Development of audit and data protection principles in electronic voting systems




audit of online voting system, data protection, exclusion of illegal influence on voters


It is assumed in standard information protection technologies that there are owners of this information who put forward requirements for protection. In secret voting systems, the information belongs to the community of citizens, and to protect it, vote organizers must create conditions that allow each voter to make sure that the vote secrecy and accuracy of vote counting are preserved. In developed democracies, this issue is resolved through a widely available audit of all procedures that may be mistrusted. Any voter can conduct such an audit. The anxiety of citizens of democratic countries is based on the idea that if electronic voting is introduced, it will be impossible to conduct such an audit. The article proposes principles of auditing all those software and hardware tools and processes of the online voting system that can generate voter distrust. This audit is carried out using a dedicated server open to voters and their fiduciaries. This server provides continuous monitoring of actions of the service staff in terms of possible interference in the operation of the voting system. Also, due to this server, auditors receive data on the integrity of the voting system hardware and software including its audit tools and an alarm signal in the event of a threat. It was possible to reduce the average time of processing the voter requests to two seconds. This means that processing a maximum of 2,500 voter requests at a vote station will take no more than two hours. Simultaneous access of 50 voters to the server will not make them wait in the queue for more than 2 minutes. Implementation results were described and links were given for conducting experimental voting on the Internet.

Author Biographies

Yuriy Khlaponin, Kyiv National University of Construction and Architecture

Doctor of Technical Sciences, Professor, Head of Department

Department of Cyber Security and Computer Engineering

Volodymyr Vyshniakov, Kyiv National University of Construction and Architecture

PhD, Associate Professor

Department of Cyber Security and Computer Engineering

Viktoriia Ternavska, Kyiv National University of Construction and Architecture

PhD, Associate Professor

Department of Labor Protection and Environment

Oleksandr Selyukov, Kyiv National University of Construction and Architecture

Doctor of Technical Sciences, Professor, Senior Researcher

Department of Cyber Security and Computer Engineering

Oleg Komarnytskyi, Department of Transport Infrastructure of the Kyiv City State Administration

PhD, Deputy Head of Department

Department of Strategic Planning


Electronic Vote & Democracy. Available at:

Prozori vybory u KNU. Kyivskyi natsionalniy universytet imeni Tarasa Shevchenka. Available at:

Devid Bismark: Elektronne holosuvannia bez obmanu. Available at:

Ajish, S., Anil Kumar, K. S. (2020). Secure I-Voting System with Modified Voting and Verification Protocol. Advances in Electrical and Computer Technologies, 189–200. doi:

Solvak, M. (2020). Does Vote Verification Work: Usage and Impact of Confidence Building Technology in Internet Voting. Lecture Notes in Computer Science, 213–228. doi:

Bezpyatchuk, Zh. (2019). U Zelenskogo obeschayut onlayn-golosovanie: chem eto grozit? BBC News Ukraina. Available at:

Recommendation CM/Rec(2017)5[1] of the Committee of Ministers to member States on standards for e-voting. Available at:

Internet-holosuvannia: pytannia do rozghliadu. Zahalnyi ohliad dlia orhaniv administruvannia vyboriv. Bila knyha IFES. Available at:

Ernest, A., Hourt, N., Larimer, D. (2016). Pat. No. US 2017/0109955 A1. Blockchain Electronic Voting System And Method. No. 15/298,177; declareted: 19.10.2016; published: 20.04.2017. Available at:

Ibrahim, M., Ravindran, K., Lee, H., Farooqui, O., Mahmoud, Q. H. (2021). ElectionBlock: An Electronic Voting System using Blockchain and Fingerprint Authentication. 2021 IEEE 18th International Conference on Software Architecture Companion (ICSA-C). doi:

Alvi, S. T., Uddin, M. N., Islam, L., Ahamed, S. (2020). From Conventional Voting to Blockchain Voting: Categorization of Different Voting Mechanisms. 2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI). doi:

Fernandes, A., Garg, K., Agrawal, A., Bhatia, A. (2021). Decentralized Online Voting using Blockchain and Secret Contracts. 2021 International Conference on Information Networking (ICOIN). doi:

Golubitskiy, S. (2019). Mutnaya tekhnologiya. Uroki moskovskih vyborov na blokcheyne. Novaya gazeta, 111. Available at:

Schneier, B. (2020). Voatz Internet Voting App Is Insecure. Schneier on Security. Available at:

Vyshnyakov, V. M., Komarnitsky, O. A. (2019). Transparentnye sistemy elektronnoy demokratii. Ottawa: Accent Graphics Communications & Publishing, 96. Available at:

Chupryn, V., Vyshniakov, V., Komarnitskiy, O. (2018). Method of counteraction of attackes of mediator in transparent system the internet voting. Ukrainian Information Security Research Journal, 20 (3), 180–187. doi:

Shannon, C. E. (1949). Communication Theory of Secrecy Systems. Bell System Technical Journal, 28 (4), 656–715. doi:

Chupryn, V., Vyshniakov, V., Prygara, M. (2016). Method of generation of casual numbers on the basis of the use of apparatus of the computer plugged in the Internet. Ukrainian Information Security Research Journal, 18 (4), 323–335. doi:

Diffie, W., Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22 (6), 644–654. doi:

Chupryn, V., Vyshniakov, V., Prygara, M. (2017). Method of combating illegal influence on voters in the Internet voting system. Ukrainian Scientific Journal of Information Security, 23 (1), 7–14. doi:

Khlaponin, Y., Khalifa, E. K., Khlaponin, D., Selyukov, A., Tolbatov, A., Tolbatov, V., Odarchenko, R. (2019). Method of Improving the Stability of Network Synchronization in Multiservice Macro Networks. Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019). Vol-2654. Kyiv, 786–797. Available at:

Khlaponin, Y. I., Khoroshko, V. O., Khokhlacheva, Y. E., Gavrilko, E. V. (2017). Parametric monitoring of computing processes in information and computing systems. Selected Papers of the XVII International Scientific and Practical Conference on Information Technologies and Security (ITS 2017). Vol-2067. Kyiv, 125–131. Available at:

Pro zatverdzhennia planu zakhodiv shchodo realizatsiyi Kontseptsiyi rozvytku elektronnoi demokratii v Ukraini na 2019-2020 roky. Vid 12 chervnia 2019 r. No. 405-r. Kyiv. Available at:

Schneier, B. (2004). What's Wrong With Electronic Voting Machines? Schneier on Security. Available at:

Vyshniakov, V. M., Pryhara, M. P., Voronin, O. V. (2014). Vidkryta systema taiemnoho holosuvannia. Upravlinnia rozvytkom skladnykh system, 20, 110–115. Available at:

Cgernyshev, D. O., Khlaponin, Y. I., Vyshniakov, V. M. (2020). Experience of introduction of electronic voting in higher education institutions. Zbirnyk naukovykh prats Viyskovoho instytutu Kyivskoho natsionalnoho universytetu imeni Tarasa Shevchenka, 68, 90–99. Available at:



How to Cite

Khlaponin, Y., Vyshniakov, V., Ternavska, V. ., Selyukov, O., & Komarnytskyi, O. (2021). Development of audit and data protection principles in electronic voting systems. Eastern-European Journal of Enterprise Technologies, 4(2(112), 47–57.