Development of audit and data protection principles in electronic voting systems

Authors

DOI:

https://doi.org/10.15587/1729-4061.2021.238259

Keywords:

audit of online voting system, data protection, exclusion of illegal influence on voters

Abstract

It is assumed in standard information protection technologies that there are owners of this information who put forward requirements for protection. In secret voting systems, the information belongs to the community of citizens, and to protect it, vote organizers must create conditions that allow each voter to make sure that the vote secrecy and accuracy of vote counting are preserved. In developed democracies, this issue is resolved through a widely available audit of all procedures that may be mistrusted. Any voter can conduct such an audit. The anxiety of citizens of democratic countries is based on the idea that if electronic voting is introduced, it will be impossible to conduct such an audit. The article proposes principles of auditing all those software and hardware tools and processes of the online voting system that can generate voter distrust. This audit is carried out using a dedicated server open to voters and their fiduciaries. This server provides continuous monitoring of actions of the service staff in terms of possible interference in the operation of the voting system. Also, due to this server, auditors receive data on the integrity of the voting system hardware and software including its audit tools and an alarm signal in the event of a threat. It was possible to reduce the average time of processing the voter requests to two seconds. This means that processing a maximum of 2,500 voter requests at a vote station will take no more than two hours. Simultaneous access of 50 voters to the server will not make them wait in the queue for more than 2 minutes. Implementation results were described and links were given for conducting experimental voting on the Internet.

Author Biographies

Yuriy Khlaponin, Kyiv National University of Construction and Architecture

Doctor of Technical Sciences, Professor, Head of Department

Department of Cyber Security and Computer Engineering

Volodymyr Vyshniakov, Kyiv National University of Construction and Architecture

PhD, Associate Professor

Department of Cyber Security and Computer Engineering

Viktoriia Ternavska, Kyiv National University of Construction and Architecture

PhD, Associate Professor

Department of Labor Protection and Environment

Oleksandr Selyukov, Kyiv National University of Construction and Architecture

Doctor of Technical Sciences, Professor, Senior Researcher

Department of Cyber Security and Computer Engineering

Oleg Komarnytskyi, Department of Transport Infrastructure of the Kyiv City State Administration

PhD, Deputy Head of Department

Department of Strategic Planning

References

Electronic Vote & Democracy. Available at: http://www.electronic-vote.org/

Prozori vybory u KNU. Kyivskyi natsionalniy universytet imeni Tarasa Shevchenka. Available at: http://univ.kiev.ua/news/8696

Devid Bismark: Elektronne holosuvannia bez obmanu. Available at: https://www.ted.com/talks/david_bismark_e_voting_without_fraud/transcript?language=uk

Ajish, S., Anil Kumar, K. S. (2020). Secure I-Voting System with Modified Voting and Verification Protocol. Advances in Electrical and Computer Technologies, 189–200. doi: https://doi.org/10.1007/978-981-15-5558-9_19

Solvak, M. (2020). Does Vote Verification Work: Usage and Impact of Confidence Building Technology in Internet Voting. Lecture Notes in Computer Science, 213–228. doi: https://doi.org/10.1007/978-3-030-60347-2_14

Bezpyatchuk, Zh. (2019). U Zelenskogo obeschayut onlayn-golosovanie: chem eto grozit? BBC News Ukraina. Available at: https://www.bbc.com/ukrainian/features-russian-49266210

Recommendation CM/Rec(2017)5[1] of the Committee of Ministers to member States on standards for e-voting. Available at: https://search.coe.int/cm/Pages/result_details.aspx?ObjectID=0900001680726f6f

Internet-holosuvannia: pytannia do rozghliadu. Zahalnyi ohliad dlia orhaniv administruvannia vyboriv. Bila knyha IFES. Available at: https://ifesukraine.org/wp-content/uploads/2020/04/IFES-White-Paper-Applegate-Chanussot-Basysty-%E2%80%98Considerations-on-Internet-Voting%E2%80%99-Mar-2020-Ukr-1.pdf

Ernest, A., Hourt, N., Larimer, D. (2016). Pat. No. US 2017/0109955 A1. Blockchain Electronic Voting System And Method. No. 15/298,177; declareted: 19.10.2016; published: 20.04.2017. Available at: https://patentimages.storage.googleapis.com/ba/6f/d2/1920626de10c1b/US20170109955A1.pdf

Ibrahim, M., Ravindran, K., Lee, H., Farooqui, O., Mahmoud, Q. H. (2021). ElectionBlock: An Electronic Voting System using Blockchain and Fingerprint Authentication. 2021 IEEE 18th International Conference on Software Architecture Companion (ICSA-C). doi: https://doi.org/10.1109/icsa-c52384.2021.00033

