Secure Voting Using Bio-metric Authentication

Authors

  • Gupta LK Department of Computer Science Engineering, IET, Bundelkhand University, Jhansi, India
  • Tiwari U Department of Computer Science Engineering, IET, Bundelkhand University, Jhansi, India
  • Chaudhary MK Department of Computer Science Engineering, IET, Bundelkhand University, Jhansi, India
  • Kasaudhan K Department of Computer Science Engineering, IET, Bundelkhand University, Jhansi, India

DOI:

https://doi.org/10.26438/ijcse/v7i2.731735

Keywords:

EVM, BA, TGS, UIDAI

Abstract

In this era of technology and advancement, everything is getting online. Today people want to be part of everything but didn't want to spare time for it. So when it comes to voting or polling, giving it time feels a very painful task, so why it should not be online? Online voting system as the name suggests is the concept of getting voting and polling done online, simply termed as ‘Internet Voting'. And to ensure security and authenticity of the vote, biometric authentication is done. This method is smart, quick, reliable, and secure. The earlier voting system was very time consuming and also were not so reliable. In the present day, the commonly used voting machine is EVM (Electronic Voting Machine), which have no mechanisms to verify the voter while casting vote and thus fake votes can be cast. But in the online voting system, Biometric authentication using fingerprint and unique voter identification number (here registration number provided during registration of voter) make it the most secure way of voting. This model covers all the limitation of present time in the voting system and is the most advanced of its time.

References

[1] S. P. Everett, M. D. Byrne, and K. K. Greene, "Measuring the usability of paper ballots: Efficiency, effectiveness, and satisfaction", Proceedings of the Human Factors and Ergonomics Society 50th Annual Meeting, (2006) October 16-20; Santa Monica, USA

[2] S. P. Everett, K. K. Greene, M. D. Byrne, D. S. Wallach, K. Derr, D. Sandler, and T. Torous, "Electronic Voting Machines versus Traditional Methods: Improved Preference, Similar Performance", CHI Proceedings: Measuring, Business, and Voting, (2008) April 5-10; Florence, Italy.

[3] M. Patil, V. Pimplodkar, A. R. Zade, V. Vibhute and R. Ghadge, “A Survey on Voting System Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 1, (2013).

[4] Douglas W. Jones, Early Requirements for Mechanical Voting Systems, First International Workshop on Requirements Engineering for E-voting Systems, Aug. 31, 2009, Atlanta.

[5] Voting methods in Estonia: Statistics about Internet Voting in Estonia VVK

[6] Database: https://uidai.gov.in/

[7] Kerberos Overview- An Authentication Service for Open Network Systems, Document ID:16087

Downloads

Published

2019-02-28
CITATION
DOI: 10.26438/ijcse/v7i2.731735
Published: 2019-02-28

How to Cite

[1]
L. K. Gupta, U. Tiwari, M. K. Chaudhary, and K. Kasaudhan, “Secure Voting Using Bio-metric Authentication”, Int. J. Comp. Sci. Eng., vol. 7, no. 2, pp. 731–735, Feb. 2019.