Towards a Privacy-Preserving Voting System Through Blockchain Technologies

作者: Rabeya Bosri , Abdur Razzak Uzzal , Abdullah Al Omar , A S M Touhidul Hasan , Md. Zakirul Alam Bhuiyan

DOI: 10.1109/DASC/PICOM/CBDCOM/CYBERSCITECH.2019.00116

关键词:

摘要: The voting system is the process to take opinion of people run constitution properly. Fairness, independence, and unbiasedness should be present in system. Hence, it must a transparent secured so that everybody can express their own freely. Worldwide vote manipulation an intriguing problem existing systems. Since different countries are using digital technology (e.g., Optical Scan Voting system, Internet Electronic system) instead traditional way Ballot Box). Only digitization could not solve issues completely. Because still there numerous ways manipulate or tamper hamper process. To build secure electronic environment, we introduce application blockchain as service for distributed With use blockchain, achieve data integrity which necessary attribute environment. anonymity voters, privacy, security environment main goal this work. Through design our with help have solved all

参考文章(27)
Guy Zyskind, Oz Nathan, Alex 'Sandy' Pentland, Decentralizing Privacy: Using Blockchain to Protect Personal Data ieee symposium on security and privacy. pp. 180- 184 ,(2015) , 10.1109/SPW.2015.27
D. Ashok Kumar, T. Ummal Sariba Begum, Electronic voting machine — A review international conference on pattern recognition. pp. 41- 48 ,(2012) , 10.1109/ICPRIME.2012.6208285
L. Christian Schaupp, Lemuria Carter, E‐voting: from apathy to adoption Journal of Enterprise Information Management. ,vol. 18, pp. 586- 601 ,(2005) , 10.1108/17410390510624025
Scott Wolchok, Eric Wustrow, J. Alex Halderman, Hari K. Prasad, Arun Kankipati, Sai Krishna Sakhamuri, Vasavya Yagati, Rop Gonggrijp, Security analysis of India's electronic voting machines Proceedings of the 17th ACM conference on Computer and communications security - CCS '10. pp. 1- 14 ,(2010) , 10.1145/1866307.1866309
Brian Rogers, Siddhartha Chhabra, Milos Prvulovic, Yan Solihin, Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly international symposium on microarchitecture. pp. 183- 196 ,(2007) , 10.1109/MICRO.2007.44
D Ashok Kumar, T Ummal Sariba Begum, None, A Comparative Study on Fingerprint Matching Algorithms for EVM Journal of Computer Sciences and Applications. ,vol. 1, pp. 55- 60 ,(2013) , 10.12691/JCSA-1-4-1
Reza Olfati-Saber, J. Alex Fax, Richard M. Murray, Consensus and Cooperation in Networked Multi-Agent Systems Proceedings of the IEEE. ,vol. 95, pp. 215- 233 ,(2007) , 10.1109/JPROC.2006.887293
Mitsuru Iwamura, Yukinobu Kitamura, Tsutomu Matsumoto, Kenji Saito, Can We Stabilize the Price of a Cryptocurrency?: Understanding the Design of Bitcoin and Its Potential to Compete with Central Bank Money Social Science Research Network. ,(2014) , 10.2139/SSRN.2519367