An Innovative Model of Security for Electronic Voting Machines

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 17 Number 3 – Nov 2014
An Innovative Model of Security for
Electronic Voting Machines
*1 M. Sreedevi, *2 Prof. M. Padmavathamma
1 Asst.professor, Dept. Of Computer Science, S.V.University, TIRUPATI, A.P, India.
2HOD, Dept. Of Computer Science, S.V.University, TIRUPATI, Andhra Pradesh, India.
ABSTRACT
Voting is most strategic and essential process of
democratic society like India where people determine
their own government. Governments around the world
are turning around to modern mechanisms of voting
like electronic voting machine, E-Voting, M-Voting.
But usage of above systems depends upon various
factors like volume of voting, latest technologies used,
various threats that effects the performance. In this
paper by considering the above facts we have proposed
new model of EVM which have edge over existing
EVM in providing security to votes. In this paper new
security module is added to EVM to provide Security
for votes in EVM through MPK cryptosystem which
provides solution to the problems of vote tampering or
loss of votes due to EVM liabilities.
KEYWORDS
Electronic voting machine, punched card, cryptography,
backup
1. INTRODUCTION
Voting is an important weapon to bring out the opinion
of a mass for some conclusions which is under
consideration. Based on the promise of greater
efficiency, better scalability, faster speed, lower cost,
and more convenience voting is currently shifting from
traditional paper-based method to automatic electronic
voting machine. The term “electronic voting” depicts
the use of some electronic means in voting and ensure
the security, reliability, guaranteed and transference of
wide range of application of voting include its use in
reality student body elections, shareholder meetings,
and the passing of legislation in parliament. Perhaps the
most important, influential, publicized and widespread
use of voting in India is the use in national elections.
Compared to its traditional paper-based counterpart,
electronic voting is considered to have many greater
potential benefits.
ISSN: 2231-5381
In
2004, India had
adopted Electronic
Voting
Machines (EVM) for its elections to the Parliament
with 380 million voters had cast their ballots using
more than a million voting machines. The Indian EVMs
are designed and developed by two Government Owned
Defense Equipment Manufacturing Units. Both systems
are identical, and are developed to the specifications
of Election Commission of India. The System is a set of
two devices running on 6V batteries. One device, the
Voting Unit is used by the Voter, and another device
called the Control Unit is operated by the Electoral
Officer. Both units are connected by a 5 meter cable.
The Voting unit has a Blue Button for every candidate,
the unit can hold 16 candidates, but up to 4 units can be
chained, to accommodate 64 candidates [4, 5]. The
Control Units has three buttons on the surface, namely,
one button to release a single vote, one button to see the
total number of vote cast till now, and one button to
close the election process. The result button is hidden
and sealed. It cannot be pressed unless the Close button
is already pressed.
Security is needed for the votes casted in EVM because
important decisions are based on the result. Due to
ballot design or the mistake of unintentional voter, may
lead to foul votes. Unreliable results can also be
produced by this scheme. Due to this scheme, chances
for malpractice are made available by corrupt leaders
which may even change the government decisions. But
the design of EVM provides some loop holes which
threatens the security of the votes. The hardware
provided with PROM for storage of votes is compact
with few instructions that run directly on the hardware].
For this simple design process, security is hard to
maintain and may result in malpractice of votes[7].
To avoid the above mentioned problem, our proposal
challenges the security of the votes casted by the public.
Our proposal focuses on two points [1]. One is to
provide security and the other is to provide backup
storage for post checking, if at all any problem arises.
This facility is provided by using cryptography where
http://www.ijettjournal.org
Page 136
International Journal of Engineering Trends and Technology (IJETT) – Volume 17 Number 3 – Nov 2014
two public keys are used for encryption and one public
key for decryption. Backup storage acts as a remote
server which preserves the votes. This storage is used
for the purpose of rechecking and confirmation. Hence,
our thesis provides solution for the security problems of
the votes in EVM.
2. RELATED WORK
Other security measures are implemented in Electronic
Voting System like framing secured model for
Electronic Voting. The system contains both user name
and password for voters who participate in election.
Voting system slowly evolved from counting hands
then to paper, punch card and scan machines finally
moved to secure voting schemes. Formerly security was
provided externally by observers, audit trails but
internal security for votes is a puzzle yet to be
solved[5].
Another way of providing security is the concept of
simplified electronic voting system where automatically
and manually it is operated to check the number of
times a voter cast his vote. The design of SEVS is
convenient of discrete digital circuitry. Some countries
have adopted electronic elements and devices like
micro controller, comparators, multiplexer, memory
which are costly, inflexible and complex. For solution,
some machines are built simple for use, flexible and
cost effective to confirm security, transparency and fast
response.
Providing security through cryptography
technique is the recent development in maintaining
security and privacy. Security is provided by a pair of
keys i.e one public key and another private key. The
keys are responsible for the security of the votes casted
in the election system. But there are some disadvantages which arises doubt about the privacy and
accuracy of the votes.
3. EVM MODEL
The Election Commission of India developed EVMs in
partnership with two government-owned companies.
