Identity access management using multi-tier cloud infrastructure for secure online voting system

Similar documents
E-Voting System based on Mobile using NIC and SIM

Implementation of Aadhaar Based EVM

PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN.

SECURITY ENHANCEMENT OF E-VOTING SYSTEM

SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY

Lecture 41 Blockchain in Government III (Digital Identity)

ABSTRACT I. INTRODUCTION

BIOMETRIC BASED VOTING MACHINE

SMART E-VOTING SYSTEM BASED ON FINGERPRINT RECOGNITION

ISSN Vol.04,Issue.05, May-2016, Pages:

Federal Voting Assistance Program (FVAP)

@IJMTER-2016, All rights Reserved ,2 Department of Computer Science, G.H. Raisoni College of Engineering Nagpur, India

The Electronic ID and the Voting Admission using a Cell Phone

Implementation of ATM security using IOT

SO OS Secure Online Voting System

Implementation of Decentralized Access Control with Anonymous Authentication in Cloud

Random Image Embedded in Videos using LSB Insertion Algorithm

INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD

Automatic Voting Machine using Hadoop

Security System for Mobile Voting with Biometrics

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Study on secure data storage based on cloud computing ABSTRACT KEYWORDS

Security Specification

HID goid Mobile ID Solution

Proximity-Aware Location Based Collaborative Sensing for Energy-Efficient Mobile Devices

Generating A Digital Signature Based On New Cryptographic Scheme For User Authentication And Security

Implementation of IRIS recognition for Securing Online Payment

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

Secure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption Technique

KantanMT.com. Security & Infra-Structure Overview

Enhanced LSB Based Audio Steganography

Defenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points

PRODUCT AUTHENTICATION USING QR-CODE THROUGH CLOUD

EFFICIENT RETRIEVAL OF DATA FROM CLOUD USING DATA PARTITIONING METHOD FOR BANKING APPLICATIONS [RBAC]

Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at

An efficient and practical solution to secure password-authenticated scheme using smart card

AES and DES Using Secure and Dynamic Data Storage in Cloud

VNF Service Chaining on SAVI SDI

S. Indirakumari, A. Thilagavathy

RADIAN6 SECURITY, PRIVACY, AND ARCHITECTURE

HID goid Mobile ID Solution

To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing

International Journal of Advance Engineering and Research Development

A Hybrid Method of Hiding The Text Information Using Stegnography

System Approach for Single Keyword Search for Encrypted data files Guarantees in Public Infrastructure Clouds

Implementing the Concept of Biometrics Recognition System in Voting Machine

A Secure System for Evaluation and Management of Authentication, Trust and Reputation in Cloud-Integrated Sensor Networks

LSB Based Audio Steganography Using Pattern Matching

A Secure Routing Protocol for Wireless Adhoc Network Creation

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)

Secure Online Voting using Steganography and Biometrics

Implementation of Color based Android Shuffling Pattern Lock

Migrating a Business-Critical Application to Windows Azure

Meeting FFIEC Meeting Regulations for Online and Mobile Banking

Secure Smart Card Based Remote User Authentication Scheme for Multi-server Environment

Verifiability experiences in government online voting

EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

The nominative data coming from the population registry and used to generate the voting cards are never stored in the evoting system database.

Information Technology

Secure Encryption Using Armstrong Number,Color Code ASCII and Prime Number

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

ErgoGroup. E-vote 2011 Security Architecture Electronic counting of paper votes V 1.1

Data Store and Multi-Keyword Search on Encrypted Cloud Data

VLSI Implementation of Advanced Encryption Standard for secured Electronic Voting Machine

Drive digital transformation with an enterprise-grade Managed Private Cloud

International Journal of Computer Engineering and Applications,

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING

Ensuring business continuity with comprehensive and cost-effective disaster recovery service.

Authentication with Privacy for Connected Cars - A research perspective -

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

ADVANCES in NATURAL and APPLIED SCIENCES

Improving Privacy and Trust in Federated Identity Using SAML with Hash Based Encryption Algorithm

Threat Assessment Summary. e-voting, Admin, and pvoting TOE s

Do you handle EU residents personal data? The GDPR update is coming May 25, Are you ready?

Layer Security White Paper

SEGMENT STATURE HASH TABLE BASED COST EFFICIENT DATA SHARING IN CLOUD ENVIRONMENT

PKI Credentialing Handbook

TRACKVIA SECURITY OVERVIEW

An Offline Foundation for Accountable Pseudonyms

6 facts about GenKey s ABIS

New Zealand Government IBM Infrastructure as a Service

Implementing Security in QR Codes by using Blowfish Algorithm

AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS

Rashmi P. Sarode et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (5), 2015,

Cloud Services. Infrastructure-as-a-Service

OptiSol FinTech Platforms

IMPROVED ALGORITHM FOR VISUAL CRYPTOGRAPHY USING REGION INCREMENTATION

REQUIREMENTS, DESIGN AND IMPLEMENTATION OF AN E-VOTING SYSTEM

Biometric Palm vein Recognition using Local Tetra Pattern

Authentication Technology for a Smart eid Infrastructure.

