Secure Voting in the Cloud using Homomorphic Encryption and Mobile Agents

被引:14
|
作者
Will, Mark A. [1 ]
Nicholson, Brandon [1 ]
Tiehuis, Marc [1 ]
Ko, Ryan K. L. [1 ]
机构
[1] Univ Waikato, Cyber Secur Lab, Hamilton, New Zealand
关键词
electronic voting; e-voting; mobile voting; homomorphic encryption; hardware model; cloud computing; privacy;
D O I
10.1109/ICCCRI.2015.30
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While governments are transitioning to the cloud to leverage efficiency, transparency and accessibility advantages, public opinion - the backbone of democracy - is being left behind. Statistics show that traditional paper voting is failing to reach the technological-savvy generation, with voter turnout decreasing every election for many first-world countries. Remote electronic voting is a possible solution facilitator to this problem, but it still faces several security, privacy and accountability concerns. This paper introduces a practical application of partially homomorphic encryption to help address these challenges. We describe a cloud-based mobile electronic voting scheme, evaluating its security against a list of requirements, and benchmarking performance on the cloud and mobile devices. In order to protect voter privacy, we propose moving away from a public bulletin board so that no individual cipher votes are saved, while still allowing vote verification. As the majority of the security threats faced by electronic voting are from the underlying system, we also introduce the novel concept of using a dedicated hardware server for homomorphic tallying and decryption.
引用
收藏
页码:173 / 184
页数:12
相关论文
共 50 条
  • [21] A Mixed Homomorphic Encryption Scheme for Secure Data Storage in Cloud
    Kangavalli, R.
    Vagdevi, S.
    [J]. 2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 1062 - 1066
  • [22] Secure Sum Computation Using Homomorphic Encryption
    Sheikh, Rashid
    Mishra, Durgesh Kumar
    [J]. DATA SCIENCE AND BIG DATA ANALYTICS, 2019, 16 : 357 - 363
  • [23] Secure genotype imputation using homomorphic encryption
    Zhou, Junwei
    Lei, Botian
    Lang, Huile
    Panaousis, Emmanouil
    Liang, Kaitai
    Xiang, Jianwen
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 72
  • [24] Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing
    HUANG Qin-long
    MA Zhao-feng
    YANG Yi-xian
    FU Jing-yi
    NIU Xin-xin
    [J]. The Journal of China Universities of Posts and Telecommunications, 2013, 20 (06) : 88 - 95
  • [25] Secure Data in Cloud Computing Using Fully Homomorphic Encryption and Public Key Infrastructure
    Zibouh, Ouadia
    Dalli, Anouar
    Drissi, Hilal
    [J]. VISION 2025: EDUCATION EXCELLENCE AND MANAGEMENT OF INNOVATIONS THROUGH SUSTAINABLE ECONOMIC COMPETITIVE ADVANTAGE, 2019, : 5950 - 5958
  • [26] A general framework to design secure cloud storage protocol using homomorphic, encryption scheme
    Zhang, Jian
    Yang, Yang
    Chen, Yanjiao
    Chen, Jing
    Zhang, Qian
    [J]. COMPUTER NETWORKS, 2017, 129 : 37 - 50
  • [27] Secure and Private Cloud-Based Control Using Semi-Homomorphic Encryption
    Farokhi, Farhad
    Shames, Iman
    Batterham, Nathan
    [J]. IFAC PAPERSONLINE, 2016, 49 (22): : 163 - 168
  • [28] Secure Cloud Computing Algorithm Using Homomorphic Encryption And Multi-Party Computation
    Das, Debasis
    [J]. 2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 391 - 396
  • [29] Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing
    Huang, Qin-Long
    Ma, Zhao-Feng
    Yang, Yi-Xian
    Fu, Jing-Yi
    Niu, Xin-Xin
    [J]. Journal of China Universities of Posts and Telecommunications, 2013, 20 (06): : 88 - 95
  • [30] Homomorphic Encryption in the Cloud
    Hrestak, Darko
    Picek, Stjepan
    [J]. 2014 37TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2014, : 1400 - 1404