2015; 2(4): 51-58 IJMRD 2015; 2(4): 51-58 www.allsubjectjournal.com Received: 11-03-2015 Accepted: 28-03-2015 e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Bhosale Poonam Science,JSPM S BSIOTR Vethekar Priyanka Science,JSPM S BSIOTR Thorat Lata Science, JSPM S BSIOTR Archana Lomte Science, JSPM S BSIOTR Correspondence: Bhosale Poonam Science,JSPM S BSIOTR Identity access management using multi-tier cloud infrastructure for secure online voting system Bhosale Poonam, Vethekar Priyanka, Thorat Lata, Archana Lomte Abstract Integrity of election process will determine the integrity of democracy itself. So the election system must be secure and robust against a variety of fraudulent behaviours, should be transparent and comprehensible that voter and candidates can accept the result of election. But in history, there are examples of election being manipulated in order to influence their outcome. Anonymity of ballot should be preserved both to guarantee that voter have no proof that proves which candidates receive their votes. Architecture to manage identity and access in Multi-tier cloud infrastructure, in which most services are supported by massive-scale data centre over the internet. Multi-tier cloud infrastructure uses tier-based model from software engineering to provide resources in different tiers. In this paper we focus on design and implementation of centralized identity and access management system for the multi-tier cloud infrastructure. First we discuss identity and access management requirement in such an environment and propose our solution to address these requirements. Next we discuss approaches to improve performance of the IAM system and make it scalable to billion of users. Keywords: IAM (Identity Access Management), Encryption, Decryption, multi-tier cloud,steganography, Biometric. 1. Introduction Elections enable every citizen of the country to participate in the process of government formation. The constitution of India provides for an election commission of India which is responsible for superintendence direction and control of all elections[5]. Integrity of election process will determine the integrity of democracy itself. So the election system must be secure against a variety of fraudulent behaviors and should be transparent and comprehensible that voters can accept the result of an election. The election must be- 1)Sufficiently robust to withstand a variety of fraudulent behaviors 2) Scalability. 3) Speed and accuracy and Authentication. Online voting system is a web based that facilities the running of elections and surveys online[1]. This system has been developed to simplify the process of organizing elections and make it convenient for votes to vote remotely from their home computers while taking into consideration security, anonymity and providing auditioning capabilities. Users are individuals who interact with the system through web browsers[2]. Biometrics is the science that tries to fetch human biological features with an automated Machine either to authentication or identification[6]. Biometric systems try to exchange Knowledge with an individual feature, e.g. finger print. A. Necessity Electronic voting machines use in India, punch card systems, Global Election Management System used in other countries have lack of indecisive or incorrect election results[9]. So, we have present Online Voting System with Biometric and Steganography, in order to avoid rigging and to enhance the accuracy and the speed of the process so that, one can cast his vote irrespective of his location. B. Advantages 1) Cost saving 2) Reduced administration 3) Create and deploy ballot quickly and with ease, integrity of the vote counting. ~ 51 ~
4) No need for renounces 5) Greater performance II ARCHITECTURE Identity access management by using on line voting system for avoid fake voting system or producing true result not fake result. The On line voting system the client register our data in intermediate server.the intermediate server send the data to the centralize server save this data send the encrypted key to the intermediate server.intermediate server send one key to the user and same key send centralize server which is symmetric key format. In this system we use AES (Advance encryption standard) and minutia based approach for fingerprint.this system uses figure print device for avoid hacking. Caching layer cache the data from user and caching prevent redundant access to the database and avoid the unnecessary data formatting. Cache layer is middle layer of identity access management system which is called Identity access management by using on line voting system for avoid fake voting system or producing true result not fake result. The On line voting system the client register our data in intermediate server.the intermediate server send the data to the centralize server save this data send the encrypted key to the intermediate server.intermediate server send one key to the user and same key send centralize server which is symmetric key format. In this system we use AES (Advance encryption standard) and minutia based approach for fingerprint.this system uses figure print device for avoid hacking. Caching layer cache the data from user and caching prevent redundant access to the database and avoid the unnecessary data formatting. Cache layer is middle layer of identity access management system which is called inter mediate server. A. Working Flow of the System:- Fig 2: System Flow ~ 52 ~
