Professional Documents
Culture Documents
Abstract— In the present situation, most people are not Blockchain use in public key cryptography to encrypt and
satisfied with the final result of the voting system. This is decrypt the transaction over the peer-to-peer network. The
because the current system for voting is centralized and fully blocks in the b lockchain have several fields: Merkle root,
controlled by the election commission. So, there is a chance
the previous block hash, time stamp, and the actual
that the central body can be compromised or hacked and the
final result can be tempered. In this direction, a decentralized, transaction. The structure of blocks is divided into two parts:
Blockchain and IoT based methodology for voting system is headers and bodies. The headers consist of the hash of the
devised and presented in this paper. Blockchain is totally previous block, time stamp, nonce, and Merkle tree. The
transparent, secured and immutable technique because it uses body consists of all t ransactional data. The block header 80 -
concept like encryption, decryption, hash function, consensus byte field contains that metadata – the data about the blocks.
and Merkle tree etc. which make Blockchain Technology an
appropriate platform for storing and sharing the data in a Ti me Stamp. It’s the digitally recorded mo ment of time
secured and anonymous manner. IoT makes use of biometric when the block has been mined. It is used to validate the
sensors using which people can cast their votes in not only transactions.
physical mode but also in digital mode. As a response, a Previous Bl ock Hash. It is a 32-byte field that carries a
message is received to the owner for casting his vote to ensure
the authentication. In this way, the present voting system is 256-b it hash of the preceding block that was generated
more secure and trust-worthy by using the properties of both using the SHA-256 cryptographic hashing algorithm.
Blockchain and IoT, and therefore, election process in the This aids in building a block chain that is linear.
democratic countries is valued more. The proposed method Nonce. Its root nu mber is contained in the 4-byte-long
ensures security as well as reduces the computational time as field. These are the only elements in a block of
compared to the existing approaches.
transactions that can be changed. Miners in PoW change
Keywords—Secu rity, Blockchain, Consensus, Smart their announcements until they locate the correct block
Contract, Merkle Tree, Hash, Nonce, IoT. hash.
Merkle Root. A 32-bytes field containing a 256-bit root
I. INT RODUCT ION hash. It is built hierarchically by merg ing the hashes of
These days, Blockchain has been used in several each transaction into a block.
applications viz., healthcare information system, smart Transacti onal Data. The list of all transactions in the
agriculture system, and s mart city to enhance the security block is contained in a variable-size field. Just so you
[6-8]. It is also widely used in the areas of vehicular area know, there are roughly 2000 transactions in each b itcoin
networks, social networks, and e voting systems to provide block. Each block is roughly 1 M B in size. Blockchains
the secure and efficient models [9-12]. Currently, two ways have different limits on block size and the quantity of
for voting system are used in Indian constituency system. transactions. A decision is made based on communication
The paper ballot system is the first, and the electronic voting overhead and network congestion.
mach ine is the second (EVM ). The ballot paper system is
not a secure voting system because anyone can change their A. Motivation
ballot papers. In this case, fair election is not performed. Use of blockchain technology can make the process of
Apart fro m the ballot paper the second method is using elections very easy and convenient [13-16]. In the present
EVM (electronic voting machine) which is a digital form o f situation, voters leave their homes and go to the election
voting this method is also not secure because people may center to cast their votes, which is not very voter-friendly
think that EVM can be hacked and vote can be tempered.
[17-22]. Therefore, we are to imp lement our work so that
So, dig ital voting system is placed that is entirely based on
users do not need to go to election center for casting their
blockchain technology. Introduction to Blockchain
vote and they can cast their vote fro m ho me by just using a
Technology – It is a decentralized distributed ledger system
in which t ransactions are stored in b locks and the blocks are simple web application or mobile application.
connected together with the help of hashes. In a blockchain
network, all blocks have the same authority to check and
verify the transaction details across the whole network.
