SlideShare a Scribd company logo
Suche senden
Hochladen
IRJET- Secure Online Voting Systems using Block of Chunks
Melden
Teilen
IRJET Journal
Fast Track Publications
Folgen
•
1 gefällt mir
•
27 views
Ingenieurwesen
https://www.irjet.net/archives/V6/i3/IRJET-V6I3488.pdf
Mehr lesen
IRJET- Secure Online Voting Systems using Block of Chunks
•
1 gefällt mir
•
27 views
IRJET Journal
Fast Track Publications
Folgen
Melden
Teilen
Ingenieurwesen
https://www.irjet.net/archives/V6/i3/IRJET-V6I3488.pdf
Mehr lesen
IRJET- Secure Online Voting Systems using Block of Chunks
1 von 4
Jetzt herunterladen
Recomendados
Blockmason link whitepaper von
Blockmason link whitepaper
JAlbic
268 views
•
33 Folien
Blockchain in Insurance 101 von
Blockchain in Insurance 101
Peter Ing
111 views
•
23 Folien
Blockchain Technology von
Blockchain Technology
RiddhiPawar5
107 views
•
22 Folien
Blockchain Technology Report 2018 von
Blockchain Technology Report 2018
Ranvijay Singh
157 views
•
13 Folien
Blockchain technology-report-final von
Blockchain technology-report-final
RishabhMalik32
205 views
•
35 Folien
BLOCKCHAIN TECHNOLOGY IN AGRICULTURE: A CASE STUDY OF BLOCKCHAIN START-UP... von
BLOCKCHAIN TECHNOLOGY IN AGRICULTURE: A CASE STUDY OF BLOCKCHAIN START-UP...
AIRCC Publishing Corporation
115 views
•
18 Folien
Más contenido relacionado
Was ist angesagt?
Blockchain based Security Architectures - A Review von
Blockchain based Security Architectures - A Review
Gokul Alex
3.8K views
•
59 Folien
Blockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency von
Blockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Unbiased Technolab
215 views
•
112 Folien
Understanding blockchaintechnology von
Understanding blockchaintechnology
SubhashKumar329
75 views
•
8 Folien
The Microsoft vision for Blockchain von
The Microsoft vision for Blockchain
ASPEX_BE
940 views
•
60 Folien
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review von
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET Journal
56 views
•
4 Folien
12 Myths about Blockchain Technology von
12 Myths about Blockchain Technology
Ahmed Banafa
3.4K views
•
62 Folien
Was ist angesagt?
(20)
Blockchain based Security Architectures - A Review von Gokul Alex
Blockchain based Security Architectures - A Review
Gokul Alex
•
3.8K views
Blockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency von Unbiased Technolab
Blockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Unbiased Technolab
•
215 views
Understanding blockchaintechnology von SubhashKumar329
Understanding blockchaintechnology
SubhashKumar329
•
75 views
The Microsoft vision for Blockchain von ASPEX_BE
The Microsoft vision for Blockchain
ASPEX_BE
•
940 views
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review von IRJET Journal
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET Journal
•
56 views
12 Myths about Blockchain Technology von Ahmed Banafa
12 Myths about Blockchain Technology
Ahmed Banafa
•
3.4K views
Blockchain Security and Demonstration von Yao Yao
Blockchain Security and Demonstration
Yao Yao
•
556 views
Blockchain for Executives, Entrepreneurs and Investors von Fenbushi Capital
Blockchain for Executives, Entrepreneurs and Investors
Fenbushi Capital
•
156 views
Ultimate guide to understand- What is Blockchain Technology von Chapter247 Infotech
Ultimate guide to understand- What is Blockchain Technology
Chapter247 Infotech
•
61 views
Blockchain for the internet of things a systematic literature review von eraser Juan José Calderón
Blockchain for the internet of things a systematic literature review
eraser Juan José Calderón
•
680 views
Nist.ir.8202 von IT Strategy Group
Nist.ir.8202
IT Strategy Group
•
131 views
IRJET- Blockchain Technology a Literature Survey von IRJET Journal
IRJET- Blockchain Technology a Literature Survey
IRJET Journal
•
365 views
Ijsrp published research paper november 2020 von shoaibulhassanuos
Ijsrp published research paper november 2020
shoaibulhassanuos
•
24 views
Blockchain Security Issues and Challenges von Merlec Mpyana
Blockchain Security Issues and Challenges
Merlec Mpyana
•
1.6K views
Blockchain von Vivek Upadhyay
Blockchain
Vivek Upadhyay
•
181 views
Blockchain Security and Privacy von Anil John
Blockchain Security and Privacy
Anil John
•
5.3K views
Blockchain in 2018 : Beyond the Hype von Ahmed Banafa
Blockchain in 2018 : Beyond the Hype
Ahmed Banafa
•
3.2K views
Blockchain an introduction von Kaveen Rodrigo
Blockchain an introduction
Kaveen Rodrigo
•
39 views
X ange uni_-_cryptos_-_bj_-_04072017 von meulle
X ange uni_-_cryptos_-_bj_-_04072017
meulle
•
13.1K views
Global Digital Sukuk (GDS) - A basic framework von Tariqullah Khan
Global Digital Sukuk (GDS) - A basic framework
Tariqullah Khan
•
1.4K views
Similar a IRJET- Secure Online Voting Systems using Block of Chunks
