Advertisement

Cluster Computing

, Volume 22, Supplement 1, pp 1703–1716 | Cite as

Anonymous and formally verified dual signature based online e-voting protocol

  • Malik Najmus Saqib
  • Junaid Kiani
  • Basit Shahzad
  • Adeel AnjumEmail author
  • Saif ur Rehman Malik
  • Naveed Ahmad
  • Atta ur Rehman Khan
Article
  • 162 Downloads

Abstract

The traditional paper-based voting is severely criticized after having found evidence of rigging in elections, leading to the uncertainty in the fairness of the election process. Traditional voting systems have severe issues in either user’s privacy or voting procedures. To counter these issues, e-voting systems have emerged as a potential solution. In this work, we proposed Internet e-voting protocol that fulfills the core properties like anonymity, verifiability, eligibility, privacy, receipt-freeness and fairness using dual signature. We prove the effectiveness and validity of our system using formal methods. A rigorous performance evaluation shows that our system clearly outperforms the existing state-of-the-art blind signature Internet e-voting protocols.

Keywords

E-voting Dual signatures Privacy Security 

References

  1. 1.
    Chondros, N., Zhang, B., Zacharias, T., Diamantopoulos, P., Maneas, S., Patsonakis, C., Delis, A., Kiayias, A., Roussopoulos, M.: D-DEMOS: a distributed, end-to-end verifiable, internet voting system. arXiv preprint arXiv:1507.06812 (2015)
  2. 2.
    Rubin, A.: Security considerations for remote electronic voting. Commun. ACM 45(12), 39–44 (2002)Google Scholar
  3. 3.
    Buchsbaum, T.M.: E-voting: International Developments and Lessons Learnt. Electronic Voting in Europe Technology, Law, Politics and Society, pp. 31-34 (2004)Google Scholar
  4. 4.
    Krimmer, R., Triessnig, S., Volkamer, M.: The development of remote e-voting around the world: a review of roads and directions. In: International Conference on E-Voting and Identity, Springer Berlin Heidelberg, pp. 1–15 (2007)Google Scholar
  5. 5.
    Okediran, O.O., Omidiora, E.O., Olabiyisi, S.O., Ganiyu, R.A., Alo, O.O.: A framework for a multifaceted electronic voting system. Int. J. Appl. Sci. 1(4), 135–142 (2011)Google Scholar
  6. 6.
    Cetinkaya, O., Doganaksoy, A.: A practical privacy preserving e-voting protocol using dynamic ballots. In: Proceedings of the 2nd National Cryptology Symposium, pp. 1–13 (2006)Google Scholar
  7. 7.
    Olusola, O.O., Olusayo, O.E., Olatunde, O.S., Adesina, G.R.: A review of the underlying concepts of electronic voting. Inf. Knowl. Manag. 2(1), 8–20 (2012)Google Scholar
  8. 8.
    Alan, D.S., John, S.C.: Revolutionalising the voting process through online strategies. USA J Online Voting 29(5), 513–530 (2005)Google Scholar
  9. 9.
    Weldemariam, K., Kemmerer, R.A., Villafiorita, A.: Formal analysis of an electronic voting system: an experience report. J. Syst. Softw. 84(10), 1618–1637 (2011)Google Scholar
  10. 10.
    Oo, H.N., Aung, A.M.: Implementation and analysis of secure electronic voting system. Int. J. Sci. Technol. Res. 2, 158–161 (2013)Google Scholar
  11. 11.
    Adida, B.: Helios: web-based open-audit voting. In: USENIX Security Symposium, vol. 17, pp. 335–348 (2008)Google Scholar
  12. 12.
    Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)Google Scholar
  13. 13.
    Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 61–70 (2005)Google Scholar
  14. 14.
    Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: International Workshop on the Theory and Application of Cryptographic Techniques, pp. 244–251. Springer, Berlin (1992)Google Scholar
  15. 15.
    Baraani-Dastjerdi, A., Pieprzyk, J., Safani-Naini, R.: A Practical Electronic Voting Protocol Using Threshold Schemes. Department of Computing Science, University of Wollongong, Wollongong (1994)Google Scholar
  16. 16.
    Juang, W.S., Chin-Laung, L.: A secure and practical electronic voting scheme for real world environments. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 80(1), 64–71 (1997)Google Scholar
  17. 17.
    Juang, W.S., Lei, C.L., Liaw, H.T.: A verifiable multi-authority secret election allowing abstention from voting. Comput. J. 45(6), 672–682 (2002)zbMATHGoogle Scholar
  18. 18.
    Okamoto, T.: Receipt-free electronic voting schemes for large scale elections. In: International Workshop on Security Protocols, pp. 25–35. Springer, Berlin (1997)Google Scholar
  19. 19.
    Kiayias, A., Yung, M.: The vector-ballot e-voting approach. In: International Conference on Financial Cryptography, pp. 72–89. Springer, Berlin (2004)Google Scholar
  20. 20.
    Li, J., Zhang, Y., Chen, X., Xiang, Y.: Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72, 1–12 (2018). ISSN 0167-4048Google Scholar
  21. 21.
    Li, P., Li, J., Huang, Z., Li, T., Gao, C.-Z., Yiu, S.-M., Chen, K.: Multi-key privacy-preserving deep learning in cloud computing. Future Gener. Comput. Syst. 74, 76–85 (2017)Google Scholar
  22. 22.
    Li, P., Li, J., Huang, Z., Gao, C.-Z., Chen, W.-B., Chen, K.: Privacy-preserving outsourced classification in cloud computing. Clust. Comput. (2017).  https://doi.org/10.1007/s10586-017-0849-9 Google Scholar
  23. 23.
    Jouini, M., Rabai, L.B.A.: A security framework for secure cloud computing environments. Int. J. Cloud Appl. Comput. (IJCAC) 6(3), 32–44 (2016)Google Scholar
  24. 24.
    Li, J., Li, J., Chen, X., Jia, C., Lou, W.: Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans. Comput. 64(2), 425–437 (2015)MathSciNetzbMATHGoogle Scholar
  25. 25.
    Gupta, B.B., Gupta, S., Chaudhary, P.: Enhancing the browser-side context-aware sanitization of suspicious HTML5 code for halting the DOM-based XSS vulnerabilities in cloud. Int. J. Cloud Appl. Comput. (IJCAC) 7(1), 1–31 (2017)Google Scholar
  26. 26.
    Li, J., Li, Y.K., Chen, X., Lee, P.P.C., Lou, W.: A hybrid cloud approach for secure authorized deduplication. IEEE Trans. Parallel Distrib. Syst. 26(5), 1206–1216 (2015)Google Scholar
  27. 27.
    Wu, J., Guo, S., Li, J., Zeng, D.: Big data meet green challenges: big data toward green applications. IEEE Syst. J. 10(3), 888–900 (2016)Google Scholar
  28. 28.
    Wu, J., Guo, S., Li, J., Zeng, D.: Big data meet green challenges: greening big data. IEEE Syst. J. 10(3), 873–887 (2016)Google Scholar
  29. 29.
    Wen, H., Tang, J., Wu, J., Song, H., Wu, T., Wu, B., Ho, P.-H., Lv, S.-C., Sun, L.-M.: A cross-layer secure communication model based on discrete fractional fourier fransform (DFRFT). IEEE Trans. Emerg. Top. in Comput. 3(1), 119–126 (2015)Google Scholar
  30. 30.
    Malik, S.U.R., Khan, S.U., Srinivasan, S.K.: Modeling and Analysis of State-of-the-art VM-based Cloud Management Platforms. IEEE Trans. Cloud Comput. 1(1), 50–63 (2013)Google Scholar
  31. 31.
    Malik, S.U.R., Khan, S.U.: Formal methods in large-scale computing systems. ITNow 55(2), 52–53 (2013)Google Scholar