B. Contibution
This paper contributes to improve the election process in Keerthi et al. [3] The Writer's Discussion in this article
the democratic countries by proposing a blockchain based contains numerous suggestions for an entirely online-based
methodology for the security enhancement in the voting voting system. The majo rity of nations continue to use paper
system. This technique ensures the trust among various ballots for voting. Over the past ten years, electronic voting
political part ies and the people as well as prevents the systems have grown widely, yet there are still a lot of
debate over vote tampering. Apart fro m this, it will also problems. The main issues with electronic voting are safety,
make the election process much easier for the voters and legality, reliability, openness, transparency, and usability.
will maintain the security, privacy, transparency, and The choices are constrained for blockchain, though. With
anonymity of the users . the use of blockchain technology, which also provides
advantages like immutability and decentralization, it is
C. Organization possible to overcome all the problems outlined. The lack o f
Rest of the paper is organized as follows. Section 2 testing and comparison, as well as the emphasis on a single
presents the literature review of the related work. The theme, are the key problems with blockchain technology as
electronic voting system is illustrated in Section 3. Section 4 it relates to electronic voting.
describes the current electronic voting system technology.
The experimental results are reported in Section 5. Th is study presents a general-purpose electronic voting
system based on blockchain. The blockchain allo ws for the
II. RELAT ED W ORK complet ion of all processes. Once voting has started,
Bajpai et al.[1] proposed In this paper, the author focuses decentralization makes sure that the platform is totally
on providing the best digital voting system for voters and independent and cannot affect the results of the vote. Voters'
identities are protected thanks to homomorphic encryption.
organizers in democratic countries. It has long been
On three different blockchains, our solution was examined
challenging to develop a safe electronic voting system that
and compared. The results demonstrate that both public and
maintains current voting techniques, fairness and anonymity
private blockchains are accessible at very modest speeds.
while offering the flexib ility and transparency that come Due to the homomorphic encryption employed to safeguard
with electronic systems. voter data, we have created a novel method that completely
decentralizes the management of the e-voting platform.
As a result, by incorporating the qualit ies of an ideal
voting system into the digital realm, the effectiveness of the Patil et al.[4] The authors of this paper largely concentrate
voting system is strengthened. As a result, election expenses on the electronic voting mechanism. Dig ital technology has
and inspector labor have co me down significantly. As recently benefited the lives of many people. This is unlike
described in this paper, we propose the architecture of a new the voting process, which mostly relies on conventional
electronic voting system using open-source blockchain paper for imp lementation. The issues of security and
technology. Blockchain is offering new potential to develop transparency are threatened by the growing use of the
new categories of digital services. Blockchain technology conventional (offline) electoral process. General elections
has changed many aspects of our lives, including the ability are still conducted using a centralized system, wh ich is
to secure digital t ransactions made over the Internet, to supervised by a single organization. Tradit ional electoral
validate their validity, to license them, and to offer the systems have problems with the ability of the entity to
highest level of security and encryption. To store data, this completely control the database and the system's tampering
system provides a distributed architecture that spreads the with the database of the crucial opportunity, among other
data between mult iple servers. This technology not only things. Blockchain is one of the technological answers since
protects voter identity outside of the voting process but also it is based on a decentralized system in which various
makes the voting process visible. people own the complete database. The blockchain is
emp loyed by the bitcoin system, co mmon ly referred to as
Mani et al.[2] exp lained in this paper, blockchain is a the decentralized banking system. One of the primary
distributed system that validates security and dependability. methods for manipulat ing databases Blockchain technology
A new era of a reliab le and consensus -based system has can be used to spread datasets on the electronic voting
begun as a result. Since blockchain places a strong emphasis system, thereby reducing this risk. Th is study looks at how
on security, many other activ ities and processes are vote results from each election site are recorded using
following its lead. The offered dig ital Ethereu m network blockchain algorith ms. This thesis proposed a technology
currently encourages almost all activit ies and operations to that relied on each node in the underly ing blockchain taking
be carried out electronically. We have seen how the current a specific turn on the system, as opposed to Bitcoin's proof-
COVID-19 pandemic situation has changed as a result of the of-work.
