IJCRT2105312
IJCRT2105312
INTRODUCTION
1.1 NEED FOR THE STUDY
Block chain is a decentralized transaction and data management technology developed first for Bit coin
crypto currency. The interest in Block chain technology has been increasing since the idea was coined in 2008.
The reason for the interest in Block chain is its central attributes that provide security, anonymity and data
integrity without any third party organization in control of the transactions, and therefore it creates interesting
research areas, especially from the perspective of technical challenges and limitations. In this research, we
have conducted a systematic mapping study with the goal of collecting all relevant research on Block chain
technology. Our objective is to understand the current research topics, challenges and future directions
regarding Block chain technology from the technical perspective. We have extracted 41 primary papers from
scientific databases. The results show that focus in over 80% of the papers is on Bit coin system and less than
20% deals with other Block chain applications including e.g. smart contracts and licensing. The majority of
research is focusing on revealing and improving limitations of Block chain from privacy and security
perspectives, but many of the proposed solutions lack concrete evaluation on their effectiveness. Many other
Block chain scalability related challenges including throughput and latency have been left unstudied. On the
basis of this study, recommendations on future research directions are provided for researchers.
And finally, one must realize that no single company will invent the entire process on its own. As with all
things on the Internet, there are layers upon layers of software, all of which would need to be trusted, and
trusted to work together
The Online Voting system is made for the people of the country residing around the world and wants
to vote for their representative. Using Electronic Voting may encompass a range of Internet services from a
touch screen kiosk at a polling station to voting online. This Project is developed for the threat free and user
oriented Online Voting System. Finger Recognition is a authentication technique. The election can be
conducted in two ways the paper ballot election and the automated ballot elections. The automated ballot
elections are called the electronic voting. The online voting system is highly developed and the online polling
system can be replaced by accurately and directly voting online and immediate results. The online voting
system is done by the internet so it can be called the Internet Voting. Fingerprint scanning-essentially provides
an identification of a person based on the acquisition and recognition of those unique patterns and ridges in a
fingerprint. The actual fingerprint identification process will change slightly between products and systems.
The basis of identification, however, is nearly the same. Standard systems are comprised of a sensor for
scanning a fingerprint and a processor which stores the fingerprint database and software which compares and
matches the fingerprint to the predefined database. Within the database, a fingerprint is usually matched to a
reference number, or PIN number which is then matched to a person's name or account. In instances of security
the match is generally used to allow or disallow access.
● Technical Feasibility
● Operation Feasibility
● Economical Feasibility
This system is targeted to be in accordance with the above-mentioned issues. Beforehand, the
management issues and user requirements have been taken into consideration. So there is no question of
resistance from the users that can undermine the possible application benefits.
2.2.3 Technical Feasibility
The technical issue usually raised during the feasibility stage of the investigation includes the
following:
Does the necessary technology exist to do what is suggested?
Do the proposed equipments have the technical capacity to hold the data required to use the
new system?
Will the proposed system provide adequate response to inquiries, regardless of the number
or location of users?
Can the system be upgraded if developed?
Are there technical guarantees of accuracy, reliability, ease of access and data security?
Java Server Page (JSP) is a technology for controlling the content or appearance of Web pages through the
use of servlets, small programs that are specified in the Web page and run on the Web server to modify the
Web page before it is sent to the user who requested it. Sun Microsystems, the developer of Java, also refers
to the JSP technology as the Servlet application program interface (API). JSP is comparable to Microsoft's
Active Server Page (ASP) technology. Whereas a Java Server Page calls a Java program that is executed by
IJCRT2105312 International Journal of Creative Research Thoughts (IJCRT) www.ijcrt.org c881
www.ijcrt.org © 2021 IJCRT | Volume 9, Issue 5 May 2021 | ISSN: 2320-2882
the Web server, an Active Server Page contains a script that is interpreted by a script interpreter (such as
VBScript or JScript) before the page is sent to the user. Architecturally, JSP may be viewed as a high-level
abstraction of Java servlets. JSPs are translated into servlets at runtime, therefore JSP is a Servlets; each JSP
servlet is cached and re-used until the original JSP is modified.JSP can be used independently or as the view
component of a server-side model–view–controller design, normally with JavaBeans as the model and Java
servlets (or a framework such as Apache Struts) as the controller. This is a type of Model 2 architecture.
JSP allows Java code and certain pre-defined actions to be interleaved with static web markup content,
such as HTML, with the resulting page being compiled and executed on the server to deliver a document. The
compiled pages, as well as any dependent Java libraries, contain Java byte code rather than machine code. Like
any other Java program, they must be executed within a Java virtual machine (JVM) that interacts with the
server's host operating system to provide an abstract, platform-neutral environment. JSPs are usually used to
deliver HTML and XML documents, but through the use of OutputStream, they can deliver other types of data
as well. The Web container creates JSP implicit objects like request, response, session, application, config,
page, pageContext, out and exception. JSP Engine creates these objects during translation phase.