IRJET- Blockchain Technology von
IRJET- Blockchain Technology
IRJET Journal
28 views
•
2 Folien
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks von
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET Journal
24 views
•
3 Folien
IRJET- Security Threats on Blockchain and its Countermeasures von
IRJET- Security Threats on Blockchain and its Countermeasures
IRJET Journal
158 views
•
7 Folien
Blockchain Computing: Prospects and Challenges for Digital Transformation Pr... von
Blockchain Computing: Prospects and Challenges for Digital Transformation Pr...
eraser Juan José Calderón
166 views
•
5 Folien
jayesh_Blockchain.pptx von
jayesh_Blockchain.pptx
JackTheMan1
8 views
•
28 Folien
Blockchain Technology ppt project.pptx von
Blockchain Technology ppt project.pptx
SahilBansal648873
71 views
•
22 Folien
Similar a IRJET- Secure Online Voting Systems using Block of Chunks
(20)
IRJET- Blockchain Technology von IRJET Journal
IRJET- Blockchain Technology
IRJET Journal
•
28 views
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks von IRJET Journal
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET Journal
•
24 views
IRJET- Security Threats on Blockchain and its Countermeasures von IRJET Journal
IRJET- Security Threats on Blockchain and its Countermeasures
IRJET Journal
•
158 views
Blockchain Computing: Prospects and Challenges for Digital Transformation Pr... von eraser Juan José Calderón
Blockchain Computing: Prospects and Challenges for Digital Transformation Pr...
eraser Juan José Calderón
•
166 views
jayesh_Blockchain.pptx von JackTheMan1
jayesh_Blockchain.pptx
JackTheMan1
•
8 views
Blockchain Technology ppt project.pptx von SahilBansal648873
Blockchain Technology ppt project.pptx
SahilBansal648873
•
71 views
Blockchain Technology ppt project.pptx von SahilBansal648873
Blockchain Technology ppt project.pptx
SahilBansal648873
•
697 views
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain von IRJET Journal
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET Journal
•
33 views
IRJET- Block Chain based Banking Application von IRJET Journal
IRJET- Block Chain based Banking Application
IRJET Journal
•
52 views
Blockchain technology in Agriculture: Applications, Impact and future von IRJET Journal
Blockchain technology in Agriculture: Applications, Impact and future
IRJET Journal
•
11 views
Blockchain Technology Overview von IRJET Journal
Blockchain Technology Overview
IRJET Journal
•
4 views
A survey on security and policy aspects of blockchain technology von TELKOMNIKA JOURNAL
A survey on security and policy aspects of blockchain technology
TELKOMNIKA JOURNAL
•
14 views
IRJET- Different Blockchain Platforms and Algorithms von IRJET Journal
IRJET- Different Blockchain Platforms and Algorithms
IRJET Journal
•
30 views
IRJET-Block Chain based Cyber Security System for Data Transfer von IRJET Journal
IRJET-Block Chain based Cyber Security System for Data Transfer
IRJET Journal
•
31 views
Understanding blockchaintechnology von SubhashKumar329
Understanding blockchaintechnology
SubhashKumar329
•
58 views
BLOCKCHAIN.pptx von PrashantPandey514885
BLOCKCHAIN.pptx
PrashantPandey514885
•
9 views
Blockchain technology von Dr. Mohamed Torky
Blockchain technology
Dr. Mohamed Torky
•
371 views
Decentralized Car Hailing Application von IRJET Journal
Decentralized Car Hailing Application
IRJET Journal
•
4 views
Disadvantages and Advantages of Blockchain von ijtsrd
Disadvantages and Advantages of Blockchain
ijtsrd
•
237 views
Blockchain Technology- A Conceptual Overview von IRJET Journal
Blockchain Technology- A Conceptual Overview
IRJET Journal
•
17 views
Más de IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL von
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
25 views
•
7 Folien
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... von
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
8 views
•
7 Folien
Identification, Discrimination and Classification of Cotton Crop by Using Mul... von
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
8 views
•
5 Folien
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... von
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
13 views
•
11 Folien
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... von
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
14 views
•
6 Folien
Performance Analysis of Aerodynamic Design for Wind Turbine Blade von
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
7 views
•
5 Folien
Más de IRJET Journal
(20)
SOIL STABILIZATION USING WASTE FIBER MATERIAL von IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
•
25 views
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... von IRJET Journal
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
•
8 views
Identification, Discrimination and Classification of Cotton Crop by Using Mul... von IRJET Journal
