SlideShare a Scribd company logo
FUTURE POLLING SYSTEM USING CLOUD COMPUTING IN SUPPORT WITH
SMART CLIENT TECHNOLOGY
N.Arvind and C.Soorya
Department of Computer Science and Engineering
Sri Sairam Engineering College,Chennai, Anna University
arvind01996@gmail.com, soorya099@gmail.com
Abstract- The cloud computing has become
more popular these days. Cloud computing
is a computing paradigm in which tasks are
assigned to a combination of connections ,
software and services that can be accessed
over internet. This paper proposes the
usage of cloud computing in E-polling. The
main aim of this project is to avoid fake
votes in polling by having a cloud database
about the voters. Iris recognition of
candidates is used for authentication. A
candidate can vote at any place irrespective
of his polling booth and can vote through
mobile phones and computer. The cloud
computing relies on the internet.when the
internet connection fails it does not work
with mobile phone / computer .we have
introduced the smart client technology to
overcome this difficulty in mobile phones
and computers.
Keywords - Cloud Computing, Smart
Client, E-polling, Biometrics.
1.INTRODUCTION
Polling is a choice that is made by counting
the number of people in favor of each
alternative. Current polling system is not so
secure. The main aim of our system is to
provide high security internet polling. Our
system is implemented using cloud computing
and biometrics. Cloud computing is a
paradigm in which virtualized resource are
provided as a service over the internet to the
cloud user. Users need not have knowledge of,
expertise in or over technologies
infrastructure in the “cloud” that supports
them. Biometric identification refers to
identifying an individual based on his/her
distinguishing physiological or behavioral
characteristics. Our system uses iris
recognition as distinguishable factor. Cloud
computing refers to the next evolution of the
Internet. Instead of buying software, installing
it on your computer, upgrading it periodically
and storing all your data on your hard drive,
with cloud computing you use software
applications online, as a service. All you need
is your computing device and an Internet
connection. The cloud computing thus can be
used in polling system
2.EXISTING SYSTEM
The security level in existing voting system
is not up to the mark. As we do not have any
back up, consider the case of EVM (Electronic
Voting Machine)data reliability is not assured.
EVM is based on microcontroller on which
ISBN:978-1535061506
www.iaetsd.in
Proceedings of ICRMET-2016
©IAETSD 201615
the program and the memory can be protected
from external read, but that is very low level
security and chip centric. In case of chip
failure data loss occurs. In many voting
system the candidate are restricted to vote at
their respective places. Internet voting system
SERVE (Security Electronic Registration and
Voting Experiment) is found to be vulnerable
to denial of service attack and website
spooling .This can compromise the results.
Moreover there are a number of technical
issues, including authentication and validation
of the end-point, protecting the voting system
against the inevitable attempts by hostile
parties to disrupt the election, and ensuring
that the network is capable of handling traffic
storms if potentially millions of citizens cast
their E-ballots in a short period of time.
3.PROPOSED SYSTEM
Fig 1.cloud sturcture
In the proposed system the database
creation is done with the details of the
candidate along with iris recognition which
serve as the key for authentication (Biometric
Database).While casting vote the iris
recognition of candidate is being matched
with the existing database. If the match is
found candidate are allowed to caste their vote
,otherwise they are denied. This system
provides safe and secure polling. Cloud
provides a service for voting to all
authenticated user.
4.Biometric Authentication
Biometric data should be collected
from the voters as part of the election pre-
registration process. Database regarding the
candidates are managed with iris recognition
as primary key. While casting vote the iris
recognition of the candidate is matched with
the existing database if the match is found the
casted vote is considered otherwise discarded.
No candidate is recognized twice. In prior to
polling, biometric authentication can also be
used to check whether the candidate is eligible
for casting vote or not. Many notebook
computers include fingerprint readers. In the
near future, the mobile handset industry will
begin to embed some type of biometric
identification system into their devices.
Fig 3.Voting using cloud
5.CLOUD STORAGE
ISBN:978-1535061506
www.iaetsd.in
Proceedings of ICRMET-2016
©IAETSD 201616
In the cloud computing technology we
can store the details of the people along with
their iris recognition . The database creation is
done with the details of the candidate along
with iris recognition which serve as the key
for authentication (Biometric Database).While
casting vote the iris recognition of candidate
is being matched with the existing database. If
the match is found candidate are allowed to
caste their vote ,otherwise they are denied.
