Definition Of Voting System Information Technology Essay

Using an electronic voting system has become more and more popular worldwide and is replacing traditional paper voting methods. However, with wider adoption it has been increasingly criticized for not being secure enough and has had some controversy over the fact that the voters need to put their trust in a system they have no idea how works and is often closed black box device. However, although users demand a transparent and secure voting system, they also demand fast and reliable results, and that is something that only an electronic voting system can provide. In the last decade many organizations and governments have started electronic voting. Some companies have also specialized in electronic voting systems, and some of them have had a lot of criticism19

2 Definition of voting system

a voting system is not just the equipment necessary to cast a vote. the voting system standards (VSS) has two definitions, addressing the physical and functional components of a voting system. the physical aspect defines a voting system as comprising all the hardware and software, procedures, manuals, and specifications .

http://homepages.nyu.edu/~tsc223/ElectronicVoting.pdf

“Voting system” means, a method of casting and processing votes that functions wholly or partly by use of electromechanical, or electronic apparatus or by use of paper ballots and includes, but is not limited to, the procedures for casting and processing votes and

the programs, operating manuals, tabulating cards, printouts and other software necessary for the system’s operation.

A voting system consists of a configuration of specific hardware and software components, procedures and expendable supplies; configured into a system which allows votes to be cast and tabulated. No single component of a voting system, such as a precinct tabulation device, meets the definition of a voting system. Sufficient components must be assembled to create a configuration, which will allow the system as a whole to meet all the requirements described for a voting system in this publication.

http://election.dos.state.fl.us/voting-systems/pdf/dsde101Form.pdf

Properties of voting systems

Researchers in the electronic voting field have already reached a consensus pack of four core properties

that an electronic voting system should have (Cranor and Cytron 1997):

Accuracy: (1) it is not possible for a vote to be altered, (2) it is not possible for a validated vote to be

eliminated from the final tally, and (3) it is not possible for an invalid vote to be counted in the final tally.

Democracy: (1) it permits only eligible voters to vote and, (2) it ensures that eligible voters vote only once.

Privacy: (1) neither authorities nor anyone else can link any ballot to the voter who cast it and (2) no voter can prove that he voted in a particular way.

Verifiability: anyone can independently verify that all votes have been counted correctly.

Accuracy, democracy and verifiability are, in most cases of today’s electoral systems, assured by the presence of representatives of opposite parties. The privacy property is currently assured by the existence of private voting booths, allowing voters to cast their votes in secrecy.

50

Voting system life cycle

Many discussions of voting system security vulnerability fail to consider the entire voting system. In addition to the hardware and software that make up the voting equipment, the system includes election workers, voters, and is deployed in a variety of physical environments. Election workers are often volunteers whose skill with technology can vary widely. Similarly, voting technology that assumes a level of technological literacy on the part of the individual voter will potentially be susceptible to error. A security assessment of election equipment that only considers hardware and software without examining its use in real contexts may conclude that the equipment is satisfactory. Considering the larger system including election workers and voters will require analysis of procedures with a focus on fair voting criteria – anonymity, confidentiality, integrity, and audit ability.

http://www.ejeg.com/volume-2/volume2-issue3/v2-i3-art4-lauer.pdf

Voting Places

Voting at polling places [8] : The department can provide the reliable, no virus, and easy-handled voting machine in the polling places. The voters can be authenticated by the traditional protocol and the technological authentication of voters might not be necessary. It provides the highest security compared to other electronic voting place.

Voting at home with voter’s computer [8]: Voters can cast their votes by using their own computers at home. It is hard to prevent the third party’s advertisement appearing on the screen while voting. It is much more difficult to secure the voter’s computer from the attacks of hackers and virus.

Voting at anyplace with mobile devices [8]: The voters can use their devices to get access to internet in any place and cast a vote through the electronic voting system. Not only can the laptop be used to vote, the PDA, cell phone, and any other mobile devices might also be used to vote in the future. But there are many harsh problems need to overcome. The security is the most serious problem. It is vital to make sure that the computer and network in which the voters get access is not monitored, intercepted, or tampered by any attackers.

http://homepages.nyu.edu/~tsc223/ElectronicVoting.pdf

Voting in Egypt

Voting in Egypt is like any other country; most of countries still using the conventional voting technique in government election, but now Egyptian government think to electronic voting system rather that conventional voting to avoid the problems they faced on it.

