PREVENTING PHISHING ATTACKS ON VOTING SYSTEMS USING VISUAL CRYPTOGRAPHY
Abstract
A voting system using visual cryptography (VC) aims at providing a facility to cast votes for critical and confidential internal corporate decisions. It has flexibility to allow casting of vote from any remote place.
The election is held in full confidentiality by applying appropriate security measures to allow the voter to vote for any participating candidate only if he logs into the system by entering the correct password, which is generated by merging the two shares using the Visual Cryptography scheme.
Administrator share the 1 to voter e-mail id before election and share 2 will available in the voting system for his login during election. Voter will get the secret password to cast his vote by combining share 1 and share 2 using Visual Cryptography. Phishing is an attempt by an individual or a group to get personal confidential information from unsuspecting victims.
Fake websites that appear very similar to the original ones are being hosted to achieve this. Internet voting focuses on security, privacy and secrecy issues, as well as challenges for stakeholder involvement and observation of the process. A new approach is proposed for voting system to prevent phishing attacks.
CHAPTER ONE
GENERAL INTRODUCTION
Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity dupes a victim into opening an email, instant message or text message. Phishing is an attempt by an individual or a group to get personal confidential information from unsuspecting victims.
Background and context of study
Online voting system is a web-based voting system that will help to manage elections easily and securely. This voting can be used for casting votes during the elections help in colleges. In this system the voter do not have to go to the polling booth to the cast their votes. There is a database which is maintained in which all the name of the voters with their complete information is stored. The system administration registers the voter by simply filling a registration form to register the voters.
After registration, the voter is assigned a secret voter ID with which he/she can use to login to the system and cast his/her vote. If invalid/wrong details are submitted, then the person is not registered to vote. After the user successfully registers themselves, a link is sent on their respective E-mail IDs. The link is a key for activated only after the user clicks on that link . the site will be activated only on the day of the voting . once the user logs in, they will be provided with a one time password which has to be entered by the user before casting his/her vote. The password will be destroyed after casting of their respective E-mail IDs.
Phishing attack is identified as a major attack among all online attacks. Phishing is the attempt to obtain sensitive information such usernames, password, and credit card, often for malicious reasons by disguising as a trustworthy entity in an electronic communication.
Cryptography is derived from two Greek words which mean “secret writing”. Cryptography is the process of scrambling the original text by rearranging and substituting the original text, arranging it in a seemingly unreadable format for others. Cryptography is an effective way to protect the information that is transmitting though the network communication path.
Visual cryptography is a cryptography technique which allows visual information (pictures, text, etc.) to be encrypt in such a way that decryption can be done just sight reading. Visual cryptography degree associated rising cryptography technology, uses the characteristics of human vision to rewrite encrypted photos; its provides secured digital transmission that is used just for merely the once.
1.2 Problem statement
Internet is the large and global network. There are different kinds of applications based on the Internet. One of them is online voting system. The use of new technologies to support voting is the subject of great debate.
Several people advocate the benefits it can bring such as improved speed and accuracy in counting, accessibility, voting from home and it is also concerned with the risk it poses, such as unequal access, violation to secrecy, anonymity and alteration of the results of an election. There are two challenges to online voting system which can be seen as well technological as culture:
You cannot at the same time have verifiability of an election and anonymous voting
This implies that you have make a tradeoff between an anonymous election and verifiability. If you want to sure that each and every voter and provide him with a method to verify that his vote has been counted correctly. In order to do that, you need to link voter to vote which would make an anonymous vote impossible. There are cultures ( in voting democracies) where public voting is common, so this is mostly a cultural question a cultural question on how you see voting in those cultures. Nonetheless is there a risk, if a non-functioning democracy would implement an identity-linked voting system, that the regime could after the election prosecute the defectors.
Accessibility has to be always guaranteed
While the penetration of the modern technology has advanced, the knowledge on how to use it has not advanced at the same pace. In order for e-voting to work, you would need to have people IT-literate enough to use a government-issued certificate to authenticate themselves and be able in general to use computers. This challenge will automatically be solve over time ageing societies of the western hemisphere this is not a given fact.
1.3 Objectives of study
Generally, the objectives of a study or research are the expected outcomes of the research or the study. This outcome may include solving a problem or bringing out statically information on the study. This section will be subdivided into two which general objectives (which is a broad statement about what I aim to achieve in this project) and the specific objectives (detailed objectives that what will be research during the project).
1.3.1 General objective
The objective of this project is to preventing phishing attack on voting system using visual cryptography.
1.3.2 Specific objectives
We define the following specific objectives:
- For the people who working outside the native country as well as for the people who are physically disabled and very old people can vote irrespective of their place.
- Proposed system provides voting system only for authorized people.
- Only one person can cast one vote.
Read: Computer Engineering Project Topics and Materials
Project Details | |
Department | Computer Engineering |
Project ID | CE0009 |
Price | Cameroonian: 5000 Frs |
International: $15 | |
No of pages | 60 |
Methodology | Experimental |
Reference | Yes |
Format | MS Word & PDF |
Chapters | 1-5 |
Extra Content | Table of content |
This is a premium project material, to get the complete research project make payment of 5,000FRS (for Cameroonian base clients) and $15 for international base clients. See details on payment page
NB: It’s advisable to contact us before making any form of payment
Our Fair use policy
Using our service is LEGAL and IS NOT prohibited by any university/college policies. For more details click here
We’ve been providing support to students, helping them make the most out of their academics, since 2014. The custom academic work that we provide is a powerful tool that will facilitate and boost your coursework, grades and examination results. Professionalism is at the core of our dealings with clients
For more project materials and info!
