ITC571 Practical and Theoretical Project - Free Samples to Students
Answer:
Justifications for the newly/updated model, identifying which areas have been enhanced
The VPN and AES encryptions used for the online voting systems were not previously used or were not in vogue. This has always caused disruption in the authenticity of the online voting system. Since, there are major chances that the voting system published online can be easily rigged; online voting system with VPN should be used in the latest voting systems that are published online. The VPN or Virtual Private Network is becoming much more widely used with every passing day since there has been a provision for the users in the VPN networks to go anonymous while browsing. There are several reasons why a VPN encryption implementation should be ideal for an online voting system.
One of the major reasons for VPN encryption is that it prevents online spying over a user while he or she is surfing the internet. This provides ultimate support a person is on the move with their internet connectivity options open via mobile data or WiFi hotspots on through their laptop, mobile or other connecting devices. Similarly it keeps a user safe from being spied over while surfing the internet from a static network like at work or at home.
VPN also has a major masking capability that enables a user to alter the real location from where he or she is actually surfing the internet. For instance, it is possible that Netflix US can be accessed while the user is in the United Kingdom. Therefore, using VPN encryptions for online voting systems are safe enough to mask the location and the identity of a voter in order to save the person from being spied over. It had been previously seen that the voters were easily spied on to find out where the votes have been casted and were easily tracked down so that the voting system could be rigged. Implementation of VPN encryption would alter the matter for the betterment of the procedure.
On the other hand, the use of AES or Advanced Encryption Standards could be very beneficial for the online voting systems since it is one of the most secured encryption algorithms being used in the contemporary times. Although publicly accessible, the documents are all encrypted in ciphers with the denotation of ‘top sec
ret’. AES encryption is also known as block cipher, since the entire algorithm is based on several permutations, substitutions, and linear transformations that are executed on 16 byte data blocks for each of them. This encryption process has the ability to encrypt electronic data in a symmetric block cipher. Without the use of this encryption method, the traditional method of DES algorithm or Data Encryption Standard algorithm was gradually falling into becoming vulnerable to brute-force attacks. This problem could be easily resolved with the use of Advanced Encryption Standards since the encryption method had the capability of securing online electronic data through to the next century. AES is also very easy to implement in both hardware, software and into restricted environments, such as smart cards, as well.
Therefore, it is justified to implement VPN and AES encryption algorithm standards for the online voting system to make the entire process far more secured than it had been in the traditional way.
Explanations of the model, selecting key models used.
VPN AES Model for online voting system: The models used for the online voting system encryption to provide maximum security to the voters as well as the casted votes, the VPN and AES models are to be used. This would be done by a very simple procedure as described below.
At first, in the online voting system portal is accessed and then the voters would be available to enter their information in the login form. If the login details are valid, then only it can be moved on to the next phase or else, the login page would not redirect to the next pages. This would be justified with the unique login ID for each voter.
Each voters must be identified with a unique identifier, and for that, the proposed solution puts forward the idea of implementing a three-step identification process. This process would be generated in the following way with the use of MEC smart cards, generating of OTP or One Time Passwords and then the implementation of the VPN systems. The Multipurpose Electronic Card or the MEC card would consist of all the electronic data to hold the information of the individual voters. The MEC card would be needed to be swiped down to feed in the identification details into the computer.
The next phase of the online voting system would then ask the voter for their fingerprint, since fingerprints are unique to every human being and cannot be altered in any manner. Only when the designated or registered fingerprint is verified for each voter, only then the candidate list would be displayed, otherwise it would not open (Backert, Backert & Dahl, 2016). As per the proposed system, the fingerprint verification would be justified by the generation of a unique OTP that would be send in the individual voter’s phone or email account registered before. Only then the biometric verification would be justified.