There is a lot of problem in conventional voting in Egypt:

1- There is no good relationship between the government and popular, popular can’t trust the government and depend on it, voter here is like a blind person that must rely on the other person to vote for him.

2- Sometimes, government coerced and carries on the voters to vote for a particular candidate, and eliminate them from voting freely.

3- Some candidates trying to win by buy the votes from the voters.

4- Government can cheat by substitute the original ballot by derivative ones.

So there must be another way to solve these problems or reduce it as possible, and give the voters the confidence to believe of the system, form this point we think to use a new technology to improve the election by building a new system that is convenience for environment of our country Egypt.

A novel in e voting in Egypt

http://docs.google.com/viewer?a=v&q=cache:0tkjSklsJf0J:citeseerx.ist.psu.edu/viewdoc/download%3Fdoi%3D10.1.1.96.19%26rep%3Drep1%26type%3Dpdf+electronic+voting+system+diagram&hl=en&gl=uk&pid=bl&srcid=ADGEESg4A60cHXQU91yKcqMtBvIK_QDFE30y-uM9olPWwuYpBHDS3k8QAmQIPJ_Nrm_aeGkQIaxMoxq3mTREZsaEZvCCdW3GsOQGS61G15RFdCai5s2KbqO728FXRmPkFgmGU_UwQWHb&sig=AHIEtbSKAxn_DBTwcaIIcGPif-nYac-epA

How voting works

In the United States, voting is a local issue. The Federal government certainly

has a lot of say about voting through the Federal Election Commission, but

in the end, its state and local officials who administer elections. In most

states, the secretary of state’s office runs an elections office that sets rules and

administers statewide elections.

The actual elections themselves are usually the purview of the county clerk.

Moreover, counties and municipalities bear the majority of the cost of

managing elections. In 2000, the total county election expenditures were

estimated at over $1 billion, or about $10 per voter.

Voting is more complicated than simply tallying votes. In fact, most of the

work in an election occurs long before the voter ever steps into the booth.

Voter registration requires large databases of voters, their addresses and

geographic calculation of precinct and district information. Ballot preparation

is a long process that is complicated by myriad rules and regulations. The

election itself must be administered, usually with the help of a large,

volunteer workforce that gets to practice about once per year. All of these

activities, in addition to vote tallying, are part of a voting system.

http://www.extremedemocracy.com/chapters/Chapter%2011-Windley.pdf

Voting systems design criteria

Authentication: Only authorized voters should be able to vote.

Uniqueness: No voter should be able to vote more than once.

Accuracy: Voting systems should record the votes correctly.

Integrity: Votes should not be able to be modified without detection.

Verifiability: Should be possible to verify that votes are correctly counted for in the final tally.

Audit ability: There should be reliable and demonstrably authentic election records.

Reliability: Systems should work robustly, even in the face of numerous failures.

Secrecy: No one should be able to determine how any individual voted.

Non- coercibility: Voters should not be able to prove how they voted.

Flexibility: Equipment should allow for a variety of ballot question formats.

Convenience: Voters should be able to cast votes with minimal equipment and skills.

Certifiability: Systems should be testable against essential criteria.

Transparency: Voters should be able to possess a general understanding of the whole process.

Cost-effectiveness: Systems should be affordable and efficient.

http://www.terena.org/activities/tf-csirt/meeting7/gritzalis-electronic-voting.pdf

3 Definition of e-voting system

An electronic voting (e-voting) system is a voting system in which the election data is recorded, stored and processed primarily as digital information.

Electronic voting is a means of having a paperless voting system.

“Electronic voting is a term used to describe any of several means of determining

people’s collective intent electronically. Electronic voting includes voting by kiosk,

internet, telephone, punch card, and optical scan ballot (a.k.a. mark-sense).”

Thefreedictionary.com 17

An electronic voting system (on-line voting, internet voting) is an election system which uses electronic ballot that would allow voters to transmit their secure and secret voted ballot to election officials over the internet [2]. With the prosperity of internet over the years, inventers start to make the use of electronic voting in order to make the voting process more convenient and raise the participation of the civic. From now on, engineers have repeatedly created new technology to improve the feasibility of electronic voting system.

http://www.terena.org/activities/tf-csirt/meeting7/gritzalis-electronic-voting.pdf

electronic voting refers to use of computer or computerized voting equipment to cast ballots in an election. this term, sometimes, is used more specifically to refer to voting that take place over the internet. electronic system can be used to register voters, tally ballots, and record votes.

http://profsite.um.ac.ir/~kahani/doc/ejisdc05.pdf

3.1 Type of e voting system

E-Voting is a type of voting that includes the use of a computer rather than the traditional use of ballot at polling centres or by postal mail. It encompasses various types of voting: kiosks, the Internet, telephones, punch cards, and marksense or optical scan ballots.

http://jatit.org/volumes/research- papers/Vol2No1/4vol2no1.pdf

there is two types of e-voting: polling place voting and Internet voting.

