Вы находитесь на странице: 1из 6

Project Proposal Form

PROJECT TITLE AND BASIC INFORMATION

1.1. Project Heading: AADHAR CARD VERIFICATION BASE ONLINE POLLING

1.2 Beneficiary : Indian citizens

1.3. Time Frame: March 2018 – March 2019

1.4. Funding source: SRM Institutite of science and technology

1.5 Co-funding sources: : Yet to be identified

1.6 Total estimated budget, including support costs: INR 2,00,000

1.7 Team Members : Mrs.K.Kanmani , Ms. Shilpa Lakotia(PG Student)

1.8 Executive Summary.

This project is to develop a secure Electronic voting machine using


Finger print identification method, for finger print accessing we use AADHAR
card database. At the time of voting in the elections, the e -voting process
authentication can be done using finger vein sensing, which enables the
electronic ballot reset for allowing voters to cast their votes. Also the voted data
and voters details can be sent to the nearby Database Administration
unit in a timely manner using Zigbee System with cryptography technique
BACKGROUND AND JUSTIFICATION

2.1 Background/context and rationale for the project

Purpose of evoting
To eliminate paper in the voting process. This involves sending of notices and ballot papers and receiving
the said ballot votes.
Facilitate electronic voting on resolutions of companies in a fair and transparent manner for all classes of
security/stakeholders.
Enable security holders to vote at a time and place of their convenience.
Eliminate postal and other natural delays which cause a hindrance to postal ballot.
Increase shareholder participation in shareholder meetings.

The e-Voting platform aims to improve transparency and Corporate Governance standards and also helps
in reducing the administrative cost associated with Postal Ballot while facilitating declaration of results
immediately after the close of the voting. Additionally investors are also benefited where they can cast
their votes on till last day from the comfort of their home / office, while eliminating the chances of their
votes being declared invalid

2.2 Development objectives (expected impact of project)

The concept of this project is to allow its citizens to exercise their right to express their choices
regarding specific issues, legislative texts, citizen initiatives, constitutional amendments,
reminders and / or electing their government and their representatives. policies Applied science is
increasingly used as a tool to help voters vote. To allow the exercise of this right, the following
measures must be taken: identification and authentication of voters, voting and recording of votes,
counting of votes, publication of electoral results.

identification of voters is required during two phases of the electoral process: first, voter
registration to establish the right to vote and, at the time of voting, to allow a citizen to exercise
their right to vote by verifying whether the person meets all the necessary requirements to vote
(authentication). Security is a central element of the e-voting process. Therefore, the need to
design a secure electronic voting system is very important. In general, the mechanisms that
guarantee the security and confidentiality of an election can be long, costly for election
administrators, and inconvenient for voters.
There are different levels of security for electronic voting. Therefore, serious steps must be taken
to keep out of the public domain. In addition, he applies security to hide the votes of advertising.
There is no measure for the acceptable level of security because the level depends on the type of
information. An acceptable level of security is always a compromise between the ease of use and
the robustness of the security method.
2.3 Securities of the E-voting systems:

The main objective of secure electronic voting is to guarantee the privacy of voters and the votes.
A secure electronic voting system meets the following requirements: Eligibility: only the votes of
legitimate voters must be taken into account; A Reusability: each voter is allowed to vote once;
Anonymity: the votes are secret; Clarification: the ballot can not be changed. Therefore, it should
not be possible to eliminate the ballots or add ballots once the election is over. Equity: partial
tabulation is impossible; Vote and leave: once a voter has voted, there is no further action before
the end of the election; Public responsibility: everyone should be able to easily verify the validity
of the entire voting process.
On the basis of the elections, voters vote simply by depositing their vote in sealed boxes
distributed around electoral circuits in a given country. At the end of the election period, all these
boxes are open and the votes are counted manually in the presence of certified officials. In this
process, there may be an error in the counting of votes or, in some cases, voters find ways to vote
more than once. Sometimes, even the votes are manipulated to distort the results of an election in
favor of certain candidates. In order to avoid these shortcomings, the government of India has
developed a direct registration electronic voting system (DRE), commonly known as electronic
voting machines or EVM.
These devices have been praised for their simple design, ease of use and reliability. However, it
has been discovered that EVMs are not inviolable and can easily be hacked. In addition, these
attacks, both hardware and software, go without detection but are quite simple to implement. This
has led us to establish a safe, transparent, reliable and easy to use system for citizens. Biometric
electronic voting systems are no longer a phenomenon, they are actively used in countries like
Ghana and Ireland and spread to many other developing countries. We propose an integration of
CIDR with the electronic voting mechanism to make electronic voting in India a reality.

