is updated which is stored in an encrypted form. Also a flag field maintained in the database is enabled against the user once user casts the vote so that if the same user tries to vote again then the application should not allow for it. All these processes are done at the server side to make voting process safe and secured. 7. E-VOTING SYSTEM SECURITY LEVELS For the security, we use e-mail service to provide the secured password to the user. When the password is generated it will be sent to the users e-mail id which is linked to the aadhar-id stored in the database. The e-mail account is self managed and none of the other user can access the email and get the password to login. The most security part lies on securing the vote casted by the user. So the vote is encrypted using Java Cryptology Extension algorithm and sent to admin [7]. However only the admin has the permission to access the database. Even while storing the vote count it is stored in the encrypted form hence it becomes a secured data. At any moment the admin only have the permission for accessing and updating data in the server. To avoid fraud voters the aadhar-id which unique number uniquely identifies the user. The possibility is that any user may try to revote again once after voting. Some flag indicating that the user status (voted or not) is maintained at the server. Whenever user casts the vote the flag field is updated and can be referred for future analysis. This flag field also helpful to collect information about percentage of voting and will act as a reference data. 8. CONCLUSION This research paper proposed a real time e-voting system based on android phones. The usability of this system is very high if it will be used in real life election process. It will definitely helpful for the users who wish to vote and the voting process will be made very easy by using this application. Advantages of the proposed e-voting system: e-voting minimizes the risk of ambiguities as the voter makes his choice by touching the screen. E-voting could also minimize the need for recounts as everything is tabulated by the computer. Also the user can cast vote without visiting the polling booth. It saves a lot of time and many resources. Usually the people wait eagerly for vote counting day to know the results. By using this system no need to wait to know the results. The admin can announce the results soon after the voting session closes. The results show that system is very efficient and easy to use. REFERENCES [1] Dr.Aree Ali Mohammed and Ramyar Adbolrahman Timour,Efficient E-voting Android Based System, IJARCSSE,vol.3,Issue 11,2013 [2] A.S. Belenky and R.C. Larson, “To Queue or not to Queue?,” OR/MS 27, October 2013, pp. 30-34. [3] “An Electronic Polling Service to Support Public Awareness Using Web Technologies”, Christos Bouras, Nikolaos Katris, Vassilis Triantafillou. 8 International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017 [4] “E-voting on Android System” paper (International Journal of Emerging Technology and Advanced Engineering) prepared by : Kirti Autade, Pallavi Ghadge, Sarika Kale ,Co-authors- Prof. N. J. Kulkarni, Prof. S. S. Mujgond, February 2012. [5] “Electronic Voting,” Encyclopedia of Computers and Computer History, prepared by Lorrie Faith Cranor and edited by Raul Rojas, published by Fitzroy Dearborn, 2001. [6] “Voting – What is, What Could be,” Caltech/MIT Voting Technology Project (VTP) Report, July 2001. [7] Java Cryptography an e-book by Jonathan B. Knudsen, First edition May 1998, ISBN:1-56592-402-9 AUTHOR Ganaraj K PG Scholar, Computer Science and Engineering Department, Bearys Institute of technology and Engineering, Mangalore, Karnataka, India. 9