Page 658 - Emerging Trends and Innovations in Web-Based Applications and Technologies
P. 658
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
technical failures. Schwartz and Skeith (2016) highlighted C. Multi-Factor Authentication for Voter Verification
the risks of malware and hacking in internet-based voting. To prevent identity fraud, the system will implement multi-
Similarly, Springall et al. (2014) conducted a security factor authentication (MFA), including biometric verification
analysis of Estonia’s online voting system, revealing (fingerprint/face recognition) and one-time passwords
significant flaws that could compromise election (OTPs).
transparency.
A decentralized identity system will be integrated to ensure
5. Legal and Ethical Considerations that only eligible voters can participate.
Legal frameworks governing e-voting vary across countries.
D. Distributed and Auditable Voting Process
Research by Niemi & Norris (2020) discusses the need for
The system will include publicly auditable logs, where
regulatory standards to ensure transparency, voter
independent observers can verify vote integrity without
anonymity, and election integrity. The lack of global
compromising privacy.
consensus on digital voting regulations poses challenges to
widespread adoption and trust. A multi-party computation (MPC) approach will be used to
prevent a single authority from controlling the election
6. Usability and Public Trust in E-Voting
Transparency in e-voting is closely tied to voter trust and results, ensuring decentralization.
usability. Studies like those by Alvarez et al. (2011) E. Secure Online and Offline Voting Options
emphasize the importance of designing user-friendly The framework will support both online voting (for remote
interfaces that provide clear verification mechanisms. Public voters) and offline blockchain-based voting machines, which
perception of e-voting remains mixed, with trust largely will sync with the blockchain once connected to the internet.
influenced by past security incidents and government
A secure recovery mechanism will be implemented for
transparency.
voters who encounter technical issues.
Proposed Work:
To address the challenges of transparency, security, and 3. Implementation and Testing Approach
trust in electronic voting (e-voting) systems, this research The proposed framework will be tested using:
proposes an enhanced e-voting framework that incorporates Simulation-based security analysis to evaluate potential
end-to-end verifiability, blockchain technology, and cyber threats.
advanced cryptographic mechanisms. The proposed system
aims to improve voter confidence, ensure election integrity, User experience testing to assess system usability and
and prevent fraud while maintaining voter anonymity. accessibility.
Pilot election trials to validate the effectiveness of the
1. Objectives of the Proposed Framework
The primary objectives of this proposed e-voting system framework in real-world voting scenarios.
include: Enhancing Transparency: Ensuring that all 4. Expected Outcomes
stakeholders, including voters and election auditors, can Increased transparency and voter trust in digital elections.
verify the integrity of the election process. Reduced risks of vote manipulation, hacking, and fraud.
Improved scalability and adaptability for different electoral
Ensuring Security and Integrity: Protecting votes from
processes.
manipulation, cyber threats, and insider attacks.
A balance between transparency and voter privacy.
Maintaining Voter Anonymity: Allowing voters to verify their
votes without compromising privacy. Proposed Research model:
The proposed research model for enhancing transparency in
Improving Usability and Accessibility: Designing a user-
friendly system that can be adopted on a large scale. digital voting systems is designed to integrate key security,
verifiability, and trust-enhancing mechanisms while
2. Key Features of the Proposed E-Voting Framework addressing challenges such as voter anonymity, vote
A. Blockchain-Based Transparency integrity, and cyber threats. This model comprises multiple
The voting process will be implemented on a permissioned layers, each focusing on a specific aspect of the e-voting
blockchain, where only authorized election authorities can process.
validate transactions while maintaining transparency for the
public. Each vote will be recorded as an immutable 1. Research Model Framework
transaction, preventing any alterations or deletions. The proposed research model consists of the following
components:
Smart contracts will be used to automate vote counting and
A. Input Layer: Voter Authentication and Registration
validation, reducing human errors and potential bias.
Secure Voter Registration: Ensures that only eligible voters
B. End-to-End (E2E) Verifiable Cryptographic Voting are registered using biometric authentication, government-
The system will integrate homomorphic encryption to allow issued ID verification, and blockchain-based decentralized
vote tallying without decrypting individual votes, ensuring identity management.
privacy and transparency. Voters will receive a
cryptographic receipt that allows them to verify whether Multi-Factor Authentication (MFA): Implements a
their vote was counted correctly without revealing their combination of password-based, biometric, and one-time
identity. password (OTP) mechanisms to prevent fraudulent voting.
B. Vote Casting Layer: Secure and Transparent Voting
Zero-knowledge proofs (ZKPs) will be utilized to allow
independent verification of the voting process without Mechanism
exposing sensitive voter information. End-to-End Verifiability (E2E-V): Ensures voters can verify
that their vote is cast correctly and counter Homomorphic
IJTSRD | Special Issue on Emerging Trends and Innovations in Web-Based Applications and Technologies Page 648