Polling place voting. In a polling place, both the voting clients (voting machines) and the physical environment are supervised by authorized entities. Depending on the type of polling place (precinct or kiosk [6]), validation may be either physical (e.g. by election officials) or electronic (with some kind of digital identification). Casting and tallying are electronic: the voting clients may be Direct Recording Electronic.

Read also  The Eight Principles Of Total Quality Management Information Technology Essay

Internet voting. The vote is cast over the Internet and the voting client is unsupervised during voting (the voting client may be at home, at work, in a library, etc). Registration may be either physical (at the elections office) or electronic (with some form of digital identification). Validation, casting and tallying are electronic.

I-voting requires a much greater level of security than e-commerce. While checking the eligibility of voters, and that no voter casts more than one vote, is no more difficult than meeting the security requirements of an e-commerce application, ensuring this and meeting other requirements such as privacy, a universally verifiable audit trail and uncoercibility, has been difficult to achieve in a practical and affordable way.

http://euro.ecom.cmu.edu/program/courses/tcr17-803/Burmeister.pdf

Advantage

The advocate of electronic voting claims that the convenience, mobility, tally speed, less cost, and flexibility are the main advantages. Following are the descriptions of the advantages.

Convenience: With the well-designed software and system, the voters can simply use his voting equipment with the minimal time and skill to finish the voting process [2].

Mobility: Voters can cast their votes at a specific polling place, home, or any place in which they can get access to the internet. People can even use the mobile device such as cell phone or PDA to vote. There is no restriction on the location [2].

Tally Speed: [3] Once the voting time is over, the computer can immediately calculate the result of the election. It is much faster than the traditional ballot counting method operated by people.

Less Cost: [3] Compared to paper ballot voting, electronic voting saves money from reducing the personnel expense, expense for location management and administration fee, etc. In the beginning, the investment expense of building up the electronic voting system would be very high. But after the system is built up, the total expense would be reduced to be much lower than paper ballot voting.

Flexibility: Electronic voting system can be designed to support a variety of ballot question formats [2]. It can be used to collect public opinions or election.

Voter participation: With convenience and mobility of the system, it would motivate people who are not interested in voting or unable to vote originally. It would increase the participation of voters.

http://homepages.nyu.edu/~tsc223/ElectronicVoting.pdf

2.5 Disadvantage

Despite the particular advantages to electronic voting system, critics of electronic voting argue about the security issue and the unequal access chance to the internet are the main drawbacks to the system.

Inequality problem:

It is apparent that the people with low salary might not be able to afford the equipment for electronic voting. And some people who are not able to use the computer facility might lose their privilege in voting.

Vulnerable to Security: The security issue is the main drawback of the electronic voting system. So far, there are still many kinds of attacks which are hard to prevent completely. The attacks might be happened from the webpage, network, to the extent of server’s database.

Denial of Service attack: A denial of service is characterized by that an attacker prevents legitimate users from using resources. An attacker may attempt to “flood” a network and thus reduce a legitimate user’s bandwidth, prevent access to a service, or disrupt service to a specific system or a user [4]. Now it is very hard to completely avoid this kind of attack. Nevertheless, people can adopt some methods such as “Filtering Routers”, “Disabling IP Broadcast”, “Disabling Unused Services”, and Performing intrusion Detection” [4] to make the network more secure.

Virus: Virus such as Trojan horse would do great damage to the system. The server can be easily protected from the attack of virus by using some specific kinds of operating system. But the client such as personal computers might not secure enough and are easily infected with virus. These viruses might attack computer from

http://www.vvk.ee/public/dok/Yldkirjeldus-eng.pdf

E-voting system concept

The e-voting concept is similar to the envelope method used during advance polls

today to allow voting outside of polling place of voter’s residence:

* the voter identifies himself/herself to polling commission,

* the voter fills the ballot and puts it in an inner envelope,

* that envelope is put into another envelope on which the voter’s data is then written,

* the envelope is transported to the voter’s polling station, the voter’s eligibility is

verified, and if the voter is eligible, the outer envelope is opened and the anonymous

inner envelope is put into the ballot box.