When a specific candidate is chosen, the model thus selected would display whether or not the candidate has already casted their vote. If it is found that the voter had already casted their vote for the specific candidate, he or she would not be allowed to cast their vote anew and the process would end. However, if it comes to light that the voter chosen has not yet casted their vote before for any of the candidates, then only it would assign the voter to encrypt themselves with the unique and specific encryption key. An admin would randomly be selected to sign and bind the casted vote by the designated voter. The next phase would follow the generation of the signature to append to the casted vote along with the unique ID of the designated admin. In the next phase of the online voting system, the casted vote by the voters would be sealed with the process of a unique hash value along with unique hash values generated for the signature and the time stamp for the casting of the vote as well. The system would then store this entirely encrypted file in the database. This entire system would form the suitable model that would be far more essential than the traditional ways of recording online votes in an online voting system.
Highlighting some strengths of the model compared to previous models
There are several reasons behind the implementation of VPN algorithm and AES encryption process in the proposed system. Most definitely because it possesses numerous advantages over the previous tradition method of online voting systems. The strengths of the proposed model in comparison with the previous models in vogue are as listed as below:
i. Enhanced Security: The proposed model is far more secured in comparison with the previous models given the VPN algorithm system and AES encryption methods. This is because with the use of the VPN method, data is kept from being stolen, altered or hacked by keeping it encrypted. The AES algorithm is used for the encryption. This acts as an advantage on the previous online voting systems as they were easily prone to get hacked given the less secured system.
ii. Remote Control: With the use of VPN, the online voting system can be managed from any area and information can be accessed from any device. In addition, the VPN algorithm also allows masking the accessing location from the hackers. This is another reason why the productivity can be increased much more in comparison with the traditional system of online voting.
iii. Sharing of Files: VPN algorithm, along with AES encryption system also allows several devices to share files amongst each other for a long period of time.
iv. Online Anonymity: VPN possesses another quality of successfully hiding the web browsing for any user maintaining complete anonymity. Although, there are other ways by which user anonymity can be achieved, like the web proxies and Hide IP software, but the proposed system allows a user to access both websites as well as web applications maintaining complete anonymity of a user.
v. Bypass filters and unblocking of websites: There are various reasons for which the proposed system uses VPN and AES to access blocked websites and bypass internet filters. While remote accessing the online voting portal, it may happen that the user is situated in a place that does not allow the specific IP or URL to be accessed from that region (Backert, Backert & Dahl, 2016). Therefore, this new implemented technology would enable accessing the portal from any place in the planet penetrating the website blockers and bypass internet filters. Compared to the older technologies, this is a breakthrough system proposed for the online voting systems since in previous times remote accessing and penetrating website blockers was not at all possible.
vi. Change of IP address: The proposed system is also available to make changes in the IP address when needed while moving from one country to another and accessing the portal from different IP addresses. This system was unavailable in the old systems.
vii. Cost Reduction: Since maintenance of the entire system is severely low, it has a much reduced cost than the older systems for online voting.
Voting processes are considered to be one of the chief elements that support democracy which helps the entire population of a country to decide unanimously. These processes are influenced by the information technology processes and hence are evolved into e-voting or online voting systems. The topic forms an important aspect for research where cryptographic primitives were utilized in order to make the voting system much more secure. This was done since every data in the cyberworld are prone to extensive hacking. The encryption process have so far been tried to be made more and more secure since the previous models are still prone to hacking. The proposed models hold the use of VPN and AES encryption models to make it impenetrable by the hackers. Through the use of the model proposed, it could be seen that there are many advantages due to the implementation of the newest proposed model. The use of VPN and AES algorithms help in maintaining utmost security. Maintaining security is the primary important factor for online voting system since there is a high chance of the voting results being rigged as this hold utmost importance for the entire country. Therefore, the primary factor that should be focused on is the security reasons of the online voting results. This holds great importance in the maintenance of democracy in a country and forms a deciding factor for the entire nation.
Demonstration of implementation:
The models used for the online voting system encryption to provide maximum security to the voters as well as the casted votes, the VPN and AES models are to be used. This would be done by a straightforward procedure as described below.
At first, in the online voting system portal is accessed and then the voters would be available to enter their information in the login form. If the login details are valid, then only it can be moved on to the next phase or else, the login page would not redirect to the following pages. This would be justified with the unique login ID for each voter.
