Blockchain technology has the potential to improve e-voting by making it more accessible and secure. The document proposes a blockchain-enabled e-voting system (BEV) that issues each voter a digital wallet and coin to cast an anonymous, immutable vote on the blockchain. However, concerns remain around governance, privacy, and security of online voting using personal devices. While some BEV systems aim to address these issues, further testing is still needed before mainstream adoption.
Blockchain technology has the potential to improve e-voting by making it more accessible and secure. The document proposes a blockchain-enabled e-voting system (BEV) that issues each voter a digital wallet and coin to cast an anonymous, immutable vote on the blockchain. However, concerns remain around governance, privacy, and security of online voting using personal devices. While some BEV systems aim to address these issues, further testing is still needed before mainstream adoption.
Blockchain technology has the potential to improve e-voting by making it more accessible and secure. The document proposes a blockchain-enabled e-voting system (BEV) that issues each voter a digital wallet and coin to cast an anonymous, immutable vote on the blockchain. However, concerns remain around governance, privacy, and security of online voting using personal devices. While some BEV systems aim to address these issues, further testing is still needed before mainstream adoption.
ABSTRACT: E-voting is among the key KEYWORDS: Voter access, Voter
public sectors that can be disrupted by fraud, immutable, tamperproof. Blockchain technology. The idea in Blockchain enabled e-voting (BEV) is 1. INTRODUCTION simple. To use a digital-currency analogy, Free and fair elections are a central feature BEV issues each voter a “wallet” of democracy. As the world becomes more containing a user credential. Each voter digital and mobile phones more widespread, gets a single “coin” representing one online voting and blockchain technology opportunity to vote. Casting a vote transfers have the potential to make voting more the voter’s coin to a candidate’s wallet. A accessible and improve election integrity. voter can spend his or her coin only once. Although at an early stage, these blockchain Blockchain might address two of the most initiatives demonstrate that blockchain can prevalent concerns in voting today: voter be used to create secure, online voting in access and voter fraud. The idea is as government and private elections. The follows. Eligible voters cast a ballot potential benefits are huge given the current anonymously using a computer or problems relating to election integrity and smartphone. BEV employs an encrypted key accessibility around the world. and tamperproof personal IDs. For On the other hand, voting and cyber security example, the mobile e-voting platform of the experts have strong concerns about whether Boston-based startup Voatz employs smart online voting can be secure and whether biometrics and real-time ID verification. blockchain technology is necessary for The public ledger ties each cast ballot to an online voting. To better understand these individual voter and establishes a issues, it is necessary to separate the permanent, immutable record. No bad actor concerns into two parts. Firstly, I explore can engage in nefarious activities because governance and privacy issues within such activities will be evident on the ledger blockchain voting systems. Different or corrected by a peer-to peer consensus blockchain architectures can affect who network. To compromise the network, controls, validates and views data on the hackers would need to successfully hack blockchain. Examining how these case most of the blocks (files with transaction studies address governance and privacy records) before new blocks were introduced. issues in their blockchain platforms can help The Blockchain audit trail ensures that no us understand the current criticisms of vote has been changed or removed and that blockchain technology in online voting. no fraudulent and illegitimate votes have Secondly, I look at security issues relating to been added. Simply, Blockchain enables the the use of personal mobile phones and creation of tamper-proof audit trails for computers for online voting. Blockchain voting. technology is often one part of the end-to-end solution in electronic voting. servers. Just a bunch of computers that talk Cyber security issues relating to how users to one another on the same network. access voting systems affect blockchain as Instead of a centralized database, all the well as non-blockchain voting systems. To transaction data that is shared across the separate these cyber security issues from nodes in the blockchain is contained in blockchain technology, I look at two online bundles of records called blocks, which are voting case studies that do not use chained together to create the public ledger. blockchain technology. Interestingly, This public ledger represents all the data in although cyber security concerns are very the blockchain. All the data in the public real, these case studies demonstrate the ledger is secured by cryptographic hashing, viability and long-term use of secure online and validated by a consensus algorithm. voting, including the case in Estonia where Nodes on the network participate to ensure online voting has been used for government that all copies of the data distributed across elections since 2005. the network are the same. While all the blockchain case studies appear to successfully address the security concerns PILLARS OF BLOCKCHAIN: relating to online voting; only Voatz and The three main properties of Blockchain Votem believe they have addressed Technology which have helped it gain governance and privacy