The e-voting follows the same scheme. E-voter creates during the voter procedures an inner envelope (which is essentially an encrypted vote) and an outer envelope (which is essentially a digital signature).

The following considerations speak in favour of the envelope method:

* simplicity and understand ability of the scheme, possibility to draw a parallel with

traditional elections;

* simplicity of system architecture – the number of components and parties is

minimal;

* full use of digital signature.

http://www.vvk.ee/public/dok/Yldkirjeldus-eng.pdf

2. Votes cannot be known before the official ballot reading;

3. Only registered voters will be able to vote;

4. Each voter will have one and only one vote;

5. Vote secrecy is guaranteed; it never will be possible to link a voter to his/her vote;

6. The voting website will resist any denial of service attack

7. The voter will be protected against identity theft;

8. The number of cast votes will be equal to the number of received ballots;

9. It will be possible to prove that a given citizen has voted;

10. The system will not accept votes outside the ballot opening period;

11. The system will be audible.

Character of e-voting system

discusses the following characteristics of a good electronic voting system: accuracy, democracy, privacy, verifiability, convenience, flexibility, and mobility.

Each account includes the characteristic of accuracy, but the authors define “accuracy” in different ways.

For example, Schneier defines accuracy as “direct mapping from intent to counted vote.” Standard defines accuracy as “the extent to which a given measurement agrees with an accepted standard for that measurement” and includes significant discussion of acceptable error rates in the body of the

document. For Cranor, “A system is accurate if (1) it is not possible for a vote to be altered, (2) it is not

possible for a validated vote to be eliminated from the final tally, and (3) it is not possible for an invalid vote to be counted in the final tally.” Combining these definitions produces: An accurate voting system counts all valid votes with minimal processing error such that the intent of eligible voters is reflected in the final tally.

Each account also discusses the requirement that voters be able to cast their vote in secret, without a link between the voter and the cast ballot. This characteristic is referred to as anonymity, confidentiality, or privacy.

Both characteristics, accuracy and privacy, are essential in an ideal voting system. Yet, it is a non-trivial matter to achieve both simultaneously. For example, how do we insure that the intent of eligible voters is reflected in the final tally, without a back-channel to the voter after the vote has been counted but, wouldn’t a back-channel to the voter compromise privacy.

Each account also discusses the requirement that voters be able to cast their vote in secret, without a link.

http://brahms.emu.edu.tr/rza/An%20Introduction%20to%20Electronic%20Voting.pdf

characteristics, such as security, reliability, ease of use, and cost effectiveness

http://www.gao.gov/new.items/d07576t.pdf

Basic Principles of E-voting

The main principle of e-voting is that it must be as similar to regular voting as

possible, compliant with election legislation and principles and be at least as secure as regular voting.

Therefore e-voting must be uniform and secret, only eligible persons must be allowed to (e-)vote, every voter should be able to cast only one vote, a voter must not be able to prove in favour of whom he/she voted. In addition to this the collecting of votes must be secure, reliable and accountable.

According to Estonian election legislation e-voting takes place from 6th to 4th day

before Election Day and the following requirements are laid out:

“(1) On advance polling days, voters may vote electronically on the web page

of the National Electoral Committee. A voter shall vote himself or herself.

(2) A voter shall identify himself or herself using the certificate entered on his

or her identity card which enables digital identification.

(3) After identification of the voter, the consolidated list of candidates in the

electoral district of the residence of the voter shall be displayed to the voter on the

web page.

(4) The voter shall indicate on the web page the candidate in the electoral

district of his or her residence for whom he or she wishes to vote and shall confirm

the vote by signing it digitally using the certificate entered on his or her identity card

which enables digital signing.

(5) A notice that the vote has been taken into account shall be displayed to the

voter on the web page.

(6) Voter may change his or her electronic vote during the advance voting

period from 6th to 4th day before Election Day:

1) by voting electronically;

2) by voting in polling station.

http://www.vvk.ee/public/dok/Yldkirjeldus-eng.pdf

E-Voting Procedures

In this section we will describe in greater detail the behaviour of the components

present in the general architecture of the system during different stages of e-voting.

6.1. Key Management

The key management procedures and the security scheme used are one of the most

critical points of the system on which the fulfilment of the main requirements of the

system (privacy and secrecy of voting) depends. What follows is not a final

description of the measures and procedures, but we will outline the main concept,

main risks and possible solutions.