This system provides safe and secure polling.
Cloud provides a service for voting to all
authenticated user. The cloud computing
mainly works based only on the internet
facility. All your data is stored online, so you
don't have to worry about the capacity.
5.1Problem with cloud computing
The main problem with the cloud
computing is it requires an internet
connection. If the candidate want to vote at the
time where the internet connection is not
available it is impossible. So we have
introduced a smart client technology to
overcome this problem.
6. SMART CLIENT APPROACH
The term Smart Client was coined to highlight
the differences between the typical "Rich
Client" applications of yesteryear and the next
generation of client applications. To
understand these differences, and to
understand how they are likely to change the
face of client-side computing .The smart client
technology provides the following advantages:
6.1Utilizes Local Resources:
A smart client application always has the
ability on the client that enable local resources
to be utilized. What do we mean by local
resources? We mean everything from
hardware to software resources. A smart client
may take advantage of the local CPU, local
memory or disk, or any local devices
connected to the client.Thus it makes use of
the local resource.
6.2 Offline Capable:
Fig 4.Smart Client technology
Because they are running on the local
machine, one of the key benefits that smart
client applications offer is that they can be
made to work even when the user is not
connected. For applications running in
occasional or intermittent connectivity
situations, such as those used by traveling
workers or even those running on laptops,
tablets, PDA's, and so on, where connectivity
cannot be guaranteed at all times, being able
to work while disconnected is essential. Even
when the client is connected, the smart client
application can improve performance and
usability by caching data and managing the
connection in an intelligent way.
6.3Intelligent Install and Update:
smart client applications manage their
deployment and update in a much more
intelligent way than traditional rich client
applications. There are many frame work that
provides the smart client technology. It
enables application artifacts to be deployed
ISBN:978-1535061506
www.iaetsd.in
Proceedings of ICRMET-2016
©IAETSD 201617
using a variety of techniques, including simple
file copy or download over HTTP.
Applications can be updated while running
and can be deployed on demand by clicking
on a URL.
6.4Client Device Flexibility
This technology provides a common platform
upon which smart client applications can be
built. Often, there will be multiple versions of
the smart client application, each targeting a
specific device type and taking advantage of
the devices unique features and providing
functionality appropriate to its usage.
6.5Storing Candidate Biometric
information
We are storing the biometric information of
the candidate in the local database. The
biometric information which we have used is
the iris recognition . The main purpose of
using the local database in the server is to
store the data of the candidate and update
them in the cloud instantly with the main
server. There are many local servers available
across various polling booth .All of them have
been combined to form the cloud structure so
that they can share the resources. The storage
in the cloud has the several features to be
discussed. The main advantage of using the
cloud computing storage is listed below
6.6Simple Scalability:
In addition to bringing processing to the data,
the next-generation cloud storage scales
simply. Cloud storage requires a high degree
of automation with self-management, self-
configuration and self-healing, all orchestrated
through high-level policies specified by the
storage administrator. Next generation storage
provides administrators flexibility and control.
As the cloud grows, additional nodes are able
to service the data requests in parallel. If
administrators require more performance, they
can add a processing node. If they need more
capacity, they can add disks. Each can be
added independently or scaled simultaneously.
The another advantage of using cloud is you
have to pay for what you are using.
7.ENSURING DATA STORAGE IN
CLOUD COMPUTING
Cloud computing security sometimes
referred to simply as "cloud security" is an
evolving sub-domain of computer security,
network security, and, more broadly,
information security. It refers to a broad set of
policies, technologies, and controls deployed
to protect data, applications, and the
associated infrastructure of cloud
computing.There are a number of security
issues associated with cloud computing but
these issues fall into two broad categories:
Security issues for the polling system and
security of the candidate biometric
authentication.
7.1Data Protection:
To be considered protected, data from
one candidate must be properly protected, it
must be stored securely when “at rest” and it
must be able to move securely from one
location to
Fig 5.Security Aspect in cloud
another. Cloud providers have systems in
place to prevent data leaks or access by third
parties. Proper separation of duties should
ensure that auditing and/or monitoring cannot
be defeated, even by privileged users at the
ISBN:978-1535061506
www.iaetsd.in
Proceedings of ICRMET-2016
©IAETSD 201618
cloud provider. Providers ensure that physical
machines are adequately secure and that
access to these machines as well as all
relevant customer data is not only restricted
but that access is documented. All the attacks
has to be prevented in the cloud computing.
Finally, providers ensure that all critical data
(iris recognition ) are masked digital
identities and credentials must be protected as
should any data that the provider collects or
produces about customer activity in the cloud.
8.VOTING THROUGH MOBILE
PHONES
Since we are using the cloud
computing technology,many devives can be
grouped in the cloud including PC, Mac or
smartphone.here we use the local database to
store the information of the thumb impression
when the internet connection is failed.when
the internet connection is available,it can send
the data to the main server.if the internet
connection is available directly it can send the
candidate information directly to the
server.thus in our system we vote at the
polling booth at any place and also through
other devices.
8.1Cloud-Computing to Address Voting
Storms
There is the question of how to build E-
voting systems that could sustain “voting
storms" of millions of connections. Cloud
computing technology could be used to handle
this issue. Instead of building a dedicated data
center to process these one-time transactions,
the infrastructure should be built through the
cloud-computing model to allow for real-time
on-demand availability of the necessary
additional resources through the cloud.
Election authorities in one state might use the
secure computing facilities in another to
handle the bursts of traffic they experience at
a particular hour of the day. The ability of
global application delivery through the cloud
would be critical to ensure efficiency and
performance in the event of “voting storms”
on the network.
Advantages of Proposed System Over
Existing one
As Authentication is based on
Biometrics, our system is fake proof. In the
existing system, candidates are restricted to
vote in their residential area whereas in our
approach candidate are free to caste their vote
at all places irrespective of their residence.
Data backup is present unlike the EVM, where
if one device fails all data will be lost.
Because the software is online, you don't need
as powerful a computer to run the
application.There's no need to buy and update
software. Use the application you need. All
your data is stored online, so you don't have to
worry about the capacity of your hard
drive.You can access the applications and
your files from anywhere.so you can vote any
place where you are staying at that particular
time. Cloud computing has everything online
fosters collaboration. Whether you use a PC,
Mac or smartphone, applications will run and
you can open and share files.these are some of
the advantages over the existing technology.
9.CONCLUSION
Some countries and states will probably
move ahead with this voting systems
quickly.The advancement of biometric
databases, point-to-point security for both the
end-user and the network, and on-demand
application delivery solutions via the cloud
and regulatory controls would play a pivotal
role in this next-generation technology
definitely. Thus we have implemented the
cloud computing technology for the purpose
of voting .By implementing this the candidate
can vote at any polling booth irrespective of
his booth, Since all the polling booth are
combined to form the cloud structure and also
he can also vote through his mobile phone
with the support of smart client technology.
10.REFERENCES
ISBN:978-1535061506
www.iaetsd.in
Proceedings of ICRMET-2016
©IAETSD 201619
[1]. Anil K. Jain, “An Identity-Authentication
System Using Fingerprints”, Proceedings of
the IEEE, Vol. 85, No. 9, pp 1365 – 1387,
September 1997.
[2]. Michael Miller, “Cloud Computing- A
Web Based Applications That Change the
Way You Work and Collaborate Online”,
ISBN-13: 978-0-7897-3803-5, ISBN-100-
7897-3803-1,
August 2008.
[3].Mr. Aviv, "All IP- national carrier network
based on wireless access technologies”,
Converge , November 04, 2008.
[4].B. Miller, “Everything you need to know
about automated Biometric identification”
Security Technol. Design, Apr.1997.
[5]Wenmoth, D. (2008) Education in the age
of cloud computing.
Advanced Networks, Virtualisation, cloud
computing, emergingtechnologies, networks
and learning.
[6]. M. Bacca, K. Rabuzin: “Biometrics in
Network Security”, The Proceedings of the
XXVIII International Convention MIPRO
2005, Rijeka, Croatia.
ISBN:978-1535061506
www.iaetsd.in
Proceedings of ICRMET-2016
©IAETSD 201620

More Related Content

PDF
Final Year Projects Computer Science (Information security) -2015
PDF
IRJET- Verbal Authentication for Personal Digital Assistants
PDF
Cloud Computing for SMBs
PDF
Database Security Two Way Authentication Using Graphical Password
PDF
A smart, location based time and
PDF
An Overview on Authentication Approaches and Their Usability in Conjunction w...
PDF
PDF
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
Final Year Projects Computer Science (Information security) -2015
IRJET- Verbal Authentication for Personal Digital Assistants
Cloud Computing for SMBs
Database Security Two Way Authentication Using Graphical Password
A smart, location based time and
An Overview on Authentication Approaches and Their Usability in Conjunction w...
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...

What's hot (17)

PDF
IRJET - Graphical Password Authentication for Banking System
PDF
Enterprise Mobile Security for PeopleSoft
PDF
Narrative of digital signature technology and moving forward
PDF
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
PDF
IRJET- Biometric Attendance Management System using Raspberry Pi
PDF
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
PDF
IRJET- Smart Mobile Attendance System using Bluetooth Technology
PDF
Log into android mobile to fetch the device oriented information using remote...
PDF
Log into android mobile to fetch the device oriented information using remote...
PDF
IRJET - Android Application Service Call Management System
PDF
IRJET- Two Way Authentication for Banking Systems
PDF
Software engineering based fault tolerance model for information system in pl...
PPT
Fujitsu Scanners and Datacap, Invoice and Variable Document Capture Innovations
PPTX
A strategic view of mobile device management
DOC
Java project titles
PDF
Managing Passwords for Mobile Users
PDF
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET - Graphical Password Authentication for Banking System
Enterprise Mobile Security for PeopleSoft
Narrative of digital signature technology and moving forward
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
IRJET- Biometric Attendance Management System using Raspberry Pi
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Smart Mobile Attendance System using Bluetooth Technology
Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...
IRJET - Android Application Service Call Management System
IRJET- Two Way Authentication for Banking Systems
Software engineering based fault tolerance model for information system in pl...
Fujitsu Scanners and Datacap, Invoice and Variable Document Capture Innovations
A strategic view of mobile device management
Java project titles
Managing Passwords for Mobile Users
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
Ad

Similar to Iaetsd future polling system using cloud computing in support with smart client technology (20)

PDF
Spe security and privacy enhancement framework for mobile devices
PDF
Nt1310 Unit 1 Assignment 1
PDF
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
DOCX
106248842 cc
PDF
Cloud computing in iot seminar report
PDF
5-Unit (CAB).pdf
DOCX
Strategic Importance of Cloud Computing in the Business Organizati.docx
PDF
I want you to Read intensively papers and give me a summary for ever.pdf
PDF
Securing mobile cloud using finger print authentication
PDF
Mi health care - multi-tenant health care system
PDF
Third Party Public Auditing Scheme for Security in Cloud Storage
PDF
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
PDF
Securing Mobile Cloud Using Finger Print Authentication
DOCX
Emerging Trends in Web App Security.docx
PPTX
Internet of things - Introduction and Variations (Architecture)
PDF
Cyber security and cyber law
PDF
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
PDF
Offline and Online Bank Data Synchronization System
PDF
Iaetsd cloud computing and security challenges
Spe security and privacy enhancement framework for mobile devices
Nt1310 Unit 1 Assignment 1
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
106248842 cc
Cloud computing in iot seminar report
5-Unit (CAB).pdf
Strategic Importance of Cloud Computing in the Business Organizati.docx
I want you to Read intensively papers and give me a summary for ever.pdf
Securing mobile cloud using finger print authentication
Mi health care - multi-tenant health care system
Third Party Public Auditing Scheme for Security in Cloud Storage
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
Securing Mobile Cloud Using Finger Print Authentication
Emerging Trends in Web App Security.docx
Internet of things - Introduction and Variations (Architecture)
Cyber security and cyber law
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
Offline and Online Bank Data Synchronization System
Iaetsd cloud computing and security challenges
Ad

More from Iaetsd Iaetsd (20)

PDF
iaetsd Survey on cooperative relay based data transmission
PDF
iaetsd Software defined am transmitter using vhdl
PDF
iaetsd Health monitoring system with wireless alarm
PDF
iaetsd Equalizing channel and power based on cognitive radio system over mult...
PDF
iaetsd Economic analysis and re design of driver’s car seat
PDF
iaetsd Design of slotted microstrip patch antenna for wlan application
PDF
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
PDF
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
PDF
Fabrication of dual power bike
PDF
Blue brain technology
PDF
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
PDF
iirdem Surveillance aided robotic bird
PDF
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
PDF
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
PDF
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
PDF
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
PDF
iaetsd Shared authority based privacy preserving protocol
PDF
iaetsd Secured multiple keyword ranked search over encrypted databases
PDF
iaetsd Robots in oil and gas refineries
PDF
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Survey on cooperative relay based data transmission
iaetsd Software defined am transmitter using vhdl
iaetsd Health monitoring system with wireless alarm
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Design of slotted microstrip patch antenna for wlan application
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
Fabrication of dual power bike
Blue brain technology
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem Surveillance aided robotic bird
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iaetsd Shared authority based privacy preserving protocol
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Robots in oil and gas refineries
iaetsd Modeling of solar steam engine system using parabolic

Recently uploaded (20)

PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
Well-logging-methods_new................
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
web development for engineering and engineering
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Model Code of Practice - Construction Work - 21102022 .pdf
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Well-logging-methods_new................
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Embodied AI: Ushering in the Next Era of Intelligent Systems
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
OOP with Java - Java Introduction (Basics)
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
bas. eng. economics group 4 presentation 1.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
R24 SURVEYING LAB MANUAL for civil enggi
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Lecture Notes Electrical Wiring System Components
web development for engineering and engineering
Foundation to blockchain - A guide to Blockchain Tech
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx

Iaetsd future polling system using cloud computing in support with smart client technology

  • 1. FUTURE POLLING SYSTEM USING CLOUD COMPUTING IN SUPPORT WITH SMART CLIENT TECHNOLOGY N.Arvind and C.Soorya Department of Computer Science and Engineering Sri Sairam Engineering College,Chennai, Anna University arvind01996@gmail.com, soorya099@gmail.com Abstract- The cloud computing has become more popular these days. Cloud computing is a computing paradigm in which tasks are assigned to a combination of connections , software and services that can be accessed over internet. This paper proposes the usage of cloud computing in E-polling. The main aim of this project is to avoid fake votes in polling by having a cloud database about the voters. Iris recognition of candidates is used for authentication. A candidate can vote at any place irrespective of his polling booth and can vote through mobile phones and computer. The cloud computing relies on the internet.when the internet connection fails it does not work with mobile phone / computer .we have introduced the smart client technology to overcome this difficulty in mobile phones and computers. Keywords - Cloud Computing, Smart Client, E-polling, Biometrics. 1.INTRODUCTION Polling is a choice that is made by counting the number of people in favor of each alternative. Current polling system is not so secure. The main aim of our system is to provide high security internet polling. Our system is implemented using cloud computing and biometrics. Cloud computing is a paradigm in which virtualized resource are provided as a service over the internet to the cloud user. Users need not have knowledge of, expertise in or over technologies infrastructure in the “cloud” that supports them. Biometric identification refers to identifying an individual based on his/her distinguishing physiological or behavioral characteristics. Our system uses iris recognition as distinguishable factor. Cloud computing refers to the next evolution of the Internet. Instead of buying software, installing it on your computer, upgrading it periodically and storing all your data on your hard drive, with cloud computing you use software applications online, as a service. All you need is your computing device and an Internet connection. The cloud computing thus can be used in polling system 2.EXISTING SYSTEM The security level in existing voting system is not up to the mark. As we do not have any back up, consider the case of EVM (Electronic Voting Machine)data reliability is not assured. EVM is based on microcontroller on which ISBN:978-1535061506 www.iaetsd.in Proceedings of ICRMET-2016 ©IAETSD 201615
  • 2. the program and the memory can be protected from external read, but that is very low level security and chip centric. In case of chip failure data loss occurs. In many voting system the candidate are restricted to vote at their respective places. Internet voting system SERVE (Security Electronic Registration and Voting Experiment) is found to be vulnerable to denial of service attack and website spooling .This can compromise the results. Moreover there are a number of technical issues, including authentication and validation of the end-point, protecting the voting system against the inevitable attempts by hostile parties to disrupt the election, and ensuring that the network is capable of handling traffic storms if potentially millions of citizens cast their E-ballots in a short period of time. 3.PROPOSED SYSTEM Fig 1.cloud sturcture In the proposed system the database creation is done with the details of the candidate along with iris recognition which serve as the key for authentication (Biometric Database).While casting vote the iris recognition of candidate is being matched with the existing database. If the match is found candidate are allowed to caste their vote ,otherwise they are denied. This system provides safe and secure polling. Cloud provides a service for voting to all authenticated user. 4.Biometric Authentication Biometric data should be collected from the voters as part of the election pre- registration process. Database regarding the candidates are managed with iris recognition as primary key. While casting vote the iris recognition of the candidate is matched with the existing database if the match is found the casted vote is considered otherwise discarded. No candidate is recognized twice. In prior to polling, biometric authentication can also be used to check whether the candidate is eligible for casting vote or not. Many notebook computers include fingerprint readers. In the near future, the mobile handset industry will begin to embed some type of biometric identification system into their devices. Fig 3.Voting using cloud 5.CLOUD STORAGE ISBN:978-1535061506 www.iaetsd.in Proceedings of ICRMET-2016 ©IAETSD 201616
  • 3. In the cloud computing technology we can store the details of the people along with their iris recognition . The database creation is done with the details of the candidate along with iris recognition which serve as the key for authentication (Biometric Database).While casting vote the iris recognition of candidate is being matched with the existing database. If the match is found candidate are allowed to caste their vote ,otherwise they are denied. This system provides safe and secure polling. Cloud provides a service for voting to all authenticated user. The cloud computing mainly works based only on the internet facility. All your data is stored online, so you don't have to worry about the capacity. 5.1Problem with cloud computing The main problem with the cloud computing is it requires an internet connection. If the candidate want to vote at the time where the internet connection is not available it is impossible. So we have introduced a smart client technology to overcome this problem. 6. SMART CLIENT APPROACH The term Smart Client was coined to highlight the differences between the typical "Rich Client" applications of yesteryear and the next generation of client applications. To understand these differences, and to understand how they are likely to change the face of client-side computing .The smart client technology provides the following advantages: 6.1Utilizes Local Resources: A smart client application always has the ability on the client that enable local resources to be utilized. What do we mean by local resources? We mean everything from hardware to software resources. A smart client may take advantage of the local CPU, local memory or disk, or any local devices connected to the client.Thus it makes use of the local resource. 6.2 Offline Capable: Fig 4.Smart Client technology Because they are running on the local machine, one of the key benefits that smart client applications offer is that they can be made to work even when the user is not connected. For applications running in occasional or intermittent connectivity situations, such as those used by traveling workers or even those running on laptops, tablets, PDA's, and so on, where connectivity cannot be guaranteed at all times, being able to work while disconnected is essential. Even when the client is connected, the smart client application can improve performance and usability by caching data and managing the connection in an intelligent way. 6.3Intelligent Install and Update: smart client applications manage their deployment and update in a much more intelligent way than traditional rich client applications. There are many frame work that provides the smart client technology. It enables application artifacts to be deployed ISBN:978-1535061506 www.iaetsd.in Proceedings of ICRMET-2016 ©IAETSD 201617
  • 4. using a variety of techniques, including simple file copy or download over HTTP. Applications can be updated while running and can be deployed on demand by clicking on a URL. 6.4Client Device Flexibility This technology provides a common platform upon which smart client applications can be built. Often, there will be multiple versions of the smart client application, each targeting a specific device type and taking advantage of the devices unique features and providing functionality appropriate to its usage. 6.5Storing Candidate Biometric information We are storing the biometric information of the candidate in the local database. The biometric information which we have used is the iris recognition . The main purpose of using the local database in the server is to store the data of the candidate and update them in the cloud instantly with the main server. There are many local servers available across various polling booth .All of them have been combined to form the cloud structure so that they can share the resources. The storage in the cloud has the several features to be discussed. The main advantage of using the cloud computing storage is listed below 6.6Simple Scalability: In addition to bringing processing to the data, the next-generation cloud storage scales simply. Cloud storage requires a high degree of automation with self-management, self- configuration and self-healing, all orchestrated through high-level policies specified by the storage administrator. Next generation storage provides administrators flexibility and control. As the cloud grows, additional nodes are able to service the data requests in parallel. If administrators require more performance, they can add a processing node. If they need more capacity, they can add disks. Each can be added independently or scaled simultaneously. The another advantage of using cloud is you have to pay for what you are using. 