BY: CHRIS GROVES Privacy in the Voting Booth. Reason for Privacy Voters worry that their vote may be held against them in the future  People shouldn’t.

Slides:



Advertisements
Similar presentations
Keiji Maekawa Graduate School of Informatics, Kyoto University Yasuo Okabe Academic Center for Computing and Media Studies, Kyoto University.
Advertisements

HES Data Management Ari Haukijärvi. Planning of HES Data Management Purpose of the data management The data will be available for analysis The available.
Internet Protocol Security (IP Sec)
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Requirements for a Secure Voting System  Only authorized voters can vote  No one can vote more than once  No one can determine for whom anyone else.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Information Assurance Management Key Escrow Digital Cash Week 12-1.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
(4.4) Internet Protocols Layered approach to Internet Software 1.
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
CMSC 414 Computer (and Network) Security Lecture 16 Jonathan Katz.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Applied Cryptography for Network Security
SECURITY: Personal Health Information Protection Act, 2004 this 5 min. course covers: changing landscape of electronic health records security threats.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt,
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Authentication Key HMAC(MK, “auth”) Server Encryption Key HMAC(MK, “server_enc”) User Password Master Key (MK) Client Encryption Key HMAC(MK, “client_enc”)
PRIVACY PRESERVING SOCIAL NETWORKING THROUGH DECENTRALIZATION AUTHORS: L.A. CUTILLO, REFIK MOLVA, THORSTEN STRUFE INSTRUCTOR DR. MOHAMMAD ASHIQUR RAHMAN.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
6. Esoteric Protocols secure elections and multi-party computation Kim Hyoung-Shick.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Strong Security for Distributed File Systems Group A3 Ka Hou Wong Jahanzeb Faizan Jonathan Sippel.
Evoting using collaborative clustering Justin Gray Osama Khaleel Joey LaConte Frank Watson.
CIS 450 – Network Security Chapter 4 - Spoofing. Definition - To fool. In networking, the term is used to describe a variety of ways in which hardware.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Digital Signatures, Message Digest and Authentication Week-9.
ICT in Healthcare. Electronic prescription service GPs and nurses can send electronic prescriptions to a dispenser (pharmacy) of the patients choice.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 10: Planning and Managing IP Security.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Security Data Transmission and Authentication Lesson 9.
Information Systems Design and Development Security Precautions Computing Science.
1 Managing Security Additional notes. 2 Intercepting confidential messages Attacker Taps into the Conversation: Tries to Read Messages Client PC Server.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
Lecture 4 Encryption and Network Protocols
Network Security Marshall Leitem 11/30/04
E-voting …and why it’s good..
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Defending Against DDoS
COMPUTER PRIVACY.
eVoting System Proposal
Crypto #4 Encryption and Network Protocols
HIPAA Overview.
Distributed medical databases
G061 - Network Security.
Presentation transcript:

BY: CHRIS GROVES Privacy in the Voting Booth

Reason for Privacy Voters worry that their vote may be held against them in the future  People shouldn’t be rewarded or punished for who they voted for Voters don’t want to feel socially pressured to vote a particular way  Voters shouldn’t feel peer pressure at the voting booth

Issues The system needs to have a physical paper trail incase the results come into question Trail can be used to keep track of the order of votes Must be sure that there is no record of the order that people voted ie. Video or paper

Non-Technical Measures The physical paper trail has to have the records randomized before any person is able to physically touch it No cameras may be permitted in the location or at entrance/exit to prevent any tracing back to database logs (if the person has video to link the time of the vote to the person then that’s a privacy issue)

Technical Issues Recorded data needs to be heavily encrypted in the event that the physical storage medium is lost or stolen Where do electronic votes get stored?  Local or Remote

Local Storage Must be stored on physical storage Need to collect all of the results to get the final tallies. After the election all of the physical media must be collected to be stored securely so that nobody can access them

Central Server Each voting terminal will transfer it’s votes to the central server via the Internet Central server then maintains the totals Still need physical paper trail created at the voting terminal

Privacy/Security Concerns System sends messages over the internet and so they can be intercept and read along the way Both the voting machines and the central server have to be exposed to the internet during the voting period to allow for traffic to be sent

IP Addresses System would use static IP addresses Server would filter traffic so that only accepts traffic that it knows are from the network of voting machines Must be kept a closely guarded secret

IP Addresses Cont’d If IP addresses became known traffic could be intercepted between voting machine and central server Attacker could spoof the IP of a voting machine and send false votes Would also leave the system open to DoS attacks

Trusted Connection In this case we could use a public key system to ensure traffic is between voting terminal and the server. Better option is to use a confidential key  All machines are known ahead of time so all can be given the key before hand  Saves the overhead of exchanging keys Must be kept strictly confidential

Encryption With these precautions packets need to be encrypted because they can be intercepted en route Must be very high levels of encryption because the government has a great deal of computing power

Data to Store Stored Information should be kept to a bare minimum to minimize possibility of linking vote to voter For this system 3 parts shall be stored – Date – Needed in the case of a discrepancy and an audit of the results – Candidate – Identifier – Confirms that the vote came from a legitimate source

Identifier Must be unique to each voter but cannot identify the voter from the ID In Canada everyone has a Social Insurance Number to uniquely identify them. Can use that to generate our identifier Can keep a database of generated IDs so that only people that have actually showed up to vote have IDs.

Generating the ID We need a one way function Could use a one way hash function This would be computationally infeasible to get the voters Social Insurance Number from the ID Use a hash function on the persons Social Insurance Number

Conclusion For this system to work effectively it’s important that all parts work together It’s particularly important that the Confidential Key and the list of IP Addresses be kept private If they are confidential the technologies can ensure that the data is secure and that it can’t be linked back to an individual voter