• Sonuç bulunamadı

View of E-Voting System using Blockchain with Network Security

N/A
N/A
Protected

Academic year: 2021

Share "View of E-Voting System using Blockchain with Network Security"

Copied!
4
0
0

Yükleniyor.... (view fulltext now)

Tam metin

(1)

Turkish Journal of Computer and Mathematics Education Vol.12 No.9 (2021), 19-22

19

Research Article

E-Voting System using Blockchain with Network Security

S. Ravikumara,K. Antony Kumarb ,and V.Sathanac a

Assistant Professor, Department of Computer Science and Engineering, School of Computing, Vel Tech RangarajanDr.Sagunthala R&D Institute of Science and Technology, Chennai, Tamil Nadu, India.

bAssistant Professor, Department of Computer Science and Engineering, School of Computing, Vel Tech RangarajanDr.Sagunthala R&D Institute of Science and Technology, Chennai, Tamil Nadu, India. cAssistant Professor, Department of Computer Science and Engineering,

K.Ramakrishnan College of Engineering, Trichy, Tamil Nadu, India.

Article History: Received: 10 January 2021; Revised: 12 February 2021; Accepted: 27 March 2021; Published

online: 20 April 2021

Abstract: Bitcoin presents a progressive decentralized agreement system. Be that as it may, Bitcoin-determined agreement instruments connected to open blockchain are deficient for the organization's situations of maturing group blockchain. We have proposed an agreement calculation named as Proof of Vote (POV). The agreement is enabled by the circulating hubs managed by community accomplices, who will go through voting to a collective statement. The main concept is to build up different security characters to organize members, with accommodation target. Furthermore, confirmation of the squares is chosen by the organizations' voting in the class without relying upon an outsider middle person or then again wild open mindfulness. Contrasted and the completely decentralized consensus-Proof of Work (POW), POV has controllable security, joining dependability, a single square affirmation to achieve conclusiveness of the exchange, and a low-delay confirmation time for the exchange.Even during difficult times like a pandemic situation like Covid 19 and apocalyptic conditions, elections can happen as usual without any disturbance.

Keywords: Blockchain, Bitcoin, Network Security, E-voting, Pandemic Situation, Covid.

__________________________________________________________________________

1. Introduction

Blockchain, which is originated from Bitcoin, is a far-reaching innovation of circulated database, information consistency calculation, cryptography, distributed transmission [4], and many more. Bitcoin keeps up a dispersed record book in a companion to peer arrange Which is said to be a scrambled information square chain, including all confirmed computerized cash exchanges all through the system. Not the same as the customary advanced money framework, individuals can exchange bitcoin straightforwardly in untrusted systems without depending on outsider go-between [5].

Bitcoins use of cryptography, makes the whole system information straightforward, and certainly secures the obscurity of the individual data, and opposes the two-fold pay assault given the entire system accord and the competition of processing power. Henceforth, as the basic innovation of Bitcoin [8] & [7], blockchain has raised an exploration blast vision system. Contrasted and the completely decentralized consensus-Proof of Work (POW) [3], POV has controllable security, joining dependability, just a single square affirmation to accomplish the exchange conclusiveness, and low-delay exchange confirmation time [6].

As long as there is need to address issues like increasing voting percentage and pandemic situations like COVID19, RIOTS, etc... . This system helps in peaceful, secure and a successful non interrupted election to be administrated.

Types of Blockchain

There are three ways in classifying blockchain: Private, public and consortium Blockchain [10].

2. Proof of Vote

Suppose few organizations have been formed as a coalition council to advantageously share business information with each head of an organization's interests. Blockchain is used to document different transactions andactivities in the sector. In any case, none of the organizations would give anyone the right to distribute items. They then choose to procure a butler group from all over the world, and the decision for butlers is routinely taken. The group is responsible for delivering squares, and each piece will be submitted for check and vote to each organization [9]. In order to guarantee the security, productivity and unwavering quality of the cooperation, these organizations chose [2]:

a. Head servants will be paid high compensations as indicated by the workload;

b. The person who applies to join the head servant group must be suggested by the individuals from the union and present a store;

c. Crafted by a head servant it will be administered and evaluated by the individuals from the union, with the goal to survive.

