Design and Implementation of a Secure Online Lottery System

被引:0
|
作者
Kuacharoen, Pramote [1 ]
机构
[1] Natl Inst Dev Adm, Dept Comp Sci, Grad Sch Appl Stat, Bangkok 10240, Thailand
来源
关键词
Online lottery system; secure online lottery system; information security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Government has the authority to operate lottery schemes. Since the operation of the lottery system is controlled by the government, there are issues with public trust. The people may speculate that the lottery is rigged. This issue becomes critical with an online lottery system since the unprotected data can be easy manipulated. If all combinations which have been sold are known before the drawing, the government may draw winning numbers which pay the least. Moreover, winning tickets may be added after the drawing. As a result, corruption may be inevitable. The government should operate lottery schemes with integrity which include transparency and accountability. This paper presents the design and the implementation of a secure online lottery system. The proposed system can provide accuracy, privacy, transparency, and verifiability. Using the proposed system, the government can operate lottery schemes with integrity.
引用
收藏
页码:94 / 105
页数:12
相关论文
共 50 条
  • [1] uAuction: Analysis, Design and Implementation of a Secure Online Auction System
    Majadi, Nazia
    Trevathan, Jarrod
    Bergmann, Neil
    2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 278 - 285
  • [2] Implementation of Authenticated and Secure Online Voting System
    Sridharan, Srivatsan
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [3] Design and Implementation of an Anonymous and Secure Online Evaluation Protocol
    Petrakos, Nikolaos
    Monachos, Stefanos
    Magkos, Emmanouil
    Kotzanikolaou, Panayiotis
    ELECTRONICS, 2020, 9 (09) : 1 - 18
  • [4] Design and Implementation of Secure Distributed Examination System
    Zhang, Yi
    Zhu, Weidong
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND MANAGEMENT INNOVATION (MSMI 2017), 2017, 31 : 302 - 306
  • [5] Design and implementation of a chaotic secure communication system
    Chou, Hsi-Chiang
    Chou, Chuan-Wei
    Hsu, Wei-Hung
    2007 INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES, VOLS 1-3, 2007, : 1117 - 1121
  • [6] Design and Implementation of a Secure Social Network System
    Layfield, Ryan
    Thuraisingham, Bhavani
    Khan, Latifur
    Kantarcioglu, Murat
    Rachapalli, Jyothsna
    ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2009, : 236 - 247
  • [7] Design and Implementation of a Secure RFID System on FPGA
    Ozen, Okan Emre
    Ors, S. Berna
    Yagci, H. Bulent
    2013 21ST SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2013,
  • [8] A Secure Healthcare System: From Design to Implementation
    Cankaya, Ebru Celikel
    Kywe, Than
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND SOFTWARE ENGINEERING (SCSE'15), 2015, 62 : 203 - 212
  • [9] Design and implementation of a secure social network system
    Layfield, Ryan
    Thuraisingham, Bhavani
    Khan, Laatifur
    Kantarcioglu, Murat
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2009, 24 (02): : 71 - 83
  • [10] Design and implementation of secure SMS messaging system
    Yu, D. (zjydg@163.com), 1600, Advanced Institute of Convergence Information Technology, Myoungbo Bldg 3F,, Bumin-dong 1-ga, Seo-gu, Busan, 602-816, Korea, Republic of (04):