2.1 Components of the System


- We propose a client-server web software architecture for the project. On the
client side, we have a fingerprint scanner and a graphical interface that accepts the voter
number, provides an interface to vote and shows confirmation messages, status and error.
GUIs will only act on server events and voter comments without additional processing.
The servers are placed in locations far from the voting booths. They are used to process,
transfer data between the client and the database, generate statistics, send messages to
voters, etc.
- There is a central database called Central Identities Data Repository or CIDR,
which is the backbone of this system. It contains all the demographic and biometric
information of each citizen of India. To reduce the load in the central database, there are
zonal databases that will be located next to the servers that will contain cached copies of
the data of the inhabitants that are within their area. These areas are decided based on
population density, area and other factors.
- All zonal databases extract CIDR data from those that fall within its scope. These
data are periodically updated and stored in a volatile form so that they can be erased if
necessary, for example during security attacks, natural disasters, maintenance work, etc.
The zonal databases will extract only the data related to the voting process and exclude all
other irrelevant information. These databases will be used for statistics and results of the
electoral process. These databases allow voting from anywhere, as long as the voter is in
the electoral circuits.

2.3 Goals of the project

- 6.1.2 Authentication and Verification of the Voter


- Authentication is the process of determining if someone or something is, in
fact, who or what is declared. To authenticate someone, we ask that you have a valid UID
number. The number will be checked first in the records of the local database. If you can
not find it, it will search the central repository. This implies a coincidence of one to many.
If the person's number is not in the central database, they will of course participate in the
voting process. On the other hand, if the number is present in the central database, the data
of this person will be stored in the zonal database. This record is extracted from the local
database and sent to the authentication servers for further processing.
- For verification purposes, the person's fingerprints will be analyzed on the client
side and individually compared to the servers with data extracted from the local database.
This process puts less emphasis on the local database and improves data traffic. We use
fingerprints for authentication because fingerprint processing is faster and better than other
biometric data. In addition, the details aadhar would be insufficient to establish the true
identity of a person, since they can be easily falsified, but when using fingerprints, it is
ensured that these false entries are blocked from the beginning.
- 6.1.3 Preventing Fraudulent Voting
- The first and most important way to guarantee a correct vote is to validate
exactly each voter. It is essential to identify that each person who will vote is unique,
otherwise it will violate the principle of voting. Everyone would vote on behalf of others.
Matching fingerprints guarantees the authentication required by the system. However, to
improve accuracy, it is important to keep the false reject rate (FRR) and the false
acceptance rate (FAR) as low as possible; practically close to zero. This can be achieved
using the best finger method. The use of 2 best fingers can improve accuracy to 98% (RIF-
2%) with a single attempt and more than 99% (RIF - 1%) with up to 3 attempts.
- To prevent minors from voting, the system calculates the age of the person from
the date of birth in the records of the database. If the calculated age is allowed, the person
can vote and otherwise. To prevent voters from voting two or more times, we put voting
flags in local databases. This flag is initially set to false. After the voter has voted, his or
her voting flag will be set to true. This will prevent the same person from voting again.
- These indicators are temporary and can be reset after the election you have
completed so that the voter can participate in the upcoming elections. Providing
transparency is another way to prevent embezzlement in the voting process from the
voter's point of view. As a voter must rely on the hardware and software that processes the
voting, it does not guarantee transparency in its strictest sense. Therefore, we found a
solution to increase voter confidence in the system by sending a message to voters on the
laptop that he or she successfully voted with the corresponding number of aadhar at any
given time.
- 6.1.4 Generating Reports
- Each time you vote to vote for the candidate of your choice, the number of
votes for that candidate is increased in the local database. The votes of all the local
databases are summarized to obtain the final figure that the candidate has received.
Therefore, this system provides instant results and avoids the unnecessary use of labor and
lost time. As it is an electronic system and uses digital data, it has several advantages. The
statistics can be generated from the data obtained for, for example, we could answer how
many people voted in a certain region, how many women voted, which age group voted
more, the highest participation rates, comparisons of previous years, etc. . everything that
was not possible with traditional voting methods, not even EVM. This would provide
important information about the election results and help improve the system.
-

- Promote innovative methods of teaching about the TST and disseminate new research in order
to enhance the professional development of teachers, e.g. on tangible and intangible heritage in
teaching about the TST.

2.4 Expected results

Expected result 1: ASPnet National Coordinators, teachers and students have developed
innovative, school-based good practices in TST teaching within the ASPnet TST Education
Project, including twinning and ICT components.

Expected result 2: A reference for quality school-based educational activities is provided through
the ASPnet TST Education Project.

Expected result 3: Visibility of UNESCO in the area of human rights education and intercultural
dialogue is strengthened.

Вам также может понравиться