E-Voting and Biometric Systems?
#1

Prepared by:
Sonja Hof
University of Linz, Austria
Institute of Applied Computer Science,
Division: Business, Administration and Society;
University of Linz, AUSTRIA


Abstract:
As e-Voting gains more importance while practicable solutions are
being implemented, more questions arise concerning alternative possibilities for a secure and feasible authentication. The specific peculiarities of secure
authentication to a system are various and for a sensitive area like e-Voting also challenging. In this paper we evaluate biometric systems in order to prove their capabilities for e-Voting systems.

Introduction
This contribution tries to look into e-Voting from a different angle on the necessary citizen authorization from a different angle. Instead of concepts such as one-time passwords or smart cards, we try to look into the pros and cons of a biometric approach. Biometrics is the science that tries to fetch human biological features with an automated machine either to authentication or identification [LA02]. Biometric products should remove the necessity of password or PINs. Typical two-factor authorizations use possession, e.g. smart card, and knowledge, e.g. PIN. Biometric systems try to exchange knowledge with an individual feature, e.g. finger print. Recording of the feature should be comfortable and fast. The most commonly use biometric feature is the finger print. It is well known and in wide spread use in daily police work.
In contrast to passwords or pin codes, biometric features are dynamic, i.e. they change over time. This is probably the most challenging property of the biometric system. One has to find a balance between a check which is too strict and generates too many rejections, and a check which is too loose and generates too many false accepts.
This paper gives an overview of biometric approaches to e-Voting. The first section gives an introduction into e-Voting. The second section elaborates on security issues specific to e-Voting systems. Finally, it focuses on security in e-Voting systems with biometric systems.

2 E-Voting
Many countries have started research projects or even pilots for e-Voting (UK [html5],[PKK03], ACM US [html6], NIST [html7], Austria [SM03], Switzerland [BR03],[html9],[html8], Germany [BR03]. There are two main motivations to introduce e-Voting: cost savings and increased voter participation and interest. Providing information and increasing the convenience for the citizens goes hand in hand, and it also offers disabled people the possibility to use e-Voting systems [html10]. Some approaches of putting e-Voting into practise are quite innovative, such as voting using SMS [html8] but still they have to cope with a lot of unsolved technical problems and therefore, it is doubtful if they will be implemented. The most sensitive aspects within e- Voting are fraught with secrecy and access issues.

3 E-Voting and Security
E-Voting is probably the most security sensitive process handled electronically nowadays [Cr02]. The main reason for this being that the worst-case scenario is really catastrophic. For example, assume an electronic vote for the German Bundestag is discovered to have been tampered with. This fraudulent act will not only have drastic consequences for Germany itself, but will also have enormous consequences for the whole European Union and further a field. Bearing this in mind, the highest achievable security is never too much for an e-Voting system.

Generally one can divide the requirements for an electronic vote into three basic musts:
• Do the actual laws in a given country allow for the electronic handling of votes?
• Does a technical solution exist that fulfils all the restrictions and requirements imposed on it by the corresponding laws?
• Do the actual voters desire and accept an electronic voting system and in particular, the designed voting system [Ba04] [Ev04]?
Fulfilling these requirements is quite challenge. Especially as their individual areas of expertise are different: law, technology and social science.

4 Biometric
Identification in E-Voting In this section, we will have a look at biometric systems [Zi03] focusing on their relevance for e-Voting systems. We will look at their different aspects regarding e- Voting systems, e.g. the huge number of persons using the biometrics or the small expertise of typical users.


One of the main issues we like to stress is the difference between biometric authentication compared to “classic” authentication as e.g. smart cards. In this comparison we ignore the well known concept of card readers based on biometrics, e.g. card readers with fingerprint authentication; In this case, the biometric input is not used to authenticate the user to the e-Voting system, but rather to authenticate his/her smart card. The e-Voting system does not interact in any way with the biometric characteristics of the actual users, but still authenticates the user with the help of the user’s authentication certificate as present on the card. Seen from this perspective, this solution is not a biometric approach to e-Voting. From now on, we will focus on biometric approaches that actually use the biometric data to authenticate the e-Voting system. Another issue with biometric systems is their relative young age, there is still currently a set of standardisation efforts going on
We will first have a look at some of the possible biometric properties that can be used for the authentication of individual persons. In this paper, we will restrict ourselves to present just a subset of different biometric properties. We explicitly do not focus on their feasibility, but rather try to show the wide spectrum of “theoretically” possible human properties that can be used in biometric systems.

