Professional Documents
Culture Documents
SSG Voting System Using Blockchain Protocol
SSG Voting System Using Blockchain Protocol
SSG Voting System Using Blockchain Protocol
JOSINE O. DALMAN
SHELAMAY A. DUMANDAN
GLENN MARK L. FLORES
MARIA J-ANNE S. RUIZ
DENISE C. SORRONDA
JUNE 2022
SSG Voting System Using Blockchain Protocol
A Thesis
Presented to the
Faculty of Computer Science Department
College of Computer Studies
Jose Rizal Memorial State University
Main Campus, Dapitan City
JOSINE O. DALMAN
SHELAMAY A. DUMANDAN
GLENN MARK L. FLORES
MARIA J-ANNE S. RUIZ
DENISE C. SORRONDA
JUNE 2022
Republic of the Philippines
JOSE RIZAL MEMORIAL STATE
UNIVERSITY
The Premier University in Zamboanga del Norte
Main Campus, Dapitan City
CERTIFICATION
This Thesis entitled “SSG Voting System Using Blockchain Protocol” has
been prepared and submitted by Josine O. Dalman, Shelamay A. Dumandan,
Glenn Mark L. Flores, Maria J-Anne S. Ruiz, and Denise C. Sorronda in partial
fulfillment of the requirements for the degree: Bachelor of Science in Computer
Science has been reviewed, checked, and verified by the undersigned as to
grammar, coherence, and organization.
ii
Republic of the Philippines
CERTIFICATION
This thesis entitled “SSG Voting System Using Blockchain Protocol” prepared
and submitted by Josine O. Dalman, Shelamay A. Dumandan, Glenn Mark L.
Flores, Maria J-Anne S. Ruiz, and Denise C. Sorronda has been examined and
is recommended for oral examination on May 24, 2022.
iii
Republic of the Philippines
Approved by the committee on ORAL EXAMINATION on May 24, 2022 with the
PANEL OF EXAMINERS with the rating of _______.
PANEL OF EXAMINERS
iv
Republic of the Philippines
v
SSG VOTING SYSTEM USING BLOCKCHAIN PROTOCOL
Abstract
Several studies have addressed privacy and security problems, but trust remains
emerging number of cyberattacks that happen every day requires a solution that
is more secure, however a centralized system is not enough. With this, the
being safe from manipulation and tampering makes it more trustworthy. The
research method used for this study are constructive and action research
methods. Findings of the study revealed that the SSG Voting System Using
vi
DEDICATION
This study is dedicated to the family of the researchers who have expressed their
unending support during the making of this research. The researchers are very
grateful to the Dalman Family, Dumandan Family, Flores Family, Ruiz Family,
and Sorronda Family for being present and fulfilling the needs of their children
This study is greatly dedicated to the highly respected Alma Mater of the
researchers, Jose Rizal Memorial State University, which have presented them
with quality education and knowledge. With this, the Academe have molded the
This study is also dedicated to the adviser, Prof. Armando T. Saguin Jr.,
and panel members namely: Prof. Ed Neil O. Maratas, Prof. John D. Sagapsapan,
Engr. Joseph Aurelius P. Jacinto, and Prof. Edgardo D. Olmoguez II, for showing
their support to the researchers. Their expert advices, lessons, and opinions have
tremendously helped the researchers in completing their study and making of the
system.
The researchers are filled with gratitude for the aid that they have received from
The Researchers
vii
ACKNOWLEDGEMENT
This whole experience would not have been possible without the
assistance and cooperation of the few people who have fulfilled their duties. The
researchers would like recognize and convey their heartfelt gratitude to the
To Armando T. Saguin Jr., the adviser, for dedicating his time and
and Edgardo D. Olmoguez II, for giving their useful ideas, comments, and
suggestions which aided the development of the system and the study;
To the Faculty and Staff of the Computer Science Department, for their
To the parents of the researchers, for showing their love and support to this
To their friends and classmates, for being great helping hands during the
Lastly, to the Almighty Father, who have bestowed the researchers His eternal
The Researchers
viii
TABLE OF CONTENTS
Page
Title i
Approval Sheet iv
Abstract v
Dedication vi
Acknowledgement vii
Chapters
Introduction 1
Theoretical/Conceptual Framework 4
ix
Significance of the Study 9
Definition of Terms 11
Related Literature 14
Foreign Studies 18
Local Studies 25
3 RESEARCH METHODOLOGY 29
Research Method 29
Research Environment 30
Data Gathering 32
Requirement Analysis 33
Class Diagram 38
Activity Diagram 39
Sequence Diagram 39
x
Evaluation Procedure 43
Research Instrument 44
Functionality 46
Reliability 47
Security 48
Coding 49
System Implementation 52
Calendar of Activities 52
RECOMMENDATION 63
Summary 63
Findings 64
Conclusion 65
Recommendation 66
BIBLIOGRAPHY 67
APPENDICES 72
xi
Appendix A – User’s Manual 73
xii
LIST OF TABLES
Tables Page
4 Calendar of Activities 53
5 Survey Results 54
in terms of Functionality 60
in terms of Reliability 61
in terms of Security 62
xiii
LIST OF FIGURES
Figures Page
1 Conceptual Framework 6
3 Hash Block 19
15 Class Diagram 38
16 Activity Diagram 39
17 Sequence Diagram 40
xiv
20 Formula for Weighted Mean 49
Blockchain protocol 58
xv
Chapter 1
Introduction
People used to save data on a floppy disc, eject it, walk over to the person
who required the data, and copy it onto their computer so they could utilize it back
in the day. The Internet and the birth of the World Wide Web introduced
technology that made data transport faster and drastically lowered information
exchange transaction costs. After ten years, Web 2.0, which offered social media
a trusted intermediary between two people who do not know or trust each other.
economy with a sophisticated content discovery and value settlement layer, they
also control all transaction rules and all user data. Today's Internet is largely
institutions' systems. Firewalls secure the data on these servers, and system
factor behind the next-generation Internet, called Web 3.0 (Voshmgir, 2020).