(2)

Turkish Journal of Computer and Mathematics Education Vol.12 No.9 (2021), 19-22

20

Research Article Accordingly, we propose an agreement component, POV, utilized only for consortium blockchain. The blockchain framework is kept up by organizations together, and comprises of undertakings and associations in various districts of the world. Applications created on this group chain will provide terminal clients of the worldwide system.

Roles of Network Model

The roles of the network models are given in Fig. [1] as shown below.

Figure 1. Role of network model Commissioner

The Commissioner has the privilege to prescribe, vote, and assess the head servants. They are additionally committed to check and forward pieces and exchanges. Every leader is equivalent in status and has similar rights and obligations. All chiefs will receive the check of a piece produced in the blockchain system. If the square has no less than 51 percent of the votes, the square is considerably removed and stored on the blockchain. The after-effect of the voting can speak to/be determined by the will of the considerable number of chiefs.

Butler

Butler has some expertise in creating pieces. The number of butler hubs is restricted. The plan of the personality of the head servant implies the partition of voting rights and official rights. Officials are accountable for voting and head servants are in charge of delivering squares. Head servants resemble the excavators in the Bitcoin, however, they have no compelling reason to squander processing power with a specific end goal to grab the privilege of creating a square, and they will haphazardly be selected to deliver a piece. A head servant will accumulate exchange data from system and pack them into a piece, and sign the square. Turning into a head servant makes two strides:

• Becoming a butler candidate. • Win a race for the butler.

Butler Candidate

As the quantity of head servants is restricted, a butler must be chosen from head servant hopefuls, and candidates will be voted by all chiefs. On the off chance that they lose in the race, they can remain on the web, and sit tight for the following race.

Ordinary Users

Ordinary clients can join or leave the system whenever without being approved, what's more, their conduct can be self-assertive. Without the authorization to take an interest during the time spent square age, they can just participate during the time spent square conveyance and message sending. They can see the entire agreement process while utilizing the administration of the framework.

3. Voting Process

Two main methods of voting exist. The first is to vote for the development of pieces, and the second is to vote in favor of the hopeful chief. The members vote to regain their points.

Voting in Favor of Peace Creation

Head servant I produces a square, and sends it to all commissioners. On the off chance that a magistrate concurs to deliver this piece, he will encode the square header and restore the mark to head servant I. If head servant I gets in any event Nc/2 + 1 marks inside the predefined time, the square is substantial. Something else/If the piece is invalid, it will be repeated by the head servant I + 1.

Voting in Favor of the Butler Competitor

• Butler j sends adjuration to all commissioners with the requests to vote. Butler J creates an extraordinary square with a choice after collecting and checking poll tickets that is shown in connected records. Head servant j will then send this article for approval to all commissioners. The voting data of the judge is a mixture of two kinds of tickets:

• Score Tickets: Each judge maintains an overview for the score of butler competitors; representative decides a sequence of candidates with a high score.

• Designated tickets: The judge establishes a special collection of candidates with the idea of human variables, or again establishes a random accumulation of candidates that increases the portability of the head-servant.

(3)

Turkish Journal of Computer and Mathematics Education Vol.12 No.9 (2021), 19-22

21

Research Article The traditional voting system has some problems with monitoring an organization with complete control of the process and the database, and can therefore adjust the software and thereby make changes in the database with the effective disposal. The arrangement is to open the database, which many customers claim is worth considering if mistakes exist. With blockchain innovation [1], the answer to the e-voting framework is perfect. Innovative Blockchain enables applications for e-voting. Each voting will be completed as an exchange in a blockchain that can track the tallying of voices. In this line, everyone can facilitate the final count, and it is possible to check that no information is modified or deleted. There is also no unauthorized blockchain information.

Design

Figure 2. Design of the voting system

Verification Process

The procedure for the confirmation begins with the maintenance of the vote square, the last hash among the existing legitimate piece as well as the sophisticated mark. Isolation is possible at this point between electronic records (elected and previous hash effect) and sophisticated signature. Fig. [2] demonstrates his hash esteem for the electronic record. Concerning the computerized mark, it is finished by an unscrambling process utilizing people in the general key of the hub to provide an electronic report. These two hash esteems are at that point looked at, if the esteem is similar then the computerized mark is substantial and the procedure proceeds, however, if the esteem is not equivalent it is viewed as invalid and the framework will decline the square to proceed with the procedure.

