What Is Online Voting? - School of Computing and Technology

advertisement
The School of Computing and Technology
Eastern Mediterranean University
Spring Semester Academic Year 2013 – 2014
ITEC 317
ONLINE VOTING
PRESENTED BY
AKINSANYA BLESSING
128593
TABLE OF CONTENT
I.
What is online voting?
II. What are the electronic systems?
III. Advantages Of Online Voting
IV.
Disadvantages of online voting
V.
Security threats of online voting
What Is Online Voting?
Online voting is a form of electronic voting and involves casting a ballot through
the internet. Normally this involves logging on to a website through any computer
with access to the internet, including your home PC. Votes are not stored in the
machine used to cast the vote, but on a central vote server that tallies votes at the
end of polling. However, online voting can also be conducted using voting kiosks.
These kiosks contain computers installed in public places for the purpose of online
voting, but are not supervised by electoral officials. Computers can also be
installed in the polling station to allow Online voting.
Online voting was first used for binding political elections in 2000 in the
U.S. in a pilot across several states targeting overseas voters. Since then, 13 more
countries have used Online voting. Two countires use Online voting nationwide
(Estonia and the United Arab Emirates); five use Online voting in some parts of
the country or for certain members of the electorate (Australia, Canada, France,
Mexico and Switzerland); two have ongoing pilots (India and Norway); three have
piloted Online voting and decided not to continue its use (Finland, the UK and the
U.S.); and two adopted Online voting, but decided to discontinue it (Netherlands
and Spain).
Countries that use Online voting tend to target specific categories of voters – for
example, expatriate voters, military personnel posted overseas, absent voters or
voters with disabilities.
Despite the Online playing an increasing role in the lives of people around
the world, there has been significant caution about the adoption of Online voting.
Some have argued that we trust the Online for banking transactions and to make
online purchases, so we should trust it to cast ballots. However, these online
transactions have a level of transparency, which means you can check they are
accurate. The need for ballot secrecy means transparency and auditability in Online
voting is difficult to implement.
This is illustrative of the biggest lesson we can learn about Online voting:
this system has much to offer, but it brings significant challenges that need to be
properly addressed if it is to positively impact the electoral process. The
auditability of the system is one of these challenges, and this inherent lack of
transparency has implications for the trust placed in the system.
PROPERTIES OF A SECURED ONLINE VOTING PROCESS
1. PRIVACY: there is no association between voter’s identification and a
marked ballot.
2. ELIGIBILITY: Only eligible voters are permitted to cast their ballots.
3. UNIQUENESS: No voter can cast his ballot more than once.
4. RECEIPT- FREENESS: A voter does not gain any information (a receipt)
which can be used to prove to a coercer that he or she voted in a certain way.
5. FAIRNESS: No partial result is available before the final result comes out.
6. VERIFIABILITY: Voters can verify that their ballots are counted correctly.
There are two types of verifiability; individual verifiability and universal
verifiability.
7. EFFICIENCY: The computations can be performed within a reasonable
amount of time.
What are the electronic systems?
In this section, theory related to existing voting systems is explained.
 Polling Place Internet Voting :Voting is done at any valid polling place by
using a computer under the physical control of election officials to cast a
ballot over the internet.
 Remote Kiosk Internet Voting is voting done at certain locations by using a
computer under the physical control of election officials to cast a ballot over
the interenet.
 Precint Internet voting: Voting that is identical to polling place internet
voting except that the voter can only vote at his or her own voting place.
 Remote Internet is voting by using a computer that is not under the physical
control of election officials.The ballot is cast over an internet connection
Online voting system by Cellphone/Smartphone
In the twenty first century, public acceptance of online voting has been promoted
by popular Television media shows such as Star Search (1980 to 1990s) and
various other variety shows. Most recently, American idol has shown a large
audience base. "There are multiple ways for you to vote for your next American
Idol: (1) Toll-free Number Voting; (2) AT&T Text Voting (SMS); (3) Online Voting
at www.AmericanIdol.com; and (4) the American Idol App Voting.The most
interesting fact is that smartphone and wireless devices provides an economic
solution to the expensive Paper ballot/mail in ballot system. In addition, most votes
are translated into an electronic format with both government identification of
identity, economic identification of identity and in addition geographical
verification of location.