Blockchain refers to the fact that all participants in a peer-to-peer (P2P) network
are assured of the reliability of the same data by applying various consensus
algorithms (Roh, C.-H. & Lee, I.-Y., 2020). Blockchain operates through
cryptography. It provides a security level which is way better than any previously
the system, are stored in a block so that malicious activities cannot easily alter
the data.
considerable decrease from the same month the previous year in June 2021.
During the first quarter of the year, the number of cyberattacks in the country
On February 4, 2022, the Risk Based Security released the 2021 Year End
Data Breach Quick View Report revealing that 4,145 publicly disclosed breaches
had exposed over 22 billion records last 2021 (“Data Breach Report: 2021 Year
End”, 2022). According to Dhillon et al. (2020), fears of large-scale internet vote
rigging have slowed efforts toward change. Indeed, just a few countries use
online voting at all, and the majority of those that do use Electronic Voting
Machines (EVMs), which require voters to attend a polling station and produce
3
identity before voting on the EVM. EVMs provide a number of clear advantages.
countries like India and Brazil because of the high speed of counting. Many
mature democracies, on the other hand, have resisted internet voting due to
concerns about hacking and fraud. Some countries have actively stopped using
them like the Netherlands in 2005. However, EVMs and centralized internet
voting systems like Estonia's do not address one of the most pressing concerns
Due to its ability to operate without a third party and enable trust through
financial uses. For example, blockchain can serve as the platform for an inter-
blockchain, and smart contract processes cannot be tampered with (Six et al.,
2022). Because a vote is a little bit of high-value data, this type of system
its security possibilities. Through this study, the researchers hope to help people
overcome their fear of new technologies. This study suggests the use of the
through a voting system for the Supreme Student Government of Jose Rizal
Theoretical/Conceptual Framework
This study applies the network theory. Network theory, in computer science, is a
part of graph theory (Fleming, 2019) which was invented in the 18 th century by
Leonhard Euler.
Using the network theory in this study, each node is a vertex. An end user
the connections between the nodes (or vertices) of a network (or graph) is also
an edge (or link). The connections between nodes go in a direction wherein one
node connects to the other. A node, as seen in the figure below is a computer or
representing a flow of data which is entered by the end user into the system. The
transaction made could be, for example, a vote being casted during the election
and a block representing this transaction is created. The figure shows a network
5
graph of a node which has a relationship with another node. The nodes are being
node in the network for validation. Each node in the network has a copy of the
whole blockchain. The nodes are shown as vertices and the lines between these
This study uses the blockchain protocol. Blockchain is the distributed ledger
based on cryptographic proof in lieu of trust. This allows any two willing parties to
make transactions with each other without needing a third party. The privacy of
situation where some of the participating nodes are malicious or faulty and should
have two properties: 1) all honest nodes should terminate on the same value, and
administrator will input the information of the candidates who are part of the
election. The system will use public key cryptography to protect the voter’s
privacy. A voter makes a transaction when he submits his vote. A block is then
added to the blockchain. The votes accumulated in the blockchain are calculated
The first box contains the input requirements of the SSG Voting System
Smartphone which are the main components in order to make and access the
and/or use the web application. In the coding process the most important
requirement is the blockchain protocol which will be used for data security of the
SSG Voting System. The system also requires the administrator of the election to
The process box shows the iterative development model which will be
undergone in developing the system. The planning phase of the iterative cycle is
where software needs and other requirements are identified including the cost,
time, resources and other items. This phase will be performed again for the next
iteration to verify that the risks are mitigated and the quality is maintained. The
implementation stage, coding will begin, and it will be ensured that every
evaluated based on the result of its performance, functionality, security and other
criteria. If the code is incorrect or the software requires an upgrade, the second
iteration begins with the planning. After repetitive testing and evaluation, the
system is deployed. The third box in the figure contains the web application.
It is the final output which is the SSG Voting System using Blockchain Protocol.
The fourth element of the diagram is the feedback. The feedback part
helps in improving the software. Modifications to the input and process stage can
and respond to the feedback from the end users. Meeting end user needs is
crucial in adding value to the software and boosting the user’s satisfaction.
8
This study aims to design a web application, SSG Voting System using
Blockchain Protocol, for Jose Rizal Memorial State University, Main Campus,
1. What is the current status of the SSG voting system in JRMSU Main
Campus?
2. What are the processes involved in the SSG Voting System using
Blockchain Protocol?
3. What is the function of blockchain in the SSG Voting System and how is it
4. How can the SSG Voting System using Blockchain Protocol be assessed
in terms of:
4.1. Functionality;
4.3. Security?
JRMSU Main Campus is important because the findings of this study are
of blockchain.
enhanced security. This system also supports the integrity and privacy of the
University. This study will benefit the university because the findings of this
study will help in advancing the current SSG Voting System of JRMSU.
involved in conducting this research will be a good additional experience for the
researchers which may be useful once they go out of the university. This may
also benefit the future researchers who wish to conduct a study of the same
introduces a new approach to traditional voting which is usually done on pen and
paper. This presents the possibility of making a voting process that uses the
problems and issues faced in the current election process when it comes to
The voting system is primarily designed for the use of Supreme Student
11
create a voter account. The candidate’s information is also entered into the
system. The casting of votes is the phase wherein the voters select the candidate
of their choice for a specific position in the SSG. Through the gathered votes, the
The data in this research is not too big, thus, does not require devices or
machines that have huge memory. The blockchain in this study is not open for
public to join in. It is only available for the members of the SSG organization. The
Definition of Terms
the Internet, on a P2P network of computers that all run the protocol and hold an
techniques that allow only the sender and intended recipient of a message to
view its contents. It is closely associated with encryption, which is the act of
12
scrambling ordinary text into what's known as cyphertext and then back again
upon arrival.
which all the peers of the Blockchain network reach a common agreement about
the present state of the distributed ledger. In this way, consensus algorithms
achieve reliability in the Blockchain network and establish trust between unknown
makes sure that every new block that is added to the Blockchain is the one and
only version of the truth that is agreed upon by all the nodes in the Blockchain.
