Development of audit and data protection principles in electronic voting systems
DOI:
https://doi.org/10.15587/1729-4061.2021.238259Keywords:
audit of online voting system, data protection, exclusion of illegal influence on votersAbstract
It is assumed in standard information protection technologies that there are owners of this information who put forward requirements for protection. In secret voting systems, the information belongs to the community of citizens, and to protect it, vote organizers must create conditions that allow each voter to make sure that the vote secrecy and accuracy of vote counting are preserved. In developed democracies, this issue is resolved through a widely available audit of all procedures that may be mistrusted. Any voter can conduct such an audit. The anxiety of citizens of democratic countries is based on the idea that if electronic voting is introduced, it will be impossible to conduct such an audit. The article proposes principles of auditing all those software and hardware tools and processes of the online voting system that can generate voter distrust. This audit is carried out using a dedicated server open to voters and their fiduciaries. This server provides continuous monitoring of actions of the service staff in terms of possible interference in the operation of the voting system. Also, due to this server, auditors receive data on the integrity of the voting system hardware and software including its audit tools and an alarm signal in the event of a threat. It was possible to reduce the average time of processing the voter requests to two seconds. This means that processing a maximum of 2,500 voter requests at a vote station will take no more than two hours. Simultaneous access of 50 voters to the server will not make them wait in the queue for more than 2 minutes. Implementation results were described and links were given for conducting experimental voting on the Internet.
References
- Electronic Vote & Democracy. Available at: http://www.electronic-vote.org/
- Prozori vybory u KNU. Kyivskyi natsionalniy universytet imeni Tarasa Shevchenka. Available at: http://univ.kiev.ua/news/8696
- Devid Bismark: Elektronne holosuvannia bez obmanu. Available at: https://www.ted.com/talks/david_bismark_e_voting_without_fraud/transcript?language=uk
- Ajish, S., Anil Kumar, K. S. (2020). Secure I-Voting System with Modified Voting and Verification Protocol. Advances in Electrical and Computer Technologies, 189–200. doi: https://doi.org/10.1007/978-981-15-5558-9_19
- Solvak, M. (2020). Does Vote Verification Work: Usage and Impact of Confidence Building Technology in Internet Voting. Lecture Notes in Computer Science, 213–228. doi: https://doi.org/10.1007/978-3-030-60347-2_14
- Bezpyatchuk, Zh. (2019). U Zelenskogo obeschayut onlayn-golosovanie: chem eto grozit? BBC News Ukraina. Available at: https://www.bbc.com/ukrainian/features-russian-49266210
- Recommendation CM/Rec(2017)5[1] of the Committee of Ministers to member States on standards for e-voting. Available at: https://search.coe.int/cm/Pages/result_details.aspx?ObjectID=0900001680726f6f
- Internet-holosuvannia: pytannia do rozghliadu. Zahalnyi ohliad dlia orhaniv administruvannia vyboriv. Bila knyha IFES. Available at: https://ifesukraine.org/wp-content/uploads/2020/04/IFES-White-Paper-Applegate-Chanussot-Basysty-%E2%80%98Considerations-on-Internet-Voting%E2%80%99-Mar-2020-Ukr-1.pdf
- Ernest, A., Hourt, N., Larimer, D. (2016). Pat. No. US 2017/0109955 A1. Blockchain Electronic Voting System And Method. No. 15/298,177; declareted: 19.10.2016; published: 20.04.2017. Available at: https://patentimages.storage.googleapis.com/ba/6f/d2/1920626de10c1b/US20170109955A1.pdf
- Ibrahim, M., Ravindran, K., Lee, H., Farooqui, O., Mahmoud, Q. H. (2021). ElectionBlock: An Electronic Voting System using Blockchain and Fingerprint Authentication. 2021 IEEE 18th International Conference on Software Architecture Companion (ICSA-C). doi: https://doi.org/10.1109/icsa-c52384.2021.00033
- Alvi, S. T., Uddin, M. N., Islam, L., Ahamed, S. (2020). From Conventional Voting to Blockchain Voting: Categorization of Different Voting Mechanisms. 2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI). doi: https://doi.org/10.1109/sti50764.2020.9350399
- Fernandes, A., Garg, K., Agrawal, A., Bhatia, A. (2021). Decentralized Online Voting using Blockchain and Secret Contracts. 2021 International Conference on Information Networking (ICOIN). doi: https://doi.org/10.1109/icoin50884.2021.9333966