ADVANTAGES OF ONLINE VOTING
Despite the challenges discussed, Online voting has a lot to offer. With increasing
levels of access to the Online, the most obvious benefit is the ease of access to the
voting process.No longer would people have to trudge down to schools, church or
community to vote now ould bad weather conditions hinder people from
voting.They can vote in the comfort of their homes, offices or visit a nearby
internet café. This is especially important in the context of declining turnout in
elections in many democracies around the world. By decreasing barriers to
participation, it is hoped Online voting can slow or reverse this decline. Voters
who are overseas, military personnel, emergency service personnel who work on
Election Day can vote from anywhere and be assured that their vote would be
counted. voters with disabilities can especially benefit from the increased access,
they can vote from their own homes without the stress of moving around. It might
also pull the hardest to reach group, those between the ages of 18 and 25 into the
political process. They have a tremendous amount of experience in surfing the net
and like the idea of new technologies. Online voting can also eliminate significant
logistical challenges associated with paper-based elections. The removal of these
logistical challenges can reduce the costs of holding elections, although new costs
will also arise.
DISADVANTAGES OF ELECTRONIC VOTING
(i)
Inequality problem: For those with low salary and cannot afford to
access the internet then it is a very big problem for them to vote. This is
known as digital divide.
(ii)
Vulnerable to security: Security issue is the main drawback of the
electronic voting system. The attack might be from the webpage, network
or even the extent of server’s database.
(iii)
Virus: Virus can be sent to destroy data from the server. Sever can be
easily protected from this virus by using some specific operating system.
(iv)
Hacking: Hackers are a big problem on the Online today.
(v)
Educational Ignorance: Some aged adults can not make use of the
computer or internet.
Security Threats of Online Voting
As all information systems, an online voting system is normally vulnerable to
computer attack. Although online voting system may improve our voting system
but the disadvantage or the threats of a security attack is really causing a setback
which is overweighing the advantages or benefits of using electronic voting. The
security problems are usually from the voter’s personal computers because that is
the weakest link and most voters don’t keep their personal computer well. Almost
everybody has experienced some kind of virus infection to their personal computer
which can be a link to destroy data used for election. I have listed some security
threats to talk about in this section.
a) Malicious payload: malicious payload is a security threat that affects the
personal computers of the voters. It is a software or configuration designed
to harm and it could be a virus, worm, Trojan horse, or a remote control
program which may be the biggest threat in voting. If malicious program is
installed on the system of the voters, it could change the vote secretly. The
owner of the system might be unaware of even having a malicious program
installed because this program might be difficult to detect because most of
the time, it run on a stealth mode. With today’s hardware and software
architectures, a malicious payload on a voting client can actually change the
voter's vote, without the voter or anyone else noticing, regardless of the kind
of encryption or voter authentication in place. For Example, Backorifice
2000 (BO2K) is packaged and distributed as a legitimate network
administration toolkit. In fact, it is very useful as a tool for enhancing
security. BO2K contains a remote control server that when installed on a
machine, enables a remote administrator (or attacker) to view and control
every aspect of that machine, as though the person were actually sitting at
the console. The open source nature of BO2K means that an attacker can
modify the code and recompile such that the program can evade detection
by security defense software (virus and intrusion detection) that look for
known signatures of programs. A signature is a pattern that identifies a
particular known malicious program. The current state of the art in widely
deployed systems for detecting malicious code does not go much beyond
comparing a program against a list of attack signatures. In fact, most
personal computers in peoples’ houses have no detection software on them.
BO2K is said to run in stealth mode because it was carefully designed to be
very difficult to detect. The program does not appear in the Task Menu of
running processes, and it was designed so that even an experienced
administrator would have a difficult time discovering that it was on a
computer. The program is difficult to detect even while it is running.
There can be no expectation that an average Online user participating in an
online election from home could have any hope of detecting the existence of
BO2K on his computer. At the same time, this program enables an attacker to
watch every aspect of the voting procedure, intercept any action of the user with
the potential of modifying it without the user’s knowledge, and to further install
any other program of the attackers desire, even ones written by the attacker, on the
voting user’s machine. The package also monitors every keystroke typed on the
machine and has an option to remotely lock the keyboard and mouse. It is difficult,
and most likely impossible, to conceive of a web application (or any other) that
could prevent an attacker who installs BO2K on a user’s machine from being able
to view and/or change a user’s vote.
