Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 24

A

Presentation on
Blockchain based Transparent voting system

Presented By:- Guided by:-


Agenda
 Abstract  Applications & Benefits

 Problem Statement  Results

 Introduction  Conclusion
 Motivation  Future Scope

Objectives  References
 Literature Survey
 Overview Diagram
 Proposed System
 Algorithms
Hardware & software

2
Abstract
Securing EVMs post voting Data is a tedious task
This involves not only manpower and also involves huge technical
assistance
It is dangerous to expose EVM machines to third-party devices
Blockchain plays a vital role to secure E-Voting data efficiently

3
Problem Statement
To design and develop Secured system to enrich the security
of the post voting data using Block chain technology

4
Introduction
About Blockchain
Head Key formation by random key 8 Byte
Block Chain Formation
Authentication
Pair Evaluation
Integrity Evaluation

5
Motivation
To provide security for the voting data

Utilizing Blockchain for the voting process

Voting through Adhar card OTP function

Simulation of whole scenario as Desktop Application

6
Objectives
To understand hash key generation technique

To maintain the meta hash key size to 8 byte

To design and develop the system to simulate the voting


process properly and to demonstrate the whole process till
end of the security point.

7
Literature Survey
Paper Methodology Description Limitations
No
[1] Consortium Making the blockchain adjustable to meet It is assumed that the polling
Blockchain the need of the polling process staff is aware of the
technology and they can
guide the voters to effectively
complete the process.

[2] Pressing the button Verifiable e-voting and public attitudes


for European toward internet voting in Greece. The authors have not shed
elections more light to the pattern of
attitudes toward evoting
from a comparative
perspective and further
investigate
latent parameters that may
have an impact on attitudes
toward
e-voting.
Literature Survey
Paper Methodology Description Limitations
No
[3] Universally vérifiable A Proposal of Anonymity and Coercion
Blockchain Blockchain-based Electronic Freeness is not
Voting System considered.

[4] Transparent and anonymous Presents an innovative Lacks extensive


E voting approach through technique for the online voting experimentation and
Blockchain platform to resolve the security experimental results.
issue with the
implementation of blockchain
technology.
Literature Survey
Paper Methodology Description Limitations
No
[5] Reverse Circle Cipher The proposed Reverse The weakness of the algorithm
Circle Cipher uses ‘circular lies in the user selection
substitution’ and ‘reversal of the key.
transposition’ to exploit the
benefits
of both confusion and
diffusion.

[6] Conceptual secure Inclusion of The Lacks the requisite


blockchain Blockchain-based system experimentation that realizes the
will be secure, reliable, and performance of the approach.
anonymous.
Overview of the Model

11
Proposed Approach
The proposed methodology of our system can be explained
through following modules:
Module A: Block Creation
Input: Voting Data
Process: String Concatenation
Output: Block Label

Module B: Block Encryption


Input: Block Label String
Process: RCC Encryption
Output: Encrypted Block
12
Proposed Approach Cont..
Module C: Block Chain Formation
Input: Encrypted Block + Previous Block Head Key
Process: SHA 256 and Random Character Selection
Output: Chain Key

Module D: Multi Linear Pairing


Input: Number of blocks
Process: Division formation
Output: Block Set

13
Proposed Approach Cont..
Module E: Integrity Evaluation
Input: Block Set
Process: Chain Key Verification
Output: Voting data Integrity Report

14
Algorithms (Block Head Key Generation)
Algorithm 1: Block Head Key Generation
// Input: Vote Attributes VA

// Output: Head Key HK

Function: headKeyGenerator (VA)

0: Start
1: HK =Ø

2: HKEY=MD5 (VA)

3: HK=HKEY[0] + HKEY[5] + HKEY[11] + HKEY[14] + HKEY[23] + HKEY[26]

4: return HK

5: Stop
___________________________________________

15
Algorithms (Blockchain Formation )
ALGORITHM 2: Blockchain Formation

//Input : Vote Information list V L

//Output: Terminal Key T K

blockchainFormation(VL)

1: Start

2: PK =” ” [Previous Key]

3: for i=0 to size of VL

4: TPL=BL[i] [TP = Database Tuple]

5: PKEY= getBodyKey(TPL)

6: TK =PK

7: end for

8: return TK

9: Stop

___________________________________________

16
Hardware Requirements
Minimum Hardware Specification :

CPU : Pentium Core i5


RAM : DDR 4 GB
HDD : 500 GB

17
Software Requirements
Software Specification:

 Coding Language : Java,


 Development Kit : JDK 1.8, JRE.
 Front End : Java Swing
 Development IDE : Netbeans 8.2
 Data Base : My SQL 5.0

18
Application and Benefits
 Applications
 Election Commission
 Election Agencies
 In all kinds of elections

 Benefits
 Cost effective
 Time Saving
 Enhanced Security for the post voting data
Results

PUT YOUR SCREEN


SHOTS HERE

20
Conclusion
Proper Development of a Standalone application for the
whole process of E-Voting
Proper maintenance of flow of the Voting process
Efficient managing of the block chains
Maintaining the integrity of the data Efficiently

21
Future Scope
Experiment can be done on a large volume of multi-structured
voting data

System can be deployed in real life scenario elections like


elections in college, Municipality elections, State and national
Elections

22
References
[1] B. Shahzad et al, “Trustworthy Electronic Voting Using Adjusted
Blockchain Technology”, IEEE Access, 2019.

[2] A. Delis et al, “Pressing the button for European elections”, 6th
International Conference on Electronic Voting: Verifying the Vote
(EVOTE), 2014.

[3] C. Adiputra et al, “A Proposal of Blockchain-based Electronic Voting


System”, Second World Conference on Smart Trends in Systems,
Security and Sustainability (WorldS4), 2018.

23
References
[4] D. Kumar et al, “Secure Electronic Voting System using Blockchain
Technology”, International Journal of Advanced Science and
Technology, 2018.

[5] E. Isaac et al, “Reverse Circle Cipher for Personal and Network
Security”, International Conference on Information Communication and
Embedded Systems (ICICES), 2013.

[6] A. Ayed, “A Conceptual Secure Blockchain-Based Electronic Voting


System”, International Journal of Network Security & Its Applications
(IJNSA) Vol.9, No.3, May 2017.

24

You might also like