International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 175 - Number 20 |
Year of Publication: 2020 |
Authors: John Kingsley Arthur, Kofi Sarpong Adu-Manu, Charles Adjetey |
10.5120/ijca2020920734 |
John Kingsley Arthur, Kofi Sarpong Adu-Manu, Charles Adjetey . A Secured Cloud-based E-voting System using Information Dispersal Algorithm. International Journal of Computer Applications. 175, 20 ( Sep 2020), 27-32. DOI=10.5120/ijca2020920734
The introduction of the electronic voting (e-voting) system has received much attention by researchers in recent years. E-voting has been of interest to stakeholders and political party leaders in most countries (that is developed and developing) practicing democracy. Academics and technocrats have delved into technical issues related to e-voting system that could foster its smooth implementation and this have encouraged it’s full acceptance in many countries. The challenge however, is how to secure and maintain a trustworthy e-voting system devoid of security breaches especially from hacking and hijacking. The challenge still remains an open area that calls for novel designs into high level security infrastructure that may enhance and improve the security of e-voting systems to gain the full trust, acceptance, and adoption by the citizenry. Ghana deploys computerized system for registration and verification during the electoral process. During the 2016 election, the Electoral Commission of Ghana adopted the electronic transmission of results although the elections were conducted manually. In this paper, a novel secured framework for electronic voting relying on the principle of the Information Dispersal Algorithm (IDA) is proposed. In our approach, upon voting, the voters vote record is encrypted and split for distribution on several virtual cloud servers. At the end of the voting period, the split vote records are reassembled into their original state for counting to take place. The splitting of the vote records and its assembling are performed by the IDA. The paper further discusses the design and implementation of the IDA in a typical e-voting environment.