Professional Documents
Culture Documents
Electronic Voting and Face Recognition Using Blockchain Technology
Electronic Voting and Face Recognition Using Blockchain Technology
ABSTRACT
There stay challenges to attain wide unfold I. INTRODUCTION
adoption of such systems particularly with The electronic balloting has emerged over time as a
relation to rising their resilience against potential replacement to the paper-based balloting to scale
faults. Distributed ledger technologies is associate back the redundancies and inconsistencies.
degree exciting technological advancement within Furthermore, it's significantly appropriate for the
the info technology world. Blockchain disabled folks. It's within the block-chain technology
technologies provide associate degree infinite vary that is extremely a lot of secure. It's effective of the
of applications cashing in on sharing economies. polling method, hashing algorithms' utility, block
This paper aims to judge the applying of creation and waterproofing, knowledge
blockchain as service to implement distributed accumulation, and result declaration by victimization
electronic vote systems. The paper elicitates the the adjustable blockchain methodology. The thought
wants of building electronic vote systems and of block creation and block waterproofing is
identifies the legal and technological limitations of introduced during this paper. The introduction of a
exploitation blockchain as a service for realizing block waterproofing thought helps in creating the
such systems. The project starts by exploitation blockchain adjustable to fulfill the necessity of the
the popular blockchain frameworks that supply polling method. The utilization of pool blockchain is
blockchain as a service. We tend to then propose a usually recommended, that ensures that the
unique electronic legal system supported blockchain is in hand by an organization (e.g.,
blockchain that addresses all limitations we tend election commission), and no unauthorized access is
to discovered. A lot of usually this paper evaluates made of outside. The framework projected during
the potential of distributed ledger technologies this paper discusses the effectiveness of the polling
through the outline of a case study, specifically the method, hashing algorithm's utility, block creation
method of associate degree election and and waterproofing, knowledge accumulation, and
implementing a blockchain-based application that result declaration by victimization the adjustable
improves the safety and reduces the price of blockchain methodology.
hosting a nationwide election.
International Journal of Advanced Information Science and Technology (IJAIST) ISSN: 2319:2682
Vol.10, Issue No.7, July 2021
9
International Journal of Advanced Information Science and Technology (IJAIST) ISSN: 2319:2682
Vol.10, Issue No.7, July 2021
III. METHODOLOGY
HARDWARE REQUIREMENTS
• Processor : Dual core processor 2.6.0 GHZ
• RAM : 1GB
• Hard disk : 160 GB
• Compact Disk : 650 Mb
• Keyboard : Standard keyboard
• Monitor : 15 inch color monitor
SOFTWARE REQUIREMENTS
• Operating system: Linux/Windows
• Tool :NPM
• Framework: Bootstrap
• Database : MySQL
10
International Journal of Advanced Information Science and Technology (IJAIST) ISSN: 2319:2682
Vol.10, Issue No.7, July 2021
11
International Journal of Advanced Information Science and Technology (IJAIST) ISSN: 2319:2682
Vol.10, Issue No.7, July 2021
voters. The privacy of the voters is very important for thereby affecting all votes cast on the aforementioned
the fair election. To develop a voting system which machine.As we have finished this Electronic Voting
can also be use by disabled person. The aim to is the and face recognition based using Blockchain
develop a solution that is very easy to use at the same Technology. The drawback is that it use less
time very sercure. To get rid of drawback of biometrics. This Electronic Voting based Blockchain
electronic voting machines have been viewed as technology will provide the fair election which is
flawed, by the security community, primarily based easy to use by every one.
on physical security concerns. Anyone with physical
access to such machine can sabotage the machine,
REFERENCES
12