International Journal of Engineering Trends and Technology (IJETT) – Volume 17 Number 3 – Nov 2014 An Innovative Model of Security for Electronic Voting Machines *1 M. Sreedevi, *2 Prof. M. Padmavathamma 1 Asst.professor, Dept. Of Computer Science, S.V.University, TIRUPATI, A.P, India. 2HOD, Dept. Of Computer Science, S.V.University, TIRUPATI, Andhra Pradesh, India. ABSTRACT Voting is most strategic and essential process of democratic society like India where people determine their own government. Governments around the world are turning around to modern mechanisms of voting like electronic voting machine, E-Voting, M-Voting. But usage of above systems depends upon various factors like volume of voting, latest technologies used, various threats that effects the performance. In this paper by considering the above facts we have proposed new model of EVM which have edge over existing EVM in providing security to votes. In this paper new security module is added to EVM to provide Security for votes in EVM through MPK cryptosystem which provides solution to the problems of vote tampering or loss of votes due to EVM liabilities. KEYWORDS Electronic voting machine, punched card, cryptography, backup 1. INTRODUCTION Voting is an important weapon to bring out the opinion of a mass for some conclusions which is under consideration. Based on the promise of greater efficiency, better scalability, faster speed, lower cost, and more convenience voting is currently shifting from traditional paper-based method to automatic electronic voting machine. The term “electronic voting” depicts the use of some electronic means in voting and ensure the security, reliability, guaranteed and transference of wide range of application of voting include its use in reality student body elections, shareholder meetings, and the passing of legislation in parliament. Perhaps the most important, influential, publicized and widespread use of voting in India is the use in national elections. Compared to its traditional paper-based counterpart, electronic voting is considered to have many greater potential benefits. ISSN: 2231-5381 In 2004, India had adopted Electronic Voting Machines (EVM) for its elections to the Parliament with 380 million voters had cast their ballots using more than a million voting machines. The Indian EVMs are designed and developed by two Government Owned Defense Equipment Manufacturing Units. Both systems are identical, and are developed to the specifications of Election Commission of India. The System is a set of two devices running on 6V batteries. One device, the Voting Unit is used by the Voter, and another device called the Control Unit is operated by the Electoral Officer. Both units are connected by a 5 meter cable. The Voting unit has a Blue Button for every candidate, the unit can hold 16 candidates, but up to 4 units can be chained, to accommodate 64 candidates [4, 5]. The Control Units has three buttons on the surface, namely, one button to release a single vote, one button to see the total number of vote cast till now, and one button to close the election process. The result button is hidden and sealed. It cannot be pressed unless the Close button is already pressed. Security is needed for the votes casted in EVM because important decisions are based on the result. Due to ballot design or the mistake of unintentional voter, may lead to foul votes. Unreliable results can also be produced by this scheme. Due to this scheme, chances for malpractice are made available by corrupt leaders which may even change the government decisions. But the design of EVM provides some loop holes which threatens the security of the votes. The hardware provided with PROM for storage of votes is compact with few instructions that run directly on the hardware]. For this simple design process, security is hard to maintain and may result in malpractice of votes[7]. To avoid the above mentioned problem, our proposal challenges the security of the votes casted by the public. Our proposal focuses on two points [1]. One is to provide security and the other is to provide backup storage for post checking, if at all any problem arises. This facility is provided by using cryptography where http://www.ijettjournal.org Page 136 International Journal of Engineering Trends and Technology (IJETT) – Volume 17 Number 3 – Nov 2014 two public keys are used for encryption and one public key for decryption. Backup storage acts as a remote server which preserves the votes. This storage is used for the purpose of rechecking and confirmation. Hence, our thesis provides solution for the security problems of the votes in EVM. 2. RELATED WORK Other security measures are implemented in Electronic Voting System like framing secured model for Electronic Voting. The system contains both user name and password for voters who participate in election. Voting system slowly evolved from counting hands then to paper, punch card and scan machines finally moved to secure voting schemes. Formerly security was provided externally by observers, audit trails but internal security for votes is a puzzle yet to be solved[5]. Another way of providing security is the concept of simplified electronic voting system where automatically and manually it is operated to check the number of times a voter cast his vote. The design of SEVS is convenient of discrete digital circuitry. Some countries have adopted electronic elements and devices like micro controller, comparators, multiplexer, memory which are costly, inflexible and complex. For solution, some machines are built simple for use, flexible and cost effective to confirm security, transparency and fast response. Providing security through cryptography technique is the recent development in maintaining security and privacy. Security is provided by a pair of keys i.e one public key and another private key. The keys are responsible for the security of the votes casted in the election system. But there are some disadvantages which arises doubt about the privacy and accuracy of the votes. 