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
•
8 views
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... von IRJET Journal
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
•
13 views
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... von IRJET Journal
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
•
14 views
Performance Analysis of Aerodynamic Design for Wind Turbine Blade von IRJET Journal
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
•
7 views
Heart Failure Prediction using Different Machine Learning Techniques von IRJET Journal
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal
•
7 views
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel von IRJET Journal
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal
•
3 views
Metro Development and Pedestrian Concerns von IRJET Journal
Metro Development and Pedestrian Concerns
IRJET Journal
•
2 views
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An... von IRJET Journal
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal
•
3 views
Data Analytics and Artificial Intelligence in Healthcare Industry von IRJET Journal
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal
•
3 views
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC... von IRJET Journal
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal
•
62 views
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur... von IRJET Journal
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal
•
12 views
Development of Effective Tomato Package for Post-Harvest Preservation von IRJET Journal
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal
•
4 views
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION” von IRJET Journal
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal
•
5 views
Understanding the Nature of Consciousness with AI von IRJET Journal
Understanding the Nature of Consciousness with AI
IRJET Journal
•
12 views
Augmented Reality App for Location based Exploration at JNTUK Kakinada von IRJET Journal
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal
•
6 views
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba... von IRJET Journal
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal
•
18 views
Enhancing Real Time Communication and Efficiency With Websocket von IRJET Journal
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal
•
5 views
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ... von IRJET Journal
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal
•
4 views
Último
CPM Schedule Float.pptx von
CPM Schedule Float.pptx
Mathew Joseph
6 views
•
5 Folien
Web Dev Session 1.pptx von
Web Dev Session 1.pptx
VedVekhande
20 views
•
22 Folien
REACTJS.pdf von
REACTJS.pdf
ArthyR3
37 views
•
16 Folien
DESIGN OF SPRINGS-UNIT4.pptx von
DESIGN OF SPRINGS-UNIT4.pptx
gopinathcreddy
21 views
•
47 Folien
Créativité dans le design mécanique à l’aide de l’optimisation topologique von
Créativité dans le design mécanique à l’aide de l’optimisation topologique
LIEGE CREATIVE
8 views
•
84 Folien
unit 1.pptx von
unit 1.pptx
rrbornarecm
5 views
•
53 Folien
Último
(20)
CPM Schedule Float.pptx von Mathew Joseph
CPM Schedule Float.pptx
Mathew Joseph
•
6 views
Web Dev Session 1.pptx von VedVekhande
Web Dev Session 1.pptx
VedVekhande
•
20 views
REACTJS.pdf von ArthyR3
REACTJS.pdf
ArthyR3
•
37 views
DESIGN OF SPRINGS-UNIT4.pptx von gopinathcreddy
DESIGN OF SPRINGS-UNIT4.pptx
gopinathcreddy
•
21 views
Créativité dans le design mécanique à l’aide de l’optimisation topologique von LIEGE CREATIVE
Créativité dans le design mécanique à l’aide de l’optimisation topologique
LIEGE CREATIVE
•
8 views
unit 1.pptx von rrbornarecm
unit 1.pptx
rrbornarecm
•
5 views
Module-1, Chapter-2 Data Types, Variables, and Arrays von Demian Antony D'Mello
Module-1, Chapter-2 Data Types, Variables, and Arrays
Demian Antony D'Mello
•
6 views
AWS A5.18 A5.18M-2021.pdf von ThinhNguyen455948
AWS A5.18 A5.18M-2021.pdf
ThinhNguyen455948
•
8 views
Robotics in construction enterprise von Khalid Abdel Naser Abdel Rahim
Robotics in construction enterprise
Khalid Abdel Naser Abdel Rahim
•
5 views
Design_Discover_Develop_Campaign.pptx von ShivanshSeth6
Design_Discover_Develop_Campaign.pptx
ShivanshSeth6
•
55 views
GDSC Mikroskil Members Onboarding 2023.pdf von gdscmikroskil
GDSC Mikroskil Members Onboarding 2023.pdf
gdscmikroskil
•
68 views
MongoDB.pdf von ArthyR3
MongoDB.pdf
ArthyR3
•
51 views
Integrating Sustainable Development Goals (SDGs) in School Education von SheetalTank1
Integrating Sustainable Development Goals (SDGs) in School Education
SheetalTank1
•
11 views
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth von Innomantra
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth
Innomantra
•
20 views