issues. Smart matic- widespread acclaim are as follows: Cybernetica believes these issues need 1. Decentralization further examination and continue to research 2. Transparency these issues as part of a European 3. Immutability consortium. These differences highlight the fact that blockchain technology in online 1. Decentralization: Before Bitcoin voting is still early stage and we need and BitTorrent came along, we were significantly more testing and validating more used to centralized services. before it can become mainstream. It is worth The idea is very simple. You have a noting that blockchain technology has centralized entity that stores all the already moved at a quicker pace than most data and you‟d have to interact people anticipated. The current applications solely with this entity to get are really impressive and it promises to whatever information you require. solve some really big problems. Another example of a centralized system is the banks. They store all BLOCKCHAIN your money, and the only way that A blockchain is a peer-to-peer network of you can pay someone by going computers, called nodes that share all the through the bank. In a decentralized data and the code in the network. So, if system, the information is not stored you‟re a device connected to the blockchain, by one single entity. In fact, you are a node in the network, and you talk everyone in the network to all the other computer nodes in the owns the information. In a network. You now have a copy of all the decentralized network, if you want to data and the code on the blockchain. There interact with your friend then you are no more central can do so directly without going through a third party. That was the In simple terms, hashing means main ideology behind Bitcoins. You taking an input string of any length and only you alone are in charge of and giving out an output of a fixed your money. You can send your length. In the context of money to anyone you want without cryptocurrencies like bitcoin, the having to go through a bank. transactions are taken as input and 2. Transparency: One of the most run through a hashing algorithm interesting and misunderstood (Bitcoin uses SHA-256) which gives concepts in blockchain is an output of a fixed length. “transparency. A person‟s identity is The blockchain is a linked list that hidden via complex cryptography contains data and a hash pointer that and represented only by their public points to its previous block, hence address. So, if you were to look up a creating the chain. What is a hash person‟s transaction history, you pointer? A hash pointer is similar to will not see “Bob sent 1 BTC” a pointer, but instead of just instead you will see containing the address of the “1MF1bhsFLkBzzz9vpFYEmvwT2 previous block it also contains the TbyCt7NZJ sent 1 BTC”. So, while hash of the data inside the previous the person‟s real identity is secure, block. This one small tweak is what you will still see all the transactions makes blockchains so amazingly that were done by their public reliable and trailblazing. address. This level of transparency has never existed before within a financial system. It adds that extra, ASSETS OF BLOCKCHAIN and much needed level of The blockchain network gives internet users accountability which is required by the ability to create value and authenticates some of these biggest institutions. digital information. Here are some assets of Speaking purely from the point of blockchain: view of cryptocurrency, if you know 1. Smart contracts: Distributed ledger the public address of one of these big technology enables the coding of simple companies, you can simply pop it in contracts that will execute when specified an explorer and look at all the conditions are met. Ethereum is an open- transactions that they have engaged source blockchain project that was built in. This forces them to be honest, specifically to realize this possibility. something that they have never had 2. The sharing economy: By enabling to deal with before. peer-to-peer payments, the blockchain opens 3. Immutability: Immutability, in the the door to direct interaction between parties context of the blockchain, means that — a truly decentralized sharing economy once something has been entered results. into the blockchain, it cannot be 3. Crowdfunding: Crowdfunding initiatives tampered with. The reason why the like Kickstarter and Gofundme are doing the blockchain gets this property is that advance work for the emerging peer-to-peer of the cryptographic hash function. economy. The popularity of these sites suggests people want to have a direct say in product development. Blockchains take this interest to the next level, potentially creating crowd-sourced venture capital funds. 9. Internet of Things (IoT): What is the 4. Governance: By making the results fully IoT? The network-controlled management transparent and publicly accessible, of certain types of electronic devices — for distributed database technology could bring instance, the monitoring of air temperature full transparency to elections or any other in a storage facility. Smart contracts make kind of poll taking. Ethereum-based smart the automation of remote systems contracts help to automate the process. management possible. A combination of 5. Supply chain auditing: Consumers software, sensors, and the network increasingly want to know that the ethical facilitates an exchange of data between claims companies make about their products objects and mechanisms. The result are real. Distributed ledgers provide an easy increases system efficiency and improves way to certify that the backstories of the cost monitoring. things we buy are genuine. Transparency 10. Neighbourhood Microgrids: comes with blockchain-based timestamping Blockchain technologies