Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 12

SECURE AND TRANSPARENT ONLINE VOTING SYSTEM

PROJECT PROPOSAL

Submitted by

AAA (0773/13)

BBB (0625/13)

CCC (0410/13)

IV B.SC Information Technology

Under the Guidance of

Mrs. Deivanai Gurusamy

in partial fulfilment for the award of the degree

of

BACHELOR OF SCIENCE

in

INFORMATION TECHNOLOGY

BULE HORA UNIVERSITY

BULE HORA, ETHIOPIA

NOVEMBER 2018
TABLE OF CONTENTS

S. NO. TITLE PAGE NO.

ABSTRACT

1 INTRODUCTION

2 BACKGROUND OF THE PROJECT

3 PROBLEM STATEMENT

4 PROPOSED SYSTEM

OBJECTIVES

5 5.1 GENERAL OBJECTIVE

5.2. SPECIFIC OBJECTIVE

6 SIGNIFICANCE OF THE PROJECT

7 BENEFICIARY GROUP OF THE PROJECT

8 SCOPE OF THE PROJECT

9 LIMITATIONS AND CONSTRAINTS (IF ANY)

10 METHODOLOGY
10.1.DATA COLLECTION METHOD
10.2. DEVELOPMENT AND ANALYSIS METHODOLOGY
10.3. SYSTEM TESTING METHODOLOGY
10.4. SYSTEM DEVELOPMENT TOOLS
10.5. SYSTEM IMPLEMENTATION TOOLS

11 FEASIBILITY STUDY

10 ACTIVITY PLAN

11 COST BREAKDOWN OF THE PROJECT

14 REFERENCES
ABSTRACT

Elections are the essential part of every democratic society and organization. Hence it is
very important to hold up as many elections as possible. Unfortunately, elections come with big
administrative efforts and costs. Today a lot of alternative e-voting systems have been proposed.
Some of them are already used. Unfortunately most of them do not even fulfil the most basic
security requirements, whereas other systems are provably secure, but completely impractical.
Furthermore a few e-voting scandals destroyed the peoples trust into these voting schemes. In
this Paper/Research/Project a new easy to use, secure and transparent online voting system is
proposed. This system is secured against very dangerous, effective and cheap key logger and
phishing attacks by using a new type of voting-TAN (transaction number). Moreover the system
is Transparent, i.e. every voter can check the systems integrity without any troubles (i.e. they do
not have to register as auditing personal). The proposed system can be easily used by small
associations or organizations as it protects the voter against common cheap and effective Trojan-
horse / key logger and phishing attacks by using the concept of voting-TAN-lists.

Keywords: Transaction Number, Transparent, Voting

Note: Do not use abbreviations or insert tables, figures or references into your abstract. You abstract
generally should not exceed about 300 words.
1. Introduction

Voting schemes have evolved from counting hands in early days to systems that include
paper, punch card, mechanical lever and optical-scan machines. Electronic voting systems
provide some characteristic different from the traditional voting technique, and also it provides
improved features of voting system over traditional voting system such as accuracy,
convenience, flexibility, privacy, verifiability and mobility. But it suffers from various
drawbacks such as Time consuming , Consumes large volume of pare work , No direct role for
the higher officials, Damage of machines due to lack of attention, Mass update doesn’t allows
users to update and edit many item simultaneously. E-voting is a term produced from the words
"Electronic" and "voting" and encompasses several different types of voting, embraces both
electronic means of casting a vote and electronic means of counting votes [2].
In this paper such a new easy to use, secure and transparent online voting system is
proposed. The new scheme is secured against very dangerous, effective and cheap key logger
and phishing attacks by using a new type of voting-TAN (transaction number).

[ Just give an introduction to the title. What is it? How does it work? Features or
characteristics in general]

2. Background of the project


Various publications have addressed the benefits and risks of e-voting systems [41, 44, 1]. Electronic
forms of voting have been implemented at some scale in many different countries, though in very
different ways .
The first electronic election scheme was proposed by xxx[8] who is the inventor of eCash. He describes a
unique method where voters can positively confirm their ballots, both at the polling station and also after
the election; to be sure they are correctly entered into the tallies, without revealing their choices.
Yyy [3] proposed a system that .uses …………………………………………………… but the system
does not meet secutity requirements.

In order to avoid these problems, the proposed system


uses…………………………………………………………………………..

