Skip to main content
Log in

Privacy preserving E-voting cloud system based on ID based encryption

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Most of the various sectors in today’s life such as bank, transport, voting, health, electricity, etc., are currently digitalized. In our research paper, we have surveyed the voting system and explored the existing drawbacks of the voting system concerning security and malfunction. The demerits in the existing schemes include less data security, vote modification, man in the middle attack, masquerade attack, denial of service attack, impersonation attack, etc. Such attacks can compromise security and allows attackers to modify the results. To resolve the above-mentioned issues as well as the attacks, this research paper proposes a protocol to overcome security-based issues. In the proposed system, a secure online e-voting system is developed for end-to-end users to avoid misappropriation on the vote during the result publication in India or any other country. The proposed E-Voting Cloud System (ECS) system has three phases: The first phase is the registration phase, the second phase is vote polling, and the third phase is result announcements. In the proposed system, the election commission of India can search and verify the vote data through cloud computing. For a detailed description of our proposed protocol, a cube data storage structure and user differentiated system are first implemented. Based on the cube data structure and user differentiated system model, the proposed protocol helps to store voter data in the cloud with the encrypted model and ECS. Finally, the candidate can decrypt the data using their key. The people can verify the result announced by the ECS. The performance analysis clearly shows that our proposed system is highly secure when compared to the existing system. Using the proposed work, secure data transfer can be performed in an efficient way for online e-voting applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. X. Chen, J. Li, J. Ma, Q. Tang, and W.Lou, “New algorithms for secureoutsourcingofmodularexponentiations,“IEEETransactions on Parallel and Distributed Systems, vol. 25, no. 9, pp. 2386–2396, 2014

  2. Shen J, Shen J, Chen X, Huang X, Susilo W (2017) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Informat Forensics Secur 12(10):2402–2415

    Article  Google Scholar 

  3. Wang B, Gu X, Ma L, Yan S (2017) Temperature error correction based on bp neural network in meteorological wireless sensor network. Int J Sensor Netw 23(4):265–278

    Article  Google Scholar 

  4. Zhong W, Xie K, Liu Y, Yang C, Xie S (2018) Auctionmechanisms for energy trading in multi-energy systems. IEEE Trans Ind Informat 14(4):1511–1521

    Article  Google Scholar 

  5. Kang J, Yu R, Huang X, Maharjan S, Zhang Y, Hossain E (2017) Enabling localized peer-to-peer electricity trading among plugin hybrid electric vehicles using consortium blockchains. IEEE Trans Ind Informat 13(6):3154–3164

    Article  Google Scholar 

  6. Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copymove forgery detection scheme. IEEE Trans Informat Forensics Secur 10(3):507–518

    Article  Google Scholar 

  7. Chen X, Chen S, Wu Y (2017) Coverless information hiding method based on the chinese character encoding. J Internet Technol 18(2):313–320

    Google Scholar 

  8. Kong Y, Zhang M, Ye D (2017) A belief propagation-based method for task allocation in open and dynamic cloud environments. Knowl-Based Syst 115:123–132

    Article  Google Scholar 

  9. Pan Z, Lei J, Zhang Y, Sun X, Kwong S (2016) Fast motion estimation based on content property for low-complexity h. 265/hevc encoder. IEEE Trans Broadcast 62(3):675–684

    Article  Google Scholar 

  10. Ma T, Zhang Y, Cao J, Shen J, Tang M, Tian Y, Al-Dhelaan A, Al-Rodhaan M (2015) K dvem: a k-degree anonymity with vertex and edge modification algorithm. Computing 97(12):1165–1184

    Article  MathSciNet  Google Scholar 

  11. Thompson, Joseph KS (2016) Cognitive Radio Assisted OLSR Routing for Vehicular Sensor Networks. Procedia Comput Sci, Elsevier BV 89:271–282

    Article  Google Scholar 

  12. Shen J, Wang C, Wang A, Sun X, Moh S, Hung PC (2017) Organizedtopologybasedroutingprotocolinincompletelypredictable ad-hoc networks. Comput Commun 99:107–118

    Article  Google Scholar 

  13. Jian Shen, Chen Wang, Anxi Wang, Sai Ji, and Yan Zhang, “A Searchable and Verifiable Data Protection Scheme for Scholarly Big Data,” IEEE Trans Emerg Topics Comput, vol. 14, NO.8, DOI https://doi.org/10.1109/TETC.2018.2830368

  14. Mohib Ullah, Arif Iqbal Umar, Noor ul Amin, Nizamuddin, “An Efficient and Secure Mobile Phone Voting System,” 978–1–4799-0615-4/13/$31.00 ©2013 IEEE

  15. Xie Y, Wen H, Wu B, Jiang Y, Meng J A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing. IEEE Trans Cloud Comput. https://doi.org/10.1109/TCC.2015.2513388

  16. Li R ChenglinShen, Heng he, ZhiyongXu, and Cheng-ZhongXu, “a lightweight secure data sharing scheme for Mobile cloud computing”, DOI https://doi.org/10.1109/TCC.2017.2649685. IEEE Trans Cloud Comput

  17. Yang X, Yi X, Nepal S, Kelarev A, Han F A secure verifiable ranked choice online voting system based on Homomorphic encryption. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2817518

  18. Shamir A, Cryptosystems I-B, Schemes S (1984) Advances in cryptology: proceedings of CRYPTO 84. Lect Notes Comput Sci 7:47–53

    Google Scholar 

  19. Kiayias A, Zacharias T, Zhang B (2017) An Efficient E2E Verifiable E-voting System without Setup Assumptions. IEEE Secur Privacy 15:14–23

    Article  Google Scholar 

  20. Xu L, Shen Y, Chan HC (2017) Understanding Content Voting Based on Social Foraging Theory. IEEE Trans Eng Manag 64:574–585

    Article  Google Scholar 

  21. Kshetri N, Voas J (2018) Blockchain-Enabled E-Voting. IEEE Software 35:95–99

    Article  Google Scholar 

  22. Gao S, Zheng D, Guo R (2019) An Anti Quantum E Voting Protocol In Block Chain With Audit Function. IEEE ACESSS 7:115304–115316

    Article  Google Scholar 

  23. Shahzad B, Crowcroft AJ (2019) Trust Worthy Electronic Voting Used Adjusted Blockchain Technology. IEEE ACESSS 7:24477–24488

    Article  Google Scholar 

  24. Qureshi A, Megías D, Rifà-Pous H (2019) SeVEP: Secure and Verifiable Electronic Polling System. IEEE Access 7:19266–19290

    Article  Google Scholar 

  25. Arnob MS, Sarker N, Inzamam-UlHaque M, Bhuyan MGS (2020) Blockchain-Based Secured E-Voting System to Remove the Opacity andEnsure the Clarity of Election of Developing Countries. Int Res J Eng Technol 7(01):1826–1831

    Google Scholar 

  26. Nikhilesh Lalam M, Nithinn S, Jebakumar R (2020) BEVS - Blockchain Based E-Voting System. Int J Adv Sci Technol 29(9s):6241–6249

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Pandiaraja PhD.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection: Special Issue on Network In Box, Architecture, Networking and Applications

Guest Editor: Ching-Hsien Hsu

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shankar, A., Pandiaraja, P., Sumathi, K. et al. Privacy preserving E-voting cloud system based on ID based encryption. Peer-to-Peer Netw. Appl. 14, 2399–2409 (2021). https://doi.org/10.1007/s12083-020-00977-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-020-00977-4

Keywords

Navigation