Data Security. Data security means protecting digital data, such as those
servers. The P2P protocol allows nodes to communicate with each other within
the network and transfer information about transactions and new blocks.
nodes ("peers") share resources amongst each other without the use of a
13
where individual clients request services and resources from centralized servers.
between failures.
system is used for an online election process that allows the university to
securely conduct the election and the votes. This system balances and supports
the security, accessibility, integrity and privacy of the voters during the event.
Using Blockchain Protocol is a web application for the election of SSG officers
transactions.
Chapter 2
overview of the sources you used while researching a specific topic and to show
your audiences how your research fits into a larger field of study.
In this chapter, the researchers used the Google scholar and other
resources to gather studies and literature that are relevant to the study, SSG
Voting System using Blockchain Protocol Data Security, for Jose Rizal Memorial
Related Literature
Ayyagari (2012) looked into 2633 different data breaches that resulted in the
loss of over 500 million records. The findings show that data breaches are still a
key challenge for many organizations. The findings suggest that the type of data
breaches caused by the "human element" are increasing. One concerning finding
of this research is that data breaches directly related to the implementation and
execution of security rules account for a significant portion. Overall, the findings
suggest that enterprises should provide effective training and tougher security
rules.
Sengupta et al. (2020) stated that the Internet of Things (IoT) is vulnerable
Things (IIoT), the security risks it poses have become even more serious.
15
Furthermore, Mohanta et al. (2019) claimed that the current centralized system
does not foster sufficient user trust. There are security and privacy concerns in
an Internet of Things (IoT) system. While some research has addressed security
and privacy concerns, there is still much work to be done before IoT is broadly
integrity, and confidentiality are some of the most basic security concerns in the
IoT system, they are not the only ones. One of the biggest difficulties in the IoT
among nodes, must be transparent in order for all users to trust each other. In
addressing the problem in trust determination, Angrish el at. (2018) stated that
David Shaum invented the world's first electronic voting system in the
early 1980s. To cast votes and keep voters anonymous, the system relied on
public key cryptography. The Blind Signature Theorem was employed to ensure
that there were no linkages between voters and ballots. Since the system's
extensive research has been conducted. The Direct Recording Electronic System
and Internet Voting Systems have received the most attention in this field. The
first method replaces paper ballot voting in polling booths, while the second
method is designed to be mobile and allows voters to vote from anywhere using
any device with an Internet connection. Obviously, it is convenient, and it has the
16
e-voting system, on the other hand, have always been a concern (Ayed, 2017).
system that stores results in the form of bit-coins and has several locations
blockchain technology was the signing and mining block. It can identify
eavesdropping and reduce the need for intervention. Because the eavesdroppers
require extra time to solve the mathematical equation in the mining process, they
are unable to alter the voting data. This technology has the potential to be
suitable for use in the real election system with a high secure factor.
based e-voting system has emerged as an important option for overcoming some
17
have been proposed as the next generation of modern electronic voting systems
incorporate sustainability data into voting systems. It ensures that all participants
that must be integrated into the blockchain and executed as scheduled in each
step of the blockchain update process. E-voting is another popular, yet critical,
topic in the realm of online services. The blockchain, combined with smart
Ethereum and its network are among the most suitable due to their consistency,
widespread use, and provision of smart contracts logic. An e-voting system must
privacy laws, such as the General Data Protection Regulation (Regulation [EU]
2016/679) (GDPR), which gives data subjects control over their personal data,
including how it is collected and stored, and requires those who collect and store
it to agree to hand over, correct, and delete it upon request. In reality, many of
18
sharing with participants how the blockchain works and utilizes personal data, as
well as how the exercise of an individual's rights would be handled given the
(Kamalpour,
2020).
Foreign Studies
secure solutions. A Blockchain resembles a data structure that stores and shares
all of the transactions that have occurred since its inception. It's basically a
and evolving list of data records that are protected from illegal manipulation,
'Block 0'. The genesis block is often hardcoded into software; it is unique in that it
does not include a reference to a prior block. When the genesis block is
initialized, 'Block 1' is produced and, when finished, is attached to the genesis
block. Each block has a transaction data component; copies of each transaction
are hashed, and then the hashes are paired and hashed again, and so on until
only one hash remains; this is known as a merkle root (Figure 3) (Barnes et al.,
2016).
19
preceding block's header. This implies that to change data, you'd have to change
both the transaction block and all subsequent blocks, as seen in Figure 4
system was
of past historic
verifiable audit
trail.
vote results can be readily altered if the data is not saved in a secure database,
Smart Contract was built using ReactJS as the front-end framework, NodeJS as
the back-end server, and Solidity as the Ethereum Smart Contract language.
secure voting mechanism. The application does not allow for any changes to the
vote results, which was its original aim. The application's code works well in real
life; all that is required are Smart Contracts on Mainnet and access to the
transcript information and/or diplomas was developed. It was stated that having
23
official record that cannot be modified while also being available publicly for
channels. It mentioned that creating and storing records in this manner ensures
that digital transcripts and diplomas cannot be altered in any way. Furthermore,
repudiation and a more secure platform for storing transcripts. As a result, if one
node in the blockchain network goes offline, the other nodes in the network will
persist and maintain accurate copies of the transcript ledger data. This also
eliminates the risk associated with a data center, especially in terms of disaster
to process and retrieve transcripts from three weeks to the same day the request
data security and recovery time. Our system is less vulnerable to malicious
2019).