The main tool to guarantee the secrecy of voting in the system is asymmetric

cryptography. A system key pair is generated, the public component of which is

integrated into client software and is used to encrypt the vote. The private component of the key pair is used in the Vote Counting Application to decrypt the vote. It is of utmost importance that the use of private key is possible only for counting the votes in the VCA (at 19.00 on election day and, if necessary, during recount). When the period for filing complaints has expired, the private key will be destroyed The privacy and secrecy of an e-voter can be compromised by a simultaneous occurrence of two security hazards: a party appears in the system (or outside the system) who has access to both the private key of the system as well as the digitally signed votes. Even though this data is separated in the system, the risk remains. A one and only private key is probably a lot easier to protect than the digitally signed e-votes – the latter pass through several system components (Voter, VFS, VSS) and data transfer channels, consequently, the danger of leaked e-votes is higher. Thus for ensuring the security the main focus should be on key management.

Read also  Information Overload Essay

The private key is subject to two dangers:

* Compromise or becoming publicly available. The occurrence of this would

enable the parties in possession of digitally signed e-votes to determine who cast a

vote in favour of whom, thus compromising the privacy of the voter.

* Corruption. The private key carrier may be destroyed, lost or be corrupted because of a technical error. When this occurs it becomes impossible to decrypt the e-votes and all the electronically cast e-votes are lost. This is a critical danger and therefore two key pairs should be used simultaneously in the system.

The key pair is generated in a Hardware Security Module (HSM) in such a way that

the private component never leaves the module. The generation of the key pair and

use of private key is maintained by key managers, there should be several of them. A scheme “N out of M” is recommended, for National Electoral Committee four

members out of seven should be present in order to perform security critical

operations. Key managers have physical (for example a keycard) as well as

knowledge-based (PIN-code) authentication devices for communicating with the HSM.

The procedures of key management, meaning the generation of the key pair and PINs, delivery of the public component to the vendor of client application, preservation of the private component, its backup and delivery to the VCA must be subject to audit supervision and should be described in a separate document.

http://www.vvk.ee/public/dok/Yldkirjeldus-eng.pdf

Paper voting system

Paper-based voting: The voter gets a blank ballot and use a pen or a marker to indicate he want to vote for which candidate. Hand-counted ballots is a time and labour consuming process, but it is easy to manufacture paper ballots and the ballots can be retained for verifying, this type is still the most common way to vote

http://crypto.nknu.edu.tw/publications/200805ICIM_eVoting.pdf

In paper voting, the conformation to these principles is achieved via voter identification, supervised voting and distributed counting procedures. People are admitted to the polling station only once, and they only get one opportunity to cast their vote. It is also hard to add invalid ballots to or remove valid ballots from the ballot box unseen. The paper system uses separate counting sessions in the different districts, and allows any citizen to attend the counting process, and thereby

verify the result. Moreover, since voting is done under supervision of the election officials, you will be guaranteed a private voting environment. This is a warrant for the secrecy of your vote. Via these aspects, paper voting has acquired a large deal of trust in the experience of citizens.

Still, the ease with which this system has been replaced in the Netherlands suggest that there are other factors involved as well. One may argue that the electronic voting machines currently in use have been accepted based on passivity rather than trust. When these machines were introduced in the Netherlands, there has not been much debate about the conformation to the aforementioned principles. Instead, their introduction has been more or less tacitly accepted in spite of decreased transparency which is typical of passivity.

http://www.win.tue.nl/ipa/archive/falldays2005/Paper_Pieters.pdf

Paper voting has earned a large amount of trust in the experience of citizens, partly due to the well organised social context. Progress in technology should not lead to problems with democratic progress in society, which may easily become the result of distrust in the election system. If voting technology mediates the relation between people and democracy in such a way that the experience of trust and stability is reduced, for whatever reason, the actions that are invited are political passivity on the one hand, and protest and obstruction on the other.

http://www.win.tue.nl/ipa/archive/falldays2005/Paper_Pieters.pdf

Voting by Paper Ballot

In colonial America, early voters substituted beans, kernels of corn, seashells, or

rocks for the multi-colored balls used in Greece, as well as using a show of hands and voice to conduct elections (Rusk 313). In 1629, the first vote credited with using paper ballots took place in a Salem, Massachusetts church and by the Civil War only Kentucky and Virginia were still voting by voice.6 In 1800, the Northwest Territory enacted a law stating that elections should be held by ballot.

http://josephhall.org/arnold_ca_vs_hist.pdf

Paper-based E-voting system

In a paper based e-voting system, a touch screen is used in voting. After the voter has finished casting his votes, the unit prints out a hardcopy of the ballot which the voter has to pass to the election officer in charge so that it can be counted in a centralized location. The ballots will then be counted through optical-scan voting systems.