SYNTAX
JSP pages use several delimiters for scripting functions. The most basic is <% ... %>, which encloses a JSP
scriptlet. A scriptlet is a fragment of Java code that is run when the user requests the page. Other common
delimiters include <%= ... %> for expressions, where the scriptlet and delimiters are replaced with the result
of evaluating the expression, and directives, denoted with <%@ ... %>.Java code is not required to be complete
or self-contained within a single scriptlet block. It can straddle markup content, provided that the page as a
whole is syntactically correct. For example, any Java if/for/while blocks opened in one scriptlet must be
correctly closed in a later scriptlet for the page to successfully compile. Content which falls inside a split block
of Java code (spanning multiple scriptlets) is subject to that code. Content inside an if block will only appear
in the output when the if condition evaluates to true. Likewise, content inside a loop construct may appear
multiple times in the output, depending upon how many times the loop body runs.
COMPILER
A Java Server Pages compiler is a program that parses JSPs, and transforms them into executable Java
Servlets. A program of this type is usually embedded into the application server and run automatically the first
time a JSP is accessed, but pages may also be precompiled for better performance, or compiled as a part of the
build process to test for errors. Some JSP containers support configuring how often the container checks JSP
files timestamps to see whether the page has changed. Typically, this timestamp would be set to a short interval
(perhaps seconds) during software development, and a longer interval (perhaps minutes, or even never) for a
deployed Web application.
MySQL is a popular choice of database for use in web applications, and is a central component of the
widely used LAMP open source web application software stack—LAMP is an acronym for "Linux, Apache,
MySQL, Perl/PHP/Python." Free-software-open source projects that require a full-featured database
management system often use MySQL.
For commercial use, several paid editions are available, and offer additional functionality. Applications
which use MySQL databases include: TYPO3, Joomla, Word Press, phpBB, MyBB, Drupal and other software
built on the LAMP software stack. MySQL is also used in many high-profile, large-scale World Wide Web
products, including Wikipedia, Google (though not for searches), ImagebookTwitter, Flickr, Nokia.com, and
YouTube.
Graphical
The official MySQL Workbench is a free integrated environment developed by MySQL AB, which
enables users to graphically administer MySQL databases and visually design database structures. MySQL
Workbench replaces the previous package of software, MySQL GUI Tools. Similar to other third-party
packages, but still considered the authoritative MySQL frontend, MySQL Workbench lets users manage
database design & modeling, SQL development (replacing MySQL Query Browser) and Database
administration (replacing MySQL Administrator).MySQL Workbench is available in two editions, the regular
free and open source Community Edition which may be downloaded from the MySQL website, and the
proprietary Standard Edition which extends and improves the feature set of the Community Edition.
Command line
MySQL ships with some command line tools. Third-parties have also developed tools to manage a
MySQL server, some listed below. Maatkit - a cross-platform toolkit for MySQL, PostgreSQL and
Memcached, developed in Perl Maatkit can be used to prove replication is working correctly, fix corrupted
data, automate repetitive tasks, and speed up servers. Maatkit is included with several GNU/Linux distributions
such as CentOS and Debian and packages are available for Programming. MySQL works on many different
system platforms, including AIX, BSDi, FreeBSD, HP-UX, eComStation, i5/OS, IRIX, Linux, Mac OS X,
Microsoft Windows, NetBSD, Novell NetWare, OpenBSD, OpenSolaris, OS/2 Warp, QNX, Solaris, Symbian,
SunOS, SCO Open Server, SCO UnixWare, Sanos and Tru64. A port of MySQL to OpenVMS also exists.
MySQL is written in C and C++. Its SQL parser is written in yacc, and a home-brewed lexical analyzer.
Many programming languages with language-specific APIs include libraries for accessing MySQL databases.
These include MySQL Connector/Net for integration with Microsoft's Visual Studio (languages such as C#
and VB are most commonly used) and the JDBC driver for Java. In addition, an ODBC interimage called
MyODBC allows additional programming languages that support the ODBC inter image to communicate with
a MySQL database, such as ASP or ColdFusion. The HTSQL - URL-based query method also ships with a
MySQL adapter, allowing direct interaction between a MySQL database and any web client via structured
URLs.
Features
As of April 2009, MySQL offered MySQL 5.1 in two different variants: the open source MySQL Community
Server and the commercial Enterprise Server. MySQL 5.5 is offered under the same licenses. They have a
common code base and include the following features:
3.2 MODULES
Registration
OTP authentication
Login
QR share
Block Chain Voting
Intimation
MODULE DESCRIPTION
Registration
The register module provides a conceptual framework for entering data on those user and the candidate
in a way that: eases data entry & accuracy by matching the MySQL database entry to the data source (usually
paper files created at point of care), ties easily back to individual user and the candidate records to connect
registers to the user details and the candidate details. It collects data elements to enable better handling for the
voter’s data and the candidate data. The data will be stored in the block chain based storage system. A block
chain-based storage system prepares data for storage by creating data shards or segments, encrypting the
shards, generating a unique hash for each shard and creating redundant copies of each shard. The replicated
shards are then distributed across the decentralized nodes in the block chain infrastructure. Block chains
are stored in computers within the system, also named as nodes.