25
system based on Hyperledger Fabric that handles safe drug supply chain
time-limited access to electronic drug data and electronic health information for
patients. In order to show the usability and efficiency of the planned platform, a
per second, transaction latency, and resource utilization. The ability of blockchain
Local Studies
difficult. This also demonstrates that the procedures of copying and verifying are
inversely proportional. This is the gap that this study is trying to address. This
mobile application, which allows students to get valid digital versions of their
solution for a shared database or 'ledger' in which several entities validate data
Bosri et al. (2019) tried to address the problem in the voting process in a
Technologies”. People in several nations are voting using digital technology (e.g.,
optical scan voting system, internet voting system, electronic voting system)
Digitalization alone could not totally resolve the difficulties because there are still
countless methods to mess with digital technologies and obstruct the voting
voting environment are solved through the architecture of the system and the use
of blockchain
28
Synthesis
advancement include security and trust between users (Sengupta et al., 2020;
Mohanta et al., 2019). Numerous data breaches have resulted in a big loss for
many cyberattacks and requires innovative methods to provide the necessary level
of security. Additionally, Mohanta et al. (2019) asserted that the current centralized
29
system does not foster enough user trust. The emergence of blockchain sought to
address these major concerns (Tas and Tanrıöver, 2020; Benny, 2020).
from illegal manipulation, tampering, and change (Mehboob et al., 2018), with
reduced human intervention (Fauzi et al.,) makes it more secure and trustworthy.
Protection Regulation, Kamalpour (2020) said that clearly disclosing with users
how the blockchain works and uses personal data, as well as how the exercise of
(Jamil, 2019), manufacturing (Angrish et al, 2018), education (Uhlig et al., 2019;
Arenas and Fernandez, 2018), and especially, in voting systems (Tran, 2021;
Bosri et al., 2019). The researchers want to explore this potential of blockchain
and implement it on a system through this study entitled “SSG Voting System
Using
Blockchain Protocol”.
Chapter 3
RESEARCH METHODOLOGY
Research Method
are two research methods used extensively in the creation or application of new
modules, tools, and techniques that have applicability well beyond the case study
and critical reflection (Koshy et al., 2011). Within the context of computing and
with its participatory and collaborative focus used as a driver for the interaction
31
between many disciplines along with the broad context of taking action on the
Research Environment
Figure 11 shows the map location of JRMSU-Main Campus. The Jose Rizal
9852. The University is divided into six (6) campuses, the main campus of which
Main Campus where the beneficiaries and respondents of the research study
and/or work. It is located at Gov. Guading Adaza St. Cruz, Dapitan City,
Zamboanga del Norte, Philippines. It has facilities like computer laboratories and
has skilled instructors who are knowledgeable in the field of science and
technology. With this, this institution keeps up with the needs of the students for
advancement in technology.
The system is designed for the use of the Supreme Students Government
(SSG) organization in Jose Rizal Memorial State University- Main Campus during
the election. The said organization is the highest governing body of the university
composed of student leaders who give voice to the students' thoughts and needs
The project development process used in this study is the Iterative Development
In 1995, the iterative process model was investigated. It was once thought
better software, faster, and with fewer flaws (Allan, 2019). It is a cyclical process.
After the initial planning is completed, the remaining processes for each iteration
are repeated with intensive testing in between until the ultimate deployment
stage is reached.
33
Data Gathering
To gather more information from the user, the researchers collect data
from the books, journals, internet resources and other existing researches or
studies related to blockchain and online voting system. The researchers also
retrieve information from the students of JRMSU- Main Campus who have used
voting system but without blockchain technology. The data are all combined to
come up with the overall idea relating to the creation of the system. The
necessary interpretation and analysis are done. The other quantitative data for
this research are obtained through the use of an online survey questionnaire
made with the use of Google forms and is circulated through the internet. The
questions devised by the researchers and tested using the appropriate tools.
34
The following are the equipment that researchers used to collect data:
interviews, surveys and web searching. The interviews and surveys provide
invaluable insight about the study conducted wherein the data is collected
firsthand from the students of Jose Rizal Memorial State University and other
personnel with knowledge regarding the topic. The web searching refers to the
act of browsing through the internet to find a wide range of information and
learning opportunities while also putting into consideration whether the online
source is a trusted website or not. Most of the journals and books cited in the
Requirements Analysis
After organizing the data, the researchers focused on the SSG Voting
requirements in order to evaluate all of the needs of the study and probable
store, retrieve, and process information. The minimum RAM is 4.0 GB and the
35
application is a Windows 10-64 bit, XAMPP for the server application, MySQL 8
for the database, PHP for the back-end, and for the front-end, HTML, CSS, and
JS are used. In the user-end, the user is required to use an internet browser
(Microsoft
Edge, Mozilla Firefox, Safari, or Google Chrome) to access the web application.
This chapter delves into the design process. It covered all of the primary
components of the study in order to elicit the users' engagement with all of the
implementation. During the design process, the researchers utilized all of the
needs and information obtained to create a representation that met its objectives.
metrics with their values and margins, patterns, algorithms, and heuristics are all
examples of design enablers. The need to structure the pieces that make up a
of why the new system was established, as well as what the new system is
The figure below represents the project system design of this research.
The administrator and the voter both have an access to the voting system
application, although the admin has a higher access level compared to the voter.
The arrows represent the flow of data. Every transaction made by the end-user of
the system, just like the casting of votes, is recorded in the blockchain. The
nodes are the servers or the computers in the network that decides, through a
block. The majority of the nodes, in this case are 3 out of 3 or 2 out of 3, must
agree that it is a valid transaction. The results from the election are then returned
dynamic diagram. Actors and use cases are used to model the functioning of a
system in use case diagrams. A set of tasks, services, and activities that the
system must do are referred to as use cases. The "actors" are persons or things
that perform certain functions within the system. In the use case diagram of the
system below, the actors are the Admin, Voter, Candidate and the Node which is
Class Diagram
their methods, and the connections between objects that are all covered. It is
called the class diagram. If two classes in a model need to interact, a link
Activity Diagram
Sequence Diagram
the order in which these interactions occur. A sequence diagram can also be
system components, are visually represented by the data flow diagram. The
figure below represents the DFD of this project. There are six data storages
entities within the system scope, as well as the inter-relationships among these
entities, are visualized using different symbols and connectors in an ERD. The
term "relationship" refers to how various things interact inside the system.
