TY - GEN
T1 - Design and development of voting data security for electronic voting (E-Voting)
AU - Djanali, Supeno
AU - Pratomo, Baskoro Adi
AU - Cipto, Karsono Puguh Nindyo
AU - Koesriputranto, Astandro
AU - Studiawan, Hudan
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016/9/19
Y1 - 2016/9/19
N2 - Several countries has moved to e-voting because of many reasons. By using e-voting, we have to pay more attention to protect voter's choice confidentiality and secure voting data. This paper proposed a combination of SHA256, digital signature, and RSA asymmetric encryption applied to database as a storage system and protocol to secure our message exchange. The proposed method was implemented as a web service and a simple client application placed in voting place is created as well. The whole system was designed to be as close as the usual parliament voting of a city in Indonesia. Therefore there are several level that need to be considered, i.e. voting place, districts, city, state, country. But we only implemented until the districts level, since the process for the next levels is just the same. Voting places, as the most bottom level, use the client application to count the voting data, then after some checking and protecting confidentiality and integrity of the data, they are sent to the upper level. At the next level, those data will be checked, signed, and sent to upper level until it reaches country level. From our experiment, our proposed method was able to handle many kinds of attack, such as replay attack, packet sniffing, and falsifying voting result, moreover privacy of the voter is well protected while the integrity of the data can be protected as well. Therefore we believe that our system will be able to replace conventional voting to a better system.
AB - Several countries has moved to e-voting because of many reasons. By using e-voting, we have to pay more attention to protect voter's choice confidentiality and secure voting data. This paper proposed a combination of SHA256, digital signature, and RSA asymmetric encryption applied to database as a storage system and protocol to secure our message exchange. The proposed method was implemented as a web service and a simple client application placed in voting place is created as well. The whole system was designed to be as close as the usual parliament voting of a city in Indonesia. Therefore there are several level that need to be considered, i.e. voting place, districts, city, state, country. But we only implemented until the districts level, since the process for the next levels is just the same. Voting places, as the most bottom level, use the client application to count the voting data, then after some checking and protecting confidentiality and integrity of the data, they are sent to the upper level. At the next level, those data will be checked, signed, and sent to upper level until it reaches country level. From our experiment, our proposed method was able to handle many kinds of attack, such as replay attack, packet sniffing, and falsifying voting result, moreover privacy of the voter is well protected while the integrity of the data can be protected as well. Therefore we believe that our system will be able to replace conventional voting to a better system.
KW - e-voting
KW - message exchange security
KW - voter's privacy
UR - http://www.scopus.com/inward/record.url?scp=84992116088&partnerID=8YFLogxK
U2 - 10.1109/ICoICT.2016.7571928
DO - 10.1109/ICoICT.2016.7571928
M3 - Conference contribution
AN - SCOPUS:84992116088
T3 - 2016 4th International Conference on Information and Communication Technology, ICoICT 2016
BT - 2016 4th International Conference on Information and Communication Technology, ICoICT 2016
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 4th International Conference on Information and Communication Technology, ICoICT 2016
Y2 - 25 May 2016 through 27 May 2016
ER -