Development of audit and data protection principles in electronic voting systems
DOI:
https://doi.org/10.15587/1729-4061.2021.238259Keywords:
audit of online voting system, data protection, exclusion of illegal influence on votersAbstract
It is assumed in standard information protection technologies that there are owners of this information who put forward requirements for protection. In secret voting systems, the information belongs to the community of citizens, and to protect it, vote organizers must create conditions that allow each voter to make sure that the vote secrecy and accuracy of vote counting are preserved. In developed democracies, this issue is resolved through a widely available audit of all procedures that may be mistrusted. Any voter can conduct such an audit. The anxiety of citizens of democratic countries is based on the idea that if electronic voting is introduced, it will be impossible to conduct such an audit. The article proposes principles of auditing all those software and hardware tools and processes of the online voting system that can generate voter distrust. This audit is carried out using a dedicated server open to voters and their fiduciaries. This server provides continuous monitoring of actions of the service staff in terms of possible interference in the operation of the voting system. Also, due to this server, auditors receive data on the integrity of the voting system hardware and software including its audit tools and an alarm signal in the event of a threat. It was possible to reduce the average time of processing the voter requests to two seconds. This means that processing a maximum of 2,500 voter requests at a vote station will take no more than two hours. Simultaneous access of 50 voters to the server will not make them wait in the queue for more than 2 minutes. Implementation results were described and links were given for conducting experimental voting on the Internet.
References
Electronic Vote & Democracy. Available at: http://www.electronic-vote.org/
Prozori vybory u KNU. Kyivskyi natsionalniy universytet imeni Tarasa Shevchenka. Available at: http://univ.kiev.ua/news/8696
Devid Bismark: Elektronne holosuvannia bez obmanu. Available at: https://www.ted.com/talks/david_bismark_e_voting_without_fraud/transcript?language=uk
Ajish, S., Anil Kumar, K. S. (2020). Secure I-Voting System with Modified Voting and Verification Protocol. Advances in Electrical and Computer Technologies, 189–200. doi: https://doi.org/10.1007/978-981-15-5558-9_19
Solvak, M. (2020). Does Vote Verification Work: Usage and Impact of Confidence Building Technology in Internet Voting. Lecture Notes in Computer Science, 213–228. doi: https://doi.org/10.1007/978-3-030-60347-2_14
Bezpyatchuk, Zh. (2019). U Zelenskogo obeschayut onlayn-golosovanie: chem eto grozit? BBC News Ukraina. Available at: https://www.bbc.com/ukrainian/features-russian-49266210
Recommendation CM/Rec(2017)5[1] of the Committee of Ministers to member States on standards for e-voting. Available at: https://search.coe.int/cm/Pages/result_details.aspx?ObjectID=0900001680726f6f
Internet-holosuvannia: pytannia do rozghliadu. Zahalnyi ohliad dlia orhaniv administruvannia vyboriv. Bila knyha IFES. Available at: https://ifesukraine.org/wp-content/uploads/2020/04/IFES-White-Paper-Applegate-Chanussot-Basysty-%E2%80%98Considerations-on-Internet-Voting%E2%80%99-Mar-2020-Ukr-1.pdf
Ernest, A., Hourt, N., Larimer, D. (2016). Pat. No. US 2017/0109955 A1. Blockchain Electronic Voting System And Method. No. 15/298,177; declareted: 19.10.2016; published: 20.04.2017. Available at: https://patentimages.storage.googleapis.com/ba/6f/d2/1920626de10c1b/US20170109955A1.pdf
Ibrahim, M., Ravindran, K., Lee, H., Farooqui, O., Mahmoud, Q. H. (2021). ElectionBlock: An Electronic Voting System using Blockchain and Fingerprint Authentication. 2021 IEEE 18th International Conference on Software Architecture Companion (ICSA-C). doi: https://doi.org/10.1109/icsa-c52384.2021.00033