Renewal Projects in Seismic Construction von Engineering & Seismic Construction
Renewal Projects in Seismic Construction
Engineering & Seismic Construction
•
6 views
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf von AlhamduKure
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
AlhamduKure
•
10 views
Proposal Presentation.pptx von keytonallamon
Proposal Presentation.pptx
keytonallamon
•
76 views
dummy.pptx von JamesLamp
dummy.pptx
JamesLamp
•
7 views
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... von csegroupvn
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
csegroupvn
•
13 views
GPS Survery Presentation/ Slides von OmarFarukEmon1
GPS Survery Presentation/ Slides
OmarFarukEmon1
•
7 views
IRJET- Secure Online Voting Systems using Block of Chunks
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2509 SECURE ONLINE VOTING SYSTEMS USING BLOCK OF CHUNKS P. Deepa1, K. Akshaya2, R. Priyadarshini3, H. Saranya4 1Associate Professor, Dept.of Computer Science and Engineering, Panimalar Engineering College, Chennai, Tamil Nadu 2,3,4U.G.Scholar, Dept.of Computer Science and Engineering, Panimalar Engineering College, Chennai, Tamil Nadu ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Distributed wireless networks perform critical network functions such as fault-tolerant data fusion, cooperative sensing, and reachingconsensusinvotingsystem. People cast their votes by going directly to voting centreorvia post. However, the delay overhead of voting can beprohibitive when numerous participants have to share the post in sequence, making it impractical for time-critical applications. In this project we propose a fast and secure Blockchain voting scheme called Blockchain Voting System BVS, which significantly reduces the delayforcollectingandtallyingvotes. In BVS, Voters transmit their votes simultaneously by exploiting the blocks in online. Votes are realized by injecting energy to pre-assigned blocks. We show that BVS is secure against hackers and third parties, that attempt to manipulate the voting outcome. Security is achieved by employing cryptography-based authentication and message integrity schemes. We analytically evaluate the voting robustness as a function of Block parameters. We extend BVS to operate in a Block groups. We discuss practical implementationchallenges related to multi-device frequency and time synchronization and present a implementation of BVS. The implementation of this concept in reality can reduce the corruption in vote counting and achieve secure result in less time. Key Words: Cryptography, Blockchain, SHA, Integrity, BVS 1. INTRODUCTION Blockchain technology allows for fast, secure, and transparent peer-to-peer transfer of digital goods that include money and intellectual property. In crypto coin mining and investing, it's an important topic to understand. One of the most talked about and misunderstood topics in recent times, blockchain technology is completely overhauling the way digital transactions are conducted and could eventually change the way several industries conduct their daily business. Two words that have rapidly become part of the mainstream vernacular are bitcoin and blockchain. While they are related, these terms refer to two different things. Bitcoin is a form of virtual currency, more commonlyknown as cryptocurrency, which is decentralized and allows users to exchange money without the need for a third-party. All bitcoin transactions are logged and made available in a public ledger to ensure their authenticity and prevent fraud. The underlying technology that facilitatesthesetransactions and eliminates the need for an intermediary is the blockchain. One of blockchain's main benefits lies in its transparency, as the ledger functions as a living, breathing chronicle of all peer-to-peer transactions that occur. Each time a transaction takes place, such as when onepartysends bitcoin directly to another, the details of that deal — including its source, destination, and timestamp — are added to a block. The block contains the transaction along with other similar types of transactions that have occurred recently. In the case of bitcoin transactions, the recent transactions are for the previous 10 minutes or so. Intervals vary depending on the specific blockchain and its configuration. The validity of the transactions within the cryptographically protected block is then checked and confirmed by the collective computing power of miners within the network in question. On an individual basis, miners are computers thatare configured to use their GPU or CPU cycles to solve complex mathematical problems, passing the block's data through a hashing algorithm until a solution is found. When the problems are solved, the block and all of its respective transactions are