election process. The suggested solution implements the
college voting mechanism utilizing the Aadhaar API and the Rathee et al.[5] In this art icle, the author discusses
Ethereu m network on a blockchain platfo rm. E-voting will blockchain and IoT -based voting systems. A smart city is an
contribute to increased transparency and voter trust, which intelligent environ ment created by the coordinated and
will help to eliminate fraud and corruption in the voting intelligent deployment of all available resources and cutting -
process. As a result of the usage of blockchain technology, edge technologies. When 5G technology and intelligent
this method will enable voters to cast their ballots fro m sensors (Internet-of-things (IoT) devices) operate together,
home with total security and dependability. users' needs are met mo re efficiently and with greater ease.
E-voting, among other IoT use cases, is a significant document forgeries allow a single person to cast several
application that advances IoT to the next stage in the ballots. The electronic voting system and this bio metric
development of smart city technology. In traditional system can both be imp lemented in the same application.
applications, it's common to presumptively trust and We would need separate ledgers for voter preferences and
cooperate with every single device. However, in reality, biometric data, and each miner would have to verify the data
intrusions may cause disruptions in devices, causing them to before confirming a voting transaction. In this instance, the
act maliciously and degrade network functions. Because of accounts would be created using your physical data rather
this, there is a serious issue with the privacy and security than documents or emails. The ledgers would also need to
problems in e -voting systems in part icular, where hackers be updated daily with information on the number of deaths
could commit a multitude of frauds to rig the election.
and people reaching 18 (the legal voting age in India), and
III. PROPOSED M ODEL they would need to be in sync with the census. The actual
data entered can be checked using public records, police
The suggested design will be based on a smart contract
records, and, in situations of suspicion, in person at a
made with Ethereu m software to construct an electron ic
procedure that the government has allowed. For a huge
voting application where the user will establish an account
portion of the Indian populace who are not particularly
and appropriate account verification is co mpleted via voter
familiar with the technical comp lexities of technology, such
identification and other biometric techniques. Each action
as the password reset and document update possibilities, it is
taken with this account is a vote that has to be verified by a
also a simpler way.
miner. The miner will assign the vote to a vote pool for that
constituency based on the voter's identity and take into These factors may cause people to forgo the entire voting
account the voter's permanent address. The opportunity to process, which would be detrimental rather than beneficial.
register to vote will be available for a brief period of time. A one-touch option that takes them to the parties of their
Each registered vote will be processed using biometric choice and another single-touch option that allows them to
techniques, and the miner will confirm the validity of each cast their ballots while remaining in the comfort of their
vote. The miner will cancel the request when the homes sounds like a much more practical solution. The
constituency's election date has passed and any additional procedure flowchart for blockchain electronic voting is
votes have been registered. The request will also be shown in Fig. 2.
cancelled by the miner if the user's biometric authentication
fails. Voting in more than one constituency will not be
permitted by the same account holder. As a result, in o rder
to save time and minimize security risks, IoT devices
needed to be protected by projecting an effective and
trustworthy framework.
B. Metamask
You may explore the scattered web of the present in your
browser with Metamask. Additionally, it enables you to run
Ethereu m on your browser without having to run a full
Ethereu m node. It contains a secure identification b lock that
gives users an interface to maintain their identities across
many websites and sign blockchain transactions.