This system has the advantage of a paper trail as every person’s votes are recorded on a piece of paper. However, holes that are not properly aligned in a punch card or stray marks on an optical-scan card may lead to a vote not being counted by the machine. Moreover, physical ballots can still be lost during or after transit to the counting stations.

http://www.topbits.com/e-voting.html

Direct recording electronic systems

A DRE (Direct Recording Electronic) voting system consists of a computer with a touch-screen monitor, a permanent storage medium such as a write-once memory card, software, and, in some systems, a ballot printer.

The computer is much like a home computer. A touch-screen monitor allows the user to touch a marked spot on the monitor surface with his finger, thus entering data as if the screen were a keyboard; you have seen one if you have ever used an Automatic Teller Machine.

The software consists of two parts:

1) An Operating System that supports the voting software and directly controls the monitor, the permanent storage, and any other device that forms part of the computer system.

2) The voting system itself, which runs as an application on the Operating System. It manages the user interface, guards against certain user errors – e.g., it refuses to accept a vote if the user votes for more candidates than there are offices to be filled – and records the vote of each user on the user’s command. The voting system also counts the votes and records the counts, or else cooperates with a central computer to produce these results.

The ballot printer, if there is one, produces a document that may look like a ballot; it shows the choices made by the user. After the user has examined it, he may direct the system to record his vote or he may ask for another chance to vote. When the voter has made his choice, the system disposes of this document in one of a number of ways, which will be described later. Most of the DRE systems installed in the United States today do not have these printers.

Direct Recording Electronic Voting Systems

This is essentially voting through a computer. Here, a digital swipe-card, buttons or a touch screen will be used in order to make the choices. The votes are stored in a physical memory device which will be sent to a centralized voting station. Public network DRE voting systems can send the results after each voter has finished or by batches throughout the election day. Although the votes can be sent through the Internet, this is only used to speed up the rate of counting. The physical memory devices will still be used to verify the count.

The benefit of this voting system is the speed in which results can be obtained because results are tabulated almost instantaneously. This system also reduces the risk of mechanical error. Since voting is done through a computer, ballot appearance can also be modified to fit the needs of the voter. A voter with poor eyesight could, for example, use a ballot format with larger text. This system also helps the government save money by eliminating the need to print ballots.

http://www.topbits.com/e-voting.html

Security threats to DRE voting systems

As noted above, the integrity of the results generated by the DRE voting system is dependent on the correctness, robustness, and security of the software in the voting terminal and the procedures for tabulating the results. If the voting system software is flawed, an election can be compromised by voters or malicious insiders. Malicious insiders could include election officials, software developers, those responsible for DRE system maintenance, or even developers of the operating system underlying the DRE system (Kohno et al. 2003). A malicious insider working for Microsoft could install software that was activated by the election date and changed 10% of the straight ticket votes for one party.

http://www.ejeg.com/volume-2/volume2-issue3/v2-i3-art4-lauer.pdf

Voting through the Internet

The principle of postal voting is the following: a few weeks before a vote, each voter receives a single use voting card at home along with documentation on the vote and a ballot to fill in (or voting lists to choose from). The voter either takes the card to the polling station on election day, hands it over to an official and votes at the ballot box; or sends the card back in a prepaid envelope along with a second, sealed anonymous envelope containing the ballot. For the purpose of remote e- Voting, voting cards were adapted. The e-Vote card contains a unique 16-digit number allocated to the voter for this unique vote, a 4-digit control key, and a 6-digit secret code hidden under a scratch-away opaque layer. If this layer is scratched away, voting using the other two modes is no longer possible, as a human operator then visually controls the card. The electronic vote proceeds in two steps: (1) establishing a valid with the voter and manage the voting process.

They are replicated with load balancing and automatic failover. The OS is designed to run protected applications on the Internet. It manages two separate compartments, one containing an Apache web server and the other containing a Tomcat application server. It controls communication between the two services. This schema protects the database servers running in the background better. The monitoring system controls the functional infrastructure and is itself redundant. It controls the front page of the voting system against any attempt to modify its looks or contents. Monitoring system operators are connected to a crisis cell that can be activated if any alarm is set off.