Contact us here
OR
Click on the WhatsApp button on the bottom left
Email: info@project-house.net
PREVENTING PHISHING ATTACKS ON VOTING SYSTEMS USING VISUAL CRYPTOGRAPHY
Project Details | |
Department | Computer Engineering |
Project ID | CE0009 |
Price | Cameroonian: 5000 Frs |
International: $15 | |
No of pages | 60 |
Methodology | Experimental |
Reference | Yes |
Format | MS Word & PDF |
Chapters | 1-5 |
Extra Content | table of content, |
Abstract
A voting system using visual cryptography (VC) aims at providing a facility to cast votes for critical and confidential internal corporate decisions. It has flexibility to allow casting of vote from any remote place.
The election is held in full confidentiality by applying appropriate security measures to allow the voter to vote for any participating candidate only if he logs into the system by entering the correct password, which is generated by merging the two shares using the Visual Cryptography scheme.
Administrator share the 1 to voter e-mail id before election and share 2 will available in the voting system for his login during election. Voter will get the secret password to cast his vote by combining share 1 and share 2 using Visual Cryptography. Phishing is an attempt by an individual or a group to get personal confidential information from unsuspecting victims.
Fake websites that appear very similar to the original ones are being hosted to achieve this. Internet voting focuses on security, privacy and secrecy issues, as well as challenges for stakeholder involvement and observation of the process. A new approach is proposed for voting system to prevent phishing attacks.
CHAPTER ONE
GENERAL INTRODUCTION
Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity dupes a victim into opening an email, instant message or text message. Phishing is an attempt by an individual or a group to get personal confidential information from unsuspecting victims.
Background and context of study
Online voting system is a web-based voting system that will help to manage elections easily and securely. This voting can be used for casting votes during the elections help in colleges. In this system the voter do not have to go to the polling booth to the cast their votes. There is a database which is maintained in which all the name of the voters with their complete information is stored. The system administration registers the voter by simply filling a registration form to register the voters.
After registration, the voter is assigned a secret voter ID with which he/she can use to login to the system and cast his/her vote. If invalid/wrong details are submitted, then the person is not registered to vote. After the user successfully registers themselves, a link is sent on their respective E-mail IDs. The link is a key for activated only after the user clicks on that link . the site will be activated only on the day of the voting . once the user logs in, they will be provided with a one time password which has to be entered by the user before casting his/her vote. The password will be destroyed after casting of their respective E-mail IDs.
Phishing attack is identified as a major attack among all online attacks. Phishing is the attempt to obtain sensitive information such usernames, password, and credit card, often for malicious reasons by disguising as a trustworthy entity in an electronic communication.
Cryptography is derived from two Greek words which mean “secret writing”. Cryptography is the process of scrambling the original text by rearranging and substituting the original text, arranging it in a seemingly unreadable format for others. Cryptography is an effective way to protect the information that is transmitting though the network communication path.
Visual cryptography is a cryptography technique which allows visual information (pictures, text, etc.) to be encrypt in such a way that decryption can be done just sight reading. Visual cryptography degree associated rising cryptography technology, uses the characteristics of human vision to rewrite encrypted photos; its provides secured digital transmission that is used just for merely the once.
1.2 Problem statement
Internet is the large and global network. There are different kinds of applications based on the Internet. One of them is online voting system. The use of new technologies to support voting is the subject of great debate.
Several people advocate the benefits it can bring such as improved speed and accuracy in counting, accessibility, voting from home and it is also concerned with the risk it poses, such as unequal access, violation to secrecy, anonymity and alteration of the results of an election. There are two challenges to online voting system which can be seen as well technological as culture:
You cannot at the same time have verifiability of an election and anonymous voting
This implies that you have make a tradeoff between an anonymous election and verifiability. If you want to sure that each and every voter and provide him with a method to verify that his vote has been counted correctly. In order to do that, you need to link voter to vote which would make an anonymous vote impossible. There are cultures ( in voting democracies) where public voting is common, so this is mostly a cultural question a cultural question on how you see voting in those cultures. Nonetheless is there a risk, if a non-functioning democracy would implement an identity-linked voting system, that the regime could after the election prosecute the defectors.
Accessibility has to be always guaranteed
While the penetration of the modern technology has advanced, the knowledge on how to use it has not advanced at the same pace. In order for e-voting to work, you would need to have people IT-literate enough to use a government-issued certificate to authenticate themselves and be able in general to use computers. This challenge will automatically be solve over time ageing societies of the western hemisphere this is not a given fact.
1.3 Objectives of study
Generally, the objectives of a study or research are the expected outcomes of the research or the study. This outcome may include solving a problem or bringing out statically information on the study. This section will be subdivided into two which general objectives (which is a broad statement about what I aim to achieve in this project) and the specific objectives (detailed objectives that what will be research during the project).
1.3.1 General objective
The objective of this project is to preventing phishing attack on voting system using visual cryptography.
1.3.2 Specific objectives
We define the following specific objectives:
- For the people who working outside the native country as well as for the people who are physically disabled and very old people can vote irrespective of their place.
- Proposed system provides voting system only for authorized people.
- Only one person can cast one vote.
Read: Computer Engineering Project Topics and Materials
This is a premium project material, to get the complete research project make payment of 5,000FRS (for Cameroonian base clients) and $15 for international base clients. See details on payment page
NB: It’s advisable to contact us before making any form of payment
Our Fair use policy
Using our service is LEGAL and IS NOT prohibited by any university/college policies. For more details click here
We’ve been providing support to students, helping them make the most out of their academics, since 2014. The custom academic work that we provide is a powerful tool that will facilitate and boost your coursework, grades and examination results. Professionalism is at the core of our dealings with clients
For more project materials and info!
Contact us here
OR
Click on the WhatsApp button on the bottom left
Email: info@project-house.net