The figure below shows the ERD of this project. The voter entity has a
oneto-one relationship with the Ballot Transaction or simply Ballot entity because
a voter in our proposed system will only have one chance to submit a filled ballot.
The Block entity has a one-to-many relationship with the Ballot, Voter, and
Candidate entities because a block can contain many transactions. On the other
hand, the Block entity has a many-to-one relationship with the Tally Result entity
because many Blocks are required in order to come up with the election results.
The Candidate entity has a many-to-one relationship with the Result entity
because the list of candidates is all tallied in the overall report with their
corresponding accumulated vote points. The same relationship with the Ballot
The administrative entity is tasked to input the Candidate values into the
system, but has no direct identified relationship, thus, not reflected on the ERD.
44
Evaluation Procedure
(30) respondents and is classified into four (4) groups of evaluators. The first
Campus, Dapitan City, and the second group comprised of SSG COMELEC
Officers of the same campus. The third group comprised the SSG Officers of the
JRMSU- Main Campus. The last group is composed of normal students who take
assess the functionality and capability of the system. Various factors which
influence the software are termed as software quality factors. The following
45
Research Instrument
organized inquiry that your target audience completes via the internet, usually by
filling out a form, is known as an online survey. There are two (2) instruments
used in this study. The first survey questionnaire is for the purpose of collecting
data from the respondents regarding the current state of the current online SSG
voting application. The second set is the evaluation form used to assess the
Cronbach's Alpha formula was used to assess the instrument's reliability. Lee
consistency specifies the amount to which all of the items in a test measure the
ensure validity, internal consistency should be confirmed before a test is used for
study or examination.
46
Fraenkel and Wallen argue that it should be at least 0.70, while Edward and
In the test, the first survey questionnaire had a Cronbach Alpha value of
0.88, while the second instrument used for evaluation had a 0.82 Cronbach
Alpha value which are both considered a good level of internal consistency and
The respondents of the study are those who have been invited to take part
in research and have actually done so. Both qualitative and quantitative
instructors, five JRMSU SSG Commission on Election officers, five SSG officers,
and 15 students from different colleges. These people are identified as crucial for
the study because they have direct experience in the voting process of the SSG
elections. The percentages of the respondents are shown in the table below.
There are two sections to the instrument that is used to collect data for the
study. The first section is based on research. The second section is based on the
pick people from the public to participate in their surveys based on their own
The weighted mean was used to measure the effectiveness of the SSG
security. It uses Likert's 5-point scale which shows the following range of values.
Functionality
by a set of attributes. The functions are those that fulfill a set of users, either
48
collection of inputs, behavior, and outputs are used to describe the function.
Mean
system responds to the inquiry of the end-user and it satisfies the end-
user.
system responds inquiry of the end-user but it does not satisfy the
end-user.
end-user.
Reliability
49
specified conditions at any time—with a lengthy mean time between failures. The
Mean
entry of information.
1.81-2.60 Less Reliable – System generates data but contains 10% error
Security
Mean
4.21-5.0 Highly secure – The respondents are fully confident that the
3.41-4.20 Much Secure – The respondents are confident that the system is
1.00-1.80 Not secure – The respondents think that the system is not
The formula for the weighted mean is used to measure the functionality,
reliability, and security of the SSG Voting System Using Blockchain Protocol.
Coding
program and instructions, thus, data will be translated into computer commands
and instructions that will run as system software of the proposed study after the
analysis in finding algorithms that will suit the need of the current problem.
51
52
Figure 21. Block Class using PHP Software Testing and Procedure
While making the system, the testing method adopted is pilot running
wherein the system is implemented first for only a small group of users to test
and assess until in time the ― SSG Voting System Using Blockchain Protocol is
Traditional voting processes are simple, but new technologies are now available
in our time, so proponents will introduce each of the observers to the fact that
5. After checking the study, the researchers will conduct an evaluation of the
system software.
will use the five-point Likert scale and a range of scores. Each respondent will be
asked to rate the study according to the criteria created by the researchers.
This research may be completed with the use of tests and evaluations.
The researchers know that no program can be adopted without first conducting a
thorough study, testing, and evaluation. The procedure can assist researchers in
achieving their objectives for the precise outcome. Each respondent will give the
System Implementation
system. The term ‘pilot’ means 'to test or trial before introducing something more
widely'. When a new system is implemented for only a small number of users to
test and assess, it is known as pilot running. The new system is made available
to all users once it has been thoroughly tested and determined to be functional.
Calendar of Activities
Table 4 reflects the activities involved in making the study, including the
time frame for each activity. The researchers started the data gathering phase
from April 12 until June 6. Data gathering is continuous despite what phase. The
analysis of the requirements started on the same day they gathered data and
paused in the 29th of May. The designing stage was done during the whole month
of December and continued until the 2nd week of May. The coding stage started
on Mar 1 until May 20th, testing was started on the month of May, and the
implementation phase was after the coding phase. Documentation was done all
1. Data Gathering
2. Requirement Analysis
3. Designing
5. Coding
6. Implementation
7. Documentation
Chapter 4
the specific problem in the study SSG Voting System using Blockchain Protocol.
Problem 1: What is the current status of the SSG voting system in JRMSU Main
Campus?
current web application developed for this purpose. The students can access the
site through a web browser by using their Smartphone, laptop, desktop, or tablet.
The first time this has been used was in 2021. There have been no known
records of complaints from candidates during the election period since then. The
respondents. Statement no. 1, “The online voting system can be accessible using
6, 7, 8, 9, 10 had the same mean of 2.0 or agree. Statement 4 is the only one in
the instrument that acquired a mean of 3 which means neither agree nor agree.
The statement no. 4 states that the “The current voting system can identify
In the current SSG voting application, the student voters are given a link
directing to the website, they then click the PROCEED button under VOTE
ONLINE. They will sign in their already registered account using their ID number
and default passwords. Once signed in, they can now select their desired
candidates in different positions and click PROCEED. It will show all candidates
that were selected for review, after that click SUBMIT to cast the vote. The
students can only vote once. The results are shown in real time.
Problem 2: What are the processes involved in the SSG Voting System using
Blockchain Protocol?
A. Registration of voter
1. Sign up
3. Click register.
B. Registration of candidates
the system
3. Save.
57
C. Casting of Votes
D. Updating of information
2. Update information
3. Save changes
● The design is composed of Homepage, Profile, Cast Your Vote, and Election
Results.
● The first page shows the field where users log in their ID and password.
● The Home section is where the user finds the Profile, Cast Your Vote, and
● The Cast Your Vote tab is the page where the user can select the candidate
of their choice.
● Election Results tab displays the counts of the votes casted and the percent
● The first page shows the field where users log in their ID and password.
58
● The Homepage section is where the admin finds the Profile, Voters,
● The Voters and Candidates tabs show the registered voter and candidates.
● Election Results tab displays the counts of the votes casted and the percent
Problem 3. What is the function of blockchain in the SSG Voting System and how
of the SSG voting system. It keeps the records of transactions from being altered,
Every block in the chain contains a set of transactions, a ballot in the case of the
voting system where all the selected candidate of the user is being recorded. The
first hash is calculated for the first block or the genesis block using the
transactions inside that block. This serves as the digital signature of that block.
For every block that is generated, it has a copy of the hash of the previous block
as well as the transactions, to indicate the current block hash. This guarantees
that no ballot in history can be tampered, since every time a part of the ballot
changes, the hash changes. The identity of the voter is also protected because of
the encryption. A voter makes a transaction when he submits his vote. A block is
then proposed to the network to check for validity. Once a block is confirmed, it is
Figure 23. Transaction Flowchart of the SSG Voting System Using Blockchain
protocol
60
Problem 4. How does the SSG Voting System using Blockchain Protocol be
five SSG officers, and 15 students from different colleges. They were considered
system was quick and easy to use. The simplicity of understanding and providing
reliable information were used to determine reliability. Finally, this system was
proved to be secure.
The findings that proved the functionality, reliability and security of the SSG
Voting System using Blockchain Protocol are shown on the tables found in the
proceeding page.
instructors, five JRMSU SSG Commission on Election officers, five SSG officers,
questionnaires. The testing was done individually. Each respondent rated the
The requirement for the project, SSG Voting System using Blockchain
A. Functionality
The Table 6 above reveal the rating of the respondents on the proposed
system in terms of functionality. The criterion, “The intended use of the software
procedure” criterion has a mean of 3.95 or functional; “It meets the needs of the
end user” criterion acquired the mean of 4.25 or highly functional; and the last
criterion which is “It has the capacity of storing data” is functional, obtaining 4.15
as its mean. The average weighted mean of all the criteria is 4.10 which means
that the system is functional. This means that the processing takes approximately
ten seconds, the system responds to the inquiry of the end user, and it satisfies
the end user. It means that the software performs accordingly to the desired
B. Reliability
The table below exhibits the reliability of the system. The criterion “It is lenient to
the input of end users” obtains the mean of 3.85 or reliable; “The output is clear and
62
understandable to the end users” earns 4.30 or highly reliable; “The system is
complete” criterion acquired a 3.70 mean which means that it is reliable; and the
last criterion, “The information provided by the system is accurate” has a mean of
4.25 or highly reliable. The average mean is 4.03 which means the system is
reliable. This means that the system generates data but contains 4% error on the
entry of information.
C. Security
“Voter ballot secrecy” acquired 4.00 mean which means that it is secured;
mean or highly secured; the last criterion, “Use of blockchain protocol” has a
weighted mean 4.50 or highly secured. The average mean is 4.23 which means
63
the system is highly secured. Highly secured indicates that the respondents are
fully confident that the system is working property and is highly secured.
functional with the average means of 4.10 of its functionality, reliability is reliable
with the average of 4.03, Security which is highly secured with the average mean
of 4.23.
The total average mean is 4.18 which means that the system is acceptable.
This chapter presents the summary and conclusions of the study. It also
covers the presentation of findings out from the data treated and the conclusions
Summary
In this chapter, the researchers sought to study “SSG Voting System using
Blockchain Protocol” and the sub problems in the statement of the problem. This
1. What is the current status of the SSG voting system in JRMSU Main
Campus?
2. What are the processes involved in the SSG Voting System using
Blockchain Protocol?
3. What is the function of blockchain in the SSG Voting System and how
employing analysis from the data gathered from the evaluation sheet. It is
66
carefully examined and analyzed in order to produce the desired result and
Findings
After all the necessary data of the study were treated accordingly, the
1. The researchers found out that the current online SSG voting system in
the respondents.
updating information.
blockchain.
evaluate it.
reliable. This means that the system generates data but contains
highly secured.
4.18 which indicated that the SSG Voting System using Blockchain
Conclusion
blockchain by using the SSG voting system as the model application, and it was
indeed realized. Based on the analysis of the system, the researchers concluded
that the end users and the election administrators will both benefit in building
mutual trust in the election process. The overall findings obtained from the
overall mean average rating of the software quality factor revealed that the SSG
voting system that uses blockchain protocol data security was acceptable to be
used.
Recommendation
The researchers would like to recommend the use of the SSG Voting System
and also opening such opportunities on how to make the election process more
secure and effective. Future researchers may integrate blockchain not only in a
voting system but also in other organization processes that they may find
blockchain useful.
BIBLIOGRAPHY
Ahmad, J., Hassan, A., & Abiddin, N. Z. (2008). Developing, Validity And
Undergoing
Research, 1(5).
Beginners https://www.goodcore.co.uk/blog/iterative-development/
Angrish, A., Craver, B., Hasan, M., & Starly, B. (2018). A case study for
network of
6). IEEE.
01-09.
70
Barnes, A., Brake, C., & Perry, T. (2016). Digital Voting with the use of
Blockchain
3648870.
Biais, B., Bisière, C., Bouvard, M., & Casamatta, C. (2019, May). Blockchains,
coordination, and forks. In AEA papers and proceedings (Vol. 109, pp.
8892).
Bosri, R., Uzzal, A. R., Al Omar, A., Hasan, A. T., & Bhuiyan, M. Z. A. (2019,
https://www.riskbasedsecurity.com/2022/02/04/data-breach-report-
2021year-end/
Dhillon, A. et al. (2020, September). Long Read: How blockchain can make
25/long- read-how-blockchain-can-make-electronic-voting-more-secure/
Khorezm,
423. https://doi.org/10.1080/1389224X.2012.691785
Fauzi, Ilham; Wardhani, Rini Wisnu; Muhasyah, Surano; Delina, Mutia (2019).
doi:10.1063/1.5132673
network-theory/
Jamil, F., Hang, L., Kim, K., & Kim, D. (2019). A novel medical blockchain model
https://www.ashurst.com/en/news-and-insights/insights/cityam-
talkinglegal---privacy-laws-and-blockchain/
Koshy, E., Koshy, V., & Waterman, H. 2011. Action Research in Healthcare.
72
http://dx.doi.org/10.4135/9781446288696.n1
Fraud
Retrieve https://timreview.ca/article/1174
Mehboob, Kashif & Arshad, Junaid & Khan, Muhammad. (2018). Secure Digital
Mohanta, Bhabendu & Panda, Soumyashree & Satapathy, Utkalika & Jena,
10.1109/ICCCNT45670.2019.8944797.\
Qayyum, A., Qadir, J., Janjua, M. U., & Sher, F. (2019). Using blockchain to rein
in the new post-truth world and check the spread of fake news. IT
Roh, C. H., & Lee, I. Y. (2020). A study on electronic voting system using private
Sengupta, J., Ruj, S., & Bit, S. D. (2020). A comprehensive survey on attacks,
security issues and blockchain solutions for IoT and IIoT. Journal of
Singh, A., & Chatterjee, K. (2018). Secevs: Secure electronic voting system using
Six, N., Herbaut, N., & Salinesi, C. (2022). Blockchain software patterns for the
Uhlig, R. P., Yonts, R., Cashman, B. W., Clark, R. S., & Nieman, B. (2019, April).
Voshmgir, S. (2020). Token Economy: How the Web3 reinvents the Internet (Vol.
APPENDICES
APPENDIX A
User’s Manual
76
Voter’s View
75
77
Administrator’s View
78
79
APPENDIX B
Source Code
80
81
82
83
84
85
86
87
88
89
90
91
92
APPENDIX C
Letter to the Panelists
94
Sir:
We, the undersigned, are 4th year students of Bachelor of Science in
Computer Science who will have our Thesis Final defense entitled “SSG Voting
System Using Blockchain Protocol”. This is in fulfillment of the requirements of
the subject Thesis 2.
We would like to request your presence as one of the panelist on May 24, 2022,
which will be done online via Google Meet.
We are hoping for your kind response on this request.
Respectfully yours,
Josine O. Dalman
Shelamay A. Dumandan
Denise C. Sorronda
Approved:
ARMANDO T. SAGUIN JR., MSIT
Instructor/Adviser
95
Respectfully yours,
Josine O. Dalman
Shelamay A. Dumandan
Denise C. Sorronda
Approved:
ARMANDO T. SAGUIN JR., MSIT
Instructor/Adviser
96
Respectfully yours,
Josine O. Dalman
Shelamay A. Dumandan
Denise C. Sorronda
Approved:
ARMANDO T. SAGUIN JR., MSIT
Instructor/Adviser
Republic of the Philippines
JOSE RIZAL MEMORIAL STATE UNIVERSITY
The Premier University in Zamboanga del Norte
Main Campus, Dapitan City
May 24, 2022
Prof. JOHN D. SAGAPSAPAN
Computer Science Department
Jose Rizal Memorial State University
Sir:
We, the undersigned, are 4th year students of Bachelor of Science in
Computer Science who will have our Thesis Final defense entitled “SSG Voting
System Using Blockchain Protocol”. This is in fulfillment of the requirements
of the subject Thesis 2.
We would like to request your presence as one of the panelist on May 24, 2022,
which will be done online via Google Meet.
We are hoping for your kind response on this request.
Respectfully yours,
Josine O. Dalman
Shelamay A. Dumandan
Denise C. Sorronda
Approved:
ARMANDO T. SAGUIN JR., MSIT
Instructor/Adviser
98
APPENDIX D
Letter to the Respondents
99
Dear Respondents,
The undersigned are gathering data for their thesis entitled “SSG Voting
System Using Blockchain Protocol”. We humbly ask you to evaluate the
questionnaire with sincerity and honesty.
Your cooperation is appreciated and will have a great impact in their study.
Thank you very much.
Josine O. Dalman
Shelamay A. Dumandan
Glenn Mark L. Flores
Noted by:
Name (Optional):
Program enrolled in JRMSU Main Campus (Example: BSCS) :
Respondent type (check one):
o Student
o JRMSU Main SSG Officer (currently or previously)
o JRMSU Main COMELEC Officer (currently or previously)
o Instructor
What is the status of the current online SSG voting application in JRMSU (Main
Campus)?
Please put a check.
1 2 3 4 5
Strongly Agree Neither Disagree Strongly
Agree agree nor Disagree
disagree
The online voting system can
be accessible using different
devices.
The system shows real-time
results.
The voting system is
userfriendly.
The current voting system
can identify tampering and
manipulation of votes/results.