(a) Delivery mechanism
The previous section gave an example of what an attacker could do to
disrupt an election if the attacker could install code of his choosing on peoples’
computers. This section deals with how this installation could happen.The first,
and most obvious mechanism is physical installation. Most people do not keep
their computers in a carefully controlled, locked environment. Imagine
someone who develops an application to attack the voting system, prepares a
floppy disk with the code on it, and then installs it on as many machines as
possible. This could be accomplished by breaking into houses, by accessing
machines in someone’s house when visiting, by installing the program on
public machines in the library, etc. at some point leading up to an election.
Then, malicious code can be delivered that can trigger any action at a later
date, enable future access (as in the case of BO2K), or disrupt normal
operation at any time. Considering that many of the attack programs that we
are seeing these days run in stealth mode, malicious code could be installed
such that average computer users cannot detect its presence.
While the physical delivery of malicious code is a serious problem, it is
nowhere near as effective as remote automated delivery. In most of the cases,
the attacks spread wider and faster than their creators ever imagined. One thing
that all of these attacks have in common is that they install some code on the
PCs that are infected. Any one of these e-mail viruses could deliver the attack
code described in the previous section.
The computers in most peoples’ houses are running operating systems with
tens of thousands of lines of code. These systems are known to be full of
operational bugs as well as security flaws. On top of these platforms, users are
typically running many applications with security problems. These security
flaws can be exploited remotely to install malicious code on them.
Perhaps the most likely candidate for delivering a widespread attack against an
election is an ActiveX control, downloaded automatically and unknowingly from
a Web server, which installs a Trojan horse (hidden program) that later interferes
with voting. Several documented attacks against Windows systems operated
exactly this way. In fact, any application that users are lured into downloading
can do the same. This includes browser plug-ins, screen savers, calendars, and
any other program that is obtained over the Online. Another danger is that the
application itself may be clean, but the installer might install a dynamically
linked library (DLL) or other malicious module, or overwrite operating system
modules. The number of ways is legion, and most users are not aware of the
dangers when they add software to their computers. As long as there are people
out there who download and install software over the Online onto today’s
personal computers running today’s operating systems, it will be easy for
attackers to deliver code that changes their votes, to peoples’ computers.
All of This is in sharp contrast to holding an election that allows people to cast
their votes from a computer full of insecure software that is under the direct control
of several dozen software and hardware vendors and run by users who download
programs from the Online, over a network that is known to be vulnerable to total
shutdown at any moment.
(b) Denial of service attack: Denial of service attacks are carried out by
automatically sending a flood of messages to a web site, a server, over a
channel or similar, to make it crash or decrease quality because it can’t
handle all the generated traffic. By using the distributed denial of service,
attackers can cause routers to crash or election server to be flooded. This can
be a significant threat to the Online voting if for instance the voting occurs on
a single day.
(c) Spoof sites: spoof sites are malicious web sites that are created to look like
legitimate web site, and in a voting scenario we understand that this could be
really bad, as the site could be used to launch phishing attacks to collect
voters credentials like a pin or a password needed to cast a vote. There are
several ways that an attacker could spoof a legitimate voting site. One way
could be to send email messages to users telling the users to click on a link
which would then bring up a fake voting site were the adversary could collect
the user’s credentials, steal the vote, and then use it differently. An attacker
could also set up a connection to the legitimate server and then feed the user
a fake web page, acting like the man in the middle, transferring and
controlling all the traffic between the user and the web server. By transferring
all the information between user and server, the user’s vote can be altered
before further sent to the server .
Given the above discussion, should countries move towards the adoption of
Online voting?
There are many challenges to be dealt with in implementing Online voting, but
also many benefits that could be achieved. There is no right or wrong answer as to
whether a country should adopt Online voting. The advantages and disadvantages
will need to be carefully weighed up, electoral stakeholders will need to be
consulted and the specific electoral environment assessed to determine whether
Online voting is appropriate and feasible. It is also very important for countries
which wish to adopt Online voting to conduct pilot projects to ensure that their
expectations of Online voting and their anticipated benefits can be achieved, and
the challenges can be properly dealt with.
Download