The first Indian EVMs were developed in the early
1980s by ECIL. They were not widely used all over the
nation because of the inconvenience of the machine.
They proposed the next model including the separate
control and ballot units and the layout of both
components [5].
The first-generation EVMs were based on Hitachi 6305
microcontrollers and used firmware stored in external
UV-erasable PROMs along with 64kb EEPROMs for
storing votes. Second-generation models were
introduced in 2000 by both ECIL and BEL. These
machines moved the firmware into the CPU and
upgraded other components. They were gradually
deployed in greater numbers and used nationwide
beginning in 2004 [In 2006, the manufacturers adopted
a third-generation design incorporating additional
changes suggested by the Election Commission [5,6].
India's EVMs have two main components, shown in
the Fig 1. There is a control unit, used by poll workers,
which stores and accumulates votes, and a ballot unit,
located in the election booth, which is used by voters.
These units are connected by a 5 m cable, which has
one end permanently fixed to the ballot unit. The
system is powered by a battery pack inside the control
unit. The EVMs are designed for one-or two-race
elections, as are typical in India. The old (or) existing
EVM is a real machine used widely all over nation for
voting purposes.
3.1 COMPONENTS OF EVM:
EVM has a storage unit called memory or control unit
and ballot unit. The votes casted are saved in the
memory and during counting time the workers remove
the seal or memory and check the votes and declare the
results. Ballot unit is used by the votes in the booth.
First the ballot unit is set up with the no. of candidates
and their symbols [1,3]. The control unit shares the no.
of votes casted to enable the checking of votes at any
time.
3.2 FUNCTIONS OF EVM
Fig : 1 Electronic Voting Machine
ISSN: 2231-5381
During election time the machine is already checked
once and then used for the purpose. The individual
who wants to deliver the votes just checks for the
http://www.ijettjournal.org
Page 137
International Journal of Engineering Trends and Technology (IJETT) – Volume 17 Number 3 – Nov 2014
particular name in the list. Next, the individual pressed
ballot button for the selected candidate to cast the vote.
The vote casted and stored in the memory or control
unit.
At the end of the day, the control unit is checked and
sealed for security purpose. On the counting day the
control units are checked and the votes are counted.
Finally the result is declared based on the total no.of
votes wanted, which is stored in the EVM.
4. CHALLENGES OF SECURITY IN EVM
i).Environmental conditions may affect the votes stored
in the memory for a long period of time. Rain,
pollution, worms and insects may damage the votes [7].
ii.)Damage caused by the electoral fraud where party
loyates may attack the booth and conquer the ballot
box.
iii.)Problem in the internal components cable
may result in wrong casting of vote which
will affect the policy of election.
iv) The Source code of EVM is not revealed and the
inner working style is not exhibited. So the working
process of EVM is not defined accurately [6].
5 PROPOSED SECURE EVM MODEL
To overcome the challenges initially we propose the
new model with backup storage, which also enhance
security for votes thus providing solution for security
issues in the existing EVM model.
Fig: 3 Security Model of EVM
To provide security, two storages are used in this model
and a technique called cryptography is implemented to
provide privacy and security against danger. Storage is
used for accumulation of votes for counting while
other, called backup storage is used to store votes for
post-checking purposes in case any problem arises.
5.1
COMPONENTS OF THE PROPOSED
MODEL
Based on the security issues of the existing EVM
model, the architecture of the proposed model is
constructed. To remove the drawbacks of satisfy the
privacy issues the model is created with additional
components. They have more purposes which increases
the value of the proposed model. Along with the parts
of the existing model, additional features are introduced
to safeguard the votes casted.
The basic Components are:
a) Control Unit: Control Unit contains the main
circuit board with CPU of a micro controller with an
Oscillator. CPU consists of ROM, which provides
security for the software being changed.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 138
International Journal of Engineering Trends and Technology (IJETT) – Volume 17 Number 3 – Nov 2014
b) Switches: Buttons are connected with switches used
for casting the votes, storage purpose for retrieving the
votes.
c) EVM Storage: The Unit which is used to store the
votes casted by the individual. The memory or storage
unit contains the votes which can be used for counting
purpose in encrypted storage by using public key-1
which is based on proposed security algorithm MPK
cryptosystem.
d)Backup Storage: The alternate storage used to
backup vote which is stored in back up device in
encrypted format by using public key-2 which is based
on proposed security algorithm MPK. This is used by
polling officer in case of damaged EVM.
this model pair of public keys are used for encryption
and private key is used for decryption.
The casted vote in EVM is encrypted with one of the
pair of public key PK and stored in EVM memory as
shown in Fig-4 and same vote is encrypted with public
key PK2 and stored in the EVM backup storage at
remote server as shown in fig-5. At the time of results
EVM votes are decrypted with private key of that EVM
given by polling official if voting machine is in normal
condition or in case of EVM failure votes are retrieved
from remote server by using private key of poll booth
officer.
e) Security Module:
This module provides
cryptographic primitives which provides security to
EVM vote at the time of storage in EVM or in
secondary storage back up device. This module is split
into two parts which encrypts vote at the time of storage
in EVM as well in backup storage. Decryption
mechanism allows to view the count of votes after
giving key by Poll booth officer or admin. MPK
algorithm [11][12] allows to store votes in encrypted
form in main memory and remote memory with two
public keys respectively.