system will have an extra step, i.e. the ability for the user to verify their vote. This is an important step where
the user can get a confirmation of their vote. The other steps include counting the votes by the organizer and
recounting in case of any discrepancies. The process of registering to vote begins with the user interacting with
the Authentication Server via a website. The AS contains information about voters in a database. The user
enters his/her Personally Identifiable Information (PII) and scans supporting documentation to upload into the
system along with an email address. The users’ picture is also taken for verification. If the information is
verified and is correct, the user is allowed to create an account. The user enters a username of their choice and
a password to log in. This information is stored separately and not linked to the users’ PII. This ensures privacy
and anonymity while voting. Also an entry is made next to the users’ database entry storing whether he/she
has registered to vote. If the users’ information cannot be verified, he/she is not allowed to create an account.
Intimation
The block chain server are connected with the inter server systems where the vote count are got stored
in each block or node. The data change in any block will be mentioned with the time stamp and they can be
intimated to the admin. The main process here is that the total count cannot be taken since the change in the
data will also change the hash code of the server. If the server hash code get changes then the data cannot be
connected together to gather the total count of the vote. If the changes of the value will be notified as “data
modified”.
SYSTEM IMPLEMENTATION
The block chain technology was introduced in 2008 when Satoshi Nakamoto created the first crypto
currency called Bit coin. The Bit coin block chain technology uses a decentralized public ledger combined
with PoW(Proof-of-Work) based stochastic consensus protocol, with financial incentives to record a totally
ordered sequence of blocks, the block chain. The chain is replicated, cryptographically signed and publicly
verifiable at every transaction so that no-one can tamper with the data that has been written onto the block
chain. The block chain structure is an append-only data structure, such that new blocks of data can be written
to it, but cannot be altered or deleted The blocks are chained in such a way that each block has a hash that is a
function of the previous block, providing the assurance of immutability. Whereas the block chain publishes all
elements of the entire chain, in general other types of block chain can be public, private or consortium based.
Public block chains grant access to read and ability to create a transaction to any user on that network. The
block chain based system will add the process by which the user can vote with the secured system.
The login can be verified and check with multiple users where the user will get an authentication for
every login session where the unknown user cannot able to use the system for the voting system. The change
in the block server can be intimated and the result is verified with the execution.
6.1 CONCLUSION
The idea of adapting digital voting systems to make the public electoral process cheaper, faster and
easier, is a compelling one in modern society. Making the electoral process cheap and quick, normalizes it in
the eyes of the voters, removes a certain power barrier between the voter and the elected official and puts a
certain amount of pressure on the elected official. It also opens the door for a more direct form of democracy,
allowing voters to express their will on individual bills and propositions. In this paper, we introduced a unique,
block chain-based electronic voting system that utilizes smart contracts to enable secure and cost efficient
election while guaranteeing voters privacy. We have outlined the systems architecture, the design, and a
security analysis of the system
REFERENCES
[1] Aishwarya Shete, Atul Lahade, Tejas Patil, Prof. Renuka Pawar, DHCP Protocol using OTP Based
Two-Factor Authentication, d International Conference on Trends in Electronics and Informatics, 201
[2] Ashish Singh, Kakali Chatterjee, SecEVS : Secure Electronic Voting System Using Blockchain
Technology, International Conference on Computing, Power and Communication Technologies, pp:863- 867,
2018
[3] Axel Schmidt, Lucie Langer, Johannes Buchmann, Specification of a Voting Service Provider, First
International Workshop on Requirements Engineering for E-Voting System, 2009
[4] Christopher Ehmke, Florian Wessling, Christoph M. Friedrich, Proof-of-Property – A Lightweight and
Scalable Blockchain Protocol, International Workshop on Emerging Trends in Software Engineering for
Blockchain, 2018
[5] Friðrik Þ. Hjálmarsson, Gunnlaugur K. Hreiðarsson, Mohammad Hamdaqa, Gísli Hjálmtýsson,
Blockchain-Based E-Voting System International Conference on Cloud Computing, pp: 983-986, vol:11, 2018
[6] Jordi Cucurull , Sandra Guasch , Alex Escala , Guillermo Navarro-Arribas and V´ıctor Ac, QR
Steganography A Threat to New Generation Electronic Voting Systems, pp: 978-989, vol:75, 2014
[7] Pei-Yu Lin, Distributed Secret Sharing Approach with Cheater Prevention based on QR Code, IEEE
Transactions on Industrial Informatics, 2015
[8] Rahil Rezwan, Huzaifa Ahmed, M. R. N. Biplob, S. M. Shuvo, Md. Abdur Rahman, Biometrically
Secured Electronic Voting Machine, IEEE Region 10 Humanitarian Technology Conference, 2017
[9] Roman Blum, Thomas Bocek, Superlight – A Permissionless, Light-client Only Blockchain with Self-
Contained Proofs and BLS Signatures, 2019
[10] Tara Salman, Raj Jain, Probabilistic Blockchains: A Blockchain Paradigm for Collaborative Decision-
Making, pp: 457-465, vol: 4, 2017