[Mention about the previous works that have been implemented in the same concept
and write their main disadvantages or the things to be improved]

3. Problem Statement

Online Voting are simple, attractive and ease to use. It reduces manual efforts and bulk of
information can be handled easily. But out of all these features there are some drawbacks with
this system are, there can be transparency issues and security issues.

3.1. Research Question


1. Does the existing system against security attacks?
2. Does the system is transparent to the users?
[ Mention the main problem you identified from the part 2 and discuss the one you
want to address in your work]

4.Proposed System

Depending on the problems identified above, a new electronic voting system is proposed .
The proposed system provides security in a way ..........................................................
And the proposed system is transparent to the users...............................................................
The system consists of

[ write how you are going to address the problem you mentioned in part 3 and describe
about the functions of proposed system.]

5.Objectives

5.1. General Objective


 To develop a voting system which is secure and transparent

5.2. Specific Objectives


1. To develop a system that protects the voter against common cheap and effective Trojan-
horse / key logger and phishing attacks.
2. To develop a transparent voting system by …………………..

6. Significance of the Project


Security is the essential part of the complete voting system and the only reason, why such a
complicated cryptographic scheme has to be used at all. In order to be accepted by the voters
or the law, the proposed system is secure and transparent. So elections can be conducted in
organizations using this system which is secure and also transparent to the users that avoids
some main problems arise during election.

[Mention why your project is important for the people who is going to use it]

7. Beneficiary group of the Project


The following people are benefited by this project
1. Voters (People)
2. Election Commission who conducts voting and elects the head.
3. Candidates
8. Scope of the project
Mention where your project will work

9. Limitations and Constraints (if any)


Limitations means for which the project is not applicable
Constraints like budget, time and human resources etc.

10.Methodology

10.1Data Collection Method

The methodology also refers to the overall approach that we use to do our final project. There are
many methodologies that we have to use to gather the necessary information for the new
proposed system. These are:-
Interview
Observation
Analyzing Existing Document
Questionaries’ forms

Give the reasons for selecting the particular method

10.2. System Development and analysis methodology

System Development methodology


Object-oriented methodology is used because of the following reason:
 It implements the concept of object orientation like inheritance, encapsulation, and
polymorphism.
 The ability to challenging the problem domains.
 to make simple communication among users, analysts, designers and programmers
 it also unaffected to change because it uses prototyping and Unified Modeling
Language(UML) tools that minimize development time
 Use case diagram, Activity diagram, sequence diagram, class diagram, data modeling and
deployment diagram

Above all the object-oriented methodology is selected because it is the current applicable models
that uses different models to analysis and design the project

System Analysis and Design Methodology

In the analysis and design of this project, object oriented analysis and designing
methodology is used. The methodology that is used here is prototyping because this
methodology enables us to do analysis, design and implementation concurrently.
10.3 System Testing Methodology
In order to deliver this system as well operated system, this project is tested at implementation
phase by using different types of testing methodologies. Those testing methods are:
I. Unit testing: - The independent module is tested using this mechanism of testing.
II. Integration testing: - using this type of testing method, the modules which are
independent and dependent to each other are tested
III. System Testing: -using this methods, the functionality of all modules
considering as a single system is tested

10.4 System Development Tools


Hardware Development Tools:
Windows computer
Software Development Tools:
Item no Software Specification
1 Microsoft word To write the documentation part.

2 VISIO UML To draw diagram

3 WAMP Server To make the website dynamic.


4 Dreamweaver cs6 To write code in a simple.
Table 10.1 software development tools

10.5 System Implementation Tools


Database and Implementation Tools
Server side scripting: PHP, for server side scripting because it has the following advantages;
PHP has resource allocation machines and it can support object-oriented programming. Although
PHP is compatible with wide Varity of web server we will use Xampp server.
Client side scripting: by considering the following characteristics java script is used-: can be
embedded in HTML page, its popular.
Database: MYSQL rises to become one of the most popular database servers in the world. This
popularity is because of the servers speed, robustness and flexible. MYSQL has arguable become
PHP most popular database counterpart.
Static webpage: HTML is highly flexible with CSS and JavaScript.
Window -7 operating system -: it has good Graphical User Interface (GUI) It also support apache
server to run on it.
Power point and MS-word-: for Documentation and presentation.