Alvi, S. T., Uddin, M. N., Islam, L., Ahamed, S. (2020). From Conventional Voting to Blockchain Voting: Categorization of Different Voting Mechanisms. 2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI). doi: https://doi.org/10.1109/sti50764.2020.9350399
Fernandes, A., Garg, K., Agrawal, A., Bhatia, A. (2021). Decentralized Online Voting using Blockchain and Secret Contracts. 2021 International Conference on Information Networking (ICOIN). doi: https://doi.org/10.1109/icoin50884.2021.9333966
Golubitskiy, S. (2019). Mutnaya tekhnologiya. Uroki moskovskih vyborov na blokcheyne. Novaya gazeta, 111. Available at: https://novayagazeta.ru/articles/2019/09/30/82175-mutnaya-tehnologiya
Schneier, B. (2020). Voatz Internet Voting App Is Insecure. Schneier on Security. Available at: https://www.schneier.com/crypto-gram/archives/2020/0315.html#cg1
Vyshnyakov, V. M., Komarnitsky, O. A. (2019). Transparentnye sistemy elektronnoy demokratii. Ottawa: Accent Graphics Communications & Publishing, 96. Available at: http://www.asdev.com.ua/dndiasb/assets/files/Vyshnyakov/e-voting.pdf
Chupryn, V., Vyshniakov, V., Komarnitskiy, O. (2018). Method of counteraction of attackes of mediator in transparent system the internet voting. Ukrainian Information Security Research Journal, 20 (3), 180–187. doi: https://doi.org/10.18372/2410-7840.20.13079
Shannon, C. E. (1949). Communication Theory of Secrecy Systems. Bell System Technical Journal, 28 (4), 656–715. doi: https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
Chupryn, V., Vyshniakov, V., Prygara, M. (2016). Method of generation of casual numbers on the basis of the use of apparatus of the computer plugged in the Internet. Ukrainian Information Security Research Journal, 18 (4), 323–335. doi: https://doi.org/10.18372/2410-7840.18.11085
Diffie, W., Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22 (6), 644–654. doi: https://doi.org/10.1109/tit.1976.1055638
Chupryn, V., Vyshniakov, V., Prygara, M. (2017). Method of combating illegal influence on voters in the Internet voting system. Ukrainian Scientific Journal of Information Security, 23 (1), 7–14. doi: https://doi.org/10.18372/2225-5036.23.11547
Khlaponin, Y., Khalifa, E. K., Khlaponin, D., Selyukov, A., Tolbatov, A., Tolbatov, V., Odarchenko, R. (2019). Method of Improving the Stability of Network Synchronization in Multiservice Macro Networks. Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019). Vol-2654. Kyiv, 786–797. Available at: http://ceur-ws.org/Vol-2654/paper61.pdf
Khlaponin, Y. I., Khoroshko, V. O., Khokhlacheva, Y. E., Gavrilko, E. V. (2017). Parametric monitoring of computing processes in information and computing systems. Selected Papers of the XVII International Scientific and Practical Conference on Information Technologies and Security (ITS 2017). Vol-2067. Kyiv, 125–131. Available at: http://ceur-ws.org/Vol-2067/paper18.pdf
Pro zatverdzhennia planu zakhodiv shchodo realizatsiyi Kontseptsiyi rozvytku elektronnoi demokratii v Ukraini na 2019-2020 roky. Vid 12 chervnia 2019 r. No. 405-r. Kyiv. Available at: https://zakon.rada.gov.ua/laws/show/405-2019-%D1%80/sp:max10#Text
Schneier, B. (2004). What's Wrong With Electronic Voting Machines? Schneier on Security. Available at: https://www.schneier.com/essays/archives/2004/11/whats_wrong_with_ele.html
Vyshniakov, V. M., Pryhara, M. P., Voronin, O. V. (2014). Vidkryta systema taiemnoho holosuvannia. Upravlinnia rozvytkom skladnykh system, 20, 110–115. Available at: http://urss.knuba.edu.ua/files/zbirnyk-20/22.pdf
Cgernyshev, D. O., Khlaponin, Y. I., Vyshniakov, V. M. (2020). Experience of introduction of electronic voting in higher education institutions. Zbirnyk naukovykh prats Viyskovoho instytutu Kyivskoho natsionalnoho universytetu imeni Tarasa Shevchenka, 68, 90–99. Available at: http://nbuv.gov.ua/UJRN/Znpviknu_2020_68_12
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 Yuriy Khlaponin, Volodymyr Vyshniakov, Viktoriia Ternavska, Oleksandr Selyukov, Oleg Komarnytskyi

This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.