verified as legitimate.Rewards — bitcoinor some other currency — are then divvied up among the computer or computers that contributed to the successful hash. When the transactions within a block are deemed valid,they are attached to the most recently verified block in the chain, creating a sequential ledger which is viewable by anyone. This process continues in perpetuity, expanding on the blockchain's contents and providing a public recordthatcan be trusted. In addition to being constantlyupdated,thechain and all of its blocks are distributed across the network to a large number of machines. This ensures that the latest version of this decentralized ledger exists virtually everywhere, making it almost impossible to forge. 2. LITERATURE SURVEY [1] Secure Physical Layer Voting, by Bocan Hu,Yan Zhang,Nirnimesh Ghose and Loukas Lazos Distributed wireless networks perform critical network functions such as fault-tolerant data fusion, cooperative sensing, and reaching consensus in voting system. They use
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2510 fusion centre for sending messages which is less secure and a slow process. [2] Extreme automation is the latest initiative to have emerged from several “hands-free”. Innovations like autonomous Ships and submarines, autonomous passenger aircraft, drone freight delivery, autonomous robotic surgery, automated knowledge discovery while the healthcare industry will need to adapt to the changing care delivery model as it will save many billions of dollars. [3] A large portion of the population in the developing world can benefit from blockchain technologies. It can be argued that in many ways, blockchain has a much higher value proposition for the developing world than for the developed world but people suffer from inefficiency, fraud, and gross misallocations of resources. [4] Blockchain is a technology that uses community validation to keep synchronized the content of ledgers replicated across multiple users. Although blockchain derives its originsfromtechnologiesintroduceddecades ago, it has gained popularity with Bitcoin. Bitcoin’s blockchain is a decentralized peer-validated time- stamped ledger that chronologically registers all valid transactions. It is a slow operation with limited governance. [5] Blockchain and the Internet of Things (IoT) are key technologies that will have a huge impact in the next 10 years for companies intheindustrial market.Thisarticle describes how these two technologies will improve efficiencies, provide new business opportunities, address regulatory requirements, and improve transparency and visibility. Third-party repair partners could monitor the blockchain for preventive maintenance and record their work on the blockchain. 3. EXISTING SYSTEM Voting is done by people through voting booth or via post. However, the delay overhead of voting can be prohibitive when numerous participants have to share the post in sequence, making it impracticalfortime-criticalapplications. The vote counting had major issues like corruptionandslow progress 3.1 Disadvantages Slow process More possibilities for Corruption Low security 4. PROPOSED SYSTEM We propose a fast and secure Blockchain voting scheme called Blockchain Voting System BVS, which significantly reduces the delay for collecting and tallying votes. In BVS, Voters transmit their votes simultaneously by exploiting the blocks in online. Votes are realized by injecting energy to pre-assigned blocks. We show that BVS is secure against hackers and third parties, that attempt to manipulate the voting outcome. Security is achieved by employing cryptography-based authentication and message integrity schemes. 4.1 Advantages Blockchain give more security in decentralised network. Results comes transparently and simultaneously. Hacking possibility is very low against the Blockchain and cryptography. 4.2 System Architecture Fig -1:System Architecture 4.3 System Modules Block chain The blockchain is an incorruptible digital ledgerof economic transactions that can be programmed to record not just financial transactions but virtually everything of value. “Picture a spread sheet that is duplicated thousandsoftimes across a network of computers. Then imagine that this network is designed to regularly update this spreadsheet and you have a basic understanding of the blockchain. Information held on a blockchain exists as a shared — and continually reconciled — database. This is a wayofusingthe network that has obvious benefits. The blockchain database isn’t stored in any single location, meaning the records it keeps are truly public and easily verifiable. No centralized version of this information exists for a hacker to corrupt. Hosted by millions of computers simultaneously, its data is accessible to anyone