3. EVM MODEL The Election Commission of India developed EVMs in partnership with two government-owned companies. The first Indian EVMs were developed in the early 1980s by ECIL. They were not widely used all over the nation because of the inconvenience of the machine. They proposed the next model including the separate control and ballot units and the layout of both components [5]. The first-generation EVMs were based on Hitachi 6305 microcontrollers and used firmware stored in external UV-erasable PROMs along with 64kb EEPROMs for storing votes. Second-generation models were introduced in 2000 by both ECIL and BEL. These machines moved the firmware into the CPU and upgraded other components. They were gradually deployed in greater numbers and used nationwide beginning in 2004 [In 2006, the manufacturers adopted a third-generation design incorporating additional changes suggested by the Election Commission [5,6]. India's EVMs have two main components, shown in the Fig 1. There is a control unit, used by poll workers, which stores and accumulates votes, and a ballot unit, located in the election booth, which is used by voters. These units are connected by a 5 m cable, which has one end permanently fixed to the ballot unit. The system is powered by a battery pack inside the control unit. The EVMs are designed for one-or two-race elections, as are typical in India. The old (or) existing EVM is a real machine used widely all over nation for voting purposes. 3.1 COMPONENTS OF EVM: EVM has a storage unit called memory or control unit and ballot unit. The votes casted are saved in the memory and during counting time the workers remove the seal or memory and check the votes and declare the results. Ballot unit is used by the votes in the booth. First the ballot unit is set up with the no. of candidates and their symbols [1,3]. The control unit shares the no. of votes casted to enable the checking of votes at any time. 3.2 FUNCTIONS OF EVM Fig : 1 Electronic Voting Machine ISSN: 2231-5381 During election time the machine is already checked once and then used for the purpose. The individual who wants to deliver the votes just checks for the http://www.ijettjournal.org Page 137 International Journal of Engineering Trends and Technology (IJETT) – Volume 17 Number 3 – Nov 2014 particular name in the list. Next, the individual pressed ballot button for the selected candidate to cast the vote. The vote casted and stored in the memory or control unit. At the end of the day, the control unit is checked and sealed for security purpose. On the counting day the control units are checked and the votes are counted. Finally the result is declared based on the total no.of votes wanted, which is stored in the EVM. 4. CHALLENGES OF SECURITY IN EVM i).Environmental conditions may affect the votes stored in the memory for a long period of time. Rain, pollution, worms and insects may damage the votes [7]. ii.)Damage caused by the electoral fraud where party loyates may attack the booth and conquer the ballot box. iii.)Problem in the internal components cable may result in wrong casting of vote which will affect the policy of election. iv) The Source code of EVM is not revealed and the inner working style is not exhibited. So the working process of EVM is not defined accurately [6]. 5 PROPOSED SECURE EVM MODEL To overcome the challenges initially we propose the new model with backup storage, which also enhance security for votes thus providing solution for security issues in the existing EVM model. Fig: 3 Security Model of EVM To provide security, two storages are used in this model and a technique called cryptography is implemented to provide privacy and security against danger. Storage is used for accumulation of votes for counting while other, called backup storage is used to store votes for post-checking purposes in case any problem arises. 5.1 COMPONENTS OF THE PROPOSED MODEL Based on the security issues of the existing EVM model, the architecture of the proposed model is constructed. To remove the drawbacks of satisfy the privacy issues the model is created with additional components. They have more purposes which increases the value of the proposed model. Along with the parts of the existing model, additional features are introduced to safeguard the votes casted. The basic Components are: a) Control Unit: Control Unit contains the main circuit board with CPU of a micro controller with an Oscillator. CPU consists of ROM, which provides security for the software being changed. ISSN: 2231-5381 http://www.ijettjournal.org Page 138 International Journal of Engineering Trends and Technology (IJETT) – Volume 17 Number 3 – Nov 2014 b) Switches: Buttons are connected with switches used for casting the votes, storage purpose for retrieving the votes. c) EVM Storage: The Unit which is used to store the votes casted by the individual. The memory or storage unit contains the votes which can be used for counting purpose in encrypted storage by using public key-1 which is based on proposed security algorithm MPK cryptosystem. d)Backup Storage: The alternate storage used to backup vote which is stored in back up device in encrypted format by using public key-2 which is based on proposed security algorithm MPK. This is used by polling officer in case of damaged EVM. this model pair of public keys are used for encryption and private key is used for decryption. The