Professional Documents
Culture Documents
Online Voting
Online Voting
Overview:
Past research on Internet voting has been concentrated on two aspects. First, there
are investigations to find the appropriate balance between anonymity and authentication.
Second, the impact of the use of Internet voting to legislation has been studied. In this
project we analyze the impact of legislation to the design of a real Internet voting system.
We discuss how legal aspects constitute security requirements on a technical level and
refine the security requirements on the design level to corresponding security requirements
of the resulting system. In our project we a going to construct and internet voting
environment consist of a main server, sub main server and client system. All the main
server, sub server and client system are maintained by Unique MAC Address. For make the
whole inter voting very secure we are going for this kind of implementation. In our project
the main server will be only one server and sub server will be unlimited accoding to the no
of state added by main server. The client system also unlimited according to the booth
count the internet voting has taken by the government. The user/people that willing to vote
using the online voting system can give their voter id number with their thumb finger print
Electronic Voting Machines ("EVM") are being used in Indian General and
State Elections to implement electronic voting in part from 1999 elections and in
total since 2002 elections. The EVMs reduce the time in both casting a vote and
Any computer program can have an undetected, unintentional error (a “bug”). Any
that is undetectable after the fact. This is true of all manufacturers and, in fact, of
all computer software. Various measures can reduce a DRE system’s vulnerability,
including computer security, physical security, testing and analysis of systems and
coding, and good election procedures. None of these steps, and no combination of
systems. For example, the computer security techniques used in India’s DRE
limited, casual access to them (such as a voter), though the machines used in the
it can undermine the electoral process—several less dramatic dangers must also be
must all be considered when debating the use of DREs in new, fragile, and
correctly respond to computer errors (they may even be too unfamiliar with
computers to describe the error to remote technical assistants). The use of VVPBs
also complicates poll worker training because of the mechanical problems often
associated with printers. Technical complications and spiraling costs have already
Proposed System:
In the proposed system, we use the internet voting method using the
fingerprints of the people who are eligible for voting. Online voting would add to
systems can identify if voters attempt to vote for the wrong number of candidates
and notify them accordingly. Internet voting system could reduce expenses
entail large additional costs and several years of government investment. The
major advantage of the internet is time consuming, i.e. with a couple of quick
clicks, use of finger prints and exercising your constitutional rights to cast our vote
in an election. For online polling, the particulars such as name, identity, fingerprint
image, original photo copies are already collected by our main server at the time
registration of new clients. In this proposed system there are main server, sub
server and client system. All internet voting system are maintained by their unique
MAC address. The sub system and client system are maintained & control by the
It is economica.
Hardware requirements
Processor : Pentium IV
RAM capacity : 2 GB
Printer : DeskJet HP
Motherboard : Intel
Cabinet : ATX
Software configuration
1. Administrator Module.
3. Online Voting.
4. Result Publishing.
Module Description:
1. Administrator Module:
In this module the admin is the one who has control of the sub server and the
client system. The existing user/people details are stored only in the main server.
And that user detail is stored in the sub server and the client system at the time of
election only.
(MAC Address)
The main server, sub server, client server are differenced using MAC address for
increases the high level security. A Media Access Control address (MAC address)
is a unique identifier assigned to network interfaces for communications on the
physical network segment. MAC addresses are used for numerous network
technologies and most IEEE 802 network technologies including Ethernet.
Logically, MAC addresses are used in the Media Access Control protocol sub-layer
of the OSI reference model.
Row level lock / unlock:
In this if a user is processing an online voting if his user name, finger print.. etc
data anything is wrong given by the user more than 3 times then that user session is
keeps locking by the admin. And that user session lock only unlock by using main
server only. At the time of user lock the particular user cannot able to vote.
In this the admin is the one has given the announcement about the date of the
election start. At the time of election start the sub server for the states will also get
started and voter detail db of state will be uploading to the sub server. And client
system will be started by both main server and sub server at the time of election.
In this module the new user can request this module and get registration for
internet voting. New user registration can be done only from specific system client
system (MAC address).at the time of new registration of the new user the register
by using their finger print for unique identification. The finger print will not
directly store in the data base. For each finger print a unique ID will be
created and that id will be encrypted using DES algorithm. and that value will
be stored id the main server is the full authority of new user register in the
client system all the full detail given buy the user are stored in main admin
system only.
3. Online Voting:
In this module the user used to put the online voting by requesting the sub
server and sub server will ensure by the main server. And the user needs to give
user name, voter id, finger print. If the given dataset is match with the sub server
database the voter voting process will be success is displayed to the user.
4. Result Publishing:
In this module after the user vote session is completed. The server is used to
calculate number of vote and releasing the result for the election of this year.