A new secure Internet voting protocol using Java Card 3 technology and Java information flow concept
نویسندگان
چکیده
Recently, there has been a spate of interest in Internet voting systems because of advantages such as participation, efficiency, accuracy, and transparency. However, challenges for having a secure i-voting system are considerable. Unless these systems are designed and implemented carefully, citizens might lose their trust on the whole voting process. This paper introduces a novel online voting protocol, which satisfies the desired security requirements of i-voting as collusion resistance, fairness, coercion\bribery, and secure voting platform. Although Internet voting systems provide convenience for voters by requiring just a PC and an Internet connection, they might be subject to some drawbacks as PCs are very susceptible to malware and sophisticated attacks. To clarify, voter side insecure platform is one of the biggest challenges in Internet voting, which would breach voter’s privacy and also affect the integrity of election. In this paper, we present an alternative to the voters’ insecure PCs. Java Card 3 is the latest version of Java Card, which could be considered as voter’s portable secure Web server. It can obtain an IP address and communicate with other network nodes with hypertext transfer protocol secure (HTTPS). Therefore, regardless of utilizing a trusted device at the client side, end-to-end security is guaranteed. This means that Java Card 3 can resolve challenges, which are posed by insecurity of the vote casting PC. Furthermore, to enhance the security and guarantee the confidentiality and integrity of the data, which are stored in the card during the voting process, we have used Java information flow. An implementation of this protocol is proposed on the basis of Java Card 3 servlet container and Web server technology in which the card and electoral servers communicate on a machine-to-machine basis. Copyright © 2014 JohnWiley & Sons, Ltd.
منابع مشابه
Design and implementation of a novel secure internet voting protocol using Java Card 3 technology
Internet voting is highly regarded for its speed, automatic counting, cost reduction and lower possibility of error. However, in order to replace traditional voting system with internet-voting, i-voting must meet many requirements and overcome some challenges like collusion, uncoercibility, unfairness and in particular voter insecure platforms. In this paper, we propose a very practical and sec...
متن کاملAnalysis of Security Models For Smart Cards
Smart cards are an old breed of ubiquitous embedded-computing devices that are increasingly gaining popularity for electronic business transactions. When these smart cards are used over networks that can be covertly snooped, such as the Internet, there is a potential threat to the security of these transactions. In this report, I describe and analyze security models for smart cards that are use...
متن کاملJCSI: A tool for checking secure information flow in Java Card applications
This paper describes a tool for checking secure information flow in Java Card applications. The tool performs a static analysis of Java Card CAP files and includes a CAP viewer. The analysis is based on the theory of abstract interpretation and on a multi-level security policy assignment. Actual values of variables are abstracted into security levels, and bytecode instructions are executed over...
متن کاملContents Editorial _________________________________________________________________ _ 3 Virtual Credit Card Processing System ________________________________________ _ 4
The virtual credit card processing system is an e-business system we have developed which provides a secure and universal mechanism for making purchases over the Internet. The system uses Remote Method Invocation (RMI), Java Server Pages (JSP), Java Servlets and Java Database Connectivity (JDBC). We also look at the possibility of implementing the system using the Web Services architecture.
متن کاملMutual Authentication with Smart Cards
The World Wide Web has become the de facto interface for consumer oriented electronic commerce. So far the interaction between consumers and merchants is mostly limited to providing information about products and credit card based payments for mail orders. This is largely due to the lack of security currently available for commercial transactions. At the moment the only security mechanism prese...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Security and Communication Networks
دوره 8 شماره
صفحات -
تاریخ انتشار 2015