Prevention of Phishing Attacks in Voting System using Visual Cryptography

被引:0
|
作者
Nisha, S. [1 ]
Madheswari, A. Neela [1 ]
机构
[1] Mahendra Engn Coll, CSE Dept, Namakkal, India
关键词
authentication; cryptography; image captcha; phishing; integer linear program; online voting;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Voting system Using Visual Cryptography (VC) aims at providing a facility to cast vote for critical and confidential internal corporate decisions. It has the flexibility to allow casting of vote from any remote place. The election is held in full confidentiality by applying appropriate security measures to allow the voter to vote for any participating candidate only if he logs into the system by entering the correct password which is generated by merging the two shares using VC scheme. Administrator sends share 1 to voter e-mail id before election and share 2 will be available in the voting system for his login during election. Voter will get the secret password to cast his vote by combining share 1 and share 2 using VC. Phishing is an attempt by an individual or a group to get personal confidential information from unsuspecting victims. Fake websites which appear very similar to the original ones are being hosted to achieve this. Internet voting focuses on security, privacy, and secrecy issues, as well as challenges for stakeholder involvement and observation of the process. A new approach is proposed for voting system to prevent phishing attacks.
引用
收藏
页数:4
相关论文
共 50 条
  • [31] A Novel Approach for Prevention of SQL Injection Attacks Using Cryptography and Access Control Policies
    Selvamani, K.
    Kannan, A.
    ADVANCES IN POWER ELECTRONICS AND INSTRUMENTATION ENGINEERING, 2011, 148 : 26 - +
  • [32] E-Smart Voting System with Secure Data Identification using Cryptography
    Patil, Sunita
    Barisal, Amish
    Pujari, Vaihhavi
    Raina, Utkarsh
    Kumar, Roushan
    2018 3RD INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2018,
  • [33] A novel voting scheme using quantum cryptography
    Sundar, D. Sam
    Narayan, Nitin
    2014 IEEE CONFERENCE ON OPEN SYSTEMS (ICOS), 2014, : 66 - 71
  • [34] Electronic Voting using Identity Based Cryptography
    Gallegos-Garcia, Gina
    Gomez-Cardenas, Roberto
    Duchen-Sanchez, Gonzalo I.
    FOURTH INTERNATIONAL CONFERENCE ON DIGITAL SOCIETY: ICDS 2010, PROCEEDINGS, 2010, : 31 - 36
  • [35] E-PAYMENT SYSTEM USING VISUAL AND QUANTUM CRYPTOGRAPHY
    Shemin, P. A.
    Vipinkumar, K. S.
    INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, SCIENCE AND TECHNOLOGY (ICETEST - 2015), 2016, 24 : 1623 - 1628
  • [36] A survey on cryptography algorithms in security of voting system approaches
    Wayed, Majid Javid
    Ghani, Abdul Azim Abdul
    Mahmod, Ramlan
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCES AND ITS APPLICATIONS, PROCEEDINGS, 2008, : 190 - 200
  • [37] A Proactive Approach to Preventing Phishing Attacks Using a Pshark
    Shah, Ripan
    Trevathan, Jarrod
    Read, Wayne
    Ghodosi, Hossein
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 915 - 921
  • [38] DEMONSTRATING DIFFERENT PHISHING ATTACKS USING FUZZY LOGIC
    Shirsat, Shweta Dasharath
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 57 - 61
  • [39] Training to Mitigate Phishing Attacks Using Mindfulness Techniques
    Jensen, Matthew L.
    Dinger, Michael
    Wright, Ryan T.
    Thatcher, Jason Bennett
    JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2017, 34 (02) : 597 - 626
  • [40] A system using provably strong cryptography is probably not secure: Some practical attacks
    Burman, S
    IETE TECHNICAL REVIEW, 2002, 19 (04): : 161 - 168