Each voter must be identified with a unique identifier, and for that, the proposed solution puts forward the idea of implementing a three-step identification process. This process would be generated in the following way with the use of MEC smart cards, making of OTP or One Time Passwords and then the implementation of the VPN systems (AboSamra et al., 2017). The Multipurpose Electronic Card or the MEC card would consist of all the electronic data to hold the information of the individual voters. The MEC card would be needed to be swiped down to feed in the identification details into the computer.
The next phase of the online voting system would then ask the voter for their fingerprint since fingerprints are unique to every human being and cannot be altered in any manner. Only when the designated or registered fingerprint is verified for each voter, only then the candidate list would be displayed; otherwise, it would not open. As per the proposed system, the fingerprint verification would be justified by the generation of a unique OTP that would be sent in the individual voter’s phone or email account registered before. Only then the biometric verification would be justified.
When a specific candidate is chosen, the model thus selected would display whether or not the candidate has already cast their vote. If it is found that the voter had already cast their vote for the specific candidate, he or she would not be allowed to cast their vote anew, and the process would end. However, if it comes to light that the voter chosen has not yet cast their ballot before for any of the candidates, then only it would assign the voter to encrypt themselves with the unique and specific encryption key. An admin would randomly be selected to sign and bind the casted vote by the designated voter. The next phase would follow the generation of the signature to append to the casted vote along with the unique ID of the designated admin. In the next period of the online voting system, the casted vote by the voters would be sealed with the process of a unique hash value along with unique hash values generated for the signature and the time stamp for the casting of the vote as well. The system would then store this entirely encrypted file in the database. This entire system would form the suitable model that would be far more essential than the traditional ways of recording online votes in an online voting system.
The implementation of the newest technology has a positive impact on the entire online voting system since the entire system focuses mainly on the security of the entire system. The VPN method enhances the system’s capability of masking IP addresses and maintaining total security in both the cases of the voters and the candidates the voters are voting for. The online voting system forms a major issue in maintaining complete security since it is essential in determining the future of a nation.
It can be clearly noticed that without the use VPN in the system, the information that have been transferred through the system from one device to another can be easily seen through the information bar. Therefore, any hacker can access the system information once disclosed through the previous processes.
Right after the implementation of the VPN algorithm, it can be clearly seen that the information transferred in the system from one device to the other cannot be seen in any way since they have been encrypted. Therefore, it is safe from being hacked by malicious hackers.
The execution time comparison chart depicts that the time required in execution previously had been much more compared to the latest implementation of AES encryption method. Therefore, it can be clearly seen that the latest proposed technology is much more effective in reducing time constrains than the previous procedures.
In this figure, we can clearly see that the previous methods adapted fall short in encryption time, decryption time and buffer size as well. Therefore, it can be clearly concluded that the newest technology implementation is much more justified in terms of security and effectiveness in the online voting systems.
The issues and challenges of this system is that they cannot focus on controlling the network traffic and minimizing the attack that may happen during the elections. Therefore, it solely focuses on maintaining the security of the entire system. Any system shared in public network has a high risk of getting attacked (AboSamra et al., 2017). This is because; voting systems always have high expectations. During the election, a huge number of people access the network at the same time. So it would have been better to focus on reducing the traffic or having activity control of the system in network.
The confidentiality of the voter votes may be in question because of the same interface and database that they have in the authentication and voting process. This is an authentication phase of the system. Same database have been used in the interface which joins the authentication and voting phase. Problem like “Man in middle” can occur and change the vote. For instance, when a user logs in using their id and password than they are subjected to receive the UI which allow them to vote. Both login and voting interface has same database. As a result of the same database, now if admin or polling officer of the system wants than he can easily see what a particular identity has vote for and at the same time he or she can tamper with the data as well. In fact, it would be problematic to trust on any authority because in fear of getting corrupted. There is not such mechanism in the network which provides the honesty and evidence that they are safe and secured. Mechanism to control the network traffic and network attack should be implementing in future proposal.