on the internet. Identity Management Identity management (ID management) is a broad administrative area that deals with identifyingindividuals in a system (such as a country, a network,oran enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2511 identity. Identity management (IdM) is the task of controlling information about users on computers. Such information includes information that authenticates the identity of a user, and information that describes information and actions they are authorized to access and/or perform. It also includes the management of descriptive information about the user and how and by whom that information can be accessed and modified. Managed entities typically include users, hardware and network resources and even applications. Online Voting System The Online Voting process is in need of a standard and secure electronic system that voters can rely on and have trust in. Currently, each state implementsitsownprocessfor voting; the lack of consistency between polls results in numerous problems.Variousmodelshavebeendevelopedto address the issues ofsecurity,privacy,validation,andquality control. However, these models do not meet all of the requirements needed for a good system. Exploring online voting from a systems perspective can demonstrate the commonalities of the current systems and the possible Algorithm Used SHA-256 Overview SHA-256 operates in the manner of MD4,MD5 and SHA- 1.The message is to be hashed first. [1] Padded with its length in such a way that the result is multiple of 512 bits long [2] Then parsed into 512-bit message blocks M1 ,M2,M3,………,Mn The message blocks are processed one at a time:Beginning with a fixed initial hash value H(0),sequentially compute Hi=H(i-1)+CM (i)(H(i-1)), Where C is the SHA-256compressionfunctionand+ means word wise mod 232 addition.H(N) Is the hash of M. Steps Step 1: Pad the message in the usual way.i.e.Append the bit “1” to the end of the message ,and then k zero bits,where k is the smallest non-negative solution to the equation l+1+k=448mod512.Tothis append 64-bit block which is equal to the number l written in binary. Step 2:Parse the message into N 512-bit blocks M1,M2,M3,……Mn.The first 32 bits of message block I are denoted M0 i,the next 32 bits are M1 i,and so on upto M15 i.We use the big-endian convention throughout,so withineach32-bitword,theleft-most bit is stored in the most significant bit position. Step 3:The hash computation proceeds as follows: For i=1 to N (N=number of blocks in padded message) { Initialize registers with(i-1)st intermediate hash value. Apply the SHA-256 compression function to update registers. Compute the ith intermediate hash valueHi. H1 i=a+H1 i-1 . . . H8 i=h+H8 i-1 HN=H1 N,H2 N,….,H8 N is the hash of M. 5. IMPLEMENTATION RESULTS Fig -2: Home Page Fig -3: Government Login Fig -4: Candidate Register
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2512 Fig -5: Candidate List 6. CONCLUSION Our Online-Voting System is secure because user can only vote by entering CNIC. No other information is shown to the user on the polling interface. On the other hand ADMIN has the only rights to check and count all votesandannouncethe final result. Although there are many voting apps for this purpose but their security level is not up to that mark. REFERENCES [1] I. F. Akyildiz, B. F. Lo, and R. Balakrishnan. Cooperative spectrum sensing in cognitive radio networks: A survey. Physical Comm., 4(1):40– 62, 2011. [2] N. Al-Nakhala, R. Riley, and T. Elfouly. Distributed algorithms in wireless sensor networks: an approach for applying binary consensus in a real testbed. Comp. Nets., 2015. [3] J. G. Andrews, A. Ghosh, and R. Muhamed. FundamentalsofWiMAX:understandingbroadband wireless networking. Pearson Education, 2007. [4] D. Barbara and H. Garcia-Molina. The reliability of voting mechanisms. IEEE Trans. Computers, 36(10):1197–1208, 1987. [5] M. Barborak, A. Dahbura, and M. Malek. The consensus problem in fault-tolerant computing. ACM Comp. Surveys, 25(2):171–220, 1993. [6] D. Bharadia, E. McMilin, and S. Katti. Full duplex radios. In Proc. of the SIGCOMM Computer Communication Review, pages 375–386. ACM, 2013. [7] S. Capkun, M. Cagalj, R. Rengaswamy, I. Tsigkogiannis, J.-P. Hubaux, and M. Srivastava. Integrity codes: Message integrity protection and authentication over insecure channels. Dependable and Secure Computing, IEEE Transactions on, 5(4):208–223, 2008. [8] D. V. Dimarogonas, E. Frazzoli, and K. H. Johansson. Distributed eventtriggered control for multi-agent systems. IEEE Trans. on Aut. Cntrl., 57(5):1291– 1297, 2012. [9] A . Dutta, D. Saha, D. Grunwald and D.Sicker. SMACK: aSMARTACKnowledgement scheme for broadcast messages in wireless networks.ACM SIGCOMM Comp.Comm.Rev.,39(4):15-26,2009.
Jetzt herunterladen