  32. 32.
    Malik, S.U.R., Bilal, K., Khan, S.U., Veeravalli, B., Li, K., Zomaya, A.Y.: Modeling and analysis of the thermal properties exhibited by cyber physical data centers. IEEE Syst. J. 11(1), 163–172 (Dec. 2015)Google Scholar
  33. 33.
    Alam, M., Malik, S.U.R., Javed, Q., Khan, A., Khan, S.B., Anjum, A., Javed, N., Akhunzada, A., Khan, M.K.: Formal modeling and verification of security controls for multimedia systems in the cloud. Tools Appl, Multimed (2017).  https://doi.org/10.1007/s11042-017-4853-0 Google Scholar
  34. 34.
    Nasir, M., Anjum, A., Manzoor, U., Balubaid, M.A., Ahmed, M., Khan, A., Ahmad, N., Malik, S.U.R., Alam, M.: Privacy preservation in skewed data using frequency distribution and weightage (FDW). J. Med. Imaging Health 7(06), 1346–1357 (2017)Google Scholar
  35. 35.
    tul Muntaha, S., Khan, A., Manzoor, U., Sarwar, K., Ahmed, M., Tahir, M., Anjum, A., Malik, S.U.R., Alam, M., Javaid, N., Balubaid, M.A.: Towards preserving privacy of outsourced genomic data over the cloud. J. Med. Imaging Health 7(06), 1475–1482 (2017)Google Scholar
  36. 36.
    Moqurrab, S.A., Anjum, A., Manzoor, U., Nefti, S., Ahmad, N., Malik, S.U.R.: Differential average diversity: an efficient privacy mechanism for electronic health records. J. Med. Imaging Health 7(06), 1177–1187 (2017)Google Scholar
  37. 37.
    Anjum, A., Raschia, G., Khan, A., Malik, S.U.R., Ahmad, N., Ahmed, M., Suhail, S., Alam, M.: τ-Safety: a privacy model for sequential publication with arbitrary updates. Comput. Secur. 66, 20–39 (May 2017)Google Scholar
  38. 38.
    Zafar, F., Abid Khan, S.U.R., Malik, M.A., Adeel Anjum, M.I., Khan, N.J., Alam, M., Jamil, F.: A survey of cloud computing data integrity schemes: design challenges, taxonomy and future trends. Comput. Secur. 65, 29–49 (2017)Google Scholar
  39. 39.
    Asad, S., Saba, T., Hussain, S., Ahmed, M., Akram, S., Khan, A., Anjum, A., Shah, M.A., Javaid, N.: An ontology-based approach for detecting drug abuse epidemiology. J. Med. Imaging Health Inf. 7, 1324–1337 (2017)Google Scholar
  40. 40.
    Zafar, F., Khan, A., Suhail, S., Ahmed, I., Khizar Hameed, H.M., Khan, F.J., Anjum, A.: Trustworthy data: a survey, taxonomy and future trends of secure provenance schemes. J. Netw. Comput. Appl. 94, 50–68 (2017)Google Scholar
  41. 41.
    Anjum, A., Raschia, G.: BangA: an efficient and flexible generalization-based algorithm for privacy preserving data publication. Computers 6(1), 1 (2017)Google Scholar
  42. 42.
    Jamil, F., Khan, A., Anjum, A., Ahmed, M., Jabeen, F., Javaid, N.: Secure provenance using an authenticated data structure approach. Comput. Secur. 73, 34–56 (2018)Google Scholar
  43. 43.
    Adeel Anjum, S.U.R., Malik, K.-K.C., Khan, A., Haroon, A., Sangeen Khan, S.U., Khan, N.A., Raza, B.: An efficient privacy mechanism for electronic health records. Comput. Secur. 72, 196–211 (2018)Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Information Systems, Faculty of Computing and Information TechnologyUniversity of JeddahJeddahSaudi Arabia
  2. 2.Department of Computer SciencesCOMSATS Institute of Information TechnologyIslamabadPakistan
  3. 3.Department of Engineering, Faculty of Engineering & CSNational University of Modern LanguagesIslamabadPakistan
  4. 4.Department of Computer SciencesAir UniversityIslamabadPakistan

Personalised recommendations