A Implementation of Secure and Strategic E-Voting System using the Algorithmic Security Visualization
Bimal Kumar1, M. Siddappa2
1Bimal Kumar, Research Scholar, Department of Computer Science, Rayalaseema University, Kurnool, Andhra Pradesh, India.
2Dr.M.Siddappa Professor, Department of Computer Science and Engineering, Sri Siddhartha Institute of Technology, Tumkur, Karnataka, India.
Manuscript received on November 17., 2019. | Revised Manuscript received on November 24 2019. | Manuscript published on 30 November, 2019. | PP: 12465-12470 | Volume-8 Issue-4, November 2019. | Retrieval Number: D7167115419/2019©BEIESP | DOI: 10.35940/ijrte.D7167.118419
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: E-Voting is one of the advance techniques which is imposed for the Voters to a get advancement in casting their vote towards to their desired candidate. The E-Voting is implemented in various other countries with the various methodologies as per their need. This paper evaluates a Unique method for the process of e-voting with the proper authentication from the government servers and also it authenticates the e-Voting machine using the proper authentication process and allows the voter to cast their vote towards the desired candidate. The System uses the Specific Security Strategic Algorithm which is used for the providing of the efficient security to the both Voter and Voter Machine. The Chances of the Jail Breaking of the Communication channel of the system server and e-Voting Machine is reduced to minimal level that the no chances of data breach or the data leak can be entertained. Following of the proper architectural approach which makes the system more efficient which achieves the higher range of the accuracy and throughput value when compared with the other imposed E-Voting System. The strategic policies used in the system complies with all the security rules and terms that provides the evidences of a better architecture gives the process of the E-Voting system more secure and specific
Keywords: E-Voting System, Security, Integrity, Communication Channel Security.
Scope of the Article: Foundations of Communication Networks.