Compliance to end-
user needs
Software's data
storage
B. RELIABILITY
C. SECURITY
105
Identification of
tampering and
manipulation of
votes/results
Use of the
blockchain protocol
APPENDIX F
Curriculum Vitae
107
Josine O. Dalman
Jose Carreon Street, Dawo, Dapitan City,
Zamboanga del Norte, 7101
09984308620
dalmanjohseeen@gmail.com
PERSONAL INFORMATION
Nickname: Sine-sine Mother’s Name: Cynthia O. Dalman
Age: 22 Occupation: Government Employee
Gender: Female Father’s Name: Joseph Verd P. Dalman
Date of Birth: June 19, 2000 Occupation: Government Employee
Place of Birth: Dapitan City Religion: Roman Catholic
Civil Status: Single Dialect: Cebuano
Citizenship: Filipino Languages Spoken: English and Filipino
EDUCATION
2018 – Present Jose Rizal Memorial State University, Main Campus
Bachelor of Science in Computer Science
Sta. Cruz, Dapitan City, Zamboanga del Norte
2012 – 2018 Rizal Memorial Institute of Dapitan City, Inc.
High School
Potol, Dapitan City, Zamboanga del Norte
2006 – 2012 Dapitan City Central School
Elementary
Justice F. Saguin St., Dapitan City, Zamboanga
del Norte
TRAININGS/SEMINARS ATTENDED
System Wide Leadership Training, 2019
Royal Farm, Gulayon
Role of Machine Learning Application, 2021
Dr. M.G.R Educational and Research Institute, India
IOT Fundamentals: The Beginners Guide to Internet of Things, 2021
Cavite State University (Virtual Seminar)
Build your Brand with Digital Marketing Planning, 2021
Google
Grow your Business with Tools from Google, 2021
Google
108
Shelamay A. Dumandan
De Venta Perla, Polanco,
Zamboanga del Norte
09153578466
shelamaydu@gmail.com
PERSONAL INFORMATION
Nickname: Lalang Mother’s Name: Lilia A. Dumandan
Age: 21 Occupation: Housewife
Gender: Female Father’s Name: Mateo A. Dumandan
Date of Birth: May 24, 2000 Occupation: Deceased
Place of Birth: Dapitan City Religion: Roman Catholic
Civil Status: Single Dialect: Kalibugan
Citizenship: Filipino Languages Spoken: English and Filipino
EDUCATION
2018 – Present Jose Rizal Memorial State University, Main Campus
Bachelor of Science in Computer Science
Sta. Cruz, Dapitan City, Zamboanga del Norte
2016-2018 Sergio Osmena National Highschool
Senior High school
Sergio Osmena
2012 – 2016 Dilawa National High School
Junior High School
Dilawa, Pinan, Zamboanga del Norte
2006 – 2012 De Venta Perla Elemtary School
Elementary
Justice F. Saguin St., Dapitan City,
De Venta Perla, Zamboanga del Norte
TRAININGS/SEMINARS ATTENDED
Introduction to Fire Protection Part 2: Fire Detection and Alarm
System (2021)
Webinar on Role of Machine Learning Application Today and
Tomorrow (2021)
PERSONAL INFORMATION
Nickname: Glenn Mother’s Name: Flordeliz L. Flores
Age: 26 Occupation: Government Employee
Gender: Male Father’s Name: Glenn M. Flores
Date of Birth: Sept. 08, 1995 Occupation: Business Man
Place of Birth: Dipolog City Religion: Born-Again
Civil Status: Single Dialect: Cebuano
Citizenship: Filipino Languages Spoken: English and Filipino
EDUCATION
2016 – Present Jose Rizal Memorial State University, Main Campus
Bachelor of Science in Computer Science
Sta. Cruz, Dapitan City, Zamboanga del Norte
2008 – 2012 Zamboanga del Norte National High School, Turno
Campus
High School
Turno, Dipolog, Zamboanga del Norte
2002 – 2008 Dipolog Pilot Demonstration School
Elementary
Central, Dipolog City
TRAININGS/SEMINARS ATTENDED
Web Application Penetration Testing, 2019
Udemy
Build and Operate Containers Apps with AWS Copilot, 2021
AWS
Program, Unite, Survive in Information Technology, 2021
Exceed
#HACK2021 Hackathon, 2021
Indigitous
Chaos Engineering, 2021
AWS
A Day In A Life of A Code, 2021 - AWS
110
PERSONAL INFORMATION
EDUCATION
Senior Highschool
Junior Highschool
Elementary
TRAININGS/SEMINARS ATTENDED
System (2021)
Tomorrow (2021)
Denise C. Sorronda
Purok Parpagayo, Minaog, Dipolog City ,
Zamboanga del Norte, 7100
09187498616
denisesorronda@gmail.com
PERSONAL INFORMATION
Nickname: Denden Mother’s Name: Rebecca S. Catolico
Age: 22 Occupation: Housewife
Gender: Female Father’s Name: Dennis M. Sorronda
Date of Birth: November 10, 1999 Occupation: Driver
Place of Birth: Dapitan City Religion: Roman Catholic
Civil Status: Single Dialect: Cebuano
Citizenship: Filipino Languages Spoken: English and Filipino
EDUCATION
2018 – Present Jose Rizal Memorial State University, Main Campus
Bachelor of Science in Computer Science
Sta. Cruz, Dapitan City, Zamboanga del Norte
2016 – 2018 Dipolog City National Highschool
Senior Highschool
Barra, Dipolog City
2012 – 2016 Sicayab National Highschool
Junior High School
Sicayab, Dipolog City
2006 – 2012 Minaog Elementary School
Elementary
Minaog, Dipolog City
TRAININGS/SEMINARS ATTENDED
Introduction to Fire Protection Part 2: Fire Detection and Alarm
System (2021)
Webinar on Role of Machine Learning Application Today and
Tomorrow (2021)
DOST-TAPI Invent School Program Webinar-Workshop (2021)
IOT Fundamentals: The Beginner's Guide to Internet of Things (2021)
Blockchain Technology: Future Of Global E-Conomy (2021)