You are on page 1of 12

Government Polytechnic ,Washim

A
MICRO PROJECT REPORT
ON
“SECURED ONLINE VOTING SYSTEM”

OF

Subject: capstone project (22058)

Submitted By
GOPAL RAJGURU (Enrollment no.2000310247)
KUNAL THER (Enrollment No.2000310257)
TEJAS YELANE(Enrollment no.2000310261)
VAIBHAV PINJARKAR(Enrollment no.2000310245)

Subject Teacher H.O.D.


Mr. S. S. Gharde Mr. U. A. Bagade
Lecturer in Info. Tech. Department Information Technology Department

Principal

Dr. G. B. Gawalwad
Government Polytechnic, Washim

DEPARTMENT OF INFORMATION TECHNOLOGY


Term I 2022-2023
Government Polytechnic,Washim

CERTIFICATE

This is to certify that the group


GOPAL RAJGURU (Enrollment no.2000310247)
KUNAL THER (Enrollment No.2000310257)
TEJAS YELANE(Enrollment no.2000310261)
VAIBHAV PINJARKAR(Enrollment no.2000310245)
Third year Students of Information Technology has submitted a CAPSTON PROJECT report on

“SECURED ONLINE VOTING SYSTEM”

During the academic session 2021-2022 in a satisfactory manner in the partial fulfillment for the
requirement of Subject: capstone project (22058)

for the Diploma in “Information Technology ”

awarded by
Maharashtra State Board of Technical Education, Mumbai.

Subject Teacher H.O.D.


Mr. S. S. Gharde Mr. U. A. Bagade
Lecturer in Info. Tech. Department Information Technology Department

Principal

Dr. G. B. Gawalwad
Government Polytechnic, Washim

DEPARTMENT OF INFORMATION TECHNOLOGY


Term I 2022-23

Micro Project, Dept. IT, GP Washim 2022-23 Page 2


Acknowledgement

Micro Project, Dept. IT, GP Washim 2022-23 Page 3


Abstract

Micro Project, Dept. IT, GP Washim 2022-23 Page 4


INDEX
Chapter No. Chapter Name PAGE NO

5 Conclusion

References

Micro Project, Dept. IT, GP Washim 2022-23 Page 5


Chapter 1
this project report is prepared for capstan project planning of 5th sem. Capston project is
prepared for online secured voting system.
This chapter consist of following section:
1.1 introduction

1.2 background

1.3 organization

1.1 discuss about introduction. background is described in 1.2. 1.3 describes about organization
of project report

1.1 introduction
1.2 background
1.3 organization of report
Capston project planning report is prepared for documentation of securrd online voting
system. This capston project planning report includes following chapters. ch 1 explains:
Introduction and Background. literature survey is described in chapter 2. chapter 3 provides
detailed description about proposed methodology. conclusion of the report is discussed in
chapter 4. finally report is ended with references.

Summary : in this chapter Introduction and Background is discussed. In the next chapter
literature Survey will be described.

Micro Project, Dept. IT, GP Washim 2022-23 Page 6


Chapter 2
Literature survey
literature survey provides Information about the literature of existing system. It also collects
the information about the various formats used in the system.

This chapter consists of following sections:


section 2.1 explains working of existing system. problem definition is discussed in 2.2. 2.3
discussed about requirement gathering.

2.1 working of existing stem.


2.2 Problem definition
2.3 SRS
Hardware requirement
Software requirement

2.1 working of existing system


The existing system is not too effective. At present there are two types of voting
methods, they are:
1) Ballot Voting
2) EVM Voting

1.Ballot Voting: A ballot is a device used to cast votes in an election, and may be a piece of
paper used in secret voting. In this the voter is given a paper which consists of all the party
symbols along with representative names in it. Here, people come to the polling booth, take
the ballot paper and vote by putting a stamp on the desired party symbol. Finally, the ballot
paper is folded and dropped into the ballot box. At last, the votes are counted by the
Election commission officers.

Micro Project, Dept. IT, GP Washim 2022-23 Page 7


2.EVM (Electronic Voting Machine): An EVM is a device which is used for voting. This
machine consists of party symbols along with the representative’s name and a button at the
end for each and every party name. The voters come near the EVM machine after
completion of their verification at the early level before voting. After verification the voter
goes near the EVM and casts their vote by pressing the button. The above procedures are
not so accurate as there may be possibility for the false/fake voting. The ballot papers may
be lost at the time of counting which may affect results of the particular area or people may
miscount the number of votes which leads authority into wrong hands. EVM machines
sometimes get corrupted and polling gets stopped temporarily and a lot of time is wasted or
EVM may be tampered and the casted votes may be polled to a particular party only, even
the vote is casted to different candidates or parties. This may lead authority into the wrong
hands. They also lack security as one’s vote can be casted by another voter or even a
miscellaneous person. This factor is known as fake voting. Without proper authentication
there is a possibility of fake voting. So, the existing system is not efficient for voting. Even
though there is very little false/fake voting, this minor setback can turn the results in the
opposite direction.

2.2problem definition
1.Secured online voting system can gives realistic voting through ballot design
2.wastege of paper,time consuming and workload can be minimised through Secured online
voting system
3.Secured online voting system can collects votes in accurate way
4.The voting server can collects the vote and filters duplicate or invalid votes
5.After the given vote voter can check his vote is to ensure that his vote has been counted
6.As we know all systems have drawbacks so I say it is have drawbacks but befores voting
systems some drawbacks can be coverd through Secured online voting system
7.Printer timeout error,fall error,no paper error,etc such types of errors occured in EVM
can be minimised through Secured online voting system

Micro Project, Dept. IT, GP Washim 2022-23 Page 8


8.Malicious code, known as malware, also is one of the most serious security threats in
using the Internet voting system. Malware is software designed to damage computer
systems and most malicious codes are distributed through Trojan horses, viruses and
worms so we can try to fix it by developing security policies and some more security or
preventing firewall
9. replacing a small part of the machine with a look alike component that can be silently
instructed to steal a percentage of the votes in favor of a choosen candidate this type of
problems can be minimised through Secured online voting system

2.3 srs

Summary : in this chapter literature survey is discussed. In the next chapter proposed
methodology will be described.

Micro Project, Dept. IT, GP Washim 2022-23 Page 9


Proposed methodology

Micro Project, Dept. IT, GP Washim 2022-23 Page 10


Conclusion

conclusion: In this project Introduction, literature survey, motivation bas


been discussed, feasibility study checked and it is found that project is,
technically and economically feasible. Project schedule system/database
design was completed.

In next Semester this design of P-1 will be implemented with the help of
suitable language and platform.

Micro Project, Dept. IT, GP Washim 2022-23 Page 11


Reference

Micro Project, Dept. IT, GP Washim 2022-23 Page 12

You might also like