Development of audit and data protection principles in electronic voting systems
It is assumed in standard information protection technologies that there are owners of this information who put forward requirements for protection. In secret voting systems, the information belongs to the community of citizens, and to protect it, vote organizers must create conditions that allow ea...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
PC Technology Center
2021-08-01
|
Series: | Eastern-European Journal of Enterprise Technologies |
Subjects: | |
Online Access: | http://journals.uran.ua/eejet/article/view/238259 |
id |
doaj-45e0ec6f2359407998d4c105d802685c |
---|---|
record_format |
Article |
spelling |
doaj-45e0ec6f2359407998d4c105d802685c2021-09-03T14:05:36ZengPC Technology CenterEastern-European Journal of Enterprise Technologies1729-37741729-40612021-08-0142(112)475710.15587/1729-4061.2021.238259275962Development of audit and data protection principles in electronic voting systemsYuriy Khlaponin0https://orcid.org/0000-0002-9287-0817Volodymyr Vyshniakov1https://orcid.org/0000-0003-4668-712XViktoriia Ternavska2https://orcid.org/0000-0003-2102-619XOleksandr Selyukov3https://orcid.org/0000-0001-7979-3434Oleg Komarnytskyi4https://orcid.org/0000-0003-4830-919XKyiv National University of Construction and ArchitectureKyiv National University of Construction and ArchitectureKyiv National University of Construction and ArchitectureKyiv National University of Construction and ArchitectureDepartment of Transport Infrastructure of the Kyiv City State AdministrationIt is assumed in standard information protection technologies that there are owners of this information who put forward requirements for protection. In secret voting systems, the information belongs to the community of citizens, and to protect it, vote organizers must create conditions that allow each voter to make sure that the vote secrecy and accuracy of vote counting are preserved. In developed democracies, this issue is resolved through a widely available audit of all procedures that may be mistrusted. Any voter can conduct such an audit. The anxiety of citizens of democratic countries is based on the idea that if electronic voting is introduced, it will be impossible to conduct such an audit. The article proposes principles of auditing all those software and hardware tools and processes of the online voting system that can generate voter distrust. This audit is carried out using a dedicated server open to voters and their fiduciaries. This server provides continuous monitoring of actions of the service staff in terms of possible interference in the operation of the voting system. Also, due to this server, auditors receive data on the integrity of the voting system hardware and software including its audit tools and an alarm signal in the event of a threat. It was possible to reduce the average time of processing the voter requests to two seconds. This means that processing a maximum of 2,500 voter requests at a vote station will take no more than two hours. Simultaneous access of 50 voters to the server will not make them wait in the queue for more than 2 minutes. Implementation results were described and links were given for conducting experimental voting on the Internet.http://journals.uran.ua/eejet/article/view/238259audit of online voting systemdata protectionexclusion of illegal influence on voters |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Yuriy Khlaponin Volodymyr Vyshniakov Viktoriia Ternavska Oleksandr Selyukov Oleg Komarnytskyi |
spellingShingle |
Yuriy Khlaponin Volodymyr Vyshniakov Viktoriia Ternavska Oleksandr Selyukov Oleg Komarnytskyi Development of audit and data protection principles in electronic voting systems Eastern-European Journal of Enterprise Technologies audit of online voting system data protection exclusion of illegal influence on voters |
author_facet |
Yuriy Khlaponin Volodymyr Vyshniakov Viktoriia Ternavska Oleksandr Selyukov Oleg Komarnytskyi |
author_sort |
Yuriy Khlaponin |
title |
Development of audit and data protection principles in electronic voting systems |
title_short |
Development of audit and data protection principles in electronic voting systems |
title_full |
Development of audit and data protection principles in electronic voting systems |
title_fullStr |
Development of audit and data protection principles in electronic voting systems |
title_full_unstemmed |
Development of audit and data protection principles in electronic voting systems |
title_sort |
development of audit and data protection principles in electronic voting systems |
publisher |
PC Technology Center |
series |
Eastern-European Journal of Enterprise Technologies |
issn |
1729-3774 1729-4061 |
publishDate |
2021-08-01 |
description |
It is assumed in standard information protection technologies that there are owners of this information who put forward requirements for protection. In secret voting systems, the information belongs to the community of citizens, and to protect it, vote organizers must create conditions that allow each voter to make sure that the vote secrecy and accuracy of vote counting are preserved. In developed democracies, this issue is resolved through a widely available audit of all procedures that may be mistrusted. Any voter can conduct such an audit. The anxiety of citizens of democratic countries is based on the idea that if electronic voting is introduced, it will be impossible to conduct such an audit. The article proposes principles of auditing all those software and hardware tools and processes of the online voting system that can generate voter distrust. This audit is carried out using a dedicated server open to voters and their fiduciaries. This server provides continuous monitoring of actions of the service staff in terms of possible interference in the operation of the voting system. Also, due to this server, auditors receive data on the integrity of the voting system hardware and software including its audit tools and an alarm signal in the event of a threat. It was possible to reduce the average time of processing the voter requests to two seconds. This means that processing a maximum of 2,500 voter requests at a vote station will take no more than two hours. Simultaneous access of 50 voters to the server will not make them wait in the queue for more than 2 minutes. Implementation results were described and links were given for conducting experimental voting on the Internet. |
topic |
audit of online voting system data protection exclusion of illegal influence on voters |
url |
http://journals.uran.ua/eejet/article/view/238259 |
work_keys_str_mv |
AT yuriykhlaponin developmentofauditanddataprotectionprinciplesinelectronicvotingsystems AT volodymyrvyshniakov developmentofauditanddataprotectionprinciplesinelectronicvotingsystems AT viktoriiaternavska developmentofauditanddataprotectionprinciplesinelectronicvotingsystems AT oleksandrselyukov developmentofauditanddataprotectionprinciplesinelectronicvotingsystems AT olegkomarnytskyi developmentofauditanddataprotectionprinciplesinelectronicvotingsystems |
_version_ |
1717816369190273024 |