Protect the operating environment internet voting systems
DOI:
https://doi.org/10.18372/2410-7840.19.11444Keywords:
Internet voting, technical protection of information, secrecy of votes, the voting system transparency, ensuring voter confidenceAbstract
In this paper we propose a method of creating a secure operating environment for Internet voting system server, which eliminates the causes of public distrust about the possible falsification of results or disclosure of the secretsof the vote. The method is based on the concept of the security kernel. Portion of memory is allocated in the server, where exclusive access to the data of the vote counting process has previously verified open application. To prevent access to this memory portion of any other processes is used an open operating system, which does not have functions for such access. Furthermore, conditions have been created for the remote monitoring of the integrity of any and all files and processes on the server, as well as all of the personnel server administration from an unlimited number of controllers that can become any person concerned. It is shown that the proposed method in conjunction with known methods of protecting information transmitted via open channels, it makes it possible to identify any and all possible threats to disclose the secrets of the vote counting and distortion of the results of Internet voting systems. The introduction of this method can be useful in many areas for all public and expert remote surveys that require counting accuracy and secrecy of the vote in full confidence to any and all participants in the electoral process.References
Jefferson D. If I Can Shop and Bank Online, Why Can’t I Vote Online? Access mode: World Wide Web. – URL: https:// www. verifiedvoting. org/ resources/ in-ternet-voting/ vote-online.
Савчук О. Системи електронних виборів: процедури голосування та матеріально-технічні засоби. Міжнародний досвід. Режим доступу: World Wide Web. – URL: http://euinfocenter.rada.gov.ua/up-loads/documents/28966.pdf.
Судрієтт Р.У. Технології голосування: життєво важливий інструмент для учасників виборів // Вісник Центральної виборчої комісії. – 2013. – № 3 (27) – С. 27-29. Режим доступу: World Wide Web. – URL: http:// www.cvk. gov.ua/ visnyk/ pdf/2013_3/ Visnik_3_2013_st_11.pdf.
Lessons from the EVOTE 2014 Internation Conferens Access mode: World Wide Web. – URL: http://e-lected.blogspot.com/search?updated-min= 2014-01-01T00:00:00-08:00&updated-max=2015-01-01T00:00:00-08:00&max-results=50.
Шнайер Б. Прикладная криптография. 2-е издание. Протоколы, алгоритмы и исходные тексты на языке Си. – М.: Триумф, 2002. – С. 94-95
Schneier B. What's Wrong With Electronic Voting Machines? Access mode: World Wide Web. – URL: https://www.schneier.com/essays/ar-chives/2004/11/ whats_wrong_with_ele.html
Вишняков В.М. Відкрита система таємного голосування / В.М. Вишняков, М.П. Пригара, О.В. Воронін // Управління розвитком складних систем. Збірник наукових праць. – 2014. – Вип. 20. – С. 110 -115. Режим доступу: World Wide Web. – URL: http://urss.knuba.edu.ua/files/zbirnyk-20/22.pdf
Чуприн В.М. Генерування випадкових чисел штатними засобами хостів мережі Інтернет./ В.М. Чуприн, В.М.Вишняков, М.П. Пригара // Захист інформації. – 2016. – Т. 18, №4 – С. 323-335. Режим доступу: World Wide Web. – URL: http://jrnl. nau.edu.ua/index.php/ZI/article/view/11085/14800
Shannon C.E. The Communication Theory of Secrecy Systems / C.E. Shannon // Bell System Technical Journal. – 1949 – v.28, n.4 – C.654-715.
Вишняков В.М., Пригара М.П. Забезпечення свободи волевиявлення в системі Інтернет-голосування (ІГ). Матеріали 4-ї Міжнародної наукової конференції ICS-2015 «Інформація, комунікація, суспільство 2015» , С. 124 – 125. Режим доступу: World Wide Web. – URL: http://ena.lp.edu.ua: 8080/xmlui/bitstream/ handle/ntb/33187/055-124-125.pdf? sequence= 1&is Allowed=y
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).