TY - GEN
T1 - Security principles and challenges in electronic voting
AU - Shojae Chaeikar, Saman
AU - Jolfaei, Alireza
AU - Mohammad, Nazeeruddin
AU - Ostovari, Pouya
PY - 2021
Y1 - 2021
N2 - An electronic voting system aims to cast and record votes of the legitimate voters while providing an adequate level of security in the way the votes are cast. These require eliminating the link between the voter and the vote, and at the same time, providing an audit trail for validating the counting and tallying processes. Voting is a critical principle of democracy, and to achieve an accurate vote recording, storing, and reporting, the designed system must be reliable, and tampering and fraud-resistant. Moreover, the architecture of the system must prevent user mistakes, and technical errors and drawbacks. This paper classifies the current critical security issues of the e-voting systems in a structured way, to help the e-voting researchers and designers evaluate their systems against them. To this end, it first reviews the system components, authorized user types, and potential threats, and then discusses the confidentiality, integrity, and availability (CIA) issues. The final contribution is introducing and prioritizing the potential security solutions.
AB - An electronic voting system aims to cast and record votes of the legitimate voters while providing an adequate level of security in the way the votes are cast. These require eliminating the link between the voter and the vote, and at the same time, providing an audit trail for validating the counting and tallying processes. Voting is a critical principle of democracy, and to achieve an accurate vote recording, storing, and reporting, the designed system must be reliable, and tampering and fraud-resistant. Moreover, the architecture of the system must prevent user mistakes, and technical errors and drawbacks. This paper classifies the current critical security issues of the e-voting systems in a structured way, to help the e-voting researchers and designers evaluate their systems against them. To this end, it first reviews the system components, authorized user types, and potential threats, and then discusses the confidentiality, integrity, and availability (CIA) issues. The final contribution is introducing and prioritizing the potential security solutions.
KW - Availability
KW - confidentiality
KW - electronic voting
KW - integrity
KW - security landscape
UR - http://www.scopus.com/inward/record.url?scp=85123017707&partnerID=8YFLogxK
U2 - 10.1109/EDOCW52865.2021.00030
DO - 10.1109/EDOCW52865.2021.00030
M3 - Conference proceeding contribution
AN - SCOPUS:85123017707
T3 - Proceedings - IEEE International Enterprise Distributed Object Computing Workshop, EDOCW
SP - 38
EP - 45
BT - Proceedings - 2021 IEEE 25th International Enterprise Distributed Object Computing Conference Workshops, EDOCW 2021
PB - Institute of Electrical and Electronics Engineers (IEEE)
CY - Piscataway, NJ
T2 - 25th IEEE International Enterprise Distributed Object Computing Conference Workshops, EDOCW 2021
Y2 - 25 October 2021 through 29 October 2021
ER -