Abstract
In this paper we constructed a formal performance model for a secure and scalable e-voting scheme known as DRE-i voting scheme. The well-known formal stochastic performance evaluation process algebra (PEPA) language and PEPA Eclipse plug-in were used to represent the voting scheme and analyse its performance characteristics. Timely responses of remote electronic voting protocols are important to increase voters’ confidence in e-voting systems. Therefore we evaluated the average response time that voters may observe when they cast their votes using remote electronic voting systems, such as DRE-i, and we also evaluated the throughput and queue length of the DRE-i server’s actions for different number of voters inside the DRE-i e-voting system. The performance evaluation of the DRE-i scheme reveals that PEPA language is efficient in investigating the performance properties of large scale e-voting schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Backes, M., Hritcu, C., Maffei, M.: Automated verification of remote electronic voting protocols in the applied pi-calculus. In: 2008 21st IEEE Computer Security Foundations Symposium. IEEE (2008)
Bradley, J.T., Gilmore, S.T.: Stochastic simulation methods applied to a secure electronic voting model. Electron. Notes Theor. Comput. Sci. 151(3), 5–25 (2006)
Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: Seberry, J., Zheng, Y. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244–251. Springer, Heidelberg (1993). https://doi.org/10.1007/3-540-57220-1_66
Gritzalis, D.A.: Principles and requirements for a secure e-voting system. Comput. Secur. 21(6), 539–556 (2002)
Hao, F., Kreeger, M., Randell, B., Clarke, D., Shahandashti, S., Lee, P.J.: Every vote counts: ensuring integrity in large-scale electronic voting. In: 2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE 2014), vol. 2, pp. 1–25 (2014)
Hao, F., Clarke, D., Shepherd, C.: Verifiable classroom voting: where cryptography meets pedagogy. In: Christianson, B., Malcolm, J., Stajano, F., Anderson, J., Bonneau, J. (eds.) Security Protocols 2013. LNCS, vol. 8263, pp. 245–254. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-41717-7_28
Hillston, J.: A Compositional Approach to Performance Modelling, vol. 12. Cambridge University Press, Cambridge (2005)
Hillston, J.: Fluid flow approximation of PEPA models. In: Second International Conference on the Quantitative Evaluation of Systems (QEST 2005). IEEE (2005)
Kremer, S., Ryan, M.: Analysis of an electronic voting protocol in the applied Pi calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 186–200. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-31987-0_14
Madise, Ăś., Martens, T.: E-voting in Estonia 2005. The first practice of country-wide binding internet voting in the world. In: Electronic Voting, vol. 86 (2006)
Network, M.D.: Web workers API, March 2015. https://developer.mozilla.org/en-US/docs/Web/API/Web_Workers_API. Accessed on 22 Nov 2017
Stathakidis, E., Schneider, S., Heather, J.: Robustness modelling and verification of a Mix Net protocol. In: Chen, L., Mitchell, C. (eds.) SSR 2014. LNCS, vol. 8893, pp. 131–150. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-14054-4_9
Thomas, N.: Performability of a secure electronic voting algorithm. Electron. Notes Theor. Comput. Sci. 128, 45–58 (2005)
Thomas, N., Zhao, Y.: Fluid flow analysis of a model of a secure key distribution centre. In: Proceedings 24th Annual UK Performance Engineering Workshop, Imperial College, London, pp. 44–57 (2008)
Thomas, N., Zhao, Y.: Mean value analysis for a class of PEPA models. In: Bradley, J.T. (ed.) EPEW 2009. LNCS, vol. 5652, pp. 59–72. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-02924-0_5
Tribastone, M., Duguid, A., Gilmore, S.: The PEPA eclipse plugin. ACM SIGMETRICS Perform. Eval. Rev. 36(4), 28–33 (2009)
William, S.: Cryptography and Network Security: Principles and Practice, pp. 23–50. Prentice-Hall, Inc., Upper Saddle River (1999)
Zhao, Y., Thomas, N.: Efficient Analysis of PEPA model of Non-repudiation Protocols (2009)
Zhao, Y., Thomas, N.: Approximate solution of a PEPA model of a key distribution centre. In: Kounev, S., Gorton, I., Sachs, K. (eds.) SIPEW 2008. LNCS, vol. 5119, pp. 44–57. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-69814-2_5
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Alotaibi, M., Thomas, N. (2018). Performance Evaluation of a Secure and Scalable E-Voting Scheme Using PEPA. In: Balsamo, S., Marin, A., Vicario, E. (eds) New Frontiers in Quantitative Methods in Informatics. InfQ 2017. Communications in Computer and Information Science, vol 825. Springer, Cham. https://doi.org/10.1007/978-3-319-91632-3_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-91632-3_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-91631-6
Online ISBN: 978-3-319-91632-3
eBook Packages: Computer ScienceComputer Science (R0)