enables the buying of a date and location — on ethical and selling of the renewable energy diamonds, for instance — that corresponds generated by neighborhood microgrids. to a product number. When solar panels make excess energy, 6. File storage: Decentralizing file storage Ethereum-based smart contracts on the internet brings clear benefits. automatically redistribute it. Similar types of Distributing data throughout the network smart contract automation will have many protects files from getting hacked or lost. other applications as the IoT becomes a 7. Prediction markets: The crowdsourcing reality. of predictions on event probability is proven 11. Identity management: There is a to have a high degree of accuracy. definite need for better identity management Averaging opinions cancels out the on the web. The ability to verify your unexamined biases that distort judgment. identity is the lynchpin of financial Prediction markets that payout according to transactions that happen online. However, event outcomes are already active. remedies for the security risks that come 8. Protection of intellectual property: As with web commerce are imperfect at best. is well known, digital information can be Distributed ledgers offer enhanced methods infinitely reproduced — and distributed for proving who you are, along with the widely thanks to the internet. This has given possibility to digitize personal documents. web users globally a goldmine of free Having a secure identity will also be content. However, copyright holders have important for online interactions. not been so lucky, losing control over their 12. AML and KYC: Anti-money intellectual property and suffering laundering (AML) and know your customer financially as a consequence. Smart (KYC) practices have a strong potential for contracts can protect copyright and automate being adapted to the blockchain. Currently, the sale of creative works online, financial institutions must perform a labor- eliminating the risk of file copying and intensive multi-step process for each new redistribution. customer. KYC costs could be reduced through cross-institution client verification and at the same time increase monitoring 13. Data management: Today, in exchange and analysis effectiveness. for their personal data people can use social media platforms like Facebook for free. In platform to vote for the 2018 inductee into the future, users will have the ability to the Rock and Roll Hall of Fame. Votem manage and sell the data their online activity processed over 1.8 million votes without generates. Because it can be easily fraud, compromise, attacks or hacking of distributed in small fractional amounts. any kind, marking it the largest use of online 14. Land title registration: As Publicly- voting using blockchain technology to accessible ledgers, blockchains can make all date.The Votem system was recently used kinds of record-keeping more efficient. for the 2018 Inductee Vote. Property titles are a case in point. They tend Case Study 3: Smartmatic-Cybernetica — to be susceptible to fraud, as well as costly Utah Republican Party, 2016 Presidential and labor-intensive to administer. Candidate 15. Stock trading: The potential for added Election, USA efficiency in share settlement makes a strong Smartmatic-Cybernetica delivered the use case for blockchains in stock trading. world‟s first online election using When executed peer-to-peer, trade blockchain technology for the Utah confirmations become almost instantaneous Republican party caucus in 2016. Nearly (as opposed to taking three days for 90% of voters registered to vote online. The clearance). platform enabled 24,486 voters.
2. EXISTING SYSTEM 3. PROPOSED SYSTEM
Case Study 1: Voatz — State of West In ideal condition as occurs with paper Virginia, 2018 Federal Elections, USA ballot voting, information about whom the In the first use of blockchain technology in a voter voted is kept secret. This information U.S. federal election, the State of West is not even known to the election Virginia used Voatz‟s mobile voting commission. This security aspect is very application to enable overseas voters to vote central to the electronic voting system. The in the 2018 U.S. midterm elections. A total system should be secure enough that no one of 144 voters from 31 countries participated should be able to know whom the voter in the pilot. The Voatz application relies on voted for and tamper with it at later stages. blockchain technology to create an Also, there should be efforts to ensure the immutable record of the votes cast. It also anonymity of the voter. To maintain voting uses cybersecurity software to detect data confidentiality, trusted third party(TTP) malware on smartphones, and biometrics for can be used. TTP acts as an agent between identification and authentication. the voter and the election commission to Case Study 2: Votem — Rock and Roll authenticate the voter to vote during Hall of Fame, 2017 & 2018 Inductee elections. Without TTP, it is difficult to Voting, USA incorporate security and data confidentiality. In 2017, music fans were able to use Votem‟s blockchain-based mobile voting BEFORE VOTING: The election commission should provide a user interface to the voter to express his intention for voting. The voter can be identified with any of the unique identification numbers assigned by the election commission. This consistently throughout the process. In the identification number must be used registration process, the voter submits a secret message. As a response to the secret verification, the election commission returns message, the client site web page generates a the validity of the voter to a trusted third unique random reference number to the party. voter which has to be noted for future reference during voting.