6. WORKING OF PROPOSED EVM MODEL
Generally votes polled in EVM are stored in memories
which are part of the machine, which requires suitable
precautions to be taken at their preservation before
viewing results of referendum. Every EVM is given an
unique ID to identify machine and the polling both to
which it belongs. To view the results Polling official
will officiate to get the results if the EVM is secure in
its place without damage physically otherwise the entire
votes will be lost [8].
So in this proposed secured EVM model the EVM is
connected to remote server with a network connection
via communication mechanism, for vote storage at
remote server as backup similar mirroring the memory
of EVM. If EVM memories are hacked entire votes
may by modified, so to overcome this the proposed
model stores votes not only in memory of machine but
also in remote server in cryptic form by using MPK
cryptographic algorithm [12] with pairs of two keys. In
ISSN: 2231-5381
Fig: 4 Encrypted Votes in EVM Memory
The above secure EVM model is simulated as web
application which provides user with an interface to
vote for his choice, the vote polled is stored in memory
of web page and back up of votes is stored in database
server at remote place in encrypted form and the results
are shown when private key is given by poll officer.
http://www.ijettjournal.org
Page 139
International Journal of Engineering Trends and Technology (IJETT) – Volume 17 Number 3 – Nov 2014
Data base server linked with web server acts as backup
storage which accumulates the votes so that for any
problem with EVM, the votes can be extracted from the
storage and the results is published whenever required.
10. REFERENCES
[1] E-voting in DCC polls. In The Daily Star, Apr. 14, 2010.
http://www.thedailystar.net/newDesign/news-etails.php?nid=134325.
[2]
Security
Analysis
of
India’s
Electronic
Voting
Machines_NetIndia, (P) Ltd, Hyderabad y The University of
Michigan April 29, 2010.
[3] Election Commission of India. The Commission’s reply to Sh. V.
V.Rao.Mar.29,2010.http://eci.nic.in/eci_main/recent/reply__sh.VVRa
o.pdf.
[4]
Election
Commission
of
India.
Handbook
forreturningofficers.2009.http://eci.nic.in/eci_main/ElectoralLaws/Ha
ndBooks/Handbook_for_Returning_Officers.pdf.
Fig: 5 Encrypted Votes stored in Remote Server
7. ANALYSIS OF PROPOSED EVM MODEL
a) The proposed model is better designed to withstand
any security attacks on data is in storage.
b) Since EVM is an electronic device Votes stored
electronically can be lost due to various problems
related to electronic devices, and it is not possible to
recover, so the proposed EVM model which provides
back up of Votes can be recovered.
c) In the proposed EVM model since the votes are
encrypted it can be altered.
d) Proposed EVM stores data in remote server in
encrypted format it can be visible or modified by
ordinary users.
e) On transit of votes to remote server the proposed
EVM Votes are encrypted and transferred so man in
middle attacks can be avoided.
f) As in the new EVM model Votes are accessed only
by polling officer with his private key, system is
authenticated appropriately.
.[5] Election Commission of India. Information under RTI on EVMs.
July 2009. No. RTI/2009-EMS/39.
[6] Election Commission of India. Electronic voting machines–
Regarding. Aug. 8, 2009. No. PN/ECI/41/2009.
[7] A. K. Agarwala, D. T. Shahani, and P. V. Indiresan. Report of the
expert committee for evaluation of the upgraded electronic voting
machine(EVM).Sept.2006.http://www.scribd.com/doc/6794194/Expe
rt-Committee-Report-on-EVM, pages 2–20.
[8] Election Commission of India. Handbook for presiding officers.
2008.
http://eci.nic.in/eci_main/ElectoralLaws/HandBooks/Handbook_for_
Presiding_Officers.pdf.
[9] Stallings William, ―Cryptography and Network Security –
Principles and Practices, India Pearson Prentice Hall, 4th Edition.
[10]A. Menezes, P. van Oorschot, and S. anstone, Handbook of
applied cryptography, CRC press, 1996.
[11] Suresh K, Venkataramana.K, “Study of Analysis on RSA and its
Variants“,International Journal of Computer Science Research &
Technology (IJCSR),Vol. 1 Issue 4, September – 2013
[12] Sreedevi.M, Prof. M. Padmavathamma, “Multi-pair Public Key
Cryptosystem”, International Journal of Engineering Trends and
Technology (IJETT) – Volume 11 Number 3 - May 2014
8. CONCLUSION:
In this paper we discussed about the working style of
existing EVM model and various problems faced by
this model. This problems can be solved using the new
model of EVM which is based on cryptography
technique. Two types of key are used i.e. two public
keys and one private key for encrypting the vote and
decrypting, so no alterations can be done externally.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 140
Download