Read also  Vpn Command Line Interface Configuration Using Packet Information Technology Essay

http://www.ejeg.com/volume-4/vol4-iss2/chevallier_et_al.pdf

internet voting system

. Internet Voting is the act of casting a vote using a system that employs internet based protocols.

. Currently there are two flavours:

. Poll site internet voting

. Remote internet voting

http://www.acsac.org/2001/case/Thurs_C_1030_Rodriguez_BAH.pdf

The point of departure is that a system of electronic voting (‘e-voting’) via

the Internet must fulfil the following five basic requirements:

􀁸 Only people eligible to vote should be able to vote.

ô€¸ It should be possible to use one’s vote only once.

􀁸 Ballots should be absolutely secret.

􀁸 It should not be possible for a vote cast to be changed by anyone else.

􀁸 The system should ensure correct tallying of votes at all levels (voting

district, constituency and area).

The Commission presents an e-voting system for Internet (online) voting

that should be capable of fulfilling these requirements. Before it is tested in

an election, however, extensive trials should be carried out. Only after such

trials can a final decision be taken as to whether the procedure is applicable

in a real election.

http://www.governments-online.org/documents/InternetVotingSweden.pdf

When the term Internet voting is used, it generally refers to remote Internet voting, where the client software communicates over the Internet to the server software, say, from a voter’s PC. However, there are at least two other ways to implement voting over the Internet: kiosk voting and poll-site voting.

http://www.acsac.org/2006/papers/130.pdf

Types of Internet Voting

Two types of Internet voting are possible, and both were used in voting trials in 2000. One method, the more basic from a technical standpoint, is Internet voting at a traditional polling site, with computer voting machines connected to the Internet and where election officials authenticate voters before ballots are cast. The other method, more technically advanced, is to cast ballots over the Internet from remote locations using electronic authentication and computer security technologies.

The Arizona Democratic primary, for example, used both methods; voters could cast their ballots from remote locations or at any polling place. Some observers believe that remote Internet voting should not be attempted until voters become comfortable with polling site Internet voting and until procedures are well established to ensure accurate voter authentication, ballot secrecy, and security. Others, however, argue that polling site Internet voting will have little value to voters, who want the convenience of remote Internet voting.

http://www.infousa.ru/information/rs20639.pdf

Security threats to Internet voting

Internet voting systems pose numerous security threats the most significant of which have to do with vulnerabilities of the PC platform and vulnerabilities associated with the Internet itself. Client PCs could be located in voters’ homes or in public or commercial establishments such as libraries or cyber cafés. Assuring that all possible PCs are free of malware is not practically possible. In addition, there can be no assurance of voter privacy as there an election is over, it is not possible to run it again under current laws governing elections.

http://www.ejeg.com/volume-2/volume2-issue3/v2-i3-art4-lauer.pdf

E-voting

Electronic voting systems are being introduced, or trialled, in several countries to provide more efficient voting procedures. However, the security of electronic elections has been seriously questioned. A major difference with traditional paper based elections is the lack of transparency. In paper elections it is often possible to observe the whole process from ballot casting to tallying, and to rely on robustness characteristics of the physical world (such as the impossibility of altering the markings on a paper ballot sealed inside a locked ballot box). By comparison, it is not possible to observe the electronic operations performed on data. Computer systems may alter voting records in a way that cannot be detected by either voters or election observers. A voting terminal’s software might be infected by malware which could change the entered vote, or even execute a completely different protocol than the one expected.

http://www.cryptoforma.org.uk/paris/9.pdf

E-voting combines technology with the democratic process, in order to make voting more efficient and convenient for votes. E-voting (or electronic voting) allows voters to either vote by computer from their homes or at the polling stations.

1) E- voting at the polling booth.

this form of e-voting is virtually the same as regular voting, but replaces the ballot paper with the balloting machine or a computer . these machines/computers are only connected to a private network and server while voting is going on or after the voting is done.

2) E-voting online

the most advanced form of a democracy would be voting online, which would allow voters to cast their votes from anywhere there is internet access

the internet is viewed as a platform and delivery medium for tools that help to eliminate some of the distance constraints in direct democracy. Technical media for e-democracy can be expected to extend to mobile technologies such as phones.

http://epubl.luth.se/1653-0187/2007/015/LTU-PB-EX-07015-SE.pdf

An e-voting system is a system consisting of mechanical, electromechanical, and electrical parts. It contains software to control the devices, to define the ballots, to cast and count the votes, and to calculate and display the results.