Alvi, S. T., Uddin, M. N., Islam, L., Ahamed, S. (2020). From Conventional Voting to Blockchain Voting: Categorization of Different Voting Mechanisms. 2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI). doi: https://doi.org/10.1109/sti50764.2020.9350399

Fernandes, A., Garg, K., Agrawal, A., Bhatia, A. (2021). Decentralized Online Voting using Blockchain and Secret Contracts. 2021 International Conference on Information Networking (ICOIN). doi: https://doi.org/10.1109/icoin50884.2021.9333966

Golubitskiy, S. (2019). Mutnaya tekhnologiya. Uroki moskovskih vyborov na blokcheyne. Novaya gazeta, 111. Available at: https://novayagazeta.ru/articles/2019/09/30/82175-mutnaya-tehnologiya

Schneier, B. (2020). Voatz Internet Voting App Is Insecure. Schneier on Security. Available at: https://www.schneier.com/crypto-gram/archives/2020/0315.html#cg1

Vyshnyakov, V. M., Komarnitsky, O. A. (2019). Transparentnye sistemy elektronnoy demokratii. Ottawa: Accent Graphics Communications & Publishing, 96. Available at: http://www.asdev.com.ua/dndiasb/assets/files/Vyshnyakov/e-voting.pdf

Chupryn, V., Vyshniakov, V., Komarnitskiy, O. (2018). Method of counteraction of attackes of mediator in transparent system the internet voting. Ukrainian Information Security Research Journal, 20 (3), 180–187. doi: https://doi.org/10.18372/2410-7840.20.13079

Shannon, C. E. (1949). Communication Theory of Secrecy Systems. Bell System Technical Journal, 28 (4), 656–715. doi: https://doi.org/10.1002/j.1538-7305.1949.tb00928.x

Chupryn, V., Vyshniakov, V., Prygara, M. (2016). Method of generation of casual numbers on the basis of the use of apparatus of the computer plugged in the Internet. Ukrainian Information Security Research Journal, 18 (4), 323–335. doi: https://doi.org/10.18372/2410-7840.18.11085

Diffie, W., Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22 (6), 644–654. doi: https://doi.org/10.1109/tit.1976.1055638

Chupryn, V., Vyshniakov, V., Prygara, M. (2017). Method of combating illegal influence on voters in the Internet voting system. Ukrainian Scientific Journal of Information Security, 23 (1), 7–14. doi: https://doi.org/10.18372/2225-5036.23.11547

Khlaponin, Y., Khalifa, E. K., Khlaponin, D., Selyukov, A., Tolbatov, A., Tolbatov, V., Odarchenko, R. (2019). Method of Improving the Stability of Network Synchronization in Multiservice Macro Networks. Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019). Vol-2654. Kyiv, 786–797. Available at: http://ceur-ws.org/Vol-2654/paper61.pdf

Khlaponin, Y. I., Khoroshko, V. O., Khokhlacheva, Y. E., Gavrilko, E. V. (2017). Parametric monitoring of computing processes in information and computing systems. Selected Papers of the XVII International Scientific and Practical Conference on Information Technologies and Security (ITS 2017). Vol-2067. Kyiv, 125–131. Available at: http://ceur-ws.org/Vol-2067/paper18.pdf

Pro zatverdzhennia planu zakhodiv shchodo realizatsiyi Kontseptsiyi rozvytku elektronnoi demokratii v Ukraini na 2019-2020 roky. Vid 12 chervnia 2019 r. No. 405-r. Kyiv. Available at: https://zakon.rada.gov.ua/laws/show/405-2019-%D1%80/sp:max10#Text

Schneier, B. (2004). What's Wrong With Electronic Voting Machines? Schneier on Security. Available at: https://www.schneier.com/essays/archives/2004/11/whats_wrong_with_ele.html

Vyshniakov, V. M., Pryhara, M. P., Voronin, O. V. (2014). Vidkryta systema taiemnoho holosuvannia. Upravlinnia rozvytkom skladnykh system, 20, 110–115. Available at: http://urss.knuba.edu.ua/files/zbirnyk-20/22.pdf

Cgernyshev, D. O., Khlaponin, Y. I., Vyshniakov, V. M. (2020). Experience of introduction of electronic voting in higher education institutions. Zbirnyk naukovykh prats Viyskovoho instytutu Kyivskoho natsionalnoho universytetu imeni Tarasa Shevchenka, 68, 90–99. Available at: http://nbuv.gov.ua/UJRN/Znpviknu_2020_68_12

Published

2021-08-31

How to Cite

Khlaponin, Y., Vyshniakov, V., Ternavska, V. ., Selyukov, O., & Komarnytskyi, O. (2021). Development of audit and data protection principles in electronic voting systems. Eastern-European Journal of Enterprise Technologies, 4(2(112), 47–57. https://doi.org/10.15587/1729-4061.2021.238259