Electronic Voting (E-Voting) An introduction and review of technology Written By: Larry Brachfeld CS591, December 2010.

Slides:



Advertisements
Similar presentations
Trusting the Vote Ben Adida - Cryptography and Information Security Group MIT Computer Science and Artificial.
Advertisements

Security Issues in Mobile Code Systems David M.Chess, High Integrity Computing Lab, IBM T.J. Watson Research Center Hawthorne, NY, USA Mobile code systems.
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
ETen E-Poll ID – Strasbourg COE meeting November, 2006 Slide 1 E-TEN E-POLL Project Electronic Polling System for Remote Operation Strasbourg.
A technical analysis of the VVSG 2007 Stefan Popoveniuc George Washington University The PunchScan Project.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 2 08/21/2012 Security and Privacy in Cloud Computing.
Observation of e-enabled elections Jonathan Stonestreet Council of Europe Workshop Oslo, March 2010.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Security+ Guide to Network Security Fundamentals
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Risks, Controls and Security Measures
Internet Voting David Jefferson Compaq Systems Research Center 130 Lytton Ave. Palo Alto, CA 94301
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Voting Naked: A Feasible Election System or Just a Recurring Nightmare Presented by: Danita McRae Daniel Bramell.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Requirements for Electronic and Internet Voting Systems in Public Elections David Jefferson Compaq Systems Research Center Palo Alto, CA
An Internet Voting System Manager Yonghua Li Kansas State University October 19, 2001 MSE Project - Phase I.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
PART THREE E-commerce in Action Norton University E-commerce in Action.
CS 325: Software Engineering April 14, 2015 Software Security Security Requirements Software Security in the Life Cycle.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Electronic Voting Ronald L. Rivest MIT Laboratory for Computer Science.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is.
SEMINAR TOPIC ON GLOBAL WIRELESS E-VOTING
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
1 The report on the scope of e-voting in elections Marianne Riise, senior adviser Strasbourg 23 and 24 November 2006 The Ministry of Local Government and.
ACM 511 Introduction to Computer Networks. Computer Networks.
Evoting using collaborative clustering Justin Gray Osama Khaleel Joey LaConte Frank Watson.
Online voting: a legal perspective
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
Chapter 4 Using Encryption in Cryptographic Protocols & Practices (Part B)
SESSION 14 INFORMATION SYSTEMS SECURITY AND CONTROL.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
Panel One Why Audit? Mary Batcher Ernst & Young and Chair of ASA Working Group on Elections.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Chap1: Is there a Security Problem in Computing?.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Electronic Voting R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
Evaluation of an E-Voting Device based on a Common Criteria Protection Profile Roland Vogt, DFKI GmbH Dr. Sönke Maseberg, datenschutz nord GmbH 8th ICCC,
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Secure, verifiable online voting 29 th June 2016.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
Securing Information Systems
Security Issues in Information Technology
Information Security, Theory and Practice.
A Practical Voting Scheme Using One Server with a Secure Coprocessor
COMPUTER SECURITY CONCEPTS
E-voting …and why it’s good..
Chapter 17 Risks, Security and Disaster Recovery
Electronic voting – safe or not?
ISI Day – 20th Anniversary
eVoting System Proposal
INFORMATION SYSTEMS SECURITY and CONTROL
Security.
ONLINE SECURE DATA SERVICE
The Italian Academic Community’s Electronic Voting System
Operating System Concepts
Presentation transcript:

Electronic Voting (E-Voting) An introduction and review of technology Written By: Larry Brachfeld CS591, December 2010

Electronic Voting Examples 2 Brachfeld, E-Voting, CS591, Dec 2010

Types of Electronic Voting 3Brachfeld, E-Voting, CS591, Dec 2010

Internet Voting Issues 4Brachfeld, E-Voting, CS591, Dec 2010 Voter authentication: determining that a ballot arriving at the vote server really is from the registered voter it purports to be from; Ballot privacy: preserving the secrecy of the ballot that no unauthorized person can read the ballot, and no one can associate a ballot with the person who cast it; Ballot integrity: guaranteeing that ballots cannot be surreptitiously changed by any software agent or third party; Reliable vote transport and storage: guaranteeing that no ballot is either created or destroyed (lost) anywhere from the vote client to the vote server without detection, and no ballots at all are created or destroyed (lost) at all from the vote servers to the vote canvass computers; Prevention of multiple voting: no more than one ballot may be counted for any one voter; Defense against attacks on the client: guaranteeing that there is no malicious software (Trojan horse, virus, etc.) on the client that can affect the integrity or privacy of the ballot; Defense against denial of service attacks on vote servers: dealing with deliberate attacks intended to control, crash, or overload the vote servers or the networks they are attached to.

Electronic Voting Requirements Functional (General) Requirements – Provide all required services for organizing and conducting the voting process – Support all users – Support different types of voting processes (e.g. General elections and primaries) – Scalable for multiple elections – Ensure only eligible voters vote, only 1 vote per person, vote is secret, every vote is counted 5Brachfeld, E-Voting, CS591, Dec 2010

Electronic Voting Requirements Security Specific Requirements – Accuracy/Correctness: Votes are unalterable, all valid votes are included in the final tally – Privacy: Nobody should be able to link a voter’s identity to the vote – Zero-proof: Sometimes called Uncoercibility; no voter should be able to prove to others how he voted (even if he wants to) and you shouldn’t be coerced into revealing your vote – Verifiability: There are mechanisms for auditing the election to ensure it has been properly conducted 6Brachfeld, E-Voting, CS591, Dec 2010

Commercially Available E-Voting Systems Brachfeld, E-Voting, CS591, Dec VoteHere.net is a private company established in 1996 as a provider of Internet voting ( ) BigPulse excels with difficult and complex high security online voting and elections when no others can satisfy (bigpulse.com) Australian System called eVACS, or Electronic Voting and Counting System created by a company called Software Improvements to run on Linux based on specifications set by independent election officials who posted the code on the Internet for all to see and evaluate. What's more, it was accomplished from concept to product in six months. It went through a trial run in an Australian state election in 2001 Election Systems & Software an industry leader in providing end-to- end integrated election solutions — supporting every phase of the election process (ESSVote.com)

Internet Voting PKI & Biometric Opportunities Using PKI & Biometrics to mitigate the security specific requirements – Accuracy/Correctness: PKI with the addition of a Biometric factor provides more confidence that the vote you cast is in fact yours and has not been altered, non-repudiation – Privacy: Using a combination of both PKI and Biometrics to encrypt the vote will help ensure that nobody can read your vote, however there will be assurance that the vote you cast is yours 8Brachfeld, E-Voting, CS591, Dec 2010

Electronic Voting Summary –From a technological perspective, Electronic Voting is no different from traditional voting –There is a ballot, vote recording mechanism, ballot boxes, and vote counting equipment –However, given how critical our voting system is to our Democratic way of life, it requires significant public assurance that it is at least as safe as current voting methods –A combination of PKI and Biometric Technology with an Electronic Voting System may accomplish this 9Brachfeld, E-Voting, CS591, Dec 2010