- Golubitskiy, S. (2019). Mutnaya tekhnologiya. Uroki moskovskih vyborov na blokcheyne. Novaya gazeta, 111. Available at: https://novayagazeta.ru/articles/2019/09/30/82175-mutnaya-tehnologiya
- Schneier, B. (2020). Voatz Internet Voting App Is Insecure. Schneier on Security. Available at: https://www.schneier.com/crypto-gram/archives/2020/0315.html#cg1
- Vyshnyakov, V. M., Komarnitsky, O. A. (2019). Transparentnye sistemy elektronnoy demokratii. Ottawa: Accent Graphics Communications & Publishing, 96. Available at: http://www.asdev.com.ua/dndiasb/assets/files/Vyshnyakov/e-voting.pdf
- Chupryn, V., Vyshniakov, V., Komarnitskiy, O. (2018). Method of counteraction of attackes of mediator in transparent system the internet voting. Ukrainian Information Security Research Journal, 20 (3), 180–187. doi: https://doi.org/10.18372/2410-7840.20.13079
- Shannon, C. E. (1949). Communication Theory of Secrecy Systems. Bell System Technical Journal, 28 (4), 656–715. doi: https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
- Chupryn, V., Vyshniakov, V., Prygara, M. (2016). Method of generation of casual numbers on the basis of the use of apparatus of the computer plugged in the Internet. Ukrainian Information Security Research Journal, 18 (4), 323–335. doi: https://doi.org/10.18372/2410-7840.18.11085
- Diffie, W., Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22 (6), 644–654. doi: https://doi.org/10.1109/tit.1976.1055638
- Chupryn, V., Vyshniakov, V., Prygara, M. (2017). Method of combating illegal influence on voters in the Internet voting system. Ukrainian Scientific Journal of Information Security, 23 (1), 7–14. doi: https://doi.org/10.18372/2225-5036.23.11547
- Khlaponin, Y., Khalifa, E. K., Khlaponin, D., Selyukov, A., Tolbatov, A., Tolbatov, V., Odarchenko, R. (2019). Method of Improving the Stability of Network Synchronization in Multiservice Macro Networks. Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019). Vol-2654. Kyiv, 786–797. Available at: http://ceur-ws.org/Vol-2654/paper61.pdf
- Khlaponin, Y. I., Khoroshko, V. O., Khokhlacheva, Y. E., Gavrilko, E. V. (2017). Parametric monitoring of computing processes in information and computing systems. Selected Papers of the XVII International Scientific and Practical Conference on Information Technologies and Security (ITS 2017). Vol-2067. Kyiv, 125–131. Available at: http://ceur-ws.org/Vol-2067/paper18.pdf
- Pro zatverdzhennia planu zakhodiv shchodo realizatsiyi Kontseptsiyi rozvytku elektronnoi demokratii v Ukraini na 2019-2020 roky. Vid 12 chervnia 2019 r. No. 405-r. Kyiv. Available at: https://zakon.rada.gov.ua/laws/show/405-2019-%D1%80/sp:max10#Text
- Schneier, B. (2004). What's Wrong With Electronic Voting Machines? Schneier on Security. Available at: https://www.schneier.com/essays/archives/2004/11/whats_wrong_with_ele.html
- Vyshniakov, V. M., Pryhara, M. P., Voronin, O. V. (2014). Vidkryta systema taiemnoho holosuvannia. Upravlinnia rozvytkom skladnykh system, 20, 110–115. Available at: http://urss.knuba.edu.ua/files/zbirnyk-20/22.pdf
- Cgernyshev, D. O., Khlaponin, Y. I., Vyshniakov, V. M. (2020). Experience of introduction of electronic voting in higher education institutions. Zbirnyk naukovykh prats Viyskovoho instytutu Kyivskoho natsionalnoho universytetu imeni Tarasa Shevchenka, 68, 90–99. Available at: http://nbuv.gov.ua/UJRN/Znpviknu_2020_68_12
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 Yuriy Khlaponin, Volodymyr Vyshniakov, Viktoriia Ternavska, Oleksandr Selyukov, Oleg Komarnytskyi
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.
A license agreement is a document in which the author warrants that he/she owns all copyright for the work (manuscript, article, etc.).
The authors, signing the License Agreement with TECHNOLOGY CENTER PC, have all rights to the further use of their work, provided that they link to our edition in which the work was published.
According to the terms of the License Agreement, the Publisher TECHNOLOGY CENTER PC does not take away your copyrights and receives permission from the authors to use and dissemination of the publication through the world's scientific resources (own electronic resources, scientometric databases, repositories, libraries, etc.).
In the absence of a signed License Agreement or in the absence of this agreement of identifiers allowing to identify the identity of the author, the editors have no right to work with the manuscript.
It is important to remember that there is another type of agreement between authors and publishers – when copyright is transferred from the authors to the publisher. In this case, the authors lose ownership of their work and may not use it in any way.