Get a Turn

Simultaneous timings are maintained during the beginning and the ending of voting time. Whenever the voting time has been finished, every hub will hang tight to make a block. If the confirmation was fruitful, at that point the hub (the hub that is thus) begins making another square which will then be communicated to all the hubs in the framework. If the center that takes the risky turn in the scheme, the process does not stop. Once the target hub realizes that the turn arrives, it is checked to ensure the preliminary square is in the framework from the authentic hub. By using a turning technique, the impacts of an information transmission device can be reduced.

Create and Broadcast

After the hubs that get the turn get hopefully done with making another piece, at that point the square is communicated to all hubs. This process creates another piece performed by every hub. The hash work is one of the cryptographic methods in computing the extraordinary esteem that can be compared to the unique finger impression of information. Two unique records could promote diverse hash esteems.

5. Conclusion

In this paper, we propose another agreement component (POV) utilized solely for the consortium blockchain. We outline four personalities for organizing members in light of the key thought of voting effort and voting system. The previous one ensures the detachment of voting rights and official rights, which upgrades the autonomy of butler's part, so does the inner control framework inside the consortium. Using hash esteems to record the results of the vote of each test station linked to each difference improves the chronicle structure and framework as well as it also allows the use of computerized marks more accurate.The use of arrangement as proposed in the context promotes a clear indication of voters’ numbers and they are not allowed to enter more than one time as the proposed framework keeps a legal connection among the hubs in the blockchain creation process. Additionally, ensure all hubs that have enlisted the outcomes are incorporated into the figuring process. Even when it comes to Crisis based situations like RIOTS, COVID19, etc.. The elections can still continue as they can happen as long as the network services are up and running perfectly.

References

A. Barnes, C. Brake, T. Perry, “Digital Voting with the use of blockchain Technology”, Team Plymouth Pioneers, Plymouth University, 2016.

X. Li, P. Jiang, T. Chen, X. Luo, Q. Wen, “A survey on the security of blockchain systems”, Future Generation Computer Systems, Vol. 107, pp. 841-853, 2020.

C. Cachin, M. Vukolić, “Blockchain consensus protocols in the wild”, Distributed, Parallel, and Cluster Computing, pp. 1-24, 2017.

C. Meter, “Design of Distributed Voting Systems”, Cryptography and Security, pp. 1-125, 2017. D. Larime, “Delegated Proof-of-Stake (DPOS)”, Bitshare whitepaper, 2014.

S. King, S. Nadal, “Ppcoin: Peer-to-peer crypto-currency with proof-of-stake”, self-published paper, pp. 1-6, 2012.

A. Suresh, R. Udendhran, M. Balamurgan, “Hybridized neural network and decision tree based classifier for prognostic decision making in breast cancers”, Soft Computing, Vol. 24, No. 11, pp. 7947-7953, 2020.

(4)

Turkish Journal of Computer and Mathematics Education Vol.12 No.9 (2021), 19-22

22

Research Article S. Heiberg, J. Willemson, “Verifiable internet voting in Estonia”, 6th International Conference on Electronic Voting: Verifying the Vote (EVOTE), pp. 1-8, 2014.

Referanslar

Benzer Belgeler

Made of multi-layers of cotton, silk or wool, the tents are usually plain on the outside, the walls lavishly decorated with intricate applique and embroidery on the

In this study, considering the close association of obesity with chronic diseases, the aim is to evaluate the association between obesity degree and chronological age as

Redundant nerve root sendrornu (RNRS) seyrek goriilen bir klinik dururn olup, etyolojisi ve patogenezi tarn olarak bilinrnernektedir. Redundant ya da Knotted Nerve Root olarak

Marmara Üniversitesi’nde lisans programında Genel Jeoloji, Mineral ve Kayaçlar, Hidrografya, Yapısal Jeomorfoloji, Coğrafya Araştırmaları, Türkiye Hidrografyası,

[r]

Türklerin tarih boyunca etkisi altında kaldıkları bütün inanç sistemlerinde sayılar ön planda yer almıştır. Özellikle üç, yedi, dokuz, kırk sayılarına; inanç,

Giderek halı ve seccadelerdeki desenlerin şematize olması, yeni desenler yaratamama ve eskilerin kabaca taklit edilmesi, sentetik boyaların Türkiye'ye girmesi ve

İşte o zaman öylesine kahretmişler ve dünyaya öylesine öfkelenmişlerdi ki, daha o gün kendilerini yeni bir savaşın içine atmışlar ve o yeni savaştan son Türk