C. NodeJS
NodeJS is an open-source, cross-platform environment
for creating networking and server-side
applications. Applications created using NodeJS can be used
on Linu x, OS X, and Microsoft Windows and are written in
Figure 4. Blockchain Based Complete E Voting Process for All Voters. JavaScript. Additionally, it offers a variety of JavaScript
modules, greatly facilitating the creation of web applications
The blockchain hashes are highly useful when someone using NodeJS.
wants to identify or spot any changes in the current blocks. A
single modification to any recorded data, such as vote totals D. ReactJS
or individual identities within the block, will, according to a A JavaScript package called ReactJS is used to create a
blockchain feature, affect the current hash. Each block variety of reusable UI co mponents. It produces user
includes the hash of the previous and current blocks, creating interface (UI) elements that can display dynamic data. React
a chain of blocks and guaranteeing the security of the is frequently used as the V in M VC. React provides a more
blockchain. Let's have a look at where a 3-block chain straightforward programming model and higher speed. Node
sequence is worn to get a better understanding of it in the
may be used to build React on the server, while React
context of E-voting. Each block in Fig. 3 denotes a cast vote
or the total number of votes cast by voters. Voter data, the Native can be used to build native apps. One-way reactive
current hash, and the hash of the following block are the data flow, which React imp lements, is less boilerp late and
three components of each block. Nu merous authorities are simpler to understand than conventional data binding.
assigned to record or preserve each vote's tally using
V. RESULT S AND DISCUSSION
Blockchain. Let's assume that a hacker tries to alter the data
of the second block from the outside or from the inside. As a result, time consumption during transaction
In such a case, any modification to the counting might processing on the blockchain network is reduced. If user
have an impact on all blocks that come after the data or vote requests are increasing, then computational time will also
information has been uploaded. This results in an irrational increase, as seen in Fig 5. User demand is decreasing, so
update of the hash of the present block as well as of blocks 3 computation time also decreases. Power consumption is also
and all succeeding blocks because they no longer have a increasing in blockchain transactions.
valid hash of the prior block. Therefore, changing a single 50
chunk will render all the following blocks unusable. This
Computation Time (Sec)
System. In: Xhafa, F., Barolli, L., Greguš, M. (eds) Advances in In: Themistocleous, M., Rupino da Cunha, P. (eds) Information
Intelligent Networking and Collaborative Systems. INCoS 2018. Systems. EMCIS 2018. Lecture Notes in Business Information
Lecture Notes on Data Engineering and Communications Processing, vol 341. Springer, Cham. https://doi.org/10.1007/978-3-
Technologies, vol 23. Springer, Cham. https://doi.org/10.1007/978-3- 030-11395-7_2.
319-98557-2_21. [21] Neelam Chauhan, Rajendra Kumar Dwivedi, "A Secure Design of the
[19] Abayomi-Zannu, T.P., Odun-Ayo, I., Tatama, B.F., Misra, S. (2020). Healthcare IoT System using Blockchain Technology", 9th IEEE
Implementing a Mobile Voting System Utilizing Blockchain International Conference on Computing for Sustainable Global
Technology and T wo-Factor Authentication in Nigeria. In: Singh, P., Development (16th INDIACom 2022), Bharati Vidyapeeth, New
Pawłowski, W., Tanwar, S., Kumar, N., Rodrigues, J., Obaidat, M. Delhi, India, to be held on 23-25, DOI:
(eds) Proceedings of First International Conference on Computing, 10.23919/INDIACom54597.2022.9763187( March, 2022).
Communications, and Cyber-Security (IC4S 2019). Lecture Notes in [22] Neelam Chauhan, Rajendra Kumar Dwivedi, "Designing A Secure
Networks and Systems, vol 121. Springer, Singapore. Smart Healthcare System with Blockchain: A Review", 1st IEEE
https://doi.org/10.1007/978-981-15-3369-3_63. International Conference on Informatics (ICI 2022), JIIT, Noida,
[20] Chaieb, M., Yousfi, S., Lafourcade, P., Robbana, R. (2019). Verify- India, to be held on 14-16 April, 2022, DOI:
Your-Vote: A Verifiable Blockchain-Based Online Voting Protocol. 10.1109/ICI53355.2022.9786895(April, 2022).