The main tasks of e-voting systems are [25]:

registration: registration of the voters in a list or registry;

legitimating: identification, authentication, and authorization of users;

casting of votes: the electronic ballot is displayed and may be cast anonymously by a citizen; collecting of votes: votes cast are collected by an urn server; processing of votes: votes are processed and an election result is calculated and presented.

http://electrobabe.files.wordpress.com/2009/01/ondrisek_e-voting-system-security-optimization_05-02-02.pdf

security

The system’s security specification was defined by 11 criteria (COE 2003): votes must not be intercepted, modified or diverted; the contents of a vote must not be knowledgeable to any third party before the counting procedure. Only persons

enjoying the right to vote can participate; each voter has only one vote and can vote only once; it must never be possible to connect a voter and his/her vote, even during the counting procedure. The system must be able to resist denial of service attacks attempting to saturate the voting server; voters must be protected against identity

theft; the number of votes emitted must be equal to the number of votes received. Any difference must be clarified and corrected; it must be possible to prove that a voter has voted; the system accepts votes only within the interval of time during which e-Voting is open. And finally, assigned authorities must be able to verify that the system works correctly. However, a secure e- Voting system must achieve an optimal trade-off between security of the procedure and user comfort. So Geneva’s concept takes a layered approach to security, introducing different techniques and technologies to guarantee both secure and simple usage.

http://www.ejeg.com/volume-4/vol4-iss2/chevallier_et_al.pdf

The advanced work of Geneva project create a good base of comprehension

of all possible security problems, the “11 commandments for internet voting”

are of special interest as they incorporate an advanced experience with EVoting:

1. Votes cannot be intercepted nor modi_ed

2. Votes cannot be known before the o_cial ballot reading

3. Only registered voters will be able to vote

4. Each voter will have one and only one vote

5. Vote secrecy is guaranteed, it never will be possible to link a voter to

his/her vote

6. The voting website will resist any denial of service attack

7. The voter will be protected against identity theft

8. The number of cast votes will be equal to the number of received votes

9. It will be possible to prove that a given citizen has voted

10. The system will not accept votes outside the ballot opening period

11. The system will be audible

Those rules has been taken in account also by the Council of Europe for

underlining the security aspect that will be the base of any E-Voting system.

. http://diuf.unifr.ch/is/userfiles/file/studentprojects/reports/eGov_HS07_Case_Studies_on_E-Voting_(DanieleCavadini_LorenzoCimasoni).pdf

security of e voting system

Security is a fundamental criterion for the selection and use of electronically supported election systems. To assure security in e-voting systems, an integral approach that covers all parts of this complex system should be chosen. This method is also called holistic security [11]. In this approach, all elements of a system

and all aspects of security, such as system stability, secrecy, integrity, availability, reliability, safety, and maintainability, also have to be considered.

http://electrobabe.files.wordpress.com/2009/01/ondrisek_e-voting-system-security-optimization_05-02-02.pdf

Security properties of e-voting

High security is essential to elections. Democracy relies on broad confidence in the

integrity of elections. There has been a lot of attention to an electronic voting by

cryptographers. Many scientific researches have been done in order to achieve security, privacy and correctness in electronic voting systems by improving cryptographic protocols of e-voting systems. Currently, the cryptographic schemes are not the main problem. The main interest is the practical security in e-voting systems. Which properties must be justified in order we could say that the system is secure for implementing? One of the main interests is seemingly contradicting security properties. On the one hand, voting must be private and the votes anonymous. On the other hand, voters must be identified in order to guarantee that only the eligible voters are capable to vote.

http://triinu.net/e-voting/master%20thesis%20e-voting%20security.pdf

Concerns about online voting Security

While internet voting – especially remote internet voting – is appealing for the reasons given above, several recent studies suggest that there are considerable security risks.

In 1999, the California Secretary of State convened a task force of experts to make recommendations about the feasibility of internet voting in California.4 The task force delivered their report in January 2000, concluding “additional technical innovations are necessary before remote Internet voting can be widely implemented as a useful tool to improve participation in the elections process in California.” It recommend that internet voting be introduced in four stages, over a period of many years.

The first stage, poll site internet voting, might be feasible in the near future. The later stages – regional poll site, kiosk, and remote internet voting – should not be deployed until the associated security concerns can be addressed.

http://www.parliament.uk/documents/post/pn155.pdf

Order Now

Order Now

Type of Paper
Subject
Deadline
Number of Pages
(275 words)