A voter identified as valid will be taken to
the voting page. There, a list of candidates An internally hash secret message and will be shown based on constituency. reference number is generated and stored in During this process, a trusted third party the election commission database. It‟s generates a public key for the voter using the important that voter not share this secret message and reference multi-chain network and stores this number with the election commission. information against the hash of the secret Otherwise, the election commission writes message and reference number of the voter. to get to know who voted for whom and The same is depicted in above. There are potentially manipulate the whole voting cases where a voter might try to vote process at later stages of voting. multiple times for the same contestant or for the multiple contestants. In either case of the DURING VOTING: In the real world, system guards against such malicious voting happens during the stipulated period. voting. This safeguarding is made possible The same procedure is followed here. in a multi-chain by restricting the number of However, the duration of voting can be transactions between 2 parties to one. extended. During voting, the voter has to Hence, even if the voter does more than one submit the same secret message and transaction/votes, those will be invalidated reference number that has been generated by multi-chain. during voter registration to the trusted third party. Trusted third party has to send the AFTER VOTING: Since it is an electronic message hash to the election commission to voting system, reports can be generated in verify that the voter is a valid voter. Upon real time. However, the real time report of who is leading and who is lagging should not be made public as it might affect public sentiment and could bais to a particular party or candidate. After the voting completeness, detailed results, constituency results etc. can be easily report about a candidate‟s results party-wise prepared using any BI tool b coming data from multi-chain and data stored in Election 4. Algorithm: Decentralized app needs Commission records. to have a consensus mechanism that portrays proof of value in the dApps: The Ultimate Open Source cryptographic system. Essentially, Revolution this endows value to the The dApp concept is still in its nascent cryptographic token and creates a stage. Explaining the same in a single line is consensus protocol that users agree tough because no upon to generate valuable crypto a specific definition seems to fit all the tokens. attributes that make an application a decentralized app. As dApps, an application 4. RESULT ANALYSIS is required to exhibit the following four E-voting is still a controversial topic within characteristics: both political and scientific circles. Despite 1. Open Source: The first and the existence of a few very good examples, foremost attribute is that such apps most of which are still in use; many more should make their core source code attempts were either failed to provide the available to everyone. As the core security and privacy features of a traditional characteristic of dApps is autonomy election or have serious usability and and unanimous consensus, scalability issues. On the contrary, essentially the changes must be blockchain-based e-voting solutions, decided by all or the majority of the including the one we have implemented users. Also, the code should be using the smart contracts and the Ethereum available to everyone for checking network, address (or may address with out. relevant modifications) almost all of the 2. Decentralized Nature: As the name security concerns, like privacy of voters, suggests, decentralized applications integrity, verification and non-repudiation of store everything on a decentralized votes, and transparency of counting. Yet, blockchain or any cryptographic there are also some properties that cannot be technology to save the app from addressed solely using the blockchain, for perils of centralized authority and example authentication of voters (on the emphasize on autonomous nature. personal level, not on the account level) 3. Incentivization: As the app is based requires additional mechanisms to be on the decentralized blockchain, the integrated, such as use of biometric factors. validators of the records on the network must be 5. CONCLUSION rewarded/incentivized with In this project, we introduced a blockchain- cryptographic tokens or any form of based electronic voting system that utilizes digital asset that has value. smart contracts to enable secure and cost- efficient election while guaranteeing voters privacy. We have shown that blockchain technology offers a new possibility to overcome the limitations and adoption barriers of electronic voting systems which ensures the election security and integrity and lays the ground for transparency. Using an Ethereum private blockchain, it is possible to send hundreds of 6. S. Holder, “Can the Blockchain Tame transactions per Moscow‟s Wild Politics?,” CityLab, 22 second onto the blockchain, utilizing every Dec. 2017; aspect of the smart contract to ease the load https://www.citylab.com/life/2017/12/can-th on the blockchain. e-blockchain For countries of greater size, some -tame-moscows-wild-politics/547973. additional measures would be needed to 7. “A South Korean Province Used support greater throughput of Blockchain Tech for Resident Vot- ing,” transactions per second. CCN.com, 8 Mar. In future to make the Voting application 2017; https://www.ccn.com/south-korean more secure we would like to add more -province-used-blockchain-tech authentication systems like biometrics, face 8. https://ethereum.org/ ID and other authentication units. This way 9. https://www.trufflesuite.com/ we can provide more security and ensure 10. https://www.trufflesuite.com/ganache that the vote is being casted by the voter 11. https://www.chaijs.com/ themselves. 12. https://mochajs.org/ 13. https://solidity.readthedocs.io/en/v0.5.3 REFERENCES: 1. Digital Home Blockchain Voting System,ActiveCitizen in Moscow Opens, “BitcoinExchangeGuide.com”. 2. “How Estonia Brought Blockchain Closer to Citizens: GovTech Case Studies,” Cointelegraph, 7 Mar. 2017; http://cointelegraph 3. “South Korea Uses Blockchain Technology for elections,” KryptoMoney, 2 may 2017; http://KrytoMoney.com/south-korea-uses-Bl ockchain-technology-for-elections. 4. M.D. Castillo, “Russia Is Leading the Push for Blockchain Democracy,” CoinDesk, 2018; https://www .coindesk.com/russias-capital -leading-charge-blockchain -democracy. 5. B. Kimathi, “Why You Shouldn‟t Get Carried Away by Sierra Leone‟s Blockchain Elections,” Crypto- Lines, 13 Mar. 2018; https://crypto-lines.com/2018/03/13/blockch ain -elections.
Implementing Enterprise Cyber Security With Open Source Software and Standard Architecture Volume Ii River Publishers Series in Digital Security and Forensics 1St Edition Anand Handa Full Chapter