References
AboSamra, K. M., AbdelHafez, A. A., Assassa, G. M., & Mursi, M. F. (2017). A practical, secure, and auditable e-voting system. Journal of Information Security and Applications, 36, 69-89.
Aziz, A. A. A., Qunoo, H. N., & Samra, A. A. A. (2018). Using homomorphic cryptographic solutions on E-voting Systems.
Backert, A., Backert, C. C., & Dahl, C. C. (2016). U.S. Patent No. 9,401,059. Washington, DC: U.S. Patent and Trademark Office.
Darwish, A., El-Gendy, M. M., & Hassanien, A. E. (2017). A New Hybrid Cryptosystem for Internet of Things Applications. In Multimedia Forensics and Security (pp. 365-380). Springer, Cham.
Divya, P., agrahwal, P., & ojha, S. (2014). International Journal of Scientific Research Engineering & Technology (IJSRET). ADVANCED ONLINE VOTING SYSTEM , 687-691.
Garfinkle, N., & Garfinkle, R. (2017). U.S. Patent No. 9,536,366. Washington, DC: U.S. Patent and Trademark Office.
Guasch Castelló, S., Escala Ribas, A., & Puiggalí, A. J. (2017). U.S. Patent Application No. 15/538,033.
Haibin, W., Xia, L., & Sheng, Z. (2015). Wireless Sensor Network Application in engineering. Multi authority E-voting system based on Group blind signature , 89-93.
Hon, C. T., Tam, C. H., & Ma, T. H. (2017). U.S. Patent Application No. 15/654,739.
Khatun, R., Bandopadhyay, T., & Roy, D. A. (2017). I.J. Information Engineering and Electronic Business. Data Modeling for Evoting system Using smart card based E-governance system , 45-52.
Marinescu, L. (2015). Journal of Mobile, Embedded and Distributed Systems. Security System for mobile voting Biometric , 100-108.
Mohammadpourfard, M., Doostari, M. A., Ghoushchi, M. B., & Shakiba, N. (2014). RESEARCH ARTICLE. A new secure Internet voting protocol using Java Card 3 , 261-284.
Neha Saini, H. V. (2017). Recent Research aspect. An Analytical study of E-voting System , 75-85.
Nielsen, J. (2015). Design principle FTW. Retrieved 4 22, 2017, from 10 Usability Heuristics for User Interface Design: https://www.designprinciplesftw.com/collections/10-usability-heuristics-for-user-interface-design
Olaniyi, O. M., Folorunso, T. A., Ahmed, A., & Joshep, O. (2016). Information Engineering and Electronic Business. Design of secure Electronic Voting System Using fingerprint biometric and Cryptography watermarking approach , 9-17.
Osho, L. O. (2016). I.J. Information Engineering and Electronic Business. Framework for an E-voting system Applicable in developing economy , 9-21.
R., I., & S., S. (2018). Web Based Application For Secure Online Voting System. International Journal Of Computer Science Engineering & Technology, 8(2), 23-27
Rura, L., Issac, B., & Haldar, M. K. (2017). Journal of Computing and Information Technology, Vo. Online Voting System Based on Image , 47-61.
Selvadurai, N. (2015). Not just a face in the crowd: addressing the intrusive potential of the online application of face recognition technologies. International Journal Of Law & Information Technology, 23(3), 187-218. doi:10.1093/ijlit/eav006
Tanveer, A., Ali, A., Paracha, M. A., & Raja, F. R. (2015, January). Performance analysis of AES-finalists along with SHS in IPSEC VPN over 1Gbps link. In Applied Sciences and Technology (IBCAST), 2015 12th International Bhurban Conference on (pp. 323-332). IEEE.
Buy ITC571 Practical and Theoretical Project - Free Samples to Students Answers Online
Talk to our expert to get the help with ITC571 Practical and Theoretical Project - Free Samples to Students Answers to complete your assessment on time and boost your grades now
The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.