#READYTOVOTE A TOOLKIT TO HELP YOU ENCOURAGE YEAR OLDS IN SCOTLAND TO REGISTER TO VOTE

Vulnerability and security issues in Auto teller machine transactions

SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.

Dyadic Enterprise. Unbound Key Control For Azure Marketplace. The Secure-As-Hardware Software With a Mathematical Proof

Zero private information leak using multi-level security and privileged access for designated authorities on demand

Conquer New Digital Frontiers with leading Public Cloud Platforms.

Applying biometric authentication to physical access control systems

CIS 6930/4930 Computer and Network Security. Project requirements

Kusum Lata, Sugandha Sharma

Transcription:

2015; 2(4): 51-58 IJMRD 2015; 2(4): 51-58 www.allsubjectjournal.com Received: 11-03-2015 Accepted: 28-03-2015 e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Bhosale Poonam Science,JSPM S BSIOTR Vethekar Priyanka Science,JSPM S BSIOTR Thorat Lata Science, JSPM S BSIOTR Archana Lomte Science, JSPM S BSIOTR Correspondence: Bhosale Poonam Science,JSPM S BSIOTR Identity access management using multi-tier cloud infrastructure for secure online voting system Bhosale Poonam, Vethekar Priyanka, Thorat Lata, Archana Lomte Abstract Integrity of election process will determine the integrity of democracy itself. So the election system must be secure and robust against a variety of fraudulent behaviours, should be transparent and comprehensible that voter and candidates can accept the result of election. But in history, there are examples of election being manipulated in order to influence their outcome. Anonymity of ballot should be preserved both to guarantee that voter have no proof that proves which candidates receive their votes. Architecture to manage identity and access in Multi-tier cloud infrastructure, in which most services are supported by massive-scale data centre over the internet. Multi-tier cloud infrastructure uses tier-based model from software engineering to provide resources in different tiers. In this paper we focus on design and implementation of centralized identity and access management system for the multi-tier cloud infrastructure. First we discuss identity and access management requirement in such an environment and propose our solution to address these requirements. Next we discuss approaches to improve performance of the IAM system and make it scalable to billion of users. Keywords: IAM (Identity Access Management), Encryption, Decryption, multi-tier cloud,steganography, Biometric. 1. Introduction Elections enable every citizen of the country to participate in the process of government formation. The constitution of India provides for an election commission of India which is responsible for superintendence direction and control of all elections[5]. Integrity of election process will determine the integrity of democracy itself. So the election system must be secure against a variety of fraudulent behaviors and should be transparent and comprehensible that voters can accept the result of an election. The election must be- 1)Sufficiently robust to withstand a variety of fraudulent behaviors 2) Scalability. 3) Speed and accuracy and Authentication. Online voting system is a web based that facilities the running of elections and surveys online[1]. This system has been developed to simplify the process of organizing elections and make it convenient for votes to vote remotely from their home computers while taking into consideration security, anonymity and providing auditioning capabilities. Users are individuals who interact with the system through web browsers[2]. Biometrics is the science that tries to fetch human biological features with an automated Machine either to authentication or identification[6]. Biometric systems try to exchange Knowledge with an individual feature, e.g. finger print. A. Necessity Electronic voting machines use in India, punch card systems, Global Election Management System used in other countries have lack of indecisive or incorrect election results[9]. So, we have present Online Voting System with Biometric and Steganography, in order to avoid rigging and to enhance the accuracy and the speed of the process so that, one can cast his vote irrespective of his location. B. Advantages 1) Cost saving 2) Reduced administration 3) Create and deploy ballot quickly and with ease, integrity of the vote counting. ~ 51 ~

4) No need for renounces 5) Greater performance II ARCHITECTURE Identity access management by using on line voting system for avoid fake voting system or producing true result not fake result. The On line voting system the client register our data in intermediate server.the intermediate server send the data to the centralize server save this data send the encrypted key to the intermediate server.intermediate server send one key to the user and same key send centralize server which is symmetric key format. In this system we use AES (Advance encryption standard) and minutia based approach for fingerprint.this system uses figure print device for avoid hacking. Caching layer cache the data from user and caching prevent redundant access to the database and avoid the unnecessary data formatting. Cache layer is middle layer of identity access management system which is called Identity access management by using on line voting system for avoid fake voting system or producing true result not fake result. The On line voting system the client register our data in intermediate server.the intermediate server send the data to the centralize server save this data send the encrypted key to the intermediate server.intermediate server send one key to the user and same key send centralize server which is symmetric key format. In this system we use AES (Advance encryption standard) and minutia based approach for fingerprint.this system uses figure print device for avoid hacking. Caching layer cache the data from user and caching prevent redundant access to the database and avoid the unnecessary data formatting. Cache layer is middle layer of identity access management system which is called inter mediate server. A. Working Flow of the System:- Fig 2: System Flow ~ 52 ~