REFERENCE:
http://docs.googleviewer?a=v&q=cache:Beb...YM1KPayt5g


Reply
#2


Modeling and Simulation of a Robust e-Voting System


Mohammed Khasawneh,Omar Al-Jarrah and Laith Barakat

Abstract
In this paper we present a simulation model for a multifaceted online e-Voting system. The proposed model is capable of handling electronic ballots with multiple scopes at the same time, e.g., presidential, municipal, and parliamentary, amongst others. The model caters for integrity of an election process in terms of the functional and non-functional requirements. The functional requirements embedded in the design of the proposed system warrant well-secured identification and authentication processes for the voter through the use of combined simple biometrics. Of utmost importance are the requirements for correctness, robustness, coherence, consistency, and security. To verify the robustness and reliability of the proposed system, intensive computer simulations were run under varying voting environments, viz. voter density, voter inter-arrival times, introduced acts of malice, etc. Results of the simulations show the impact of several parameters on the performance of the system. These results provide the proper grounds that would guide the decision maker in customizing an e-voting system.

for more:
http://docs.googleviewer?a=v&q=cache:c9iUCcXpL5AJ:ibimapublishingjournals/CIBIMA/volume8/v8n26.pdf+Modeling+and+Simulation+of+a+Robust+e-Voting+System+pdf&hl=en&gl=in&pid=bl&srcid=ADGEESjyLo6287qI_xemY48hKmb4agQV9joiBVJkt6xu5apMYTbpidAntTB-Jc-Z1zjcdKkkiEesa8zyR3TKM4_qFEGuXVCfYlsPH-iultWV0L4JA2RbZX8-8IO_XeKGuO92_S9Syfmv&sig=AHIEtbT5SFUHAwRS0YCiqOMyNIC31P6CXQ



Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: disadvantages of biometric voting machine, biometric secure mobile voting, biometric voting machine project report, disadvantages biometric voting machine, disadvantages of biometric voting s, advantages of biometric voter registration systems, disadvantages of biometric voting,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  “ONLINE VOTING SYSTEM” seminar class 7 12,273 10-06-2015, 04:12 PM
Last Post: seminar report asees
  Human Robot Interaction in Multi-Agent Systems pdf computer topic 0 1,211 25-03-2014, 09:43 PM
Last Post: computer topic
  Evolution of Embedded Systems(Downlaod Seminar Report) Computer Science Clay 2 3,289 14-12-2012, 02:09 PM
Last Post: seminar details
  A survey of usage of Data Mining and Data Warehousing in Academic Institution and Lib seminar class 1 2,124 29-11-2012, 12:56 PM
Last Post: seminar details
  Integration Of Data mining And Data warehousing Systems computer science topics 1 3,262 29-11-2012, 12:56 PM
Last Post: seminar details
  Real Time Systems with Linux/RTAI computer science crazy 1 2,926 01-11-2012, 02:25 PM
Last Post: seminar details
  RTOS - Real Time Operating Systems full report project report tiger 6 11,839 22-10-2012, 01:54 PM
Last Post: seminar details
  Embedded Systems and Information Appliances seminar projects crazy 1 2,129 22-10-2012, 01:21 PM
Last Post: seminar details
  Integrated Design and Implementation of Embedded Control Systems with Scilab seminar surveyer 1 2,357 19-10-2012, 01:58 PM
Last Post: seminar details
  Adaptive Network Based Fuzzy Inference Systems (ANFIS) computer girl 0 1,287 11-06-2012, 12:53 PM
Last Post: computer girl

Forum Jump: