=Paper= {{Paper |id=Vol-1830/Paper66 |storemode=property |title=A Framework for Pre and Post Vote Cast Audit to Enhanced Electronic Voting Systems’ Credibility (PsVCF) |pdfUrl=https://ceur-ws.org/Vol-1830/Paper66.pdf |volume=Vol-1830 |authors=Enesi Femi Aminu,Aliyu Abdulmalik,Hussein Abubakar Zubairu }} ==A Framework for Pre and Post Vote Cast Audit to Enhanced Electronic Voting Systems’ Credibility (PsVCF)== https://ceur-ws.org/Vol-1830/Paper66.pdf
                       International Conference on Information and Communication Technology and Its Applications
                                                              (ICTA 2016)
                                                     Federal University of Technology, Minna, Nigeria
                                                                    November 28 – 30, 2016




    A Framework for Pre and Post Vote Cast Audit to Enhanced Electronic Voting
                          Systems’ Credibility (PsVCF)



                            Enesi Femi Aminu1, Aliyu Abdulmalik2, Hussein Abubakar Zubairu3
                     1,2
                       Department of Computer Science, Federal University of Technology, Minna, Nigeria
            3
                Department of Information & Media Technology, Federal University of Technology, Minna, Nigeria
                         {1enesifa, 3abu.zubairu} @futminna.edu.ng, 2aliyuabdulmalik57@yahoo.com,

Abstract—A citizen of any democratically practiced nation                there individuals who are unscrupulous that can compromise
under the permitted age reserves the legitimate right to vote            the system for some gains. Most a time; these set of people
and be voted for. This right is so powerful which needs to be            are highly proficient in Information Technology (IT)
guided diligently. Because the functions of this right when              knowledge.
carefully used can yield national developments and growths in                Election conducts in Nigeria for instance, is attributed
all sense of live. In order to guide this right from all possible        with a huge number of issues and challenges [4]; common
human interference and manipulations thus; the introduction              among the problems include prolonged legal tussle, missing
of electronic voting machines (eVotingMachines). However, it             names of some registered voters, intimidation and
is ascertain that this has not yet yield the expected results.
                                                                         disfranchisement of voters, multiple and under aged voting,
Because Information Technology (IT) experts, particularly
software designers and engineers are alleged to manipulate the
                                                                         snatching or destruction of ballot boxes, miscomputation and
system (program) to favor their prefer candidate(s). It is in the        falsification of results [2]. As a result of poor electoral
light of this that this paper proposes a pre and post vote cast          system in most developing nations, the sizes of electoral
audit framework for electronic voting machines such that                 mayhem is seriously on the increase, and the political elites
every voter can audit the system before and after voting. This           have taken the advantages of this worrisome situation to
will ensure real free and fair vote cast, authentication of vote         engage uninformed and poverty ridden youths to indulge in
casted and true results of vote casted. Ultimately, reduces to           various electoral violence [5]. In addition, it is also asserted
zero any acts of suspicious and malpractices.                            that in [6] the syndrome of godfatherism and godson also
                                                                         forms a factor to electoral violence exploiting the
   Keywords-eVotingMachines; pre-vote cast; post-vote cast;              weaknesses of the traditional voting system. The collective
audit; credibility; benefitted contestant; party; system.                effect of the electoral abnormalities are but not limited to
                                                                         misuse of incumbency power, lack of lucidity and stern
                                                                         flawed voter lists; actual or perceived bias of election
                       I.    INTRODUCTION                                officials resulting to real or perceived fraud stimulate
                                                                         election related violence with far reaching consequence of
    It is a known fact that the words “democracy and
                                                                         eroding peoples' faith and confidence in democratic process
election” are intervolving. Democracy, a type of government
                                                                         [7]. Therefore, it is also the view of [8] that if the voting
in which the utmost power is confined to the people which
                                                                         mechanism and systems are well managed (just as proposed
can be directly applied by them or by their designated
                                                                         in this paper); it will guarantee good governance based on
representatives under a free electoral system. While, election
                                                                         rule of law, transparency, and accountability. The remaining
on the other hand is a process in which voters select their
                                                                         sections of this paper are thus organized as follow. Section II
representatives and express their preferences for the way that
                                                                         captures the account of some related literatures (studies) of
they will be governed [1]. Poor electoral system is a major
                                                                         the proposed work; Section III depicts the architectural
cause of unhealthy political competition among power
                                                                         framework of the proposed pre and post vote cast audit
contenders and consequently leads to electoral violence. It is
                                                                         which form the pivot of this paper; Section IV implores
ascertain that one of the prime causes of political struggle
                                                                         some data modeling approaches to further gives a pictorial
amid power contestants and eventually leads to electoral
                                                                         details of the proposed framework and Section V concluded
hostility is poor electoral system [2].
                                                                         the work and it recommendations.
    In any democratic settings; qualified citizens or
registered voters are expected to guide and respect their
voting right because it is their desire for such right to be                                 II.   RELATED STUDIES
given to their intended party or candidate. It is important to               The research work carried out by [9], pointed out
note that if the platform designed or adopted to cast and                verifiability, fairness, eligibility, privacy, among others as
count vote lacks credibility, unarguably; that will call for so          salient characteristics of electronic voting systems. The
many questions and presumptions [3]. It is assumed that                  authors aimed to develop an electronic voting system that

                                                                    41
                                         International Conference on Information and Communication Technology and Its Applications (ICTA 2016)

suite these characteristics of electronic voting process. The               Furthermore, [15] developed a real-time e-voting system
system included voting, counting, result announcement                   in Nigeria with emphasis on security and result veracity.
among others. However, at the counting stage; the voter has             Considering the methodology in which the system is
no idea if the vote cast is actually benefited by the targeted          implemented which were divided into five main modules for
contestant or party. The final results would only be                    instance; in the voting module, a voter is expected to register
announced by the counter when the election period of time is            and a password is thereby sent to his mail. By implication,
over at the result announcement stage. We argued that                   such voter is expected to have an existing mail account and
suspected system’s manipulations could still be carried out             cost of accessing his mail before a vote is casted must be
by unethical IT experts.                                                incurred. Considering the low level of literacy and the
    In the course of this research, a good number of works              negative outlook of economy in this part of the world, such
have been carried out on enhancing electronic voting                    system would by extension discourage and disfranchise so
systems; particularly on security - mainly introduction of              many eligible voters. However, in the proposed framework;
biometric for voter’s authentication. This fact was buttress in         fingerprint biometric as a means of security is required for
the work of [10]. However, little or no attention is given to           voter to register and proceed to execute the vote cast
intended vote cast credibility.                                         activities. Thereby eliminates the cost of signing-in and
    Bringing security and authentication like biometric based           accessing email account. Besides, avoid any form of account
computer network into electronic voting machines was the                hijack by third party. Also, the issue of disenfranchisement
survey work carried by [11]. The researchers emphasis the               of eligible voters who are illiterates is completely avoided
significance of Biometric techniques in electronic voting               using the proposed method of security.
machines. In their work, they finally propose a biometric-                  A paper titled “A Simplified Electronic Voting Machine
based design that protects transparency, secrecy, and                   System” by [16] proposed a transparent operation on the
anonymity as well as other important services. Three                    system by using unique information and produces the results
different types of authentications in security related were             of aggregate casted votes for the contestants.
discussed in their work. They are as follows: “something we                 The greatest danger to e-voting system is that
know”; this simply mean some sort of personal information.              interference on program of the systems can go undetected
For example, Personal Identification Number (PIN),                      affecting the results of the voting, then an independent and
password (short or long), the second type is “something we              extensive security monitoring, auditing, cross checking and
have”; the researchers described this type in form of physical          reporting needs to be a critical part of e-voting system [17].
objects for example, token and smart cards and lastly,                      The work of [18] equally stated that as a result of lack of
“something we are”, a typical example is biometric. This                transparency, the use of electronic voting system in some
third type of authentication brings us to the security measure          nations who have adopted its usage had equally generated a
we adopted in the research work. The term biometric                     lot of controversies. The researchers further pointed out that
(fingerprint, iris, face and other passive traits); describe the        few years ago; there was an argument that the
science of measurement of creatures [12].                               trustworthiness of the system may be achieved by the use of
    In the research work of [13], they provided security to             backup paper trails. And in contrast; they argued that the
electronic voting system through the means of visual                    paper trails would not provide the adequate measures but the
cryptography and homomorphic encryption that protect user               transparency of the machine could be restore by adopting
authentication by adopting shared construction algorithm.               sufficient security measures. They concluded that when
Thus, in summary of their work; a voter is authenticated                technology is inaccurately and hastily applied to election, it
before voting take place. The adoption of biometric system              can inadvertently give room to so many electoral challenges
of security in this proposed research is further strengthen by          and thereby lowering the electorate confidence in the
the authors as stated in their work under review that the               exercise. Therefore, the issue is not just adopting electronic
likelihood of two or more users not possessing the same                 voting system in countries like Nigeria but enhancing the
identification features in the biometric system is clearly not          system for electoral confidentiality and credibility is the
daisy. However, auditing process and technique as propose               utmost concern; which is what this proposed work is sought
in this paper was not included in their work.                           to address.
    In the proposed system of [14] the work depicts how                     The need for the proposed framework is justified
mobile phones that are android based are proficient in voting           reviewing the work of [19]; where some nefarious actions
system. The system supported concurrent voting as a result              that could be carried out by different categories of people.
of distributed nature of the database. In summary, the                  Among these is where votes could be illegitimately created,
researchers claimed that the proposed new e-voting system               deleted or modified by voting device or operating system
ensures voter privacy and voting correctness, hence                     developers, internet provider or poll worker (with access to
providing a key mechanism that based on distinctive                     network traffic or storage media). Table 1 shown the
identification number. However, economy and illiteracy                  summarized list of these nefarious actions (attacks) by
factors among others in developing nations were not taken               researchers who done the analysis of Diebold voting system.
into consideration. Besides, android – an open source                       Other types of attacks discussed were insertion of
platform can easily be manipulated by software engineers to             backdoors into operating systems, compiler or loader;
satisfy their negative motives; thereby poses credibility issue         insertion of backdoors into codes attacks; attacks on network
to electronic voting system.                                            capabilities of the systems; attacks on the capabilities of
                                                                        harddisks; and attacks on smart cards.



                                                                   42
                                        International Conference on Information and Communication Technology and Its Applications (ICTA 2016)


                                             TABLE I.        ATTACKS ON THE SYSTEM [19]




                                                                       system. Eligible voter is expected to fully register. The
    III.   THE PROPOSED FRAMEWORK FOR PRE AND POST                     biometric device for fingerprint forms core details of the
                    VOTE CAST AUDIT                                    registration and the details information will automatically
                                                                       keep in the database (DB). The Administrator (Admin) is
    The framework has the administrator (admin.) and the               expected to perform some administration tasks such as
voter as shown in Figure1. The Administrator refers to a key           registering contestants/parties, voters, responsible to display
staff that is completely saddled with the responsibility of            parties or contestants details when the need arise among
monitoring and managing the e-voting system. While the                 other tasks. Essentially, this framework unlike existing
voter category demands voter to first log-in using a biometric         systems, proposes a mechanism where voter can audit the
finger printing device. If the finger print input is confirmed         numbers of votes garner by his/her intending contestant only
to be valid by the system, the voter’s details will be                 before and after his vote to ensure credibility of the vote. In
displayed.                                                             the lieu of this; the proposed architecture is described as
                                                                       three tiers architecture in this paper.
                                                                           Pre-vote Audit: In this tier, voter is expected to login
                                                                       using his fingerprint to validate and authenticate his detail
                                                                       information in the database during registration. Successful
                                                                       login will affords voter to access the number of votes garner
                                                                       by his intending contestant/party only before his vote can be
                                                                       casted. That is; voter cannot access the number of votes
                                                                       garner by other contestants or parties. This is to ensure
                                                                       secrecy and data privacy of other parties. Once a voter
                                                                       accesses a contestant’s numbers of votes; his vote must
                                                                       automatically be casted for such contestant or party as the
                                                                       case may be.
                                                                           Vote: In this mid-tier, a vote is casted and goes to the
                                                                       secured database of the system. Expectedly, the vote will
                                                                       definitely cause increment to the relations (database) of
                                                                       benefited contestant and that of total votes respectively.
                                                                           Post-vote Audit: In order to avoid and eliminates any
                                                                       acts of suspicious, the researchers come up with this final tier
                                                                       (otherwise known as confirmatory tier) of the architecture.
                                                                       This tier finally confirms and ensures that vote casted goes to
                                                                       the intending contestant. This tier checkmates vote against
                                                                       some contemptible acts like causes vote to be miscounted by
                                                                       tampering with the source codes or configuration; insert
               Figure 1. The Proposed Framework
                                                                       backdoors into codes; among others.
                                                                           The architecture is further represented in Figure2 using
     The blue dotted rectangle represents the graphical user           flowchart. Voter is expected to log-in using finger-print
interface (GUI) of the proposed framework for the e-Voting             biometric and some other personal details. If the inputs are

                                                                  43
                                            International Conference on Information and Communication Technology and Its Applications (ICTA 2016)

correct, a pre-vote audit is expected is expected to be carried            being forwarded to the database for onward verification and
out for the intending contestant or party as the case may be.              authentication. Once the system authenticates the thumbprint
A vote is casted and equally expected to carry out a post-vote             to be valid, a successful message is generated to the system
audit before login out of the system. All these functions to               interface. Then, voter can navigate the system to select audit
forestall any forms of despicable acts that could be carried               before vote (pre-vote audit) and from the database the system
out by different categories of people especially malicious                 display the valid number of accredited voters and various
software engineers that can illegitimately set some computer               contestant or parties. Once voter select the intending
codes to create, delete or modify vote.                                    contestant/party that will benefit his vote cast, the system
                                                                           will generates the total number of votes garner by the
                                                                           contestant and the system will prompt the voter to cast his
                                                                           vote automatically for that contestant. Thereafter, a post-vote
                                                                           audit is expected to carry out in order to validate and ensure
                                                                           that your vote is casted for the intending party; and finally
                                                                           logs-out.




      Figure 2. Representation of the Framework using flowchart



   IV.   MODELING THE PROPOSED FRAMEWORK USING USE
             CASE AND SEQUENCE DIAGRAM
    In order to strengthen the aim of this research work and                      Figure 3. Use Case Modeling of the Proposed Framework
make a strong case for it, the proposed framework is further
represented by using some models: use case model for
Figure3 and sequence model for Figure4. This is because use
                                                                                    V.     CONCLUSION AND RECOMMENDATIONS
case diagram affords a better model to describe the proposed
functionalities of any new system; and sequence diagram – a                    It is a known fact that a large number of countries in
unified modeling tool that provides a graphical means of                   Africa, for example, Nigeria; still uses ballot paper system
depicting objects interactions over time.                                  for election. However, considering the common position of
    With the use case diagram in Figure3, the detail                       the related works reviewed in section II, it is long overdue
functionalities of the administrator in the proposed                       for country like Nigeria to key-in into this invention called
framework are captured. Among the functionalities during                   (enhanced) electronic voting system in order to build
requirement analysis are upload: voters, contestants and                   confidence and credibility for the Electoral College that
political parties details, total number of registered voters. It is        would in turn ameliorate electoral violence. Thus, in this
sole responsibility of the administrator to ensure that every              research paper, the credibility of electronic voting systems
eligible voters who shown up for the exercise are duly                     has been extended further by the proposed framework that
registered and ensure to upload their registration details into            prospective voter should be able to audit the number of votes
the database. A voter in this context means those that can                 garner by his/her beneficiary’s contestant or party before and
vote and be voted for. At the end of it, total number of                   after vote is casted. With this proposed framework, election
registered voters should be made available to the voters. Also             result’s credibility is assured; electoral related violence as a
in the case of parties, admin own the duty to equally register             result of suspicious feelings are eliminated; malicious
parties accordingly.                                                       manipulation of the system by unscrupulous and unethical
    The work flow of Figure 4 is as follows: at this point it is           information technology experts are firmly monitored. It is
assumed that every eligible voter has duly registered.                     worth mentioning that pre and post auditing of votes can
Therefore, for vote cast exercise; voter can access the system             only be carried by voter strictly on his/her benefitted
by applying thumbprint via a fingerprint detector which is                 contestant or party. That is; the data privacy of other

                                                                      44
                                                International Conference on Information and Communication Technology and Its Applications (ICTA 2016)