11. Feasibility Study

Once the team understands the problem found in the system, the next step is to conduct which
high level capsule version of the entered system and design process.
11.2. Economic feasibility

The computerized system takes care of the present existing system’s data flow and procedures
completely and should generate all the reports of the manual system besides a host of other
management reports. Depending on this we are going to determine benefits of this project by
dividing into two. Those are tangible and intangible benefits.
A) Tangible Benefits:
According to our determination the project we are going develop will provide the next
benefits as tangible benefits. Those are:
 Cost reduction and avoidance
 Error reduction
 Increase speed of activity

B) Intangible benefits:
The benefits that we have determined under economic feasibility as intangible benefits are:
 Reduce Resource Consumption
 Increase security

The system to be developed is economically feasible and the benefit is outweighing the cost. Since
this project already computerizes the existing system, by now the reduction of cost for materials
used in manual operation becomes beneficiary to the organization.
11.3. Operational feasibility

The system to be developed will provide accurate, active, secured service. And also it is plat form
independent i.e. it run’s in all operating system. Proposed projects are beneficial only if they can be
turned into information systems that will meet the organizations operating requirements. In the
existing manual system, the new system was considered to be operational feasible.
11.4.Technical Feasibility

The system is going to be developed by following the php language, html, java script, MySQL
and other language and we have the ability to develop this system without any difficulty since
the team has studied the required methodologies and tools. So the system will be technically
feasible.
11.5.Organizational Feasibility

Organizational feasibility attempts to developing and implementing a new system, against the
benefits that would accrue from having the new system in place. This feasibility study gives the top
management the organizational justification for the new system. So the new system is considered to
be organizationally feasible.

11.6.Ethical Feasibility

Ethical feasibility is a test to determine if the project is ethical, or even legal.  Ethical feasibility
should be tested from both the organizational perspective, as well as the developer’s perspective. 
The organization has a vested interested to develop applications that show they are both
professional and ethical. Therefore our project keeps all legal and ethical of the country and the
society.

12.Activity Plan/Time table


The time allocated for the smooth flow of the project by the team members is described in
the following table.

Table 12.1.Activity Plan/Time table

13.Cost break down of the project

This is for the budget invested to develop the system or total development cost of the system
through life of project. The tangible costs to be incurred in developing the system are:-
I. Hardware development cost
II. Software development cost

I. Hardware Cost

No Material Amount Unit price(Birr) Total price


1 PCi3Toshiba 1 10,000.00birr 10,000.00birr
1 Paper (A4 ) 2 packet 180.00birr 180.00birr
2 Pen (lexi5) 5 5.00birr 25.00birr
3 Flash memory (8GB) 1 300.00birr 300.00bir
4 CD-RW 2 20.00birr 40.00birr
5 Copy - 200.00birr 200.00birr
6 Print - 500.00birr 500.00birr
7 Total 11245.00bir
r
Table 13.1.Hardware Cost

II. Software cost

No Material Price per unit


1 Microsoft office 2010 900
2 Visual paradigm 12.0 800
3 Rational Rose Enterprise Edition 700
4 Apache wamp 700
5 Notepad++ 10000
Total 13100.00 Birr

Table 13.2Software Cost

14.References

[1] S.V.Manisekaran, R.Venkatesan, "An AdaptiveDistributed Power Efficient Clustering


Algorithm for Wireless Sensor Networks", American Journal of Scientific Research, no. 10, pp.
50-63, 2010.

[2]

Author, A., & Author, B. (year). Title of book (edition if not first). City: Publisher.
Book by a single author
 Leshin, C.B. (1997). Management on the World Wide Web. Englewood Cliffs, NJ:
Prentice-Hall.
Author, A., & Author, B. (year). Title of book (edition if not first). City: Publisher.
Book by more than one author
 Cornett, M., Wiley, B.J., & Sankar, S. (1998). The pleasures of nurturing (2nd ed).
London: McMunster Publishing.

Journal Article
Author, A., & Author, B. (year). Title of article. Title of Journal, volume number (issue number),
page numbers.
 Barry, H. (1996). Cross-cultural research with matched pairs of societies. Journal of
Social Psychology, 79 (1), 25-33.

Referencing Electronic Sources


Author, A. (year, month day). Title of article. Title of Newspaper. Retrieved from home page web
address
 Nader, C. (2009, June 19). Mental health issues soar among children. The Age. Retrieved
from http://www.theage.com.au

You might also like