1) Every individual in the country is first register for voting. So, our first step is the registration. 2) At the time of registration each person give thumb impression for the security purpose by using Digital Persona Hardware. 3) After doing this system provide to person a personal identification number(pin) and secrete key is generated as shown in figure. Fig: 3 Secret Key Generation 4) By using Personal identification number and secrete key with thumb gives cover image as shown in fig.2. 5) After that stego image is generated by using cover image as shown fig.2 Fig 4: Stego Image Creation Fig 5: Stego Image creation algorithm ~ 53 ~
6) The registered user login to the system for voting by entering PIN and secrete key with thumb impression. 7) After login at the server side stego image will be decoded by using authentication algorithm as shown in fig. B. Authentication Algorithm 8) Decoding the stego image details of the voter are find from the database at the server side. 9) If details are matched with the database stored then voter will be authenticated for voting and caste the vote. 10) Finally result is generated Fig 7: Authentication Algorithm ~ 54 ~
III. Actual Result A. Client Side 1) Registration 2) Thumb Impression ~ 55 ~
3) Login B. Server side 1) Admin Login ~ 56 ~
2) Home Page 3) Result IV. Problems in Finger Print Recognization 1. Handicapped people does not applicable for voting in our system. 2. Hardware is required for taking thumb impression which is costly. In online voting system result declaration becomes easy, fast and voting becomes possible for migrated user. Online voting system provides fast generation of region wise result. It s a result should be in correct manner. Online voting system increases the system productivity by casting number of votes. Conclusions In this paper, we have developed online voting system using IAM, and Multi-tier cloud infrastructure for secure voting environment. In this system we tried to avoid fraud voting. ~ 57 ~ Acknowledgment Paper is a test of not only technical skill but also team work. This journey could not be completed without the support of guide and group member. We would like to thanks Prof. A.
C. Lomte. To co-ordinate us. And this study provided us the opportunity to work with this best topic and excellent supervision. Finally, we want to thank my expert Staff for always being there References Mohammad Faraji, Joon -Myung Kang, Hadi Bannazadeh, and Alberto Leon-Garcia Department of Electrical and Computer Engineering University of Toronto, Toronto, ON, Canada Email: fms.faraji, joonmyung.kang, hadi.bannazadeh, alberto.leongarcia HYPERLINK"mailto:alberto.leongarciag@utoronto.ca"HY PERLINK"mailto:alberto.leongarciag@utoronto.ca"@utoro nto.ca J.-M. Kang, H. Bannazadeh, and A. Leon-Garcia, Savi testbed: Control and management of converged virtual ict resources, in Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on. IEEE, 2013, pp. 664 667. K. Gunjan, G. Sahoo, and R. Tiwari, Identity management in cloud computing a review, International Journal of Engineering, vol. 1,no. 4, 2012. A. Jøsang and S. Pope, User centric identity management, in AusCERT Asia Pacific Information Technology Security Conference. Citeseer, 2005, p. 77. T. F. Steve Schwab, Managing identity and authorization for community clouds, Duke University, Tech. Rep., 2012. [Online]. Available: www.exogeni.net/ B. Kandukuri, V. Paturi, and A. Rakshit, Cloud security issues, in Services Computing, 2009. SCC 09. IEEE International Conference on, 2009, pp. 517 520 J. Chase, L. Grit, D. Irwin, V. Marupadi, P. Shivam, and A. Yumerefendi, Beyond virtual data centers: Toward an open resource control architecture, in in Selected Papers from the International Conference on the Virtual Computing Initiative (ACM Digital Library),ACM, 2007. P. Liu, S. Jajodia, and C. D. McCollum, Intrusion confinement by isolation in information systems, Journal of Computer Security, vol. 8, 2000. N. Gunti, W. Sun, and M. Niamat, I-rbac: Isolation enabled role-based access control, in Privacy, Security and Trust (PST), 2011 Ninth Annual International Conference on, 2011, pp. 79 86. R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Rolebased access control models, Computer, vol. 29, no. 2, pp. 38 47,Feb. 1996. Available: http://dx.doi.org/10.1109/2.485845 International Conference on Computing and Control Engineering (ICCCE 2012), 12 & 13 April, 2012 A Novel Data Hiding Technique based Bio-Secure Online Voting Systemǁ Prabha Susy Mammen and S. Ramamoorthy E-Voting through Biometrics and Cryptography- Steganography Technique with conjunction of GSM Modemǁ Emerging Trends in Computer Science and Information Technology -2012(ETCSIT2012) Proceedings published in International Journal of Computer Applications (IJCA) by Shobha lokhande SECURE ELECTRONIC REGISTRATION & VOTING SYSTEM BASED ON BIOMETRICSǁ National Conference on Future Computing Volume 1, March 2012 by Dr.K.Kuppusamy1 Associate Professor Department of Computer Science Engineering Alagappa University Karaikudi 630 003.& K.Kavitha 2 M.Phil Scholar Science & Engineering Alagappa University Karaikudi 630 003. ~ 58 ~