7.ENSURING DATA STORAGE IN CLOUD COMPUTING Cloud computing security sometimes referred to simply as "cloud security" is an evolving sub-domain of computer security, network security, and, more broadly, information security. It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing.There are a number of security issues associated with cloud computing but these issues fall into two broad categories: Security issues for the polling system and security of the candidate biometric authentication. 7.1Data Protection: To be considered protected, data from one candidate must be properly protected, it must be stored securely when “at rest” and it must be able to move securely from one location to Fig 5.Security Aspect in cloud another. Cloud providers have systems in place to prevent data leaks or access by third parties. Proper separation of duties should ensure that auditing and/or monitoring cannot be defeated, even by privileged users at the ISBN:978-1535061506 www.iaetsd.in Proceedings of ICRMET-2016 ©IAETSD 201618
  • 5. cloud provider. Providers ensure that physical machines are adequately secure and that access to these machines as well as all relevant customer data is not only restricted but that access is documented. All the attacks has to be prevented in the cloud computing. Finally, providers ensure that all critical data (iris recognition ) are masked digital identities and credentials must be protected as should any data that the provider collects or produces about customer activity in the cloud. 8.VOTING THROUGH MOBILE PHONES Since we are using the cloud computing technology,many devives can be grouped in the cloud including PC, Mac or smartphone.here we use the local database to store the information of the thumb impression when the internet connection is failed.when the internet connection is available,it can send the data to the main server.if the internet connection is available directly it can send the candidate information directly to the server.thus in our system we vote at the polling booth at any place and also through other devices. 8.1Cloud-Computing to Address Voting Storms There is the question of how to build E- voting systems that could sustain “voting storms" of millions of connections. Cloud computing technology could be used to handle this issue. Instead of building a dedicated data center to process these one-time transactions, the infrastructure should be built through the cloud-computing model to allow for real-time on-demand availability of the necessary additional resources through the cloud. Election authorities in one state might use the secure computing facilities in another to handle the bursts of traffic they experience at a particular hour of the day. The ability of global application delivery through the cloud would be critical to ensure efficiency and performance in the event of “voting storms” on the network. Advantages of Proposed System Over Existing one As Authentication is based on Biometrics, our system is fake proof. In the existing system, candidates are restricted to vote in their residential area whereas in our approach candidate are free to caste their vote at all places irrespective of their residence. Data backup is present unlike the EVM, where if one device fails all data will be lost. Because the software is online, you don't need as powerful a computer to run the application.There's no need to buy and update software. Use the application you need. All your data is stored online, so you don't have to worry about the capacity of your hard drive.You can access the applications and your files from anywhere.so you can vote any place where you are staying at that particular time. Cloud computing has everything online fosters collaboration. Whether you use a PC, Mac or smartphone, applications will run and you can open and share files.these are some of the advantages over the existing technology. 9.CONCLUSION Some countries and states will probably move ahead with this voting systems quickly.The advancement of biometric databases, point-to-point security for both the end-user and the network, and on-demand application delivery solutions via the cloud and regulatory controls would play a pivotal role in this next-generation technology definitely. Thus we have implemented the cloud computing technology for the purpose of voting .By implementing this the candidate can vote at any polling booth irrespective of his booth, Since all the polling booth are combined to form the cloud structure and also he can also vote through his mobile phone with the support of smart client technology. 10.REFERENCES ISBN:978-1535061506 www.iaetsd.in Proceedings of ICRMET-2016 ©IAETSD 201619
  • 6. [1]. Anil K. Jain, “An Identity-Authentication System Using Fingerprints”, Proceedings of the IEEE, Vol. 85, No. 9, pp 1365 – 1387, September 1997. [2]. Michael Miller, “Cloud Computing- A Web Based Applications That Change the Way You Work and Collaborate Online”, ISBN-13: 978-0-7897-3803-5, ISBN-100- 7897-3803-1, August 2008. [3].Mr. Aviv, "All IP- national carrier network based on wireless access technologies”, Converge , November 04, 2008. [4].B. Miller, “Everything you need to know about automated Biometric identification” Security Technol. Design, Apr.1997. [5]Wenmoth, D. (2008) Education in the age of cloud computing. Advanced Networks, Virtualisation, cloud computing, emergingtechnologies, networks and learning. [6]. M. Bacca, K. Rabuzin: “Biometrics in Network Security”, The Proceedings of the XXVIII International Convention MIPRO 2005, Rijeka, Croatia. ISBN:978-1535061506 www.iaetsd.in Proceedings of ICRMET-2016 ©IAETSD 201620