casted vote in EVM is encrypted with one of the pair of public key PK and stored in EVM memory as shown in Fig-4 and same vote is encrypted with public key PK2 and stored in the EVM backup storage at remote server as shown in fig-5. At the time of results EVM votes are decrypted with private key of that EVM given by polling official if voting machine is in normal condition or in case of EVM failure votes are retrieved from remote server by using private key of poll booth officer. e) Security Module: This module provides cryptographic primitives which provides security to EVM vote at the time of storage in EVM or in secondary storage back up device. This module is split into two parts which encrypts vote at the time of storage in EVM as well in backup storage. Decryption mechanism allows to view the count of votes after giving key by Poll booth officer or admin. MPK algorithm [11][12] allows to store votes in encrypted form in main memory and remote memory with two public keys respectively. 6. WORKING OF PROPOSED EVM MODEL Generally votes polled in EVM are stored in memories which are part of the machine, which requires suitable precautions to be taken at their preservation before viewing results of referendum. Every EVM is given an unique ID to identify machine and the polling both to which it belongs. To view the results Polling official will officiate to get the results if the EVM is secure in its place without damage physically otherwise the entire votes will be lost [8]. So in this proposed secured EVM model the EVM is connected to remote server with a network connection via communication mechanism, for vote storage at remote server as backup similar mirroring the memory of EVM. If EVM memories are hacked entire votes may by modified, so to overcome this the proposed model stores votes not only in memory of machine but also in remote server in cryptic form by using MPK cryptographic algorithm [12] with pairs of two keys. In ISSN: 2231-5381 Fig: 4 Encrypted Votes in EVM Memory The above secure EVM model is simulated as web application which provides user with an interface to vote for his choice, the vote polled is stored in memory of web page and back up of votes is stored in database server at remote place in encrypted form and the results are shown when private key is given by poll officer. http://www.ijettjournal.org Page 139 International Journal of Engineering Trends and Technology (IJETT) – Volume 17 Number 3 – Nov 2014 Data base server linked with web server acts as backup storage which accumulates the votes so that for any problem with EVM, the votes can be extracted from the storage and the results is published whenever required. 10. REFERENCES [1] E-voting in DCC polls. In The Daily Star, Apr. 14, 2010. http://www.thedailystar.net/newDesign/news-etails.php?nid=134325. [2] Security Analysis of India’s Electronic Voting Machines_NetIndia, (P) Ltd, Hyderabad y The University of Michigan April 29, 2010. [3] Election Commission of India. The Commission’s reply to Sh. V. V.Rao.Mar.29,2010.http://eci.nic.in/eci_main/recent/reply__sh.VVRa o.pdf. [4] Election Commission of India. Handbook forreturningofficers.2009.http://eci.nic.in/eci_main/ElectoralLaws/Ha ndBooks/Handbook_for_Returning_Officers.pdf. Fig: 5 Encrypted Votes stored in Remote Server 7. ANALYSIS OF PROPOSED EVM MODEL a) The proposed model is better designed to withstand any security attacks on data is in storage. b) Since EVM is an electronic device Votes stored electronically can be lost due to various problems related to electronic devices, and it is not possible to recover, so the proposed EVM model which provides back up of Votes can be recovered. c) In the proposed EVM model since the votes are encrypted it can be altered. d) Proposed EVM stores data in remote server in encrypted format it can be visible or modified by ordinary users. e) On transit of votes to remote server the proposed EVM Votes are encrypted and transferred so man in middle attacks can be avoided. f) As in the new EVM model Votes are accessed only by polling officer with his private key, system is authenticated appropriately. .[5] Election Commission of India. Information under RTI on EVMs. July 2009. No. RTI/2009-EMS/39. [6] Election Commission of India. Electronic voting machines– Regarding. Aug. 8, 2009. No. PN/ECI/41/2009. [7] A. K. Agarwala, D. T. Shahani, and P. V. Indiresan. Report of the expert committee for evaluation of the upgraded electronic voting machine(EVM).Sept.2006.http://www.scribd.com/doc/6794194/Expe rt-Committee-Report-on-EVM, pages 2–20. [8] Election Commission of India. Handbook for presiding officers. 2008. http://eci.nic.in/eci_main/ElectoralLaws/HandBooks/Handbook_for_ Presiding_Officers.pdf. [9] Stallings William, ―Cryptography and Network Security – Principles and Practices, India Pearson Prentice Hall, 4th Edition. [10]A. Menezes, P. van Oorschot, and S. anstone, Handbook of applied cryptography, CRC press, 1996. [11] Suresh K, Venkataramana.K, “Study of Analysis on RSA and its Variants“,International Journal of Computer Science Research & Technology (IJCSR),Vol. 1 Issue 4, September – 2013 [12] Sreedevi.M, Prof. M. Padmavathamma, “Multi-pair Public Key Cryptosystem”, International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 3 - May 2014 8. CONCLUSION: In this paper we discussed about the working style of existing EVM model and various problems faced by this model. This problems can be solved using the new model of EVM which is based on cryptography technique. Two types of key are used i.e. two public keys and one private key for encrypting the vote and decrypting, so no alterations can be done externally. ISSN: 2231-5381 http://www.ijettjournal.org Page 140