Access the full text.
Sign up today, get DeepDyve free for 14 days.
N. Kshetri, J. Voas (2018)
Blockchain-Enabled E-VotingIEEE Software, 35
(2020)
Blockchain-Based Secured E-Voting System to Remove the Opacity andEnsure the Clarity of Election of Developing Countries
Thompson Stephan, K. Joseph (2016)
Cognitive Radio Assisted OLSR Routing for Vehicular Sensor NetworksProcedia Computer Science, 89
Jian Shen, Chen Wang, Anxi Wang, S. Ji, Yan Zhang (2018)
A Searchable and Verifiable Data Protection Scheme for Scholarly Big DataIEEE Transactions on Emerging Topics in Computing, 9
Yuanpeng Xie, H. Wen, Bin Wu, Yixin Jiang, Jiaxiao Meng (2019)
A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud ComputingIEEE Transactions on Cloud Computing, 7
Jian Li, Xiaolong Li, Bin Yang, Xingming Sun (2015)
Segmentation-Based Image Copy-Move Forgery Detection SchemeIEEE Transactions on Information Forensics and Security, 10
Friorik Hjalmarsson, Gunnlaugur Hreioarsson, Mohammad Hamdaqa, G. Hjálmtýsson (2018)
Blockchain-Based E-Voting System2018 IEEE 11th International Conference on Cloud Computing (CLOUD)
Ruixuan Li, Chenglin Shen, Heng He, X. Gu, Zhiyong Xu, Chengzhong Xu (2018)
A Lightweight Secure Data Sharing Scheme for Mobile Cloud ComputingIEEE Transactions on Cloud Computing, 6
Jiawen Kang, Rong Yu, Xumin Huang, Sabita Maharjan, Yan Zhang, E. Hossain (2017)
Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium BlockchainsIEEE Transactions on Industrial Informatics, 13
Xianyi Chen, Sheng Chen, Yulei Wu (2017)
Coverless Information Hiding Method Based on the Chinese Character EncodingJournal of Internet Technology, 18
Yan Kong, Minjie Zhang, Dayong Ye (2017)
A belief propagation-based method for task allocation in open and dynamic cloud environmentsKnowl. Based Syst., 115
Jian Shen, Chen Wang, Anxi Wang, Xingming Sun, S. Moh, P. Hung (2017)
Organized topology based routing protocol in incompletely predictable ad-hoc networksComput. Commun., 99
A. Kiayias, T. Zacharias, Bingsheng Zhang (2017)
An Efficient E2E Verifiable E-voting System without Setup AssumptionsIEEE Security & Privacy, 15
S Nithinn M Nikhilesh Lalam (2020)
BEVS - Blockchain Based E-Voting SystemInt J Adv Sci Technol, 29
D. Chaum, Ronald Rivest, Alan Sherman (2013)
Advances in Cryptology: Proceedings Of Crypto 82
Zhaoqing Pan, Jianjun Lei, Yun Zhang, Xingming Sun, S. Kwong (2016)
Fast Motion Estimation Based on Content Property for Low-Complexity H.265/HEVC EncoderIEEE Transactions on Broadcasting, 62
(2017)
ZhiyongXu, and Cheng-ZhongXu, “a lightweight secure data sharing scheme for Mobile cloud computing”, DOI https://doi.org/10.1109/TCC.2017.2649685
Weifeng Zhong, Kan Xie, Yi Liu, Chao Yang, Shengli Xie (2018)
Auction Mechanisms for Energy Trading in Multi-Energy SystemsIEEE Transactions on Industrial Informatics, 14
M. Ullah, A. Umar, N. Amin, Nizamuddin (2013)
An efficient and secure mobile phone voting systemEighth International Conference on Digital Information Management (ICDIM 2013)
Jian Shen, Jun Shen, Xiaofeng Chen, Xinyi Huang, W. Susilo (2017)
An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud DataIEEE Transactions on Information Forensics and Security, 12
Lingling Xu, Yi Shen, H. Chan (2017)
Understanding Content Voting Based on Social Foraging TheoryIEEE Transactions on Engineering Management, 64
Tinghuai Ma, Yuliang Zhang, Jie Cao, Jian Shen, Meili Tang, Yuan Tian, A. Al-Dhelaan, Mznah Al-Rodhaan (2015)
KDVEM : a k-degree anonymity with vertex and edge modification algorithmComputing, 97
Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, W. Lou (2012)
New Algorithms for Secure Outsourcing of Modular ExponentiationsIEEE Transactions on Parallel and Distributed Systems, 25
Baowei Wang, Xiaodu Gu, Li Ma, Shuangshuang Yan (2017)
Temperature error correction based on BP neural network in meteorological wireless sensor networkInt. J. Sens. Networks, 23
Tinghuai Ma, Yuliang Zhang, Jie Cao, Jian Shen, Meili Tang, Yuan Tian, A. Al-Dhelaan, Mznah Al-Rodhaan (2015)
$$\varvec{\textit{KDVEM}}$$KDVEM: a $$k$$k-degree anonymity with vertex and edge modification algorithmComputing, 97
B. Shahzad, J. Crowcroft (2019)
Trustworthy Electronic Voting Using Adjusted Blockchain TechnologyIEEE Access, 7
Amna Qureshi, D. Megías, H. Rifà-Pous (2019)
SeVEP: Secure and Verifiable Electronic Polling SystemIEEE Access, 7
B Wang, X Gu, L Ma, S Yan (2017)
Temperature error correction based on bp neural network in meteorological wireless sensor networkInt J Sensor Netw, 23
Xuechao Yang, X. Yi, S. Nepal, A. Kelarev, F. Han (2018)
A Secure Verifiable Ranked Choice Online Voting System Based on Homomorphic EncryptionIEEE Access, 6
Seung Choi, A. Kiayias, T. Malkin (2011)
BiTR: Built-in Tamper Resilience
Shiyao Gao, Dong Zheng, Rui-Fang Guo, Chunming Jing, Chencheng Hu (2019)
An Anti-Quantum E-Voting Protocol in Blockchain With Audit FunctionIEEE Access, 7
Most of the various sectors in today’s life such as bank, transport, voting, health, electricity, etc., are currently digitalized. In our research paper, we have surveyed the voting system and explored the existing drawbacks of the voting system concerning security and malfunction. The demerits in the existing schemes include less data security, vote modification, man in the middle attack, masquerade attack, denial of service attack, impersonation attack, etc. Such attacks can compromise security and allows attackers to modify the results. To resolve the above-mentioned issues as well as the attacks, this research paper proposes a protocol to overcome security-based issues. In the proposed system, a secure online e-voting system is developed for end-to-end users to avoid misappropriation on the vote during the result publication in India or any other country. The proposed E-Voting Cloud System (ECS) system has three phases: The first phase is the registration phase, the second phase is vote polling, and the third phase is result announcements. In the proposed system, the election commission of India can search and verify the vote data through cloud computing. For a detailed description of our proposed protocol, a cube data storage structure and user differentiated system are first implemented. Based on the cube data structure and user differentiated system model, the proposed protocol helps to store voter data in the cloud with the encrypted model and ECS. Finally, the candidate can decrypt the data using their key. The people can verify the result announced by the ECS. The performance analysis clearly shows that our proposed system is highly secure when compared to the existing system. Using the proposed work, secure data transfer can be performed in an efficient way for online e-voting applications.
Peer-to-Peer Networking and Applications – Springer Journals
Published: Aug 7, 2020
Keywords: Digital India; E-voting; ECS; Cube data storage,end-to-end user
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.