1) Every individual in the country is first register for voting. So, our first step is the registration. 2) At the time of registration each person give thumb impression for the security purpose by using Digital Persona Hardware. 3) After doing this system provide to person a personal identification number(pin) and secrete key is generated as shown in figure. Fig: 3 Secret Key Generation 4) By using Personal identification number and secrete key with thumb gives cover image as shown in fig.2. 5) After that stego image is generated by using cover image as shown fig.2 Fig 4: Stego Image Creation Fig 5: Stego Image creation algorithm ~ 53 ~

6) The registered user login to the system for voting by entering PIN and secrete key with thumb impression. 7) After login at the server side stego image will be decoded by using authentication algorithm as shown in fig. B. Authentication Algorithm 8) Decoding the stego image details of the voter are find from the database at the server side. 9) If details are matched with the database stored then voter will be authenticated for voting and caste the vote. 10) Finally result is generated Fig 7: Authentication Algorithm ~ 54 ~

III. Actual Result A. Client Side 1) Registration 2) Thumb Impression ~ 55 ~

3) Login B. Server side 1) Admin Login ~ 56 ~

2) Home Page 3) Result IV. Problems in Finger Print Recognization 1. Handicapped people does not applicable for voting in our system. 2. Hardware is required for taking thumb impression which is costly. In online voting system result declaration becomes easy, fast and voting becomes possible for migrated user. Online voting system provides fast generation of region wise result. It s a result should be in correct manner. Online voting system increases the system productivity by casting number of votes. Conclusions In this paper, we have developed online voting system using IAM, and Multi-tier cloud infrastructure for secure voting environment. In this system we tried to avoid fraud voting. ~ 57 ~ Acknowledgment Paper is a test of not only technical skill but also team work. This journey could not be completed without the support of guide and group member. We would like to thanks Prof. A.

C. Lomte. To co-ordinate us. And this study provided us the opportunity to work with this best topic and excellent supervision. Finally, we want to thank my expert Staff for always being there References Mohammad Faraji, Joon -Myung Kang, Hadi Bannazadeh, and Alberto Leon-Garcia Department of Electrical and Computer Engineering University of Toronto, Toronto, ON, Canada Email: fms.faraji, joonmyung.kang, hadi.bannazadeh, alberto.leongarcia HYPERLINK"mailto:alberto.leongarciag@utoronto.ca"HY PERLINK"mailto:alberto.leongarciag@utoronto.ca"@utoro nto.ca J.-M. Kang, H. Bannazadeh, and A. Leon-Garcia, Savi testbed: Control and management of converged virtual ict resources, in Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on. IEEE, 2013, pp. 664 667. K. Gunjan, G. Sahoo, and R. Tiwari, Identity management in cloud computing a review, International Journal of Engineering, vol. 1,no. 4, 2012. A. Jøsang and S. Pope, User centric identity management, in AusCERT Asia Pacific Information Technology Security Conference. Citeseer, 2005, p. 77. T. F. Steve Schwab, Managing identity and authorization for community clouds, Duke University, Tech. Rep., 2012. [Online]. Available: www.exogeni.net/ B. Kandukuri, V. Paturi, and A. Rakshit, Cloud security issues, in Services Computing, 2009. SCC 09. IEEE International Conference on, 2009, pp. 517 520 J. Chase, L. Grit, D. Irwin, V. Marupadi, P. Shivam, and A. Yumerefendi, Beyond virtual data centers: Toward an open resource control architecture, in in Selected Papers from the International Conference on the Virtual Computing Initiative (ACM Digital Library),ACM, 2007. P. Liu, S. Jajodia, and C. D. McCollum, Intrusion confinement by isolation in information systems, Journal of Computer Security, vol. 8, 2000. N. Gunti, W. Sun, and M. Niamat, I-rbac: Isolation enabled role-based access control, in Privacy, Security and Trust (PST), 2011 Ninth Annual International Conference on, 2011, pp. 79 86. R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Rolebased access control models, Computer, vol. 29, no. 2, pp. 38 47,Feb. 1996. Available: http://dx.doi.org/10.1109/2.485845 International Conference on Computing and Control Engineering (ICCCE 2012), 12 & 13 April, 2012 A Novel Data Hiding Technique based Bio-Secure Online Voting Systemǁ Prabha Susy Mammen and S. Ramamoorthy E-Voting through Biometrics and Cryptography- Steganography Technique with conjunction of GSM Modemǁ Emerging Trends in Computer Science and Information Technology -2012(ETCSIT2012) Proceedings published in International Journal of Computer Applications (IJCA) by Shobha lokhande SECURE ELECTRONIC REGISTRATION & VOTING SYSTEM BASED ON BIOMETRICSǁ National Conference on Future Computing Volume 1, March 2012 by Dr.K.Kuppusamy1 Associate Professor Department of Computer Science Engineering Alagappa University Karaikudi 630 003.& K.Kavitha 2 M.Phil Scholar Science & Engineering Alagappa University Karaikudi 630 003. ~ 58 ~