contestants or parties who are not beneficiaries of the                            [4]  M. Duruji, C. Ayo, O. Samuel and A. Oni.“Making a Case for e-
prospective vote should be protected. However; the work is                              Voting in Nigeria”, Proceedings of the 15th European Conference on
                                                                                        eGovernment: ECEG, Portsmouth, UK, 18-19 June, 2015.
still in progress. In the nearest future, the full implementation
                                                                                   [5] D. O. Nnamani. “Electoral Process and Challenges of Good
is expected to be completed where evaluation and test of the                            Governance in the Nigerian State (1999-2011)”. Journal of Good
developed system will be carried out. At that point, a case                             Governance and Sustainable Development in Africa (JGGSDA), Vol.
will be made for its electioneering adoption in Nigeria and                             2, No 3, December, 2014.
beyond. Furthermore, the proposed system is recommended                            [6] A. Abdullahi and R. T. Sakariyau. “Democracy and Politics of
for institutions for example institutions of higher learning for                        Godfatherism In Nigeria: The Effects and Way Forward”.
student union elections on the small-scale applicability.                               International Journal of Politics and Good Governance, Volume 4,
                                                                                        No. 4.2 Quarter II 2013.
                                                                                   [7] L. Olurode. Election Security in Nigeria: Matter Arising. Friedrich-
                                                                                        Ebert-Stiftung (FES) September, 2013.
                                                                                   [8] P. A. Oyadiran and O. I. Nweke. An Appraisal of the Nigerian
                                                                                        Democratic Journey between 1999 and 2014. JORIND 12 (2)
                                                                                        December, 2014.
                                                                                   [9] N. O. Htet and A. M. Aung. “Implementation and Analysis of Secure
                                                                                        Electronic Voting System”. International Journal of Scientific and
                                                                                        Technology Research Volume 2, Issue 3, March 2013.
                                                                                   [10] M. R. Ayesha and S. Z. Naseem. Enhanced Real Time System of E-
                                                                                        Voting using Finger Print, Conference Paper · November 2013.
                                                                                   [11] T. U. Pavshere and S. V. More. “A Survey on Secured E-Voting
                                                                                        System Using Biometric”. International Journal of Advanced
                                                                                        Research in Science, Engineering and Technology, Vol. 3, Issue 3,
                                                                                        March 2016.
                                                                                   [12] C. Vielhauer. Biometric User Authentication for IT Security from
                                                                                        Fundamental to Handwriting. Adavnces in Information Security
                                                                                        Volume 18, Springer Sciences+Business Media Inc., 2006.
                                                                                   [13] R. Tekadel, R. Kharat, V. Magade, M. Shaikh and P. Mendhe. “E-
                                                                                        Voting System using Visual Cryptography & Homomorphic
                                                                                        Encryption”. International Journal of Advanced Research in
                                                                                        Computer and Communication Engineering Vol. 5, Issue 1, January
                                                                                        2016.
                                                                                   [14] A. A. Akshay, G. R. Manoj, R. S. Rajashree and J. V. Bhagyashree.
                                                                                        “Secure Mobile Based E-Voting System”. International Journal on
 Figure 4. Sequence Diagram representation of the Proposed Framework                    Recent and Innovation Trends in Computing and Communication.
                                                                                        Volume: 4 Issue: 4, April 2016.
                                                                                   [15] S. M. Abdulhamid, O. S. Adebayo, D. O. Ugiomoh and M. D.
                             REFERENCES                                                 AbdulMalik. “The Design and Development of Real-Time E-Voting
                                                                                        System in Nigeria with Emphasis on Security and Result Veracity”. I.
                                                                                        J. Computer Network and Information Security 2013, 5, 9 – 18.
[1]   O. O. Okediran, E. O. Omidiora, S. O. Olabiyisi, R. A. Ganiyu and O.         [16] M. M. Hoque. “A Simplified Electronic Voting Machine System”.
      O. Alo. “A Framework for a Multifaceted Electronic Voting System”.                International Journal of Advanced Science and Technology Vol.62,
      International Journal of Applied Science and Technology 135 Vol. 1                pp.97-102, 2014.
      No.4; July 2011.
                                                                                   [17] B. Rexha, V. Neziri and R. Dervishi. Improving authentication and
[2]   S. Ahmad, S. A. J. Bt Abdullah and R. Bt Arshad. “Issues and                      transparency of e-Voting system – Kosovo case. International Journal
      Challenges of Transition to e-Voting Technology in Nigeria” Public                of Computers and Communications Issue 1, Volume 6, 2012.
      Policy and Administration Research, Vol.5, No.4, 2015.
                                                                                   [18] A. Riera and P. Brown. Bringing Confidence to Electronic Voting.
[3]   A. J. Jegede, G. I. O. Aimufua and N. I. Akosu. “Electronic Voting: A             Electronic Journal of e-Governmnet Volume 1 Issue 1. (14-21) 2003.
      Panacia for electoral irregularities in developing countries”.
      International Journal of Science and Knowledge, Vol. 1; No. 1; 17-           [19] S. Krassovsky. Security flaws of existing electronic voting systems,
      30; 2012.                                                                         2005.




                                                                              45