Secure Online E-voting Protocol Based on Voters Authentication
V. Sahaya Sakila1, Debin Jose2, Abhijith K P3, Adith R Babu4

1Debin Jose, Pursuing his Bachelor Degree in Computer Science and Engineering from the Prestigious SRM Institute of Science and Technology.
2Abhijith K P, Pursuing his Bachelor Degree in Computer Science and Engineering from the Prestigious SRM Institute of Science and Technology.
3Adith R Babu, Pursuing his Bachelor Degree in Computer Science and Engineering from the Prestigious SRM Institute of Science and Technology.
4V. Sahaya Sakila, Assistant Professor at the Computer Science and Engineering Department of SRM Institute of Science and Technology.

Manuscript received on October 17, 2019. | Revised Manuscript received on 22 October, 2019. | Manuscript published on November 10, 2019. | PP: 3268-3270 | Volume-9 Issue-1, November 2019. | Retrieval Number: A4653119119/2019©BEIESP | DOI: 10.35940/ijitee.A4653.119119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Although there are many e-voting systems present by analysis it is found that they all are vulnerable to privacy risk and weakness of unreliable protocols and denial of service attacks. Here is the need to implement the public key encryption e-voting system. The primary objective of this system is to make ensure reliability, privacy and security of the protocol and voting is convenience to users. As a result of the specification requirements, the system was summarized into three parts: access control process which limit access to a system or to any other resource. Secondly, voting process was done by encrypting voter’s electronic ballot before submitting to the server. Finally, the final result was sorted through deciphering the received encrypted information. The System is more efficient than other E-Voting systems, since voters can vote from their devices without extra cost and effort, and encryption ensures the security. A pseudo random number is generated using the OTP principle, is used by the voter for authentication purpose while casting the vote. These techniques provide a secure platform, thus exceeding vulnerabilities of the traditional voting system.
Keywords: Pseudo Algorithm (false name), time based One Time Password Algorithm (TOTP), Security Algorithm (RSA).
Scope of the Article: Algorithm Engineering