Voting system Using Visual Cryptography (VC) aims at providing a facility to cast vote for critical and confidential internal corporate decisions. It has the flexibility to allow casting of vote from any remote place. The election is held in full confidentiality by applying appropriate security meas
Preventing Phishing Attack On Voting System Using Visual Cryptography
Voting system Using Visual Cryptography (VC) aims at providing a facility to cast vote for critical and confidential internal corporate decisions. It has the flexibility to allow casting of vote from any remote place. The election is held in full confidentiality by applying appropriate security measures to allow the voter to vote for any participating candidate only if he logs into the system by entering the correct password which is generated by merging the two shares using VC scheme. Administrator sends share 1 to voter e-mail id before election and share 2 will be available in the voting system for his login during election. Voter will get the secret password to cast his vote by combining share 1 and share 2 using VC. Phishing is an attempt by an individual or a group to get personal confidential information from unsuspecting victims. Fake websites which appear very similar to the original ones are being hosted to achieve this. Internet voting focuses on security, privacy, and secrecy issues, as well as challenges for stakeholder involvement and observation of the process. A new approach is proposed for voting system to prevent phishing attacks.
Objectives:
To handle Phishing Attack:
Most of the applications are giving high protection towards the Password Security and they are not concentrating on phishing attacks. By phishing, attackers are directly getting the passwords from the user and they can enter into the relevant web sites with correct password.So our main purpose of this system to avoid this phishing attack using Visual Cryptography (VC) techniques.
To save time of users:
Our another purpose is to save time of users because existing system is time consuming and voters has to be in voting booth in presence and it is not feasible when the voters are in other city or in other country.
For phishing detection and prevention, we are proposing a new methodology to detect the phishing website. The proposed methodology is based on the Anti-Phishing Image Captcha validation scheme using visual cryptography. It will allow only authenticated users to cast vote. Also it will prevent phishing attacks in the internet voting system
The proposed approach can be divided into two phases: Registration Phase In the registration phase, the server will pick textual images as passwords. The text of these images will act as the password for the user. The image is divided into two shares such that one of the shares is kept with the user and the other share is kept in the server. The user's share is sent to the user for later verification during login phase. The image is also stored in the actual database of website as confidential data. Registration process is depicted in Fig 10. Login Phase In the Login phase first the user is prompted for the username (user id).Then the user is asked to enter his share which is kept with him. This share is sent to the server where the user's share and share which is stored in the database of the website, for each user, is stacked together to produce the image captcha. The image captcha is displayed to the user. The end user is required to enter the text displayed in the image captcha and this can serve the purpose of password and using this, the user can log in into the website. Now, the user id and password will be sent to authentication system for the purpose of authentication. Authentication is the process of ensuring that the person is the one who he claims to be. For this purpose user id is sent to server and corresponding password is fetched from the database. Now the password provided by the user and the password fetched from database is compared. Therefore, using the username and image captcha generated by stacking two shares one can verify whether the website is genuine/secure website or a phishing website and can also verify whether the user is a authenticated or not
Final product will be a web based system,
Through which user can enroll his/her in election and admin will approved .
User able to cast vote in election from any place.
| Item Name | Type | No. of Units | Per Unit Cost (in Rs) | Total (in Rs) |
|---|---|---|---|---|
| Web Hosting | Equipment | 1 | 7000 | 7000 |
| Advertising | Miscellaneous | 1 | 2000 | 2000 |
| Thesis Printing | Miscellaneous | 6 | 1300 | 7800 |
| Total in (Rs) | 16800 |
The abysmal health condition in Pakistan is a wail for help. Pakistan lags behind even whe...
Over the past few decades, significant innovations have been made in the field of medicine...
The manufacturing industry plays an important role in development of any country. The coun...
A green house is where plants such as flowers and vegetables are grown. Greenhouses